Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

220-1102 CompTIA A+ Certification Core 2 Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

220-1102 Practice Questions

CompTIA A+ Certification Core 2 Exam

Last Update 2 days ago
Total Questions : 845

Dive into our fully updated and stable 220-1102 practice test platform, featuring all the latest A+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free A+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 220-1102. Use this test to pinpoint which areas you need to focus your study on.

220-1102 PDF

220-1102 PDF (Printable)
$43.75
$124.99

220-1102 Testing Engine

220-1102 PDF (Printable)
$50.75
$144.99

220-1102 PDF + Testing Engine

220-1102 PDF (Printable)
$63.7
$181.99
Question # 81

A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?

Options:

A.  

EULA

B.  

Pll

C.  

DRM

D.  

Open-source agreement

Discussion 0
Question # 82

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

Options:

A.  

Database system

B.  

Software management

C.  

Active Directory description

D.  

Infrastructure as a Service

Discussion 0
Question # 83

An implementation specialist is replacing a legacy system at a vendor site that has only one wireless network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has open authentication. The technician needs to secure the vendor's sensitive data. Which of the following should the specialist do FIRST to protect the company's data?

Options:

A.  

Manually configure an IP address, a subnet mask, and a default gateway.

B.  

Connect to the vendor's network using a VPN.

C.  

Change the network location to private.

D.  

Configure MFA on the network.

Discussion 0
Question # 84

Which of the following script types is used with the Python language by default?

Options:

A.  

.ps1

B.  

.vbs

C.  

.bat

D.  

.py

Discussion 0
Question # 85

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

Options:

A.  

Access control list

B.  

Acceptable use policy

C.  

Incident report

D.  

Standard operating procedure

Discussion 0
Question # 86

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

Options:

A.  

High availability

B.  

Regionally diverse backups

C.  

On-site backups

D.  

Incremental backups

Discussion 0
Question # 87

A technician needs to add an individual as a local administrator on a Windows home P

C.  

Which of the following utilities would the technician MOST likely use?

Options:

A.  

Settings > Personalization

B.  

Control Panel > Credential Manager

C.  

Settings > Accounts > Family and Other Users

D.  

Control Panel > Network and Sharing Center

Discussion 0
Question # 88

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

Options:

A.  

Disable System Restore.

B.  

Schedule a malware scan.

C.  

Educate the end user.

D.  

Run Windows Update.

Discussion 0
Question # 89

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

Options:

A.  

Enable promiscuous mode.

B.  

Clear the browser cache.

C.  

Add a new network adapter.

D.  

Reset the network adapter.

Discussion 0
Question # 90

Which of the following is used as a password manager in the macOS?

Options:

A.  

Terminal

B.  

FileVault

C.  

Privacy

D.  

Keychain

Discussion 0
Question # 91

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

Options:

A.  

Trojan

B.  

Rootkit

C.  

Cryptominer

D.  

Keylogger

Discussion 0
Question # 92

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

Options:

A.  

Stop code

B.  

Event Mewer

C.  

Services

D.  

System Configuration

Discussion 0
Question # 93

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

Options:

A.  

A system patch disabled the antivirus protection and host firewall.

B.  

The system updates did not include the latest anti-malware definitions.

C.  

The system restore process was compromised by the malware.

D.  

The malware was installed before the system restore point was created.

Discussion 0
Question # 94

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

Options:

A.  

Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service

B.  

Flashing the BIOS, reformatting the drive, and then reinstalling the OS

C.  

Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS

D.  

Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Discussion 0
Question # 95

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.  

Implementing password expiration

B.  

Restricting user permissions

C.  

Using screen locks

D.  

Disabling unnecessary services

Discussion 0
Question # 96

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.  

apt-get

B.  

CIFS

C.  

Samba

D.  

greP

Discussion 0
Question # 97

Which of the following should be used to secure a device from known exploits?

Options:

A.  

Encryption

B.  

Remote wipe

C.  

Operating system updates

D.  

Cross-site scripting

Discussion 0
Question # 98

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

Options:

A.  

Proceed to the site.

B.  

Use a different browser.

C.  

Report the error to the bank.

D.  

Reinstall the browser.

Discussion 0
Question # 99

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

Options:

A.  

Private-browsing mode

B.  

Invalid certificate

C.  

Modified file

D.  

Browser cache

Discussion 0
Question # 100

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

Options:

A.  

Requiring employees to enter their usernames and passwords

B.  

Setting up facial recognition for each employee

C.  

Using a PIN and providing it to employees

D.  

Requiring employees to use their fingerprints

Discussion 0
Get 220-1102 dumps and pass your exam in 24 hours!

Free Exams Sample Questions