Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 7 / 17
Total 832 questions

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

    Turn off the machine.

A.

Run a full antivirus scan.

B.

Remove the LAN card.

C.

Install a different endpoint solution.

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?

A.

Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.

B.

Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.

C.

Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

D.

Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Disable applicable BIOS options.

B.

Load the system in safe mode.

C.

Start up using a flash drive OS and run System Repair.

D.

Enable Secure Boot and reinstall the system.

Which of the following is the most likely to use NTFS as the native filesystem?

A.

macOS

B.

Linux

C.

Windows

D.

Android

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?

    msconfig

A.

chkdsk

B.

sfc

C.

diskpart

D.

mstsc

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

A.

Software firewall

B.

Password complexity

C.

Antivirus application

D.

Anti-malware scans

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

A.

ifconfig

B.

netstat

C.

ping

Which of the following combinations meets the requirements for mobile device multifactor authentication?

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

A.

Configure the firewall.

B.

Restore the system from backups.

C.

Educate the end user

D.

Update the antivirus program.

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.