Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 9

A user's computer was infected with a Trojan. The user thinks the Trojan was introduced when clicking on a malicious link in an email. Which of the following actions should the technician take to prevent further damage to the computer?

A.

Ensure anti-malware signatures are up to date.

B.

Enable the firewall.

C.

Scan the system with a rootkit scanner.

D.

Review the proxy settings.

Full Access
Question # 10

A technician needs to configure a newly installed SSD. Which of the following tools should the technician use? (Select two).

A.

regedit.exe

B.

resmon.exe

C.

gpedit.msc

D.

diskmgmt.msc

E.

dfrgui.exe

F.

diskpart.msc

Full Access
Question # 11

A technician is working at a client office site and the technician's family member repeatedly calls and texts about a non-emergency situation. Which of the following should the technician do?

A.

Step aside and answer.

B.

Put the phone on silent.

C.

Text a reply.

D.

Ignore the phone and continue working.

Full Access
Question # 12

Which of the following is the most secure method of preventing someone from accessing a cell phone?

A.

PIN

B.

Swipe

C.

Passphrase

D.

Pattern

Full Access
Question # 13

Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?

A.

Encrypting data at rest

B.

Implementing firewalls

C.

Utilizing Intrusion detection systems

D.

Backing up data regularly

Full Access
Question # 14

A technician is assisting a customer who is having difficulty accessing the company’s website. Which of the following should the technician do first?

A.

Ask the customer for their log-in credentials.

B.

Check the company's internal knowledge base for solutions.

C.

Refer the customer to a more experienced technician.

D.

Record the details of the issue in the company’s ticketing system.

Full Access
Question # 15

Which of the following is the most significant drawback of using the WEP protocol for wireless security?

A.

Complex configuration process

B.

Slow data transfer speed

C.

Vulnerability to key-cracking attacks

D.

Incompatibility with older devices

Full Access
Question # 16

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Full Access
Go to page: