Skip to content

220-1002 CompTIA A+ Certification : Core 2 Exams demo

QUESTION 2
A technician arrives on site to find that two users who have the same model on Android smartphone are having
the same issue with a specific application.
Whenever they attempt to launch the application, it fails and gives an error message. Which of the following
should the technician do FIRST?
A. Reinstall the application
B. Roll back the application to the earlier version
C. Clear the application cache
D. Update the OS of the smartphones
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Choose two.)
A. dir
B. chkdsk
C. dism
96CE4376707A97CE80D4B1916F054522
D. ipconfig
E. format
F. diskpart
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
An administrator is setting up a Windows terminal server.
Which of the following settings should the administrator modify to increase server security? (Choose two.)
A. Change the default access port
B. Enforce password complexity
C. Put the terminal server into the router’s DMZ
D. Disable logon time restrictions
E. Block all unused ports on the LAN smart switch
F. Use the local client certificate for server authentication
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically
separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?
A. Telnet
B. SSH
C. RDP
D. VNC
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain
access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
A. Guest network
96CE4376707A97CE80D4B1916F054522
B. TKIP
C. Default login
D. Outdated firmware
E. WPS
F. WEP
Correct Answer: CF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and
identify while in use.
Which of the following naming convention formats should the technician follow?
A. Domain name, location, IP address
B. Domain name, location, asset ID
C. Asset ID, MAC address
D. Location, RFID
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Which of the following provide the BEST security for a server room? (Choose two.)
A. Badge reader
B. Bollard
C. Biometric lock
D. Cable lock
E. USB token
F. Privacy window shades
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Which of the following threats uses personalized information in an attempt at obtaining information?
A. Whaling
B. Impersonation
C. Spoofing
96CE4376707A97CE80D4B1916F054522
D. Spear phishing
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other
computers on the same LAN do not exhibit this symptom.
Which of the following needs to be adjusted on the workstation to fix the issue?
A. Date and time
B. UEFI boot mode
C. Logon times
D. User access control
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring
the Windows workstations to use the new proxy server.
Which of the following Control Panel utilities should the technician use to configure the setting?
A. Internet Options – Advanced
B. Internet Options – Connections
C. Internet Options – Security
D. Internet Options – Content
E. Internet Options – Privacy
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
A. 2GB
B. 4GB
C. 8GB
D. 16GB
Correct Answer: B
96CE4376707A97CE80D4B1916F054522
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
A technician is working at a help desk firm and receives a call from a user who has experienced repeated
BSODs. The technician is scheduled to take a break just after the call comes in.
Which of the following is the BEST choice for the technician to make?
A. Politely ask the user to call back
B. Ask another technician to take the call
C. Troubleshoot the issue for the user
D. Input the issue as a ticket and escalate to Tier 2
E. Put the user on hold and troubleshoot after the scheduled break
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the
data is very valuable.
Which of the following is the BEST method of securing the phone?
A. Fingerprint lock
B. Passcode lock
C. Swipe lock
D. PIN lock
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
Which of the following devices are MOST likely to have a grounding wire attached to them based on the
manufacturer’s design? (Choose two.)
A. UPS
B. Server rack
C. PoE phone
D. Desktop printer
E. Modem
F. Patch panel
Correct Answer: AB
96CE4376707A97CE80D4B1916F054522
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the
technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.
Which of the following is MOST likely causing this error?
A. The computer has GRUB Legacy installed
B. Windows Startup services are not running
C. An incompatible partition is marked as active
D. An unsupported version of Windows is installed
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
A technician is installing a private PC in a public workspace.
Which of the following password practices should the technician implement on the PC to secure network
access?
A. Remove the guest account from the administrators group
B. Disable single sign-on
C. Issue a default strong password for all users
D. Require authentication on wake-up
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of
the shares hosted on his home media server. Joe has verified he is connected to the Internet.
Which of the following would explain why Joe cannot access his personal shares?
A. An IP conflict is present
B. A corporate VPN is enabled
C. A firewall exception must be set
D. HomeGroup must be enabled
Correct Answer: C
Section: (none)
Explanation
96CE4376707A97CE80D4B1916F054522
Explanation/Reference:
QUESTION 19
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software
but is now experiencing extremely slow performance on the laptop.
Which of the following should a technician do to resolve the issue and avoid recurrence?
A. Activate real-time protection on both antivirus software programs
