Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 1 / 17
Total 832 questions

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

A.

Run the antivirus scan.

B.

Add the required snap-in.

C.

Restore the system backup

D.

use the administrator console.

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

A.

Data usage limits

B.

Wi-Fi connection speed

C.

Status of airplane mode

D.

System uptime

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

A.

The instructions from the software company are not being followed.

B.

Security controls will treat automated deployments as malware.

C.

The deployment script is performing unknown actions.

D.

Copying scripts off the internet is considered plagiarism.

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Which of the following should be used to control security settings on an Android phone in a domain environment?

A.

MDM

B.

MFA

C.

ACL

D.

SMS

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

A.

Guards

B.

Bollards

C.

Motion sensors

D.

Access control vestibule

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

A.

The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozenapplication in the list, and clicks Force Quit.

B.

The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.

C.

The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.

D.

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Which of the following data is MOST likely to be regulated?

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?

A.

Surge suppressor

B.

Battery backup

C.

CMOS battery

D.

Generator backup

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives