Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 6 / 17
Total 832 questions

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?

A.

Group Policy Editor

B.

Local Users and Groups

C.

Device Manager

D.

System Configuration

Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?

A.

gpedit.msc

B.

perfmon.msc

C.

devmgmt.msc

A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select?

A.

Full

B.

Incremental

C.

Differential

D.

Synthetic

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?

A.

FTP

B.

RDP

C.

SSH

D.

VNC

Which of the following is also known as something you know, something you have, and something you are?

    ACL

A.

MFA

B.

SMS

C.

NFC

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

A.

Investigate the firewall logs.

B.

Isolate the machine from the network.

C.

Inspect the Windows Event Viewer.

D.

Take a physical inventory of the device.

Which of the following should be documented to ensure that the change management plan is followed?

A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis

Which of the following would allow physical access to a restricted area while maintaining a record of events?

A.

Hard token

B.

Access control vestibule

C.

Key fob

D.

Door Lock

Which of the following is command options is used to display hidden files and directories?

A.

-a

B.

-s

C.

-lh

D.

-t

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

A.

ipconfig

B.

arp

C.

nslookup

D.

pathping

Which of the following are mobile operating systems used on smartphones? (Select two).

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Which of the following statements describes the purpose of scripting languages?

    To access the hardware of the computer it is running on

A.

To automate tasks and reduce the amount of manual labor

B.

To abstract the complexity of the computer system

C.

To compile the program into an executable file