Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 25

Which of the following is a situation in which a surge suppressor is considered critical?

A.

The electrical source is not grounded.

B.

A device requires 220V or higher.

C.

A device is being turned on for the first time.

D.

The electrical source is near high humidity.

Full Access
Question # 26

A technician, who is completing hardware upgrades at a company, is approached by a user who submitted a computer upgrade request. After checking the list of offices to upgrade, the technician finds that the user's office is not listed for an upgrade. Which of the following actions should the technician take next?

A.

Ask the company's human resources department to address the issue.

B.

Notify the project manager about the user's concern.

C.

Tell the user that this request is not on the list to be upgraded.

D.

Ask the user's supervisor if the technician should upgrade the computer.

Full Access
Question # 27

A technician needs to open a port on a firewall in order to connect to a Linux server via a terminal interface. Which of the following ports should the technician open?

A.

21

B.

22

C.

53

D.

443

E.

3389

Full Access
Question # 28

A company wants to reduce the negative ecological impacts of its business and has decided to hire an e-waste company to dispose of equipment. Which of the following should the e-waste company provide the business7

A.

Non-disclosure agreement

B.

Certification of destruction

C.

Low-level formatting

D.

Shredding/drilling

Full Access
Question # 29

An MDM report shows that a user's company cell phone has unauthorized applications installed. The device has recently checked into the MDM server, and the company still has access to remotely wipe the device. Which of the following describes the action the user has performed?

A.

Obtained root access

B.

Upgraded the OS

C.

Installed a VPN

D.

Uninstalled the MDM software

Full Access
Question # 30

An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?

A.

Smart card

B.

Biometrics

C.

Hard token

D.

One-time password

Full Access
Question # 31

A technician is working at a client office site, and the technician’s family member repeatedly calls and texts about a non-emergency situation. Which of the following should the technician do?

A.

Step aside and answer.

B.

Put the phone on silent.

C.

Text a reply.

D.

Ignore the phone and continue working.

Full Access
Question # 32

A user is unable to access the company’s internal network on a separate subnet. A help desk technician verifies the user's credentials, and the user has the appropriate permissions to access the network. The technician checks the network and finds the connection is stable. No other users are having this issue. Which of the following should the technician do next?

A.

Consult with the firewall team to see If the user's IP address Is blocked.

B.

Delete the user’s credentials and create new ones.

C.

Run a virus scan on the user's workstation.

D.

Update the network drivers on the user’s workstation.

Full Access
Go to page: