Pass CompTIA A+ 220-1102 Exam on the First Try with Latest 220-1102 Dumps

We DumpsBase provide the latest and updated CompTIA 220-1102 exam questions to help candidates prepare for the CompTIA A+ Core 2 exam. The updated 220-1102 exam dumps of DumpsBase is full of 100% actual exam questions, ensuring you can prove your proficiency in the CompTIA A+ test on the first try. Read CompTIA A+ 220-1102 dumps questions of DumpsBase to boost your confidence and pass the CompTIA A+ Certification Core 2 Exam with ease.

CompTIA A+ Certification Core 2 Exam 220-1102 Free Dumps Demo

1. A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times.

Which of the following should the technician use?

2. Before leaving work, a user wants to see the traffic conditions for the commute home.

Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?

3. Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

4. A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers.

Which of the following BEST addresses this need?

5. A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe.

Which of the following social-engineering attacks is the user experiencing?

6. A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option?

7. Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

8. A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network.

Which of the following configurations should the technician employ to achieve this goal?

9. A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results.

Which of the following should the user do to resolve the issue?

10. The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network.

Which of the following would BEST reduce this risk for Windows laptop users?

11. An administrator has received approval for a change request for an upcoming server deployment.

Which of the following steps should be completed NEXT?

12. A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones.

Which of the following technologies can be implemented to prevent this issue?

13. A company needs to securely dispose of data stored on optical discs.

Which of the following is the MOST effective method to accomplish this task?

14. An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years.

Which of the following backup methods would BEST meet the requirements?

15. A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive.

Which of the following tools should the technician use?

16. A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards.

Which of the following encryption technologies should be used to secure the workstation in case of theft?

17. A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines.

Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

18. A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop.

Which of the following should the technician MOST likely have done to prevent damage?

19. Which of the following change management documents includes how to uninstall a patch?

20. A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items.

Which of the following programs can the technician use to view startup items?

21. A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labeled Accept Which of the following agreements IS MOST likely in use?

22. A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware.

Which of the following should the technician do FIRST?

23. A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment.

Which of the following would be the BEST method to protect against unauthorized use?

24. Which of the following often uses an SMS or third-party application as a secondary method to access a system?

25. A technician is investigating an employee's smartphone that has the following symptoms

• The device is hot even when it is not in use.

• Applications crash, especially when others are launched

• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO).

26. Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

27. A user's corporate phone was stolen, and the device contains company trade secrets.

Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

28. Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

29. In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

30. Which of the following is the proper way for a technician to dispose of used printer consumables?

31. Which of the following script types is used with the Python language by default?

32. A technician suspects a rootkit has been installed and needs to be removed.

Which of the following would BEST resolve the issue?

33. A user reports a computer is running slow.

Which of the following tools will help a technician identify the issue?

34. A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser.

Which of the following steps would MOST likely resolve the issue? (Select TWO)

35. A user is trying to use a third-party USB adapter but is experiencing connection issues.

Which of the following tools should the technician use to resolve this issue?

36. A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible.

Which of the following should the technician configure?

37. A call center technician receives a call from a user asking how to update Windows

Which of the following describes what the technician should do?

38. A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension

Which pf the following actions is the FIRST step the technician should take?

39. Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell.

Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

40. A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied.

Which of the following pieces of hardware should the technician replace to resolve the issue?

41. Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

42. A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working.

Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

43. A technician is asked to resize a partition on the internal storage drive of a computer running macOS.

Which of the followings tools should the technician use to accomplish this task?

44. Which of the following Wi-Fi protocols is the MOST secure?

45. A technician has been tasked with using the fastest and most secure method of logging in to laptops.

Which of the following log-in options meets these requirements?

46. Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

47. A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering.

Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?

48. An implementation specialist is replacing a legacy system at a vendor site that has only one wireless network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has open authentication. The technician needs to secure the vendor's sensitive data.

Which of the following should the specialist do FIRST to protect the company's data?

49. An administrator has submitted a change request for an upcoming server deployment.

Which of the following must be completed before the change can be approved?

50. Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

51. A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time.

Which of the following protocols will the technician MOST likely utilize?

52. A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

53. A developer is creating a shell script to automate basic tasks in Linux.

Which of the following file types are supported by default?

54. A technician receives a call (rom a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user's screen with the user.

Which of the following would BEST accomplish this task?

55. A technician is preparing to remediate a Trojan virus that was found on a workstation.

Which of the following steps should the technician complete BEFORE removing the virus?

56. A user needs assistance changing the desktop wallpaper on a Windows 10 computer.

Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

57. A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines.

Which of the following should be updated to reflect this new requirement?

58. A new service desk is having a difficult time managing the volume of requests.

Which of the following is the BEST solution for the department?

59. A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee.

Which of the following methods should the technician use to refresh the laptop?

60. A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others.

Which of the following applications should the technician use to assist the user with hiding the file?

61. The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems.

Which of the following would BEST limit the bark's risk? (Select TWO)

62. A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs.

Which of the following filesystems is supported by both OS types?

63. A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded.

Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

64. A user reports that text on the screen is too small. The user would like to make the text larger and easier to see.

Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

65. While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names.

Which of the following social-engineering attacks is being attempted?

66. A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware.

Which of the following actions would be BEST to remove the malware while also preserving the user's files?

67. A systems administrator is creating a new document with a list of the websites that users are allowed to access.

Which of the following types of documents is the administrator MOST likely creating?

68. A technician needs to interconnect two offices to the main branch while complying with good practices and security standards.

Which of the following should the technician implement?

69. A data center is required to destroy SSDs that contain sensitive information.

Which of the following is the BEST method to use for the physical destruction of SSDs?

70. Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day.

Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

71. An analyst needs GUI access to server software running on a macOS server.

Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

72. A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair.

Which of the following should the technician do NEXT?

73. A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

74. A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid.

Which of the following should be checked FIRST?

75. A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.

Which of the following backup methods should the technician MOST likely implement?

76. A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console.

Which of the following is the NEXT step the technician should take to resolve the issue?

77. A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected.

Which of the following BEST describes why the system still has malware?

78. A technician needs to add an individual as a local administrator on a Windows home PC.

Which of the following utilities would the technician MOST likely use?

79. A user calls the help desk and reports a workstation is infected with malicious software.

Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

80. During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before.

To BEST resolve this issue, the executive should:

81. Someone who is fraudulently claiming to be from a reputable bank calls a company employee.

Which of the following describes this incident?

82. An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi.

Which of the following wireless security methods BEST describes what this organization implemented?

83. Which of the following should be done NEXT?

84. A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password.

Which of the following BEST describes the security benefits realized after this deployment?

85. A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service.

Which of the following is the BEST course of action for the support center representative to take?

86. A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment.

Which of the following options describes how to set up Windows Hello Fingerprint for the user?

87. The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack.

Which of the following would BEST mitigate this threat?

88. Which of the following macOS features provides the user with a high-level view of all open windows?

89. A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware.

Which of the following will MOST likely help to permanently remove the malware?

90. Which of the following is an example of MFA?

91. A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network.

Which of the following BEST describes what the systems administrator should tell the user?

92. A SOHO client is having trouble navigating to a corporate website.

Which of the following should a technician do to allow access?

93. A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3.

Which of the following is the MOST likely cause of the issue?

94. An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost.

Which of the following steps should a systems administrator attempt FIRST?

95. A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore.

Which of the following would BEST accomplish this task?

96. A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed.

Which of the following should be updated before requesting approval again?

97. A macOS user needs to create another virtual desktop space.

Which of the following applications will allow the user to accomplish this task?


 

 

SY0-601 Exam Dumps Questions V22.02: The Ultimate Study Guide for CompTIA Security+ Certification
CompTIA Network+ N10-008 Exam Dumps: Prepare with 446 Practice Questions and Answers

Add a Comment

Your email address will not be published. Required fields are marked *