Best October Special Limited Time 50% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s50disc

220-1002 PDF

$47.5

$94.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

220-1002 PDF + Testing Engine

$70

$139.99

3 Months Free Update

  • Exam Name: CompTIA A+ Certification Exam: Core 2
  • Last Update: Oct 19, 2021
  • Questions and Answers: 623
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

220-1002 Engine

$55

$109.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

220-1002 CompTIA A+ Certification Exam: Core 2 Questions and Answers

Question # 4

Joe, a mobile device user, reached his monthly quota of data about halfway through the current billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his usage patterns have not changed over the past month. Which of the following is MOST likely causing this issue?

A.

There are unintended WiFi connections

B.

Location tracking has been enabled

C.

Applications are causing high resource utilization.

D.

Malware is causing excessive data transmission

Full Access
Question # 5

A technician is removing malware from a workstation. The malware was installed via a phishing attack, which

was initiated from a link that was included in an email.

Which of the following should the technician do to address this issue? (Choose two.)

A.

Ensure the anti-rootkit utility is up to date and run it to remove the threat.

B.

Update the host firewall to block port 80 on the workstation.

C.

Restore the system using the last known-good configuration from the recovery console.

D.

Ensure antivirus is up to date and install the latest patches.

E.

Educate the user on verifying email links by hovering over them before clicking.

F.

Ensure endpoint protection is up to date and run the utility to remove the threat.

Full Access
Question # 6

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?

A.

Disconnect the PC from the network

B.

Perform an antivirus scan

C.

Run a backup and restore

D.

Educate the end user

Full Access
Question # 7

A network support technician takes a call from an office manager who wants to change the wireless security

key on the access point in that particular office. The office manager explains that a label on the access point

indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect

securely to the access point to make the change?

A.

RDP to 10.0.100.2

B.

SSH to 10.0.100.2

C.

HTTP to 10.0.100.2

D.

Telnet to 10.0.100.2

Full Access
Question # 8

A technician is working on an infected computer After running a scan and removing the malicious software, only one issue remains. When opening up the browser, it is redirected to an unwanted site The technician checks the home page settings, and they are correct. The technician types the home page address in the browser, and it is still redirected. Which of the following does the technician need to edit to resolve this issue?

A.

MSConfig

B.

Registry

C.

Hosts file

D.

boot.ini

Full Access
Question # 9

An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a

hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for

subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent

any further emails from this organization?

A.

Click the “Unsubscribe” button on each unwanted email

B.

Send the unwanted items to the spam or junk folder

C.

Deploy an email address whitelist

D.

Create domain-based filters

Full Access
Question # 10

A company requires multifactor authentication. When accessing one of the available RemoteApp programs that requires authentication, the user is not prompted to enter a pin. Which of the following BEST describes this scenario?

A.

Principle of least privilege

B.

Password expiration

C.

Single sign-on

D.

Permission inheritance

Full Access
Question # 11

The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?

A.

Spear phishing

B.

Impersonation

C.

Dumpster diving

D.

Whaling

Full Access
Question # 12

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

A.

GPT

B.

Dynamic

C.

Basic

D.

Extended

Full Access
Question # 13

A technician needs to install Windows 10 on a 4TB hard drive. Which of the following should the technician perform to accomplish this task?

A.

Format the drive to use exFAT.

B.

Configure the drive to use the GPT.

C.

Configure the drive to use an MBR.

D.

Format the drive to use CDFS.

Full Access
Question # 14

A small business, which is located in a Hood plain, wants a technician to recommend a backup strategy that will allow for Its flies to be recovered at an alternate location within a few days following a disaster. Which of the following backup methodologies will the technician MOST likely recommend''

A.

Implement a hoi site in an area outside the flood plain.

B.

Move all servers to an laaS provider and only use SaaS applications

C.

Install cloud backup software and use it (or regular backups

D.

Configure local tape backups and store them in a safe on site.

Full Access
Question # 15

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:

There are 1033 infected files on this computer. Click here to disinfect.

The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

A.

Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.

B.

Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications.

C.

Back up the user’s files. Restore the system to the original system image designated by corporate IT policies. Restore the user’s files.

D.

Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.

Full Access
Question # 16

A technician discovers a user’s home computer has Windows Update disabled and suspects malware has replaced several Windows OS files. After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?

A.

xcopy

B.

chkdsk

C.

sfc

D.

gpupdate

Full Access
Question # 17

A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or

replacement. The PC has numerous errors during the boot process and is running a very outdated operating

system. Which of the following should the technician do?

A.