B. Uninstall one antivirus software program and install a different one
C. Run OS updates
D. Enable the quarantine feature on both antivirus software programs
E. Remove the user-installed antivirus software
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The
user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor.
Which of the following OSs should the technician recommended to ensure the BEST performance on this
computer?
A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten
minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time
because he has already tried everything that has been suggested.
Which of the following should the technician do?
A. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot
B. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this
one
C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the
issue and save time
D. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved
96CE4376707A97CE80D4B1916F054522
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Which of the following security methods BEST describes when a user enters a username and password once
for multiple applications?
A. SSO
B. Permission propagation
C. Inheritance
D. MFA
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have
access to only the application needed for customer interaction. The technician must also ensure that whenever
the computer is rebooted or powered on it logs in automatically without a password.
Which of the following account types would the technician MOST likely set up on this kiosk machine?
A. Guest
B. Administrator
C. Power User
D. Remote Desktop User
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to
pay for a license.
Which of the following license types should the technician recommend?
A. Open license
B. Personal license
C. Corporate license
D. Enterprise license
Correct Answer: A
Section: (none)
Explanation
96CE4376707A97CE80D4B1916F054522
Explanation/Reference:
QUESTION 25
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to
take daily backups of all servers. The server backups will be saved locally to NAS.
Which of the following can Joe do to ensure the backups will work if needed?
A. Frequently restore the servers from backup files and test them
B. Configure the backups to restore to virtual machines for quick recovery
C. Set up scripts that automatically rerun failed backup jobs
D. Set up alerts to let administrators know when backups fail
E. Store copies of the backups off-side in a secure datacenter
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all
data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding
process and needs suggestions on the best way to prevent this from happening again.
Which of the following recommendations should the contractor give to the customer? (Choose two.)
A. Backup testing
B. Cloud storage
C. Local storage backups
D. Data recovery
E. Hot site
F. Waterproof devices
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear
as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again.
The updates continue to fail.
Which of the following is the FIRST option to check?
A. Visit the Microsoft Update website to see if there is an issue with a specific update
B. Look up the error number associated with the failed update
C. Look at the system Event Viewer to find more information on the failure
D. Download the failed update to install manually
96CE4376707A97CE80D4B1916F054522
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory.
Which of the following Control Panel utilities should the technician use?
A. System
B. Display
C. Folder Options
D. Indexing Options
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
A technician has identified malware on a user’s system.
Which of the following should the technician do NEXT according to malware removal best practices?
A. Enable System Restore and create a restore point so no data is lost
B. Educate the user about how to avoid malware in the future
C. Update the antivirus software and run a full system scan
D. Move the infected system to a lab with no network connectivity
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization
and sees that it varies between 95% and 100%. After the technician closes some running applications, the
CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls
again with the same problem.
Which of the following is a tool the technician can use to resolve the issue?
A. Task Manager
B. MSTSC
C. MSConfig
D. PerfMon
Correct Answer: A
96CE4376707A97CE80D4B1916F054522
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing
at least one hour of uptime in case of extreme weather conditions.
Which of the following should a technician recommend?
A. Uninterruptible power supply
B. Surge protector
C. Power strip
D. Power distribution unit
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Which of the following installation types would require the use of an answer file to install the OS?
A. Unattended
B. Clean
C. Repair
D. Upgrade
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
A Mac user’s operating system became corrupted, and files were deleted after malware was downloaded. The
user needs to access the data that was previously stored on the MAC.
Which of the following built-in utilities should be used?
A. Time Machine
B. Snapshot
C. System Restore
D. Boot Camp
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
.

.

.

.

 BUY full version for more questions

Previous article 1z0-062 Oracle Database 12c Administration Exams demo
Next article MB-310 Microsoft Dynamics 365 Finance exams demo

Comments

Certpixel Reply to ailzesca - June 7, 2022

yes we do , please check our listing

ailzesca - June 10, 2021

do u have 220-1002 june update?

Leave a comment

* Required fields