CompTIA A+ Core Exam 220-1002 Updated Questions

In order to achieve CompTIA A+ Core certification 2019, you must pass two core exams:

220-1001 CompTIA A+ Certification Exam: Core 1

220-1002 CompTIA A+ Certification Exam: Core 2

Here, we share CompTIA A+ Core Exam 220-1002 Updated Questions with you, which can help you pass 220-1002 exam smoothly. CompTIA A+ 220-1002 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures. The most updated 220-1002 dumps questions help you master all exam points in real exam.

Free 220-1002 CompTIA A+ Core 2 Dumps Questions

1. CORRECT TEXT

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.

INSTRUCTIONS:

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

2. A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.

Whenever they attempt to launch the application, it fails and gives an error message.

Which of the following should the technician do FIRST?

 
 
 
 

3. A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Select two.)

 
 
 
 
 
 

4. An administrator is setting up a Windows terminal server.

Which of the following settings should the administrator modify to increase server security? (Select two.)

 
 
 
 
 
 

5. A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

 
 
 
 

6. A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

 
 
 
 
 
 

7. A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.

Which of the following naming convention formats should the technician follow?

 
 
 
 

8. Which of the following provide the BEST security for a server room? (Select two.)

 
 
 
 
 
 

9. Which of the following threats uses personalized information in an attempt at obtaining information?

 
 
 
 

10. A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.

Which of the following needs to be adjusted on the workstation to fix the issue?

 
 
 
 

11. A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.

Which of the following Control Panel utilities should the technician use to configure the setting?

 
 
 
 
 

12. Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

 
 
 
 

13. A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in.

Which of the following is the BEST choice for the technician to make?

 
 
 
 
 

14. A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable.

Which of the following is the BEST method of securing the phone?

 
 
 
 

15. Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

 
 
 
 
 
 

16. A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

 
 
 
 

17. A technician is installing a private PC in a public workspace.

Which of the following password practices should the technician implement on the PC to secure network access?

 
 
 
 

18. Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server.

Joe has verified he is connected to the Internet.

Which of the following would explain why Joe cannot access his personal shares?

 
 
 
 

19. A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop.

Which of the following should a technician do to resolve the issue and avoid recurrence?

 
 
 
 
 

20. A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor.

Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

 
 
 
 

21. Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

 
 
 
 

22. Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

 
 
 
 

23. A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

 
 
 
 

24. A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license.

Which of the following license type should the technician recommend?

 
 
 
 

25. Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.

Which of the following can Joe do to ensure the backups will work if needed?

 
 
 
 
 

26. A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again.

Which of the following recommendations should the contractor give to the customer? (Select two.)

 
 
 
 
 
 

27. A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail.

Which of the following is the FIRST option to check?

 
 
 
 

28. A technician needs to edit a protected .dll file but cannot find the file in the System32 directory.

Which of the following Control Panel utilities should the technician use?

 
 
 
 

29. A technician has identified malware on a user’s system.

Which of the following should the technician do NEXT according to malware removal best practices?

 
 
 
 

30. A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the

CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem.

Which of the following is a tool the technician can use to resolve the issue?

 
 
 
 

31. A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions.

Which of the following should a technician recommend?

 
 
 
 

32. Which of the following installation types would require the use of an answer file to install the OS?

 
 
 
 

33. A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.

Which of the following built-in utilities should be used?

 
 
 
 

34. A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server.

Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

 
 
 
 

35. A manager with a restricted user account receives the following error message:

Windows Update cannot currently check for updates because the service is not running.

The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem.

Which of the following should the technician do NEXT?

 
 
 
 

36. A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares.

Which of the following are the MOST likely reasons for these issues? (Select two.)

 
 
 
 
 

37. With which of the following types is a man-in-the-middle attack associated?

 
 
 
 

38. An employee reported that a suspicious individual was looking through the recycle bin.

Which of the following types of social engineering threats is this?

 
 
 
 

39. A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping.

The remote connection drops periodically.

Which of the following steps should the technician take NEXT to resolve the problem?

 
 
 
 

40. An employee is unable to view in-office network folders while working at home.

Which of the following is the MOST likely cause of the problem?

 
 
 
 

41. A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade.

Which of the following documents did the network administrator MOST likely give to the technician?

 
 
 
 

42. After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.

When testing the policy, a removable drive is plugged in but can still be accessed.

Which of the following command-line tools should the technician use to apply the new policy?

 
 
 
 

43. A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.

With which of the following types of infections are the PCs MOST likely infected? (Select two.)

 
 
 
 
 
 

44. Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.

Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.

Which of the following settings or features is responsible for the problems Ann is experiencing?

 
 
 
 

45. Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

 
 
 
 

46. In which of the following file extension types would a user expect to see the command. “net use T: serverfiles’?

 
 
 
 

47. A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.

Which of the following should the technician replace to prevent these issues in the future?

 
 
 
 

48. Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

 
 
 
 

49. Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized.

Which of the following messages will be displayed?

 
 
 
 

50. Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure.

Which of the following should the help desk perform to fix the issue?

 
 
 
 

51. A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.

Which of the following would the project team MOST likely add to the SOW?

 
 
 
 

52. A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.

Which of the following would MOST likely fix the issue?

 
 
 
 

53. An end user’s PC is taking a long time to boot.

Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

 
 
 
 
 
 

54. A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.

Which of the following protocols and authentication methods should the technician implement? (Select two.)

 
 
 
 
 
 
 
 

55. A technician is PXE booting a computer.

Which of the following is the technician MOST likely performing on the computer?

 
 
 
 

56. Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office.

However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.

Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

 
 
 
 
 
 

57. Which of the following is the maximum RAM limit of a Windows 32-bit version?

 
 
 
 

58. A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.

Which of the following steps should be taken FIRST to determine the cause of the issue?

 
 
 
 
 

59. Joe, an end user, has been prompted to provide his username and password to access the payroll system.

Which of the following authentication methods is being requested?

 
 
 
 

Updated CompTIA Network+ Certified N10-007 Test Dumps Questions
Updated CompTIA Project+ PK0-004 Dumps Questions V11.02

Add a Comment

Your email address will not be published. Required fields are marked *