Ask if the customer would like to donate the PC to a school

B.

Offer to sell a slightly newer computer to the customer

C.

Work on the computer and bill the customer for the time

D.

Advise the customer that the cost of repair is more than a new PC

Full Access
Question # 18

After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly Which of the following should the technician do NEXT?

A.

Verify the browser's proxy configuration settings

B.

Instruct the user to use the alternate web browser instead.

C.

Disconnect and reconnect from the corporate VPN

D.

Flush the workstation's DNS cache

E.

Scan the user's workstation for malware

Full Access
Question # 19

A technician is removing a virus from a user’s Windows workstation. The virus was installed by the user while downloading pirated software from the Internet. Which of the following should the technician do to address this issue?

A.

End the current explorer.exe task. Update and run an antivirus scanning utility to remove the threat. Relaunch explorer.exe using Task Manager.

B.

End the current explorer.exe task using the command line. Update and run an antivirus scanning utility to remove the threat.

C.

Launch explorer.exe using Task Manager. Update and run an antivirus scanning utility to remove the threat.

D.

Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.

Full Access
Question # 20

Which of the following basic scripting components can be used to repeat an operation until a specific requirement is met?

A.

If-then logic

B.

String variables

C.

Conditional loop

D.

Goto statement

Full Access
Question # 21

Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?

A.

WPS

B.

WPA2-PSK

C.

WPA-Enterprise

D.

WEP

Full Access
Question # 22

Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).

A.

.vbs

B.

.txt

C.

.exe

D.

.Up

E.

.bat

F.

.xlsx

Full Access
Question # 23

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?

A.

Check to ensure the printer selected is the default printer

B.

Check the status of the print server queue

C.

Cancel all documents and print them again

D.

Check that the printer is not offline print mode

Full Access
Question # 24

Which of the following application installation methods requires the use of a valid IP address?

A.

USB

B.

Network-based

C.

Script-based

D.

CD-ROM

Full Access
Question # 25

A technician receives the Chief Executive Officer’s (CEO’s) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario?

(Choose three.)

A.

Disconnect the device from the network

B.

Identify and research the symptoms

C.

Restore the computer to the previous checkpoint

D.

Scan and use removal techniques

E.

Create a restore point

F.

Educate the end user

G.

Schedule scans and run updates

Full Access
Question # 26

Which of the following is the maximum RAM limit of a Windows 32-bit version?

A.

no limit

B.

4GB

C.

8GB

D.

32GB

Full Access
Question # 27

A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)

A.

Reset the user’s browser to default settings

B.

Delete the user’s cached images, temporary files, and cookies

C.

Reboot the user’s computer and install a secondary antivirus

D.

Convince the user to use a different web browser that is currently unaffected

E.

Download the update to the user’s web browser of choice

F.

Remove any unapproved applications from the user’s startup items

Full Access
Question # 28

The Chief Executive Officer (CEO) of an organization frequently travels with sensitive data on a laptop and is concerned the data could be compromised if the laptop is lost or stolen. Which of the following should the technician recommend to BEST ensure the data is not compromised if the laptop is lost or stolen?

A.

Implement strong password policies.

B.

Encrypt the hard drive on the laptop.

C.

Set up a BIOS password on the laptop.

D.

Enable multifactor authentication on the laptop.

Full Access
Question # 29

A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous logins across the network, some of which are attempting to access workstations and servers to which the user does not have access Which of the following should the network administrator do NEXT?

A.

Delete the user's AD account

B.

Decrease the user's AD privileges

C.

Disable the user's AD account

D.

Reset the password on the user's AD account

Full Access
Question # 30

A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)

A.

Change management policy

B.

EULA

C.

BYOD policy

D.

Risk analysis

E.

MDM policy

F.

Time-based login policies

Full Access
Question # 31

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?

A.

Update limitations

B.

Limited access

C.

End-of-life

D.

Network connection

Full Access
Question # 32

A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users’ accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?

A.

Botnet

B.

Ransomware

C.

Antivirus definitions

D.

Keylogger

Full Access
Question # 33

A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

A.

Air filters

B.

Privacy screens

C.

Vacuums

D.

ESD mats

Full Access
Question # 34

A cybersecurity researcher purchased several used laptops at an auction. While the hard drives appeared to be blank, the researcher was able to recover all the data that previously existed on the drives. Which of the following methods did the original owner MOST likely use to clear the drives’ contents?

A Standard format

B. Drive degaussing

C. Disk encryption

D. Drive wipe

Full Access
Question # 35

A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?

A.

Performance Monitor

B.

Component Services

C.

Task Manager

D.

Event Viewer

Full Access
Question # 36

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:

Which of the following is the MOST likely cause of the problem?

A.

Joe should be using WEP security on his hot-spot for faster throughput

B.

Someone else is using Joe’s hot-spot due to weak password

C.

Joe’s hot-spot gave him an invalid IP address

D.

Joe is likely in a poor signal area and should try another area

Full Access
Question # 37

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

A.

Unattended installation

B.

Remote installation

C.

Repair installation

D.

Image deployment installation

Full Access
Question # 38

A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.

Which of the following Control Panel utilities should the technician use to accomplish this task?

A.

Network and Sharing Center

B.

Sync Center

C.

Credential Manager

D.

User Accounts

Full Access
Question # 39

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hot-spot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe’s slow data speeds?

A.

Joe’s data transmission is over the limit

B.

The phone needs to be rebooted from overuse

C.

The use of GPS interferes with data speeds

D.

There is unintended Bluetooth pairing.

Full Access
Question # 40

Which of the following is a Device that stores a copy of a certificate that is used for authentication?

A.

Biometric scanner

B.

Soft token

C.

Smart card

D.

OTP token

Full Access
Question # 41

The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable. Which of the following methods should the technician use to meet the requirement?

A.

Standard format

B.

Low-level format

C.

Overwrite

D.

Degauss

Full Access
Question # 42

A technician performed an in-place upgrade to Windows 10 on a customer’s laptop. Following the upgrade, a proprietary software application no longer works. The technician realizes the software is not compatible with Windows 10. Which of the following is the BEST option to make the software functional again?

A.

Apply all known updates to the updated OS.

B.

Roll back the in-place upgrade to the original OS.

C.

Run the application in compatibility mode.

D.

Reinstall the original OS.

Full Access
Question # 43

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

A.

netstat

B.

net use

C.

nslookup

D.

ping

Full Access
Question # 44

Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

A.

Download antivirus updates

B.

Update the device drivers

C.

Quarantine the affected systems

D.

Perform hardware diagnostics

Full Access
Question # 45

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

A.

Uninterruptible power supply

B.

Surge protector

C.

Power strip

D.

Power distribution unit

Full Access
Question # 46

A technician is creating a network topology diagram Which of the following would be the MOST appropriate to include? (Select TWO)

A.

A list of network addresses for each device

B.

A list of the ports on each device and what they are connected to

C.

Technical specifications and performance ratings for the devices

D.

Settings, configuration details, and notes on proper operations

E.

A list of devices that need replacement within the next 6-12 months

F.

The MAC address and serial number of each device on the network

Full Access
Question # 47

An administrator needs to uninstall an update on a Windows 7 computer. Which of the following Control Panel utilities would make this possible?

A.

Device Manager

B.

System Protection

C.

Programs and Features

D.

User Account Control

Full Access
Question # 48

Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

A.

Educate the end user on safe browsing and email habits.

B.

Scan and remove the malware from the infected system.

C.

Create a system restore point and reboot the system.

D.

Schedule antivirus scans and perform Windows updates.

Full Access
Question # 49

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

A.

exFAT security

B.

Ext3 security

C.

HFS security

D.

EFS security

E.

CDFS security

Full Access
Question # 50

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods

is BEST suited for the total destruction of the SSDs?

A.

Overwriting

B.

Formatting

C.

Incinerating

D.

Degaussing

Full Access
Question # 51

A network technician is creating a set of scripts to help complete some common tasks. The technician wants to leave notes within the scripts to explain the purpose of each section and allow for changes later. Which of the following should the technician use?

A.

Inline comments

B.

End-user documentation

C.

Change management

D.

Environmentally aware variables

Full Access
Question # 52

Which of the following security measures would BEST prevent unauthorized individuals from being granted access to a secure location?

A.

An infrared retina scanner and RFID lock

B.

Smart cards with a chip and PIN reader

C.

Barcoded ID badges and an electronic scanner

D.

Keys and a mechanical deadbolt lock

E.

Key fobs and wireless entry locks

Full Access
Question # 53

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.

Which of the following should the technician replace to prevent these issues in the future?

A.

System memory

B.

Surge protector

C.

Hard drives

D.

Battery backup

Full Access
Question # 54

A user is unable to get to any internal websites but can access some external websites. Which of the following will MOST likely resolve this issue?

A.

Uninstall and reinstall the browser.

B.

Confirm the proper proxy settings

C.

Disable the firewall

D.

Disable and re-enable the network adapter.

Full Access
Question # 55

A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)

A.

Reboot into safe mode

B.

Clear the application data

C.

Contact the application’s developer

D.

Reinstall the application

E.

Do a force stop

F.

Clear the application cache

Full Access
Question # 56

A user's laptop screen goes Clank every time the keyboard and/or mouse are not active for five minutes The user needs to change the settings for this option. Which of the following Control Panel utilities allows the user to make the adjustment?

A.

Device Manager

B.

Sync Center

C.

Power Options

D.

Display settings

Full Access
Question # 57

A technician was contacted regarding an issue affecting hundreds of users on a domain network. Which of the following would be MOST effective at remediating future issues through documentation?

A.

Take personal notes for future reference.

B.

Document the findings in the technician ticketing system.

C.

Document the solution in a user-facing FAQ page.

D.

Brief upper management in a meeting regarding the findings.

Full Access
Question # 58

A technician is investigating connectivity issues over the corporate network. The technician attempts to Telnet into an access point in the break room, which is labeled AP-1. but is unable to proceed any further or authenticate Which of the following commands will be MOST beneficial in determining the connectivity issues?

A.

netstac

B.

tracert

C.

ipconfig

D.

nslookup

Full Access
Question # 59

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the “My Documents” folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

A.

Remove the registry entry and rename the local account folder

B.

Delete or rename the local user folder

C.

Run DISM and re-add the local power user account

D.

Remove the user account in Credential Manager and restart the PC

Full Access
Question # 60

A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?

A.

Passphrase

B.

Knowledge-based authentication

C.

PIN

D.

Thumbprint

Full Access
Question # 61

Which of the following malware types would MOST likely require reimaging?

A.

Botnet

B.

Spyware

C.

Rootkit

D.

Keylogger

Full Access
Question # 62
A.

Formal the drive and restate all data from the recovery partition.

B.

Remove the disk and degauss it to remove the malware Reinsert the disk and restore from backup

C.

Roll back system changes, run anti-malware software, and educate the user

D.

Wipe and reformat the drive, and reload the operating system.

Full Access
Question # 63

A help desk technician needs to make administrative changes securely on a remote user's machine. The user must be logged off when the changes are made. Which of the following tools would the technician MOST likely use?

A.

RDP

B.

Virtual network computing

C.

Microsoft Remote Assistance

D.

SFTP

Full Access
Question # 64

A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

A.

Fingerprint lock

B.

Passcode lock

C.

Swipe lock

D.

PIN lock

Full Access
Question # 65

Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Full Access
Question # 66

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

A.

WPA2

B.

AES

C.

MAC filtering

D.

RADIUS

E.

WPS

Full Access
Question # 67

When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues The network administrator notices abnormally high network utilization Which of the following is the MOST likely issue the company is experiencing?

A.

Malware infection

B.

Rogue antivirus

C.

Browser redirection

D.

OS update failures

Full Access
Question # 68

A user can no longer edit files on the company shared drive. The user previously used has access to these files. A technician verifies the user can view the folders but cannot open any subfolders or folders. Which of the following must happen to fix this issue?

A.

The user should ask the file owners for permission and then let the technician know.

B.

The technician needs to update the local Be permissions to include read write. and modify access

C.

The technician must update the server permissions to include read, write and modify access.

D.

The technician’s update supervisor must approve the access and update the file explorer permission to read, write, and modify access.

Full Access
Question # 69

Malware has been identified on a critical system that is currently quarantined. Which of the following should a technician do after the malware symptoms are correctly identified?

A.

Educate the power user for that system.

B.

Schedule weekly scans and run routine updates.

C.

Disable System Restore.

D.

Remediate the infected system.

Full Access
Question # 70

A technician deployed a new file server on the network. The technician wants to map the file server as a network drive on all users' computers when they log onto the network by creating a logon script Which of the following should the technician use?

A.

net use

B.

dism

C.

diskpart

D.

gpresult

Full Access
Question # 71

A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

A.

Universal serial bus locks

B.

Personal identity verification cards

C.

Privacy screen

D.

Entry control roster

E.

Door locks

F.

Privacy window

Full Access
Question # 72

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

A.

The computer has GRUB Legacy installed

B.

Windows Startup services are not running

C.

An incompatible partition is marked as active

D.

An unsupported version of Windows is installed

Full Access
Question # 73

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?

A.

PHI certification

B.

PCI compliance

C.

POTS implementation

D.

PII filtering

Full Access
Question # 74

A technician needs to recommend a disaster recovery solution for a company that has three offices across two

states. The technician must ensure the solution has:

• The ability to centralize data backups

• High availability

• The ability to synchronize user data to local machines

Which of the following solutions will the technician MOST likely recommend? (Choose two.)

A.

Cold storage of all corporate data

B.

Redundant network links

C.

Hot site

D.

Servers at each location

E.

Clustered backups

F.

Cloud replication

G.

Local backups

Full Access
Question # 75

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

A.

Phishing

B.

Spear phishing

C.

Dumpster diving

D.

Impersonation

Full Access
Question # 76

Which of the following operating systems is based on UNIX source code and is closed source?

A.

Android

B.

Windows

C.

macOS

D.

Linux

Full Access
Question # 77

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).

A.

System files have been deleted

B.

Proxy settings are configured improperly

C.

The OS has been updated recently.

D.

There are disabled services on the vendor website.

E.

Program file permissions have changed recently.

F.

There is a rogue anti-malware program.

Full Access
Question # 78

A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

A.

Telnet

B.

SSH

C.

RDP

D.

VNC

Full Access
Question # 79

Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN The technician received alerts of devices failing throughout the network due to a power outage Which of the following is MOST likely causing the wireless issues?

A.

SSID is configured to not broadcast.

B.

The system locked out for all wireless users.

C.

The DHCP scope for WLAN is full

D.

The WAP in the warehouse is down

Full Access
Question # 80

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.

INSTRUCTIONS:

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 81

Which of the following is the MOST secure wireless security protocol?

A.

AES

B.

WPA

C.

WPA2

D.

WEP

Full Access
Question # 82

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

A.

Inform management regarding the anticipated amount of downtime

B.

Document a backout plan to roll back changes to the router

C.

Configure a redundant data path to eliminate downtime

D.

Make the downtime window larger than actually anticipated

Full Access
Question # 83

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

A.

Put on an ESD strap.

B.

Place components on an ESD mat

C.

Disconnect the power before servicing the PC

D.

Place the PC on a grounded work bench

Full Access
Question # 84

A technician is decommissioning a workstation that contains Pll The HDDs cannot be used in another device, and all data must be destroyed Which of the following actions would BEST fulfill these requirements? (Select TWO)

A.

Physically damage the drives.

B.

Leave the drives in the workstation since it will be decommissioned

C.

Take a picture of the drives individually and their serial numbers

D.

Send the drives to a certified third-party vendor for destruction.

E.

Perform a low-level format before removal

F.

Set a complex hard drive password.

Full Access
Question # 85

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

A.

Access control lists

B.

Multifactor authentication

C.

Organizational unit

D.

Trusted software sources

E.

Data loss prevention

F.

Pre-shared key

Full Access
Question # 86

Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?

A.

Credential Manager

B.

Network and Sharing Center

C.

Security and Maintenance

D.

Troubleshooting

Full Access
Question # 87

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).

A.

Full device encryption

B.

Remote backup application

C.

SSO authentication

D.

Device profiles update

E.

OS security updates

F.

Biometric authentication

Full Access
Question # 88

A technician is troubleshooting a PC and identifies the issue as malware. To remediate the PC, the technician attempts to download a malware removal tool but finds the PC cannot connect to the Internet. Which of the following MOST likely explains why the PC cannot access the Internet?

A.

The PC is quarantined.

B.

System Restore is disabled.

C.

The PC is currently running antivirus.

D.

Malware corrupted the NIC drivers.

Full Access
Question # 89

A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?

A.

Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

B.

Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.

C.

Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.

D.

Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

Full Access
Question # 90

A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?

A.

The Internet security options have changed

B.

The operating system updates have changed

C.

The network directory permissions have changed

D.

The user account permissions have changed

Full Access
Question # 91

Which of the following accurately describes why a file on a USB drive would be inaccessible by a user until the correct authentication is received?

A.

Read-only access

B.

Secure Boot

C.

System files and folders

D.

BitLocker To Go

Full Access
Question # 92

A technician is running Windows on a company’s Mac workstations without incurring an additional expense to the company. The Windows licenses were purchased in the past. Users are required to run both Windows and Mac operating systems on their machines, but never at the same time. Which of the following would be the BEST way to accomplish this?

A.

Perform a PXE boot on the workstations.

B.

Install virtualization software.

C.

Utilize Mission Control on the Mac workstations.

D.

Install Boot Camp on the workstations.

Full Access
Question # 93

A technician is installing an application on a Linux system using the Bash shell console. Which of the following extensions should the technician select to install the application?

A.

.Exe

B.

.Apk

C.

.Sh

D.

.app

Full Access