Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

220-1202 Exam Dumps - CompTIA A+ Core 2 2025 Exam

Go to page:
Question # 9

A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information. Which of the following best describes this scenario?

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Full Access
Question # 10

A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team do to prevent further unauthorized installations from occurring?

A.

Configure Group Policy.

B.

Implement PAM.

C.

Install anti-malware software.

D.

Deploy MDM.

Full Access
Question # 11

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Full Access
Question # 12

A user is experiencing issues with outdated images while browsing websites. Which of the following settings should a technician use to correct this issue?

A.

Administrative Tools

B.

Windows Defender Firewall

C.

Internet Options

D.

Ease of Access

Full Access
Question # 13

A technician is assigned to offboard a user. Which of the following are common tasks on an offboarding checklist? (Choose two.)

A.

Quarantine the hard drive in the user's laptop.

B.

Deactivate the user's key fobs for door access.

C.

Purge all PII associated with the user.

D.

Suspend the user's email account.

E.

Turn off the network ports underneath the user's desk.

F.

Add the MAC address of the user's computer to a blocklist.

Full Access
Question # 14

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

A.

Implement the change

B.

Approve the change

C.

Propose the change

D.

Schedule the change

Full Access
Question # 15

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Full Access
Question # 16

A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to fix the network access issue?

A.

Wide-area network

B.

Wireless network

C.

Proxy network settings

D.

Virtual private network

Full Access
Go to page: