Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

220-1102 CompTIA A+ Certification Core 2 Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

220-1102 Practice Questions

CompTIA A+ Certification Core 2 Exam

Last Update 2 days ago
Total Questions : 845

Dive into our fully updated and stable 220-1102 practice test platform, featuring all the latest A+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free A+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 220-1102. Use this test to pinpoint which areas you need to focus your study on.

220-1102 PDF

220-1102 PDF (Printable)
$43.75
$124.99

220-1102 Testing Engine

220-1102 PDF (Printable)
$50.75
$144.99

220-1102 PDF + Testing Engine

220-1102 PDF (Printable)
$63.7
$181.99
Question # 101

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

Options:

A.  

MFA

B.  

WPA2

C.  

AES

D.  

RADIUS

Discussion 0
Question # 102

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?

Options:

A.  

Enable firewall ACLs.

B.  

Examine the localhost file entries.

C.  

Verify the routing tables.

D.  

Update the antivirus definitions.

Discussion 0
Question # 103

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

Options:

A.  

TKIP

B.  

RADIUS

C.  

WPA2

D.  

AES

Discussion 0
Question # 104

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

Options:

A.  

Evil twin

B.  

Impersonation

C.  

Insider threat

D.  

Whaling

Discussion 0
Question # 105

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

Options:

A.  

DHCP

B.  

SMTP

C.  

DNS

D.  

RDP

Discussion 0
Question # 106

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

Options:

A.  

User account status

B.  

Mobile OS version

C.  

Data plan coverage

D.  

Network traffic outages

Discussion 0
Question # 107

A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The technician needs to make use of a tool natively designed for Linux. Which of the following tools will the technician MOST likely use?

Options:

A.  

VNC

B.  

MFA

C.  

MSRA

D.  

RDP

Discussion 0
Question # 108

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8G

B.  

Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.  

The system is missing updates.

B.  

The system is utilizing a 32-bit OS.

C.  

The system's memory is failing.

D.  

The system requires BIOS updates

Discussion 0
Question # 109

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

Options:

A.  

gpedit

B.  

gpmc

C.  

gpresult

D.  

gpupdate

Discussion 0
Question # 110

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

Options:

A.  

Phishing

B.  

Smishing

C.  

Whaling

D.  

Vishing

Discussion 0
Question # 111

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.  

File Explorer

B.  

Startup Folder

C.  

System Information

D.  

Programs and Features

E.  

Task Scheduler

F.  

Device Manager

Discussion 0
Question # 112

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

Options:

A.  

copy

B.  

xcopy

C.  

robocopy

D.  

Copy-Item

Discussion 0
Question # 113

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

Options:

A.  

Remote wipe

B.  

Firewall

C.  

Device encryption

D.  

Remote backup

E.  

Antivirus

F.  

Global Positioning System

Discussion 0
Question # 114

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

Options:

A.  

UAC

B.  

MDM

C.  

LDAP

D.  

SSO

Discussion 0
Question # 115

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

Options:

A.  

Cross-site scripting

B.  

SQL injection

C.  

Brute-force attack

D.  

DDoS attack

Discussion 0
Question # 116

A technician needs to implement a system to handle both authentication and authorization. Which of the following meets this requirement?

Options:

A.  

WPA3

B.  

MFA

C.  

TACACS+

D.  

RADIUS

Discussion 0
Question # 117

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

Options:

A.  

Authenticator application

B.  

Access control lists

C.  

Biometrics

D.  

Smart card readers

Discussion 0
Question # 118

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

Options:

A.  

Windows 10

B.  

macOS

C.  

Linux

D.  

Chrome OS

E.  

iOS

Discussion 0
Question # 119

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

Options:

A.  

Configure MAC filtering.

B.  

Disable DHCP.

C.  

Configure port forwarding.

D.  

Disable guest access.

Discussion 0
Question # 120

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

Options:

A.  

HTTPS

B.  

VLAN

C.  

DNS

D.  

SMTP

Discussion 0
Get 220-1102 dumps and pass your exam in 24 hours!

Free Exams Sample Questions