New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 6 / 13
Total 845 questions

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?

A.

The domain's processor compatibility is not met

B.

The laptop has Windows 10 Home installed

C.

The laptop does not have an onboard Ethernet adapter

D.

The Laptop does not have all current Windows updates installed

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.

INSTRUCTIONS

Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?

A.

DHCP reservation

B.

Port forwarding

C.

DNS A record

D.

NAT

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

A.

Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin

B.

Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run

C.

Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup

D.

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?

A.

Verify all third-party applications are disabled

B.

Determine if the device has adequate storage available.

C.

Check if the battery is sufficiently charged

D.

Confirm a strong internet connection is available using Wi-Fi or cellular data

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

A.

Consoltf

B.

Disk Utility

C.

Time Machine

D.

FileVault

A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?

A.

Change the DNS address to 1.1.1.1

B.

Update Group Policy

C.

Add the site to the client's exceptions list

D.

Verity the software license is current.

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?

A.

FreeBSD

B.

Chrome OS

C.

macOS

D.

Windows

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

A.

The smartphone's line was not provisioned with a data plan

B.

The smartphone's SIM card has failed

C.

The smartphone's Bluetooth radio is disabled.

D.

The smartphone has too many applications open

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

A.

Quarantining system files

B.

Reimaging the workstation

C.

Encrypting the hard drive

D.

Disabling TLS 1.0 support

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

A.

Home

B.

Pro for Workstations

C.

Enterprise

D.

Pro

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A.

.deb

B.

.vbs

C.

.exe

D.

.app

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.