Summer Special Sales Coupon - 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s55disc

220-1002 PDF

$49.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

220-1002 PDF + Testing Engine

$79.2

$175.99

3 Months Free Update

  • Exam Name: CompTIA A+ Certification Exam: Core 2
  • Last Update: Sep 29, 2022
  • Questions and Answers: 665
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

220-1002 Engine

$59.4

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

220-1002 CompTIA A+ Certification Exam: Core 2 Questions and Answers

Question # 6

Which of the following would BEST support an 8TB hard drive with one partition?

A.

GPT

B.

FAT16

C.

FAT32

D.

EFS

Full Access
Question # 7

A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).

A.

Perform a system file check and replace any changed files with their original versions

B.

Enable the pop-up blocker on the Internet browser

C.

Uninstall any recently installed unknown programs and browser extensions,

D.

Perform a hard shutdown and cold boot the computer

E.

Scan the RAM and hard drive using an up-to-date antivirus program.

Full Access
Question # 8

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?

A.

Zero-day malware

B.

Safari code injection

C.

OS corruption

D.

Overheating

E.

Time sync failure

Full Access
Question # 9

A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

A.

Incompatibility

B.

Impact to the network

C.

Impact to the user

D.

Impact to the device

Full Access
Question # 10

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.)

A.

Image deployment

B.

Multiboot

C.

PXE

D.

Unattended installation

E.

USB

F.

Wake-on-LAN

Full Access
Question # 11

An end user reports a Windows computer is infected with a virus. Which of the following should be the technician’s FIRST troubleshooting step?

A.

Identify malware symptoms

B.

Disable System Restore

C.

Run Windows Update

D.

Educate the end user

Full Access
Question # 12

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

A.

Inventory management policy

B.

Knowledge base articles

C.

End-user acceptance document

D.

Acceptable use policy

E.

Incident documentation

F.

Network diagrams

Full Access
Question # 13

A new user has joined a company, and human resources has given the user several documents to sign

regarding compliance and regulations for company computers. The user has also received web links to

documentation for applications, as well as processes and procedures to do jobs in accordance with those

programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

A.

Inventory management policy

B.

Knowledge base articles

C.

End-user acceptance document

D.

Acceptable use policy

E.

Incident documentation

F.

Network diagrams

Full Access
Question # 14

A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside. Which of the following should the technician use to remove the excess dust and dirt?

A.

A brush

B.

A vacuum

C.

Compressed air

D.

A damp cloth

Full Access
Question # 15

An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?

A.

Increase the amount of RAM

B.

Reboot the server

C.

Check the system logs

D.

Perform disk defragmentation

Full Access
Question # 16

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

A.

Firewall

B.

Antivirus

C.

Email filtering

D.

ACLs

E.

VPN

Full Access
Question # 17

A Windows 7 machine appears to have a failure. Every time it is rebooted, the message “BOOTMGR is missing” appears.

You have previously inserted a Windows 7 installation DVD into the DVD-ROM.D18912E1457D5D1DDCBD40AB3BF70D5D

Please repair this failure without overwriting the customers’ local user profiles.

INSTRUCTIONS

Use the Windows recovery and repair utilities to remediate the issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1002 question answer

220-1002 question answer

Full Access
Question # 18

Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?

A.

Generator

B.

Battery backup

C.

Surge suppressor

D.

Line conditioner

Full Access
Question # 19

A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which

of the following should the technician monitor during the installation?

A.

Impact to the workstations

B.

Impact to the users

C.

Impact to the network

D.

Impact to the DHCP pool

Full Access
Question # 20

A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.

Which of the following Control Panel utilities should the technician use to accomplish this task?

A.

Network and Sharing Center

B.

Sync Center

C.

Credential Manager

D.

User Accounts

Full Access
Question # 21

A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?

A.

Loop

B.

Integer

C.

String

D.

Variable

Full Access
Question # 22

A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?

A.

Antistatic bags

B.

Needle-nose pliers

C.

Safety goggles

D.

ESD straps

Full Access
Question # 23

A user wants to use a computer to access files on a nearby laptop Both computers can ping each other, but the user is unable to access any remote files. Which of the following settings should the user change to resolve the issue?

A.

Proxy settings

B.

Default gateway

C.

Firewall exceptions

D.

DNS

E.

QoS

Full Access
Question # 24

A technician is working on a virtual server migration project. The technician has already completed the SOW; however, the servers will not work without a critical network configuration that was missed in the original SOW. The technician needs to make the adjustments quickly.

Which of the following best practice processes should the technician perform NEXT?

A.

Obtain end-user acceptance for the proposed changes and submit a change plan for additional work.

B.

Submit the changes to the change board for approval.

C.

Notify the change team of the changes needed and perform the changes.

D.

Escalate to stakeholders and obtain override approval for out-of-scope changes.

E.

Document the changes and perform the work.

Full Access
Question # 25

A technician is in the process of removing a recently discovered Trojan horse application from a users laptop. Which of the following should the technician complete to prevent reinfection of the same machine?

A.

Reenable Windows System Restore after rebooting the device

B.

Research the symptoms to identify the threat.

C.

Update the operating system and anti-malware signatures.

D.

Isolate the infected machine from all networks.

Full Access
Question # 26

A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible Which of the following technologies should the technician use to manage this system?

A.

Telnet

B.

HTTPS

C.

SSH

D.

RDP

E.

SFTP

Full Access
Question # 27

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

A.

netstat

B.

net use

C.

nslookup

D.

ping

Full Access
Question # 28

Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.

Which of the following is MOST likely the cause?

A.

Ransomware

B.

Cryptomining

C.

Rootkit

D.

Keylogger

Full Access
Question # 29

A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?

A.

Change the default SSID

B.

Enable MAC filtering

C.

Update the firmware

D.

Set encryption

Full Access
Question # 30

A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

A.

Run a virus scan with updated signature files

B.

Uninstall any unknown browser extensions or add-ons

C.

Install the latest version of the Internet browser

D.

Enable SSL 3.0 in the browser settings

E.

Delete all unknown registry keys and reboot

Full Access
Question # 31

A technician is securing a server room by implementing a two-factor authentication solution Which of the following should the technician implement to provide the BEST security for the server room?

A.

Door lock and mantrap

B.

Server lock and badge reader

C.

Security guard and entry control roster

D.

Biometric lock and hardware token

Full Access
Question # 32

A smartphone user receives notice that a threshold for high-speed data usage, despite the user’s usage

behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST?

A.

Check network access permissions on recently loaded applications.

B.

Limit data usage to WiFi networks only.

C.

Wipe the device and restore to the factory default.

D.

Change the lock screen password.

Full Access
Question # 33

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some

websites, and web services are not responding from any of the web browsers, although Joe can access these

services from his smartphone without issue. The computer’s malware scanner has the latest definitions

installed. Which of the following would BEST explain why the computer is functioning this way?

A.

Expired root certificate

B.

OS update failures

C.

Pop-up blocker

D.

Hijacked email

Full Access
Question # 34

A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?

A.

Passphrase

B.

Knowledge-based authentication

C.

PIN

D.

Thumbprint

Full Access
Question # 35

A user on a local desktop wants to allow a blocked program through the Windows Firewall. Which of the following user accounts is necessary to perform this task?

A.

Guest

B.

Power user

C.

Administrator

D.

Standard

Full Access
Question # 36

A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with a yellow warning graphic. This icon advises the user that:

A.

BitLocker is operating on the system but not for the user

B.

BitLocker has locked the drive, and it is no longer accessible

C.

BitLocker is suspended, and the drive is no longer encrypted

D.

BitLocker has encountered an error and the user should run the check disk utility.

Full Access
Question # 37

A technician has been asked to review the configuration of an executive’s SOHO network following a recent news report regarding home Internet routers that are being added to botnets for malicious purposes. Which of the following would be BEST to prevent the router from being added to a botnet? (Choose two.)

A.

Upgrading to an enterprise-grade router

B.

Enabling WPA2-Enterprise encryption

C.

Changing the default credentials

D.

Updating to the latest firmware

E.

