Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 169

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Full Access
Question # 170

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

A.

Screen resolution

B.

Screen zoom

C.

Screen timeout

D.

Screen brightness

E.

Screen damage

F.

Screen motion smoothness

Full Access
Question # 171

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Full Access
Question # 172

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

Full Access
Question # 173

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

A.

Screen-sharing software

B.

Secure shell

C.

Virtual private network

D.

File transfer software

Full Access
Question # 174

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

A.

TACACS+

B.

Kerberos

C.

Preshared key

D.

WPA2/AES

Full Access
Question # 175

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

A.

Disk Cleanup

B.

Resource Monitor

C.

Disk Defragment

D.

Disk Management

Full Access
Question # 176

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

A.

Implementing data-at-rest encryption

B.

Disabling AutoRun

C.

Restricting user permissions

D.

Restricting log-in times

E.

Enabling a screen lock

F.

Disabling local administrator accounts

Full Access
Go to page: