Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

220-1002 Sample Questions Answers

Questions 4

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?

Options:

A.

Update limitations

B.

Limited access

C.

End-of-life

D.

Network connection

Buy Now
Questions 5

A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible Which of the following technologies should the technician use to manage this system?

Options:

A.

Telnet

B.

HTTPS

C.

SSH

D.

RDP

E.

SFTP

Buy Now
Questions 6

The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.

Which of the following would be the MOST secure solution to this error?

Options:

A.

Add Ann to the local Power Users group

B.

Set the software to save to the %APPDATA% folder

C.

Add Ann to the local administrator group

D.

Give Ann write access to C:\Program Files\

E.

Give Ann permission to elevate her permissions through a UAC prompt

Buy Now
Questions 7

Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

Options:

A.

Shoulder surfing

B.

Phishing

C.

Tailgating

D.

Dumpster diving

Buy Now
Questions 8

Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?

Options:

A.

Create a static DNS entry on the server for the PC

B.

Change her NIC IP address to dynamic

C.

Create a new exception on her local firewall

D.

Make sure the PC’s IP is in the management VLAN

Buy Now
Questions 9

Which of the following installation methods allows a technician to install Windows from a remote location

Options:

A.

USB

B.

NetBoot

C.

PXE

D.

CD-ROM

Buy Now
Questions 10

A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?

Options:

A.

Loop

B.

Integer

C.

String

D.

Variable

Buy Now
Questions 11

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

Options:

A.

Firewall

B.

Antivirus

C.

Email filtering

D.

ACLs

E.

VPN

Buy Now
Questions 12

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

Options:

A.

LCD monitor

B.

Power supply

C.

Laptop screen

D.

CRT monitor

E.

Motherboard

F.

Tablet

Buy Now
Questions 13

A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues?

(Choose two.)

Options:

A.

Slow performance

B.

Slow data speeds

C.

No wireless connectivity

D.

Baseband

E.

Application hang

F.

Overheating

Buy Now
Questions 14

A recent outbreak of a virus has uncovered that a company must put a security template in place to mitigate future virus outbreaks. Which of the following best practices would a technician MOST likely implement as pari of the security template? (Select TWO).

Options:

A.

Failed attempts lockout policy

B.

Restricting user permissions

C.

Login time restrictions

D.

Setting strong passwords

E.

Patch/update management

Buy Now
Questions 15

A Windows 7 machine appears to have a failure. Every time it is rebooted, the message “BOOTMGR is missing” appears.

You have previously inserted a Windows 7 installation DVD into the DVD-ROM.D18912E1457D5D1DDCBD40AB3BF70D5D

Please repair this failure without overwriting the customers’ local user profiles.

INSTRUCTIONS

Use the Windows recovery and repair utilities to remediate the issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 16

An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a

hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for

subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent

any further emails from this organization?

Options:

A.

Click the “Unsubscribe” button on each unwanted email

B.

Send the unwanted items to the spam or junk folder

C.

Deploy an email address whitelist

D.

Create domain-based filters

Buy Now
Questions 17

A user recently connected a Windows laptop to a free WiFi hot-spot. After returning to the office, the user cannot access network shares. Which of the following is the MOST likely cause?

Options:

A.

Remote access has been disabled.

B.

The local firewall settings are incorrect.

C.

Location-based settings are not turned on.

D.

The network shares are hidden.

Buy Now
Questions 18

A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Select two.)

Options:

A.

dir

B.

chdsk

C.

dism

D.

ipconfig

E.

format

F.

diskpart

Buy Now
Questions 19

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

Options:

A.

Put on an ESD strap.

B.

Place components on an ESD mat

C.

Disconnect the power before servicing the PC

D.

Place the PC on a grounded work bench

Buy Now
Questions 20

Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

Options:

A.

Acceptable use policy

B.

Inventory management

C.

EULA

D.

MDM policy

Buy Now
Questions 21

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

Options:

A.

End-user education

B.

Pre-installation environment cleaning

C.

Disabling of System Restore

D.

Infected system quarantine

Buy Now
Questions 22

A manager with a restricted user account receives the following error message:

Windows Update cannot currently check for updates because the service is not running.

The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the following should the technician do NEXT?

Options:

A.

Reboot the computer

B.

Restart the network services

C.

Roll back the device drivers

D.

Rebuild the Windows profiles

Buy Now
Questions 23

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

Options:

A.

Check the contents of the hosts file

B.

Do a System Restore to a date before the infection

C.

Rerun the antivirus scan with higher sensitivity

D.

Rebuild the OS on the machine

Buy Now
Questions 24

Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

Options:

A.

Folder Redirection

B.

Group Policy

C.

Security Groups

D.

Home Folder

Buy Now
Questions 25

Which of the following threats uses personalized information in an attempt at obtaining information?

Options:

A.

Whaling

B.

Impersonation

C.

Spoofing

D.

Spear phishing

Buy Now
Questions 26

A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses Which of the following is MOST likely the problem?

Options:

A.

Rootkit

B.

Zero-day malware

C.

Rogue antivirus

D.

Old virus definitions

Buy Now
Questions 27

Which of the following devices provides protection against brownouts?

Options:

A.

battery backup

B.

surge suppressor

C.

rack grounding

D.

line conditioner

Buy Now
Questions 28

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

Options:

A.

Guest network

B.

TKIP

C.

Default login

D.

Outdated firmware

E.

WPS

F.

WEP

Buy Now
Questions 29

A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

Options:

A.

Universal serial bus locks

B.

Personal identity verification cards

C.

Privacy screen

D.

Entry control roster

E.

Door locks

F.

Privacy window

Buy Now
Questions 30

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user’s request? (Select TWO)

Options:

A.

MAC filtering

B.

Default SSID

C.

Ratio power levels

D.

Content filtering

E.

Physical security

Buy Now
Questions 31

A technician has been dispatched to resolve a malware problem on a user’s workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?

Options:

A.

Run the scan again to ensure all malware has been removed

B.

Quarantine the infected workstation from the network

C.

Install all of the latest Windows Updates to patch the system

D.

Educate the user on safe browsing practices

Buy Now
Questions 32

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).

Options:

A.

System files have been deleted

B.

Proxy settings are configured improperly

C.

The OS has been updated recently.

D.

There are disabled services on the vendor website.

E.

Program file permissions have changed recently.

F.

There is a rogue anti-malware program.

Buy Now
Questions 33

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

Options:

A.

Default SSID

B.

MAC filtering

C.

NAT

D.

QoS

E.

Signal strength

F.

Encryption

Buy Now
Questions 34

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

Options:

A.

Disable System Restore.

B.

Create a restore point.

C.

Apply system updates.

D.

Restart into safe mode.

Buy Now
Questions 35

A user's personal settings are not saving, and a technician suspects the user's local Windows profile is corrupt. The technician wants to check the size of the ntuser.dat file, but It does not appear in the user's profile directory. Which of the following Control Panel utilities should the technician use to correct this?

Options:

A.

Folder Options

B.

Sync Center

C.

Display Settings

D.

User Accounts

Buy Now
Questions 36

Which of the following provide the BEST security for a server room? (Select two.)

Options:

A.

Badge reader

B.

Bollard

C.

Biometric lock

D.

Cable lock

E.

USB token

F.

Privacy window shades

Buy Now
Questions 37

Which of the following types of scripts would be seen on the user end of a web page?

Options:

A.

.bat

B.

.js

C.

.sh

D.

.vbs

Buy Now
Questions 38

A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.

Which of the following should the network administrator do NEXT?

Options:

A.

Delete the user’s AD account.

B.

Decrease the user’s AD privileges.

C.

Disable the user’s AD account.

D.

Reset the password on the user’s AD account.

Buy Now
Questions 39

A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

Options:

A.

Telnet

B.

SSH

C.

RDP

D.

VNC

Buy Now
Questions 40

A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user’s workstation?

Options:

A.

chkdsk

B.

netstat

C.

gpupdate

D.

diskpart

Buy Now
Questions 41

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?

Options:

A.

Zero-day malware

B.

Safari code injection

C.

OS corruption

D.

Overheating

E.

Time sync failure

Buy Now
Questions 42

A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users’ accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?

Options:

A.

Botnet

B.

Ransomware

C.

Antivirus definitions

D.

Keylogger

Buy Now
Questions 43

The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?

Options:

A.

Spear phishing

B.

Impersonation

C.

Dumpster diving

D.

Whaling

Buy Now
Questions 44

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

INSTRUCTIONS

Select the MOST appropriate statement for each response.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Let’s take a look at your phone settings.

Please change the port number on your mail settings to 993.

Which of the following should be done NEXT?

Options:

A.

Close the ticket out

B.

Educate the user on the solution that was performed

C.

Tell the user to take time to fix it themselves next time

D.

Send an email to Telecom to inform them of the issue and prevent reoccurrence

Buy Now
Questions 45

A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?

Options:

A.

Ignore the message as a false positive

B.

Shut down and restart the computer.

C.

Unplug the Ethernet cable.

D.

Follow the onscreen instructions to remove the malware

Buy Now
Questions 46

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?

Options:

A.

Create a risk analysis report for review

B.

Submit a change order for approval

C.

Insist the worker accepts the standard desktop

D.

Document the request and place the order

Buy Now
Questions 47

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?

Options:

A.

PHI certification

B.

PCI compliance

C.

POTS implementation

D.

PII filtering

Buy Now
Questions 48

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?

Options:

A.

Degauss

B.

Drive wipe

C.

Standard format

D.

Low-level format

Buy Now
Questions 49

When hackers execute code against a vulnerability In the hope that It has not yet been addressed, this Is known as a

Options:

A.

zero-day attack

B.

spoofing attack

C.

DDoS attack.

D.

brute force attack.

Buy Now
Questions 50

A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?

Options:

A.

Continue to work on the assigned task

B.

Take the print job to the office manager

C.

Remove the print job from the output tray

D.

Disconnect the printer from the network to prevent further print jobs

Buy Now
Questions 51

During a network server outage, the administrators computer received an IP address of 169.254.0.10 and had no access to internal or external resources. Which of the following should be configured to ensure the administrator's computer retains network access?

Options:

A.

Alternative IP address

B.

Wake-on-LAN

C.

APIPA

D.

Proxy setting

Buy Now
Questions 52

Which of the following must be enabled to configure 20 new machines to be booted over a network?

Options:

A.

Multi-boot

B.

Dynamic

C.

PXE

D.

GPT

Buy Now
Questions 53

A systems administrator is configuring a new workstation. Which of the following will MOST likely be the administrator's FIRST step?

Options:

A.

Set the screen timeout lock

B.

Change the default administrator account

C.

Require a BIOS/UEFI password.

D.

Enable full-disk encryption.

Buy Now
Questions 54

A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?

Options:

A.

Passphrase

B.

Knowledge-based authentication

C.

PIN

D.

Thumbprint

Buy Now
Questions 55

Which of the following would MOST likely be connected to a computer to provide electricity in case of a blackout?

Options:

A.

Battery backup

B.

Surge suppressor

C.

Portable generator

D.

Power inverter

Buy Now
Questions 56

A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes?

Options:

A.

Terminal

B.

Disk maintenance

C.

iCloud

D.

Image recovery

Buy Now
Questions 57

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server.

Which of the following is the FIRST step the technician should take to correct this issue?

Options:

A.

See if Joe’s email address has been blacklisted

B.

Change the password on Joe’s email account

C.

Update the antivirus and perform a full scan on the PC

D.

Isolate Joe’s computer from the network

Buy Now
Questions 58

Which of the following standards controls the processing of credit cards?

Options:

A.

PCI

B.

PHI

C.

PGP

D.

PII

Buy Now
Questions 59

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

Options:

A.

Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot

B.

Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one

C.

Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

D.

Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

Buy Now
Questions 60

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

Options:

A.

Standard formatting

B.

HD drilling

C.

Low-level formatting

D.

HD partitioning

Buy Now
Questions 61

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:

Which of the following is the MOST likely cause of the problem?

Options:

A.

Joe should be using WEP security on his hot-spot for faster throughput

B.

Someone else is using Joe’s hot-spot due to weak password

C.

Joe’s hot-spot gave him an invalid IP address

D.

Joe is likely in a poor signal area and should try another area

Buy Now
Questions 62

A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page The technician tries with a third-party browser and connects without error The technician needs to make sure the old certificate is no longer used in Internet Explorer. Which of the following Internet Options should the technician use to ensure the old certificate is removed'?

Options:

A.

Advanced

B.

Clear SSL state

C.

Publishers

D.

Certificates

Buy Now
Questions 63

A technician must manually modify the HOSTS system file in order to resolve a website address to a specified

local destination. Which of the following utilities should the technician use to BEST accomplish the task?

Options:

A.

Regedit

B.

services.msc

C.

Msinfo32

D.

Notepad

E.

MMC

Buy Now
Questions 64

A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.

The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following:

Which of the following should be changed to resolve this issue?

Options:

A.

Privacy – Maps

B.

Display – Brightness

C.

Storage – Photos

D.

Mail – Work

Buy Now
Questions 65

A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. Which of the following would be BEST suited for this task?

Options:

A.

VNC

B.

Telnet

C.

SSH

D.

RDP

Buy Now
Questions 66

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).

Options:

A.

Full device encryption

B.

Remote backup application

C.

SSO authentication

D.

Device profiles update

E.

OS security updates

F.

Biometric authentication

Buy Now
Questions 67

A company is implementing multifactor authentication and requires a solution that utilizes TCP. Which of the following will the company MOST likely select?

Options:

A.

SNMP

B.

TACACS+

C.

DHCP

D.

RADIUS

E.

Kerberos

Buy Now
Questions 68

A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account?

Options:

A.

RADIUS

B.

WPA2

C.

TKIP

D.

AES

Buy Now
Questions 69

A technician needs to access the user Interface of a server outside the network. The technician added network security with MAC filtering and port forwarding to allow tor the connection Which of the following will the technician MOST likely use to connect to the server?

Options:

A.

Remote Assistance

B.

SSH

C.

Telnet

D.

RDP

Buy Now
Questions 70

A technician is scheduled to upgrade a grocery store's network equipment at 11 00 p.m. There are only a few shoppers in the store, therefore, the store manager wants the technician to start the upgrade early Which of the following is the NEXT step the technician should perform?

Options:

A.

Create a back-out plan for the store.

B.

Review the change request document

C.

Draft the new network diagrams.

D.

Get approval from the Change Advisory Board

Buy Now
Questions 71

A technician is remediating a virus on an infected workstation. All user files are set to system and hidden. Which of the following shouW a technician perform NEXT to remediate the system?

Options:

A.

Back up user data and rebuild the user profile.

B.

Restore user data and reset the user file attributes via a command line.

C.

Run System Restore to a date before the infection

D.

Perform a clean install of the OS and restore the user data

E.

Reset all file attributes on the user's profile via command line

Buy Now
Questions 72

A customer recently upgraded from Windows 7 to Windows 10. The customer lost access to certain network shares, and the system keeps preventing the user's access. Which of the following is the MOST likely cause of the issue?

Options:

A.

The BitLocker feature was activated and encrypted the shares.

B.

The user's information was not preserved during the upgrade

C.

Windows Firewall no longer allows access to legacy systems.

D.

The network login script executed incorrectly.

Buy Now
Questions 73

Many of the files in a user's network folder have a new file extension and are inaccessible. After some

troubleshooting, a technician discovers a text document that states the files were intentionally encrypted, and a

large sum of money is required to decrypt them.

Which of the following should the technician do to recover the files?

Options:

A.

Restore the network folder from a backup.

B.

Perform a System Restore on the computer.

C.

Update the malware scanner and run a full scan.

D.

Disconnect the computer from the network.

Buy Now
Questions 74

Which of the following physical security measures is intended to mitigate tailgating?

Options:

A.

Biometrics

B.

Badge reader

C.

Smart card

D.

Mantrap

Buy Now
Questions 75

A technician is creating a network topology diagram Which of the following would be the MOST appropriate to include? (Select TWO)

Options:

A.

A list of network addresses for each device

B.

A list of the ports on each device and what they are connected to

C.

Technical specifications and performance ratings for the devices

D.

Settings, configuration details, and notes on proper operations

E.

A list of devices that need replacement within the next 6-12 months

F.

The MAC address and serial number of each device on the network

Buy Now
Questions 76

A customer contacts an IT technician regarding a PC's performance. The customer explains that the computer struggles to run several applications simultaneously, Which of the following

changes should the technician recommend FIRST to address the customer's concern?

Options:

A.

Increase the allocation of virtual memory.

B.

Upgrade the RAM to a larger capacity.

C.

Replace the existing HDD with an SSD.

D.

Enable fastboot in the BIOS

Buy Now
Questions 77

Which of the following Windows technologies can render a Me unreadable by anyone other than the file's creator?

Options:

A.

EFS

B.

DFS

C.

Bit Locker

D.

NTFS

Buy Now
Questions 78

A technician needs to recommend a disaster recovery solution for a company that has three offices across two

states. The technician must ensure the solution has:

• The ability to centralize data backups

• High availability

• The ability to synchronize user data to local machines

Which of the following solutions will the technician MOST likely recommend? (Choose two.)

Options:

A.

Cold storage of all corporate data

B.

Redundant network links

C.

Hot site

D.

Servers at each location

E.

Clustered backups

F.

Cloud replication

G.

Local backups

Buy Now
Questions 79

A customer is planning to recycle a computer. The customer wants to ensure any personal data on the computer is no longer recoverable, but the hardware must will still the be useable. Which of the following is the BEST method to dispose of the customer’s data?

Options:

A.

OS reinstallation

B.

TPM configuration

C.

Low-level format

D.

Drive incineration

Buy Now
Questions 80

A technician is encrypting the company's laptops using BitLocker, but some of the laptops do not have a built-in TPM. Which of the following would enable the technician to use BitLocker on these machines?

Options:

A.

A USB key

B.

A firmware update

C.

A local disk

D.

Two-factor authentication

Buy Now
Questions 81

A technician is removing malware from a workstation. The malware was installed via a phishing attack, which

was initiated from a link that was included in an email.

Which of the following should the technician do to address this issue? (Choose two.)

Options:

A.

Ensure the anti-rootkit utility is up to date and run it to remove the threat.

B.

Update the host firewall to block port 80 on the workstation.

C.

Restore the system using the last known-good configuration from the recovery console.

D.

Ensure antivirus is up to date and install the latest patches.

E.

Educate the user on verifying email links by hovering over them before clicking.

F.

Ensure endpoint protection is up to date and run the utility to remove the threat.

Buy Now
Questions 82

A user's laptop screen goes black after five minutes of not being used. Which of the following Windows Control Panel utilities should be used to modify the user experience?

Options:

A.

Troubleshooting

B.

Internet Options

C.

Power Options

D.

Device Manager

Buy Now
Questions 83

A technician recently upgrade a leptop a replo’s RAM from 2GB to 4hb. However , the operating system only recognizes the RAM as 3.5GB. Which of the following is the MOST likely reason the leptop does not recognize the full amount of RAM?

Options:

A.

The RS-232 connector pins are damaged.

B.

A 32-bit operating system is installed.

C.

The msinfo32 executable is compute.

D.

A FAT32 filesystem is configured.

Buy Now
Questions 84

A sales manager uses a phone as a hot-spot to connect a laptop to the Internet. The connection is fast most of the time, but the connection becomes noticeably slower every few weeks. The manager contacts the help desk for assistance. Which of the following should a technician check NEXT to troubleshoot the issue?

Options:

A.

Wireless channel interference

B.

The time since the last phone restart

C.

The data plan limits

D.

The mobile OS update log

Buy Now
Questions 85

A technician discovers a user’s home computer has Windows Update disabled and suspects malware has replaced several Windows OS files. After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?

Options:

A.

xcopy

B.

chkdsk

C.

sfc

D.

gpupdate

Buy Now
Questions 86

A technician discovers a user’s home computer has Windows Update disabled and suspects malware has replaced several Windows OS files. After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?

Options:

A.

xcopy

B.

chkdsk

C.

sfc

D.

gpupdate

Buy Now
Questions 87

A technician needs to allow RDP access for a user. Port forwarding is already set up for port 3389. The technician will have to change the listening port for the new access. Which of the following OS tools should the technician use on the PC to change the listening port for RDP?

Options:

A.

Local firewall

B.

MSTSC

C.

MSINFO32

D.

Services

Buy Now
Questions 88

Joe, a user, reports the programs and icons on his Windows desktop are much larger than they were the day before. He tried changing the screen resolution and restarting the computer, but it still does not look right. Joe also states the computer showed it was finishing updates when he first powered it on. Which of the following should a technician perform NEXT?

Options:

A.

Reboot the computer.

B.

Roll back the video driver.

C.

Reload the OS.

D.

Boot into safe mode.

Buy Now
Questions 89

A user often loses connectivity while in the back offices of a building. Given the following access point control settings:

Which of the following settings needs to be configured to resolve the issue?

Options:

A.

Customize valid channels

B.

Bluetooth coexistence

C.

Client aware

D.

TX power

E.

80MHz support

Buy Now
Questions 90

A company would like to increase its security measures because a workstation was recently hacked. Which of the following would offer the BEST protection from unauthorized access of workstations?

Options:

A.

Implementing strong passwords

B.

Restricting user permissions

C.

Encrypting the filesystem

D.

Disabling AutoRun

Buy Now
Questions 91

A user on a local desktop wants to allow a blocked program through the Windows Firewall. Which of the following user accounts is necessary to perform this task?

Options:

A.

Guest

B.

Power user

C.

Administrator

D.

Standard

Buy Now
Questions 92

Which of the following would MOST likely be connected to a computer Id provide electricity in case of a blackout?

Options:

A.

Battery backup

B.

Surge suppressor

C.

Portable generator

D.

Power inverter

Buy Now
Questions 93

A user's computer was infected with malware, and a technician successfully removed the infection However, the user reports certain web-based services are still inaccessible. Which of the following should the technician perform FIRST to resolve the issue?

Options:

A.

Turn off System Restore

B.

Update the malware signatures

C.

Reset the Internet Explorer settings.

D.

Check the hosts file

Buy Now
Questions 94

Which of the following is the maximum amount of RAM a computer can access if it is using a 32-bit version of the Windows OS?

Options:

A.

2GB

B.

4GB

C.

6GB

D.

8GB

Buy Now
Questions 95

A user’s login screen does not look normal when booting the computer. A technician states the computer was showing the company’s workstation imaging system screen, but it has since been fixed. Which of the following did the technician update?

Options:

A.

Operating system

B.

Drivers

C.

Boot order

D.

BIOS firmware

Buy Now
Questions 96

Which of the following physical security measures can be combined with a badge reader to create an MFA system to control physical access?

Options:

A.

Hardware token

B.

Biometric locks

C.

Key jobs

D.

Smart cards

Buy Now
Questions 97

Which of the following allows for per-command authentication and authorization?

Options:

A.

TKIP

B.

RADIUS

C.

AES

D.

TACACS

Buy Now
Questions 98

A systems administrator created a policy that should create a shortcut on a user's desktop Shortly after the policy was created, a technician inspects the user's desktop and notices the shortcut is not present. The administrator verifies that the policy was created correctly and that it is being applied to the user's account. Which of the following will MOST Likely resolve the issue Immediately without interrupting the user's session?

Options:

A.

gpupdate /force

B.

gpupdate /boot

C.

gpupdate /logoff

D gpupdate /target:computer

Buy Now
Questions 99

Which of the following is a risk to computer equipment when the humidity is low?

Options:

A.

Static discharge

B.

Corrosion

C.

Frequent brownouts

D.

Increased dust

Buy Now
Status:
Expired , and Replaced By
Exam Code: 220-1002
Exam Name: CompTIA A+ Certification Exam: Core 2
Last Update: Apr 14, 2023
Questions: 665
$64  $159.99
$48  $119.99
$40  $99.99
buy now 220-1002