Reducing the transmit power levels

F.

Disabling the SSID from being broadcast

Full Access
Question # 38

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?

A.

macOS

B.

Windows

C.

Linux

D.

Chrome

Full Access
Question # 39

Which of the following types filesystems is in use when data is endiphered on a disk using a key?

A.

exFAT

B.

HFS

C.

FAT

D.

EFS

Full Access
Question # 40

A technician is remediating a virus on an infected workstation. All user files are set to system and hidden. Which of the following shouW a technician perform NEXT to remediate the system?

A.

Back up user data and rebuild the user profile.

B.

Restore user data and reset the user file attributes via a command line.

C.

Run System Restore to a date before the infection

D.

Perform a clean install of the OS and restore the user data

E.

Reset all file attributes on the user's profile via command line

Full Access
Question # 41

After setting up a replacement macOS device, Ann, a user, notices none of her previously saved passwords are automatically populating in her applications. Which of the following would have prevented this scenario?

A.

Enabling FileVault on the OS drive

B.

Using the passwd command to manage her passwords

C.

Configuring Gatekeeper to use the most secure setting

D.

Configuring Keychain to save to an iCloud account

Full Access
Question # 42

Which of the following should be done prior to installing replacement RAM modules into a desktop computer?

A.

Wear an ESD wrist strap.

B.

Put on latex gloves

C.

Connect power to a grounded outlet

D.

Disconnect the CMOS battery

Full Access
Question # 43

A technician needs to remove malware from a Windows system. The technician has already performed research on the malware and determined it is a memory virus. Which of the following steps should the technician take NEXT?

A.

Disable the restore points.

B.

Remediate the affected system.

C.

Educate the user.

D.

Quarantine the affected system.

Full Access
Question # 44

After purchasing an Ultrabook. Ann. a home user, has a technician come to her home and install an operating system. Which of the following OS retaliation methods will the technician MOST likely use?

A.

Flash drive

B.

PXE

C.

Optical disc

D.

Cloned drive

Full Access
Question # 45

The Chief Executive Officer (CEO) of an organization frequently travels with sensitive data on a laptop and is concerned the data could be compromised if the laptop is lost or stolen. Which of the following should the technician recommend to BEST ensure the data is not compromised if the laptop is lost or stolen?

A.

Implement strong password policies.

B.

Encrypt the hard drive on the laptop.

C.

Set up a BIOS password on the laptop.

D.

Enable multifactor authentication on the laptop.

Full Access
Question # 46

An administrator is loading a new Linux server. Which of the following filesystems will the administrator MOST likely select for the primary partition?

A.

ExFAT

B.

NTFS

C.

ext3

D.

Swap

Full Access
Question # 47

A user opens a phishing email and types logon credentials into a fake banking website. The computer’s antivirus software then reports it has quarantined several temporary Internet files. A technician disconnects the computer from the network. Which of the following should the technician perform NEXT?

A.

Have the user change the password.

B.

Update the antivirus software and run scans.

C.

Disable the user’s local computer account.

D.

Quarantine the phishing email.

Full Access
Question # 48

A user's mobile device has slow data speeds. The user first noticed the stow speeds after downloading a large application to the device. The application download MOST likely caused.

A.

a hardware issue on the device.

B.

the device to run more slowly

C.

the user to exceed the monthly data limit

D.

the device to change to WiFi settings

Full Access
Question # 49

The management team has issued a new directive that states a certain string is no longer allowed in any of the names on any of the Linux workstation. Which of the following commands would a technician issue to find all the instances of the unwanted string on a workstation?

A.

Ps aux | gre ‘string’

B.

Cd | mv ‘string’

C.

is |Grep ‘string’

D.

dd / | rm ‘string’

Full Access
Question # 50

A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?

A.

Update all antivirus definitions and run a full scan on all networked computers.

B.

Make sure the operating systems on all networked computers are fully patched and up to date

C.

Update all software drivers and firmware on all the affected computers.

D.

Enable geofiltering on the network firewall to stop unwanted communications.

Full Access
Question # 51

A user reports a computer is experiencing the following issues:

  • Slowness at different points in the day
  • Screensaver engaging randomly
  • BSODs

Which of the following tools should the technician use to analyze the computer’s behavior?

A.

Computer Management

B.

Event Viewer

C.

Performance Monitor

D.

Task Manager

Full Access
Question # 52

A company recently upgraded its computers from Windows XP SP3 lo Windows 7. Due to budget constraints, the company was not able to purchase newer machines. The computers do not have TPM chips. Out the company would like to secure the information on the local hard disk in case the hard drive is stolen, while being able to access all of its information even if users leave. Which of the following would allow the company to accomplish this task?

A.

Encrypted file system

B.

BitLocker

C.

Secure Boot

D.

BIOS password

Full Access
Question # 53

A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs. Which of the following should the technician implement to ensure maximum uptime of the client VM?

A.

Cloud storage backup

B.

Large file storage

C.

Image-level backup

D.

Uninterruptible power supply

Full Access
Question # 54

A technician is attempting to resolve an issue with a customer's smartphone. The customer can no longer unlock the smartphone due to an “incorrect pattern" message appearing onscreen,

The customer explains that the option to "make pattern visible” is unchecked in the security settings. The customer has also unsuccessfully tried to unlock the smartphone using a PIN. The

customer is certain the pattern and PIN being entered are both correct. The technician is unable to click the proper options onscreen to perform a reset, but can select it without issue using

the side buttons designed for volume and power. Which of the following describes the root cause of the issue?

A.

The smartphone's data cable is disconnected.

B.

The smartphone's side buttons are becoming sticky.

C.

The smartphone has very little free space available.

D.

The smartphone screen needs to be calibrated.

Full Access
Question # 55

An IT manager receives a call from a user who states a technician completed work on a department laptop within the last week. The user indicates the technician tried to explain the issue

with the laptop, but the user was unable to understand because the technician used a lot acronyms. Additionally, the user claims the technician spoke too quickly when explaining the issue

and seemed preoccupied with a cell phone. The IT manager wants to address an email to the IT department to ensure the user's complaints are conveyed to the team. Which of the following

should the IT manager recommend in the email to the team? (Select TWO).

A.

Technicians should avoid using technical jargon when speaking to users.

B Technicians should avoid trying to explain complex issues to users.

B.

Technicians should avoid speaking to users who have complex issues.

C.

Technicians should avoid setting an expectation for project completion in front of the user.

D.

Technicians should avoid distractions when speaking with users.

E.

Technicians should avoid working in front of users.

Full Access
Question # 56

A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

A.

Remote wipe

B.

Device encryption

C.

Biometric authentication

D.

Enterprise sandbox

Full Access
Question # 57

An administrator wants to search a file on a Linux server for the plus symbol (+). Which of the following will the administrator MOST likely use?

A.

Is

B.

sh

C.

cat

D.

grep

Full Access
Question # 58

Which of the following should be replaced after a voltage spike?

A.

Surge suppressor

B.

Battery backup

C.

Power supply

D.

Electrical cable

Full Access
Question # 59

A user moves a file from one NTFS disk to another NTFS disk Which of the following descnbes the changes to the file permissions?

A.

The file has both the source and destination permissions

B.

The file keeps the source permissions.

C.

The file permissions have to be set manually.

D.

The file receives the destination permissions

Full Access
Question # 60

A technician is setting up network adapter settings on Windows clients that have static IP address assignments. The technician has more than 100 workstation to complete and wants to automate the process. The requirements for the adapter settings are as follows:

* They must utilize a command line utility

* The technician has no access to Group Policy

* All workstation should have an IP address assigned by the DHCP.

Which of the following steps should the technician perform to meet these requirements?

A.

Use the ipconfig/release and ipconfig /renev command to have the workstation contact the DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

B.

Use the petsh command to reset the workstation adapter. Then use the ipconfig /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

C.

Use the net use command to view active connection on the network. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

D.

Use the netstat command to find connections on the workstation adapter. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a .bat file to execute on all systems.

Full Access
Question # 61

A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While

troubleshooting, a technician discovers there are rules on the user’s account that are forwarding the emails to

an external email address and deleting the emails from the bank.

This is an example of:

A.

spam email.

B.

invalid certificates.

C.

hijacked email.

D.

browser pop-ups.

Full Access
Question # 62

A technician needs to recommend a disaster recovery solution for a company that has three offices across two

states. The technician must ensure the solution has:

• The ability to centralize data backups

• High availability

• The ability to synchronize user data to local machines

Which of the following solutions will the technician MOST likely recommend? (Choose two.)

A.

Cold storage of all corporate data

B.

Redundant network links

C.

Hot site

D.

Servers at each location

E.

Clustered backups

F.

Cloud replication

G.

Local backups

Full Access
Question # 63

Which of the following is an authentication protocol that can be used for users in the field?

A.

WEP

B.

WPA2

C.

RADIUS

D.

TKIP

Full Access
Question # 64

A technician is troubleshooting a home WiFi router that is used by a small company of 30 employees. The business is experiencing intermittent wireless connectivity issues. Which of the following is the MOST likely cause of the issues'?

A.

Some of the employees are not licensed to use the router

B.

The router has insufficient capabilities

C.

Static DNS has not been set up on the router.

D.

Several of the employees are using an incorrect SSlD

Full Access
Question # 65

A technician encounters a previously unidentified issue. The technician conducts some research, finds a solution, and resolves the issue. According to best practices, which of the following should the technician do so the issue can be addressed if it is encountered again?

A.

Inform the immediate supervisor about the findings.

B.

Email all the other technicians to explain the problem and resolution.

C.

Enter the resolution in the ticket and close it.

D.

Add the findings to the knowledge base

Full Access
Question # 66

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the

BEST choice for the technician to make?

A.

Politely ask the user to call back

B.

Ask another technician to take the call

C.

Troubleshoot the issue for the user

D.

Input the issue as a ticket and escalate to Tier 2

E.

Put the user on hold and troubleshoot after the scheduled break

Full Access
Question # 67

A user’s mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices. Which of the following should a technician perform to resolve the issue?

A.

Run a malware scan on the device.

B.

Instruct the user to change the device’s password.

C.

Disable access to the user’s contacts.

D.

Deny access to text messages.

Full Access
Question # 68

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

A.

GPT

B.

Dynamic

C.

Basic

D.

Extended

Full Access
Question # 69

A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

A.

Fingerprint lock

B.

Passcode lock

C.

Swipe lock

D.

PIN lock

Full Access
Question # 70

A customer's computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?

A.

Ping

B.

Iwconfig

C.

Nbtstat

D.

Nslookup

Full Access
Question # 71

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.

Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.

Which of the following settings or features is responsible for the problems Ann is experiencing?

A.

Full device encryption

B.

Account lock

C.

Multifactor authentication

D.

Strong password requirements

Full Access
Question # 72

A user reports that a cell phone application is loading slowly and not functioning properly Which of the following should a technician do FIRST to remedy this issue?

A.

Remove and reinstall the application.

B.

Hard reset the cell phone.

C.

Reconnect the wireless network connection

D.

Close all running applications

Full Access
Question # 73

A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

A.

Domain name, location, IP address

B.

Domain name, location, asset ID

C.

Asset ID, MAC address

D.

Location, RFID

Full Access
Question # 74

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?

A.

Install to a network drive

B.

Install to a USB drive

C.

Install to a DVD-RW

D.

Install to a security internal_HDD

Full Access
Question # 75

A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

A.

Telnet

B.

SSH

C.

RDP

D.

VNC

Full Access
Question # 76

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

A.

sudo

B.

chmod

C.

grep

D.

pwd

Full Access
Question # 77

A technician responds to a report that a user’s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

A.

Roll back the OS upgrade. Continue using the older version of Windows

B.

Reset the PC to its factory conditions. Perform the OS upgrade again

C.

Update the SATA controller driver from the manufacturer’s website

D.

Perform a full backup and replace the hard drive

Full Access
Question # 78

A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. Which of the following would be BEST suited for this task?

A.

VNC

B.

Telnet

C.

SSH

D.

RDP

Full Access
Question # 79

Which of the following provide the BEST security for a server room? (Select two.)

A.

Badge reader

B.

Bollard

C.

Biometric lock

D.

Cable lock

E.

USB token

F.

Privacy window shades

Full Access
Question # 80

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:

220-1002 question answer

Which of the following is the MOST likely cause of the problem?

A.

Joe should be using WEP security on his hot-spot for faster throughput

B.

Someone else is using Joe’s hot-spot due to weak password

C.

Joe’s hot-spot gave him an invalid IP address

D.

Joe is likely in a poor signal area and should try another area

Full Access
Question # 81

A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

A.

Universal serial bus locks

B.

Personal identity verification cards

C.

Privacy screen

D.

Entry control roster

E.

Door locks

F.

Privacy window

Full Access
Question # 82

A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?

A.

Enable System Restore and create a restore point so no data is lost

B.

Educate the user about how to avoid malware in the future

C.

Update the antivirus software and run a full system scan

D.

Move the infected system to a lab with no network connectivity

Full Access
Question # 83

A user who is running Windows 10 logs Into a machine and notices that shared drives are missing, the "My Documents* folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

A.

Remove the registry entry and rename the local account folder.

B.

Delete or rename the local user folder.

C.

Run DISM and re-add the local power user account.

D.

Remove the user account In Credential Manager and restart the PC.

Full Access
Question # 84

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

A.

SSD

B.

Optical drive

C.

Flash drive

D.

PXE

Full Access
Question # 85

A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

A.

Time Machine

B.

Snapshot

C.

System Restore

D.

Boot Camp

Full Access
Question # 86

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

A.

Uninstall the camera application

B.

Check the application permissions

C.

Reset the phone to factory settings

D.

Update all of the applications on the phone

E.

Run any pending OS updates

Full Access
Question # 87

A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.

Which of the following types of infection does the user MOST likely have?

A.

Rootkit

B.

Keylogger

C.

Trojan

D.

Ransomware

Full Access
Question # 88

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)

A.

Administrative share permissions

B.

Mapped drives

C.

Group Policy hours restriction

D.

Denied write/delete permissions

E.

Disabled proxy settings

Full Access
Question # 89

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

A.

Remove applications from startup

B.

Defragment the hard drive

C.

Install additional RAM

D.

Install a faster hard drive

E.

End the processes in Task Manager

F.

Run the Disk Cleanup utility

Full Access
Question # 90

Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?

A.

Credential Manager

B.

Network and Sharing Center

C.

Security and Maintenance

D.

Troubleshooting

Full Access
Question # 91

Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

A.

Acceptable use policy

B.

Inventory management

C.

EULA

D.

MDM policy

Full Access
Question # 92

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

A.

2GB

B.

4GB

C.

8GB

D.

16GB

Full Access
Question # 93

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.

Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

A.

Unattended installation

B.

Remote network installation

C.

In-place upgrade

D.

Clean installation

Full Access
Question # 94

A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses Which of the following is MOST likely the problem?

A.

Rootkit

B.

Zero-day malware

C.

Rogue antivirus

D.

Old virus definitions

Full Access
Question # 95

Which of the following is a community supported, open source OS used for both services and workstations?

A.

IOS

B.

Windows 10

C.

Linux

D.

OS X

Full Access
Question # 96

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:

There are 1033 infected files on this computer. Click here to disinfect.

The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

A.

Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.

B.

Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications.

C.

Back up the user’s files. Restore the system to the original system image designated by corporate IT policies. Restore the user’s files.

D.

Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.

Full Access
Question # 97

A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory. Which of the following should the technician use to accomplish this?

A.

Devices and Printers

B.

Sync Center

C.

Device Manger

D.

Power Options

Full Access
Question # 98

Which of the following built-in accounts was removed in Windows 10?

A.

Power User

B.

Administrator

C.

Guest

D.

Standard User

Full Access
Question # 99

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

A.

Default SSID

B.

MAC filtering

C.

Power levels

D.

Content filtering

E.

Firewall

Full Access