Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 137

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

A.

Document the date and time of change

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document the findings of the sandbox test,

Full Access
Question # 138

A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation?

A.

SAN

B.

LAN

C.

GPU

D.

PAN

Full Access
Question # 139

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

A.

nslookup

B.

net use

C.

netstat

D.

net user

Full Access
Question # 140

A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?

A.

Disabling UAC

B.

Restricting local administrators

C.

Enabling UPnP

D.

Turning off AutoPlay

Full Access
Question # 141

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

A.

The smartphone's line was not provisioned with a data plan

B.

The smartphone's SIM card has failed

C.

The smartphone's Bluetooth radio is disabled.

D.

The smartphone has too many applications open

Full Access
Question # 142

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Full Access
Question # 143

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?

A.

macOS

B.

Linux

C.

Chrome OS

D.

Windows

Full Access
Question # 144

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

A.

Scan the computer with the company-provided antivirus software

B.

Install a new hard drive and clone the user's drive to it

C.

Deploy an ad-blocking extension to the browser.

D.

Uninstall the company-provided antivirus software

E.

Click the link in the messages to pay for virus removal

F.

Perform a reset on the user's web browser

Full Access
Go to page: