Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

220-1102 CompTIA A+ Certification Core 2 Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

220-1102 Practice Questions

CompTIA A+ Certification Core 2 Exam

Last Update 2 days ago
Total Questions : 845

Dive into our fully updated and stable 220-1102 practice test platform, featuring all the latest A+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free A+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 220-1102. Use this test to pinpoint which areas you need to focus your study on.

220-1102 PDF

220-1102 PDF (Printable)
$43.75
$124.99

220-1102 Testing Engine

220-1102 PDF (Printable)
$50.75
$144.99

220-1102 PDF + Testing Engine

220-1102 PDF (Printable)
$63.7
$181.99
Question # 181

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.  

Rearranging the monitor's position in display settings

B.  

Swapping the cables for the monitors

C.  

Using the Ctrl+AIt+> to correct the display orientation

D.  

Updating the display drivers for the video card

Discussion 0
Question # 182

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

Options:

A.  

incineration

B.  

Resale

C.  

Physical destruction

D.  

Dumpster for recycling plastics

Discussion 0
Question # 183

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

Options:

A.  

Windows Enterprise Edition

B.  

Windows Professional Edition

C.  

Windows Server Standard Edition

D.  

Windows Home Edition

Discussion 0
Question # 184

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.  

Multifactor authentication will be forced for Wi-Fi.

B.  

All Wi-Fi traffic will be encrypted in transit.

C.  

Eavesdropping attempts will be prevented.

D.  

Rogue access points will not connect.

Discussion 0
Question # 185

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

Options:

A.  

Run the virus scanner in an administrative mode.

B.  

Reinstall the operating system.

C.  

Reboot the system in safe mode and rescan.

D.  

Manually delete the infected files.

Discussion 0
Question # 186

While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?

Options:

A.  

Send a quick message regarding the delay to the next customer.

B.  

Cut the current customer's lime short and rush to the next customer.

C.  

Apologize to the next customer when arriving late.

D.  

Arrive late to the next meeting without acknowledging the lime.

Discussion 0
Question # 187

Which of the following is a consequence of end-of-lite operating systems?

Options:

A.  

Operating systems void the hardware warranty.

B.  

Operating systems cease to function.

C.  

Operating systems no longer receive updates.

D.  

Operating systems are unable to migrate data to the new operating system.

Discussion 0
Question # 188

Which of the following command-line tools will delete a directory?

Options:

A.  

md

B.  

del

C.  

dir

D.  

rd

E.  

cd

Discussion 0
Question # 189

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

Options:

A.  

Remote wipe

B.  

Mandatory screen locks

C.  

Location applications

D.  

Device data encryption

Discussion 0
Question # 190

A technician is on-site dealing with an angry customer. The customer thinks the issues have not been addressed, while the technician thinks that the issue has been correctly resolved. Which of the following should the technician do to handle the situation?

Options:

A.  

Insist that the customer is correct and document the concern.

B.  

Listen to the customer and do not speak at all.

C.  

Escalate the issue to the next tier.

D.  

Apologize and ask what would help resolve the issue.

Discussion 0
Question # 191

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

Options:

A.  

Time drift

B.  

NTP failure

C.  

Windows Update

D.  

CMOS battery

Discussion 0
Question # 192

When a user is browsing a website on a smartphone, a pop-up appears. The pop-up states that the system has been breached and directs the user to an application to resolve the breach. Which of the following should the user do?

Options:

A.  

Close the website and ignore the pop-up

B.  

Replace the smartphone

C.  

Download and install the application to resolve the issue

D.  

Analyze the smartphone to find the source of the breach

Discussion 0
Question # 193

Which of the following should be used to configure automatic backups on macOS?

Options:

A.  

Mission Control

B.  

Time Machine

C.  

Disaster Recovery

D.  

System Restore

Discussion 0
Question # 194

A customer is configuring on an old desktop an inexpensive file server to share photos and videos and wants to avoid complicated licensing. Which of the following operating systems should the technician most likely recommend?

Options:

A.  

Chrome OS

B.  

Linux

C.  

macOS

D.  

Windows

Discussion 0
Question # 195

A user is attempting to access a shared drive from a company-issued laptop while working from home. The user is unable to access any files and notices a red X next to each shared drive. Which of the following needs to be configured in order to restore the user's access to the shared drives?

Options:

A.  

IPv6

B.  

VPN

C.  

IPS

D.  

DNS

Discussion 0
Question # 196

A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?

Options:

A.  

Transaction log

B.  

Incremental

C.  

Synthetic

D.  

Differential

Discussion 0
Question # 197

An application's performance is degrading over time. The application is slowing but never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?

Options:

A.  

Reliability history

B.  

Computer management

C.  

Resource monitor

D.  

Disk defragment

Discussion 0
Question # 198

Which of the following is the most significant drawback of using the WEP protocol for wireless security?

Options:

A.  

Complex configuration process

B.  

Slow data transfer speed

C.  

Vulnerability to key-cracking attacks

D.  

Incompatibility with older devices

Discussion 0
Question # 199

Which of the following is a reason why PII is regulated?

Options:

A.  

To establish a chain-of-custody

B.  

To increase efficiency of databases

C.  

To stop information leaks

D.  

To protect privacy rights

E.  

To discourage anonymity

Discussion 0
Question # 200

A user accidentally deleted an important presentation from the desktop of a workstation. The presentation was created after the most recent daily corporate backup. As a result, the technician is unable to restore the presentation. Which of the following should the technician enable to prevent this issue from occurring in the future?

Options:

A.  

Incremental backup

B.  

File History

C.  

System Restore

D.  

BitLocker

Discussion 0
Get 220-1102 dumps and pass your exam in 24 hours!

Free Exams Sample Questions