Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 49

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Full Access
Question # 50

A company is transitioning to a new firewall and discovers that one of the servers is still sending traffic to the old firewall. Which of the following IP address settings should a technician change to resolve this issue?

A.

Dynamic

B.

Gateway

C.

NAT

D.

DNS server

Full Access
Question # 51

A client recently upgraded their Windows 10 machine to Windows 11. The client reports the following message displays when turning the computer on: "Error loading operating system." Which of the following should a technician do first to troubleshoot this issue?

A.

Disable the Secure Boot feature.

B.

Use the automated startup recovery.

C.

Format the drive.

D.

Resize the boot partition.

Full Access
Question # 52

An MDM report shows that a user's company cell phone has unauthorized applications installed. The device has recently checked into the MDM server, and the company still has access to remotely wipe the device. Which of the following describes the action the user has performed?

A.

Obtained root access

B.

Upgraded the OS

C.

Installed a VPN

D.

Uninstalled the MDM software

Full Access
Question # 53

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Full Access
Question # 54

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

A.

MFA

B.

WPA2

C.

AES

D.

RADIUS

Full Access
Question # 55

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Full Access
Question # 56

A customer's machine is heavily infected with various strains of malware. Which of the following is the most efficient and verifiable way to ensure all of the malware is removed from the system?

A.

Utilizing a system restore point

B.

Performing a clean OS installation

C.

Replacing damaged files with verified backups

D.

Utilizing multiple AV vendors to eradicate the infections

Full Access
Go to page: