Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 185

An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?

A.

Scan all of the infected files with up-to-date, anti-malware cleaning software.

B.

Fully patch the server operating systems hosting the fileshares.

C.

Change the files to be read-only.

D.

Restore critical data from backup.

Full Access
Question # 186

A technician finds that a new company security policy has broken an application in use at a branch office. Which of the following should the technician do to ensure that the application is fixed and prevent the issue from reoccurring?

A.

Request a policy exception be put in place while the application requirements are addressed

B.

Reinstall the affected software using local administrative rights for each computer

C.

Remove the new security settings and change the administrative accounts on the branch office computers to prevent the settings from being reapplied

D.

Research and procure a replacement application that is not adversely affected by the new policy

Full Access
Question # 187

An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?

A.

Smart card

B.

Biometrics

C.

Hard token

D.

One-time password

Full Access
Question # 188

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

A.

ext

B.

APFS

C.

FAT

D.

EFS

Full Access
Question # 189

Which of the following is the most practical method to reduce the number of clicks on phishing emails for a public-facing organization?

A.

Providing user awareness education

B.

Introducing a BYOD policy

C.

Setting up SMTP filtering rules

D.

Restricting emails from personal email addresses

Full Access
Question # 190

A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?

A.

End-user acceptance

B.

Staff delegation

C.

Appropriate scoping

D.

Sandbox testing

Full Access
Question # 191

A user downloaded a 64-bit version of a new software program, but the installation failed due to an error. Which of the following most likely caused the error?

A.

The OS version is incompatible.

B.

The user needs to enable ActiveX.

C.

The .NET Framework needs to be updated.

D.

The user needs administrator privileges.

Full Access
Question # 192

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Full Access
Go to page: