Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 1 / 13
Total 845 questions

Which of the following technologies is proprietary and can be configured to use MFA?

A.

MS-CHAPv2

B.

RADIUS

C.

Kerberos

D.

WPA2

A technician needs to override DNS and map IP addresses and URLs to different locations. Which of the following should the technician do?

A.

Install signal repeaters.

B.

Edit the hosts file.

C.

Configure the firewall.

D.

Enable port forwarding.

A company is opening several remote offices and would like to have the capability for its systems administrator to automate patch management and software deployment. Which of the following would meet this requirement?

A.

VNC

B.

RMM

C.

MSRA

D.

SSH

A company wants a new software program installed on all company computers, including remote employees’ machines. Which of the following methods should the IT department use to remotely deploy the software?

A.

Clone

B.

Scripted

C.

In-place

D.

Image

A technician thinks that a computer on the network has been infected with malware. The technician attempts several times to use a malware removal tool, but the issue persists. Which of the following should the technician do next?

A.

Restore the computer from the last known-good backup

B.

Reboot the computer into safe mode

C.

Purchase a new endpoint protection tool

D.

Use system recovery to prevent further infection

While accessing a website, a user clicks on a menu option and nothing happens. Which of the following actions should the user take to most likely resolve this issue?

A.

Enable TLS 1.0 in the browser.

B.

Enable private-browsing mode.

C.

Disable pop-up blocker.

D.

Clear the cache.

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

A.

Data-in-transit encryption

B.

File encryption

C.

USB drive encryption

D.

Disk encryption

After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?

A.

Shut down and cold start the smartphone

B.

Delete the email containing the attachment

C.

Wipe the device and reset it to factory defaults

D.

Uninstall and reinstall the mobile browser

Which of the following security threats requires a phone call to launch the attack?

A.

Vishing

B.

XSS

C.

Spoofing

D.

DDoS

Which of the following types of malware is designed to enable administrative access to a computer?

A.

Rootkit

B.

Trojan

C.

Worm

D.

Ransomware

A user is unable to open personal files on a PC on a home network. An on-screen message indicates the files are encrypted and demands payment to access the files. Which of the following should a technician recommend the user do first?

A.

Reinstall the OS.

B.

Run the System Restore feature.

C.

Disconnect the PC from the network.

D.

Pay the amount demanded.

E.

Scan the PC with an anti-malware program.

A company’s help desk receives numerous calls from employees reporting issues related to a current security breach. Which of the following steps should the help desk team take to document the breach?

A.

Record the details in the ticketing system.

B.

Take screenshots and attach them to the root cause analysis.

C.

Discuss the incident with the company’s legal team.

D.

List the details in the company’s knowledge base.

A user is unable to see transaction details on a website, and nothing happens when the user clicks the details button. Which of the following should the user do to fix this issue?

A.

Clear the browser cache.

B.

Disable the pop-up blocker.

C.

Configure private browsing.

D.

Verify valid certificates.

A technician is implementing the latest application security updates for endpoints on an enterprise network. Which of the following solutions should the technician use to ensure device security on the network while adhering to industry best practices?

A.

Automate the patching process.

B.

Monitor the firewall configuration.

C.

Implement access control lists.

D.

Document all changes.

Which of the following is used to detect and record access to restricted areas?

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?

A.

.py

B.

.js

C.

.vbs

D.

.sh

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Which of the following command-line tools will delete a directory?

A.

md

B.

del

C.

dir

D.

rd

E.

cd