2022 New Year Express Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

220-1002 Sample Questions Answers

Questions 4

A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?

Options:

A.

The Internet security options have changed

B.

The operating system updates have changed

C.

The network directory permissions have changed

D.

The user account permissions have changed

Buy Now
Questions 5

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

Options:

A.

Activate real-time protection on both antivirus software programs

B.

Uninstall one antivirus software program and install a different one

C.

Run OS updates

D.

Enable the quarantine feature on both antivirus software programs

E.

Remove the user-installed antivirus software

Buy Now
Questions 6

A user reports slow performance on a computer. A technician checks the computer and finds the RAM utilization Is very high. The technician restarts the computer, and the RAM use is still high. The technician discovers a program running in the background Is using most of the RAM. The user only uses this program once at the end of the year to produce a report. Which of the following steps should the technician take to improve the computer's performance?

Options:

A.

Uninstall and reinstall the program.

B.

Perform a repair installation of the program

C.

Install the latest updates for the program.

D.

Disable the program on startup.

Buy Now
Questions 7

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

Options:

A.

Change the default access port

B.

Enforce password complexity

C.

Put the terminal server into the router’s DMZ

D.

Disable logon time restrictions

E.

Block all unused ports on the LAN smart switch

F.

Use the local client certificate for server authentication

Buy Now
Questions 8

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

Options:

A.

Untrusted software

B.

Outdated antivirus

C.

MDM policies

D.

Inactive VPNs

Buy Now
Questions 9

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

Options:

A.

Remove the guest account from the administrators group

B.

Disable single sign-on

C.

Issue a default strong password for all users

D.

Require authentication on wake-up

Buy Now
Questions 10

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.

Which of the following actions should be taken to close the vulnerability? (Select two.)

Options:

A.

Disable guest account

B.

Remove admin permissions

C.

Modify AutoRun settings

D.

Change default credentials

E.

Run OS security updates

F.

Install a software firewall

Buy Now
Questions 11

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

Options:

A.

Acceptable use policy violations

B.

Server configuration

C.

Chain of custody

D.

Data loss incidents

Buy Now
Questions 12

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.

Which of the following security measures should be used?

Options:

A.

Biometric device

B.

Common access card

C.

Cable lock

D.

Privacy screen

E.

Mantrap

Buy Now
Questions 13

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

Options:

A.

Component Services

B.

System Configuration

C.

Security Policy

D.

Local Users and Groups

Buy Now
Questions 14

A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)

Options:

A.

Reset the user’s browser to default settings

B.

Delete the user’s cached images, temporary files, and cookies

C.

Reboot the user’s computer and install a secondary antivirus

D.

Convince the user to use a different web browser that is currently unaffected

E.

Download the update to the user’s web browser of choice

F.

Remove any unapproved applications from the user’s startup items

Buy Now
Questions 15

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)

Options:

A.

Backup testing

B.

Cloud storage

C.

Local storage backups

D.

Data recovery

E.

Hot site

F.

Waterproof devices

Buy Now
Questions 16

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?

Options:

A.

Install to a network drive

B.

Install to a USB drive

C.

Install to a DVD-RW

D.

Install to a security internal_HDD

Buy Now
Questions 17

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?

Options:

A.

Resolution

B.

Refresh rate

C.

Extended monitor

D.

Color depth

Buy Now
Questions 18

A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot Which of the following should the technician complete to resolve the issue?

Options:

A.

Boot the workstation in safe mode and disable the graphics driver system tray menu

B.

Boot the workstation in safe mode with networking and install the latest stable graphics driver.

C.

Boot the workstation in safe mode and disable Windows driver signing requirements

D.

Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

Buy Now
Questions 19

A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

Options:

A.

Time Machine

B.

Snapshot

C.

System Restore

D.

Boot Camp

Buy Now
Questions 20

Which of the following Windows Enterprise OS version Offers BitLocker as a feature that can be enabled?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 21

Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?

Options:

A.

Restart the table

B.

Disable and then renewable Bluetooth

C.

Calibrate the touchscreen sensor

D.

Disconnect and then reconnect the stylus

Buy Now
Questions 22

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).

Options:

A.

Full device encryption

B.

Remote backup application

C.

SSO authentication

D.

Device profiles update

E.

OS security updates

F.

Biometric authentication

Buy Now
Questions 23

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

Options:

A.

Provide documentation of the repair to the customer

B.

Allow the customer to voice concerns and post the story to social media later

C.

Inform the customer the job is done and return to the office

D.

Defend each step and why it was necessary

Buy Now
Questions 24

Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?

Options:

A.

Files disappearing

B.

File permission changes

C.

Application crash

D.

Too many start items

Buy Now
Questions 25

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

Options:

A.

GPT

B.

Dynamic

C.

Basic

D.

Extended

Buy Now
Questions 26

A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.

Which of the following is causing the error?

Options:

A.

Small hard drive

B.

Insufficient RAM

C.

OS compatibility

D.

Folder permissions

Buy Now
Questions 27

A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.

Which of the following types of infection does the user MOST likely have?

Options:

A.

Rootkit

B.

Keylogger

C.

Trojan

D.

Ransomware

Buy Now
Questions 28

A technician is contacted by a user who is working from home but is unable to connect to any office resources (e.g., files, printers). The user is able to access the Internet.

Which of the following should the technician check FIRST?

Options:

A.

VPN

B.

DHCP

C.

NAT

D.

DNS

Buy Now
Questions 29

After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly Which of the following should the technician do NEXT?

Options:

A.

Verify the browser's proxy configuration settings

B.

Instruct the user to use the alternate web browser instead.

C.

Disconnect and reconnect from the corporate VPN

D.

Flush the workstation's DNS cache

E.

Scan the user's workstation for malware

Buy Now
Questions 30

A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)

Options:

A.

Change management policy

B.

EULA

C.

BYOD policy

D.

Risk analysis

E.

MDM policy

F.

Time-based login policies

Buy Now
Questions 31

A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues?

(Choose two.)

Options:

A.

Slow performance

B.

Slow data speeds

C.

No wireless connectivity

D.

Baseband

E.

Application hang

F.

Overheating

Buy Now
Questions 32

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.

Which of the following would be the BEST resolution to Ann’s issue?

Options:

A.

Restart the tablet.

B.

Disable and then reenable Bluetooth.

C.

Calibrate the touchscreen sensor.

D.

Disconnect and then reconnect the stylus.

Buy Now
Questions 33

What a user is allowed to do on a computer network would be addressed in:

Options:

A.

a user acceptance policy

B.

regulatory and compliance policy

C.

a password policy

D.

an acceptable use policy

Buy Now
Questions 34

A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users’ accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?

Options:

A.

Botnet

B.

Ransomware

C.

Antivirus definitions

D.

Keylogger

Buy Now
Questions 35

A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?

Options:

A.

Only a surge protector is needed due to the backup generator

B.

Plug directly into the emergency power source

C.

Plug a surge protector directly into the UPS

D.

Connect to a UPS that utilizes the emergency power source

Buy Now
Questions 36

A user spills a small amount of toner from a laser printer onto the floor. Which of the following is the safest way to clean up the toner?

Options:

A.

Use a wet/dry vacuum.

B.

Use a broom and a dust pan

C.

Use damp paper towels.

D.

Spray the toner with canned air.

Buy Now
Questions 37

A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or

replacement. The PC has numerous errors during the boot process and is running a very outdated operating

system. Which of the following should the technician do?

Options:

A.

Ask if the customer would like to donate the PC to a school

B.

Offer to sell a slightly newer computer to the customer

C.

Work on the computer and bill the customer for the time

D.

Advise the customer that the cost of repair is more than a new PC

Buy Now
Questions 38

While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

Options:

A.

Reimage the machine from a network share

B.

Change the boot order and boot to an external drive

C.

Remove and then replace the CMOS battery

D.

Use the BIOS user password to reset the supervisor password

Buy Now
Questions 39

An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?

Options:

A.

Uninterruptible power supply

B.

Voltage regulator

C.

Surge suppressor

D.

Generator

Buy Now
Questions 40

When hackers execute code against a vulnerability In the hope that It has not yet been addressed, this Is known as a

Options:

A.

zero-day attack

B.

spoofing attack

C.

DDoS attack.

D.

brute force attack.

Buy Now
Questions 41

When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

Options:

A.

Certificates

B.

Software tokens

C.

Firewall

D.

Port security

Buy Now
Questions 42

A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out. and will not display The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play Which of the following is MOST likely causing the Issue?

Options:

A.

Data transmission over limit

B.

Unauthorized account access

C.

Resource over use

D.

Unintended Bluetooth pairing

Buy Now
Questions 43

Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?

Options:

A.

Create a static DNS entry on the server for the PC

B.

Change her NIC IP address to dynamic

C.

Create a new exception on her local firewall

D.

Make sure the PC’s IP is in the management VLAN

Buy Now
Questions 44

The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.

Which of the following would be the MOST secure solution to this error?

Options:

A.

Add Ann to the local Power Users group

B.

Set the software to save to the %APPDATA% folder

C.

Add Ann to the local administrator group

D.

Give Ann write access to C:\Program Files\

E.

Give Ann permission to elevate her permissions through a UAC prompt

Buy Now
Questions 45

A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer’s drive require?

Options:

A.

NTFS

B.

Ext4

C.

HFS

D.

FAT32

Buy Now
Questions 46

Which of the following would BEST support an 8TB hard drive with one partition?

Options:

A.

GPT

B.

FAT16

C.

FAT32

D.

EFS

Buy Now
Questions 47

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

Options:

A.

Check for and apply software updates

B.

Perform repair installation on the application

C.

Add the user to the local administrators group

D.

Rebuild the user’s mail profile

Buy Now
Questions 48

A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

Options:

A.

keys

B.

passwords

C.

root CA

D.

tokens

Buy Now
Questions 49

Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?

Options:

A.

Cable lock

B.

Windows key + L

C.

Smart card removal

D.

Key fob

E.

BIOS password

Buy Now
Questions 50

A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory." Which of the following commands would BEST accomplish this?

Options:

A.

grep -d mandatory *

B.

grep -i mandatory *

C.

grep mandatory file

D.

grep mandatory *

Buy Now
Questions 51

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

Options:

A.

Firewall

B.

Antivirus

C.

Email filtering

D.

ACLs

E.

VPN

Buy Now
Questions 52

A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?

Options:

A.

Ignore the message as a false positive

B.

Shut down and restart the computer.

C.

Unplug the Ethernet cable.

D.

Follow the onscreen instructions to remove the malware

Buy Now
Questions 53

A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users* data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained. Which of the following commands will achieve this result by default?

Options:

A.

robocopy

B.

copy

C.

xcopy

D.

cp

Buy Now
Questions 54

A systems administrator is configuring a new workstation. Which of the following will MOST likely be the administrator's FIRST step?

Options:

A.

Set the screen timeout lock

B.

Change the default administrator account

C.

Require a BIOS/UEFI password.

D.

Enable full-disk encryption.

Buy Now
Questions 55

A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account?

Options:

A.

RADIUS

B.

WPA2

C.

TKIP

D.

AES

Buy Now
Questions 56

Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

Options:

A.

WPA2-PSK

B.

AES

C.

TACACS

D.

TKIP

Buy Now
Questions 57

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods

is BEST suited for the total destruction of the SSDs?

Options:

A.

Overwriting

B.

Formatting

C.

Incinerating

D.

Degaussing

Buy Now
Questions 58

Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

Options:

A.

Install the third-party driver from the manufacturer's website.

B.

Update the included Windows driver from Windows Update

C.

Flash the firmware on the BIOS to the latest version.

D.

Replace the video card with one that is supported by Windows natively.

Buy Now
Questions 59

A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?

Options:

A.

Change the default SSID

B.

Enable MAC filtering

C.

Update the firmware

D.

Set encryption

Buy Now
Questions 60

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).

Options:

A.

MAC filtering

B.

Default SSID

C.

Radio power levels

D.

Content filtering

E.

Physical security

Buy Now
Questions 61

An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a

hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for

subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent

any further emails from this organization?

Options:

A.

Click the “Unsubscribe” button on each unwanted email

B.

Send the unwanted items to the spam or junk folder

C.

Deploy an email address whitelist

D.

Create domain-based filters

Buy Now
Questions 62

An administrator changed the lite permissions on a Linux server from -rwxrw-r-x to -rwxrwxrwx. Which of the following commands did the administrator use?

Options:

A.

chmod

B.

rm

C.

apt-get

D.

chown

Buy Now
Questions 63

A new policy requires all users to log on to their corporate workstations using smart card authentication. Which of the following best practices should be implemented to further secure access to workstations?

Options:

A.

Data encryption

B.

Screen lock timeouts

C.

Required screensavers

D.

Strong passwords

Buy Now
Questions 64

A user is receiving a large number of suspicious emails, many of which are automated emails that state the recipient cannot be found Which of the following is the MOST likely cause of the issue?

Options:

A.

An invalid certificate is on the mail server

B.

The user's email was hijacked

C.

The user's address book was corrupted

D.

The user's system time is different from the mail server.

Buy Now
Questions 65

A user's laptop screen goes Clank every time the keyboard and/or mouse are not active for five minutes The user needs to change the settings for this option. Which of the following Control Panel utilities allows the user to make the adjustment?

Options:

A.

Device Manager

B.

Sync Center

C.

Power Options

D.

Display settings

Buy Now
Questions 66

Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 67

An employee is taking a credit card payment over the phone, but the payment system has a temporary outage. To avoid inconveniencing the customer, the employee writes down the credit card number and expiration date on a notepad to be entered later This is in violation of:

Options:

A.

PHI

B.

PCI

C.

Pll

D.

PGP

Buy Now
Questions 68

A customer keeps receiving the following message: Website blocked due to PUP. The customer asks a technician to resolve the issue immediately. Which of the following should the technician do to help resolve the customer’s issue?

Options:

A.

Check the customer’s computer for a rogue antivirus.

B.

Update the antivirus software and run a scan.

C.

Advise the customer to not revisit the website.

D.

Enable pop-ups for the website the customer is attempting to visit.

Buy Now
Questions 69

The Chief Information Security Officer (CISO) wants to ensure the company is prepared in case of a ransomware attack. The CISO has requested network vulnerability scans, firewall audits, and ACL logs. Which of the following should the CISO also request?

Options:

A.

Audits of the cloud storage platform

B.

Tests of the data backups

C.

Physical penetration tests

D.

NIDS signature updates

Buy Now
Questions 70

Which of the following should a technician do FIRST before opening a computer case to replace a part?

Options:

A.

Remove all jewelry.

B.

Put on an ESD strap.

C.

Perform self-grounding.

D.

Disconnect the power.

Buy Now
Questions 71

A user is trying to access a popular email website but is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue. Which of the following should the technician do to remove the threat from the system?

Options:

A.

Remove all parameters after the FQDN website address.

B.

Remove all files from the temporary folder and restart the computer.

C.

Remove and reinstall the web browser in safe mode.

D.

Remove all lines that are not comments from the hosts file.

Buy Now
Questions 72

A user cannot print to a network printer. A technician runs the Windows 10 troubleshooting utility, but it does not find any errors. Which of the following printer settings should the technician check NEXT?

Options:

A.

Duplex

B.

Spooler

C.

Collate

D.

Resolution

Buy Now
Questions 73

A technician encounters a previously unidentified issue. The technician conducts some research, finds a solution, and resolves the issue. According to best practices, which of the following should the technician do so the issue can be addressed if it is encountered again?

Options:

A.

Inform the immediate supervisor about the findings.

B.

Email all the other technicians to explain the problem and resolution.

C.

Enter the resolution in the ticket and close it.

D.

Add the findings to the knowledge base

Buy Now
Questions 74

A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which of the following filesystems should the technician utilize to install the listed operating system?

Options:

A.

EW2

B.

FAT32

C.

HFS

D.

NTFS

Buy Now
Questions 75

A user’s mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices. Which of the following should a technician perform to resolve the issue?

Options:

A.

Run a malware scan on the device.

B.

Instruct the user to change the device’s password.

C.

Disable access to the user’s contacts.

D.

Deny access to text messages.

Buy Now
Questions 76

A technician deployed a new file server on the network. The technician wants to map the file server as a network drive on all users' computers when they log onto the network by creating a logon script Which of the following should the technician use?

Options:

A.

net use

B.

dism

C.

diskpart

D.

gpresult

Buy Now
Questions 77

Which of the following account types account types enables and end user to install software without restrictions?

Options:

A.

Administrator

B.

Power user

C.

Standard

D.

Guest

Buy Now
Questions 78

A technician is working on an infected computer After running a scan and removing the malicious software, only one issue remains. When opening up the browser, it is redirected to an unwanted site The technician checks the home page settings, and they are correct. The technician types the home page address in the browser, and it is still redirected. Which of the following does the technician need to edit to resolve this issue?

Options:

A.

MSConfig

B.

Registry

C.

Hosts file

D.

boot.ini

Buy Now
Questions 79

Which of the following is a Device that stores a copy of a certificate that is used for authentication?

Options:

A.

Biometric scanner

B.

Soft token

C.

Smart card

D.

OTP token

Buy Now
Questions 80

A user installed an application that now requires a license key to enable lull functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task''

Options:

A.

SSH

B.

RDP

C.

FTP

D.

Telnet

Buy Now
Questions 81

A user is attempting to open Outlook, Outlook seems to have cached some invalid user login information, causing it to fail when trying to connect to Office 365 applications. Which of the following Control Panel applets should a technician use to clear the cached invalid user login information?

Options:

A.

Network and Sharing Center

B.

Sync Center

C.

User Account Control

D.

Credential manager

Buy Now
Questions 82

An administrator needs to uninstall an update on a Windows 7 computer. Which of the following Control Panel utilities would make this possible?

Options:

A.

Device Manager

B.

System Protection

C.

Programs and Features

D.

User Account Control

Buy Now
Questions 83

Which of the following operating systems has versions for servers, workstations, and phones?

Options:

A.

Android

B.

iOS

C.

Chrome OS

D.

Windows

Buy Now
Questions 84

A technician is setting up a laptop for a company. The company is very concerned about data loss after one of a laptops was stolen. Which of the following security best practices should be implemented to address this concern?

Options:

A.

Enable full disk encryption.

B.

Configure a failed-attempts lockout.

C.

Disable AutoRun.

D.

Configure a BIOS password.

Buy Now
Questions 85

A technician is developing a backup and disaster recovery plan for a customer. The customer requires quick file recovery when necessary, but wants to ensure recovery is possible in case of a complete disaster, with data loss of no more than three days. Which of the following backup procedures should the technician suggest to BEST meet the customer's needs?

Options:

A.

Configure backups to the cloud storage and set minimum retention.

B.

Schedule daily backups to local storage and weekly backups to cloud storage

C.

Archive to tape that is stored in an isolated part of the building.

D.

Back up to local storage that in turn is backed up to the cloud storage

Buy Now
Questions 86

A customer has called the help desk because a word processing application will no longer open. It was working fine earlier, but the user had to close a document quickly. An error message popped up about a network resource, and then the document crashed. Now, when the user clicks on the icon to launch the application, it does not give an error and will not open. Which of the following should a technician do FIRST?

Options:

A.

Run full antivirus and anti-malware scans on the computer.

B.

Check the processes to see if the task is still running and kill it.

C.

Reinstall the proprietary office suite of applications.

D.

Connect the computer to the network and remap the share.

Buy Now
Questions 87

A customer contacts an IT technician regarding a PC's performance. The customer explains that the computer struggles to run several applications simultaneously, Which of the following

changes should the technician recommend FIRST to address the customer's concern?

Options:

A.

Increase the allocation of virtual memory.

B.

Upgrade the RAM to a larger capacity.

C.

Replace the existing HDD with an SSD.

D.

Enable fastboot in the BIOS

Buy Now
Questions 88

A smartphone user has been receiving unsolicited emails that contain Pl in the webmail inbox associated with the device. Which of the following steps should the user take FIRST to identify the cause of the issue?

Options:

A.

Report the emails as spam.

B.

Check the permissions on all installed third-party applications.

C.

Delete the webmail account and create a new one.

D.

Restore the smartphone to factory default settings.

Buy Now
Questions 89

A technician is performing service on a computer and notices it is responding very slowly. The computer has 4GB of RAM. a four-core 3GHz processor, and a SATA I 54O0rpm 300GB HOD. The technician logs the following process information:

Based on this data, which of the following is the MOST likely cause of the performance issues?

Options:

A.

The dtfhost.exe is likely a virus, and the computer has slowed down due to an infection

B.

The WSFTPD application is overloading the NIC. causing the computer to freeze periodically.

C.

The chrome application is using loo much memory and causing excessive paging

D.

The operating system is performing an installation that is slowing down the computer.

E.

The Windows Defender application is using too much CPU, causing the slowdown.

Buy Now
Questions 90

A user contains the help desk the restore an application that was lost when a System Restore was performed last week. A technician development the application was emitted to the user from an unknown source and downloaded from a link in the email. Which of the following should the technician do NEXT?

Options:

A.

Educate the user.

B.

Reboot the computer.

C.

Update the anti-malware software.

D.

Update the antivirus software.

Buy Now
Questions 91

A technician configures a switch for an enterprise to use 802.1X. Which of the following logical security concepts uses 802.1X?

Options:

A.

Access control list

B.

MAC address filtering

C.

MDM policies

D.

Port security

Buy Now
Questions 92

An administrator is loading a new Linux server. Which of the following filesystems will the administrator MOST likely select for the primary partition?

Options:

A.

ExFAT

B.

NTFS

C.

ext3

D.

Swap

Buy Now
Questions 93

A user can no longer edit files on the company shared drive. The user previously used has access to these files. A technician verifies the user can view the folders but cannot open any subfolders or folders. Which of the following must happen to fix this issue?

Options:

A.

The user should ask the file owners for permission and then let the technician know.

B.

The technician needs to update the local Be permissions to include read write. and modify access

C.

The technician must update the server permissions to include read, write and modify access.

D.

The technician’s update supervisor must approve the access and update the file explorer permission to read, write, and modify access.

Buy Now
Questions 94

A technician is monitoring a network and notices an outage has occurred that could potentially cause a major disruption to the business workflow. Which of the following should the technician do NEXT? !•: A. Identify the issue and its impact to the business.

B. Report the incident to the proper teams or management for awareness.

C. Start a root cause analysts and create documentation

D. Create an action plan and implement the solution

Options:

Buy Now
Questions 95

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.

Which of the following would the project team MOST likely add to the SOW?

Options:

A.

Risk analysis

B.

Plan to change

C.

Backout plan

D.

Change board approvals

Buy Now
Questions 96

A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system Which of the following did the technician forget to do to prevent reinfection?

Options:

A.

Connect to the network and update the OS with the latest security patches

B.

Scan and dean the USB device used to transfer data from the equipment

C.

Disable System Restore and remove all restore points from the system

D.

Update the local antivirus and set it to scan automatically every evening

Buy Now
Questions 97

A Windows user is attempting to install a local printer and is unsuccessful on permissions.

Which of the following user types BEST describes this user?

Options:

A.

Guest

B.

Power User

C.

Administrator

D.

Standard User

Buy Now
Questions 98

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are:

Two 1GHz CPUs

2GB of memory

15GB hard drive

800x600 screen resolution

Which of the following should the technician do to resolve the problem?

Options:

A.

Increase the number of CPUs

B.

Increase the amount of memory

C.

Increase the amount of hard drive space

D.

Increase the screen resolution

Buy Now
Questions 99

A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?

Options:

A.

Certificates

B.

Least privilege

C.

Directory permissions

D.

Blacklists

Buy Now
Exam Code: 220-1002
Exam Name: CompTIA A+ Certification Exam: Core 2
Last Update: Jan 18, 2022
Questions: 665
$72  $159.99
$54  $119.99
$45  $99.99
buy now 220-1002