Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 220-1102 CompTIA A+ Certification Core 2 Exam is now Stable and With Pass Result

220-1102 Practice Exam Questions and Answers

CompTIA A+ Certification Core 2 Exam

Last Update 3 days ago
Total Questions : 591

220-1102 is stable now with all latest exam questions are added 3 days ago. Just download our Full package and start your journey with CompTIA A+ Certification Core 2 Exam certification. All these CompTIA 220-1102 practice exam questions are real and verified by our Experts in the related industry fields.

220-1102 PDF

220-1102 PDF (Printable)
$48
$119.99

220-1102 Testing Engine

220-1102 PDF (Printable)
$56
$139.99

220-1102 PDF + Testing Engine

220-1102 PDF (Printable)
$70.8
$176.99
Question # 1

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Options:

A.  

Spam filter installation

B.  

Invalid registry settings

C.  

Malware infection

D.  

Operating system update

Discussion 0
Question # 2

Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?

Options:

A.  

taskschd.msc

B.  

perfmon.msc

C.  

lusrmgr.msc

D.  

Eventvwr.msc

Discussion 0
Question # 3

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

Options:

A.  

WPS

B.  

TKIP

C.  

WPA3

D.  

WEP

Discussion 0
Question # 4

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Options:

A.  

Full

B.  

Differential

C.  

Off-site

D.  

Grandfather-father-son

Discussion 0
Question # 5

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8G

B.  

Which of the following is the MOST likely reason this system is not utilizing all the

available RAM?

Options:

A.  

The system is missing updates.

B.  

The systems utilizing a 32-bit OS.

C.  

The system's memory is failing.

D.  

The system requires BIOS updates.

Discussion 0
Question # 6

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

Options:

A.  

Escalate the ticket to Tier 2.

B.  

Run a virus scan.

C.  

Utilize a Windows restore point.

D.  

Reimage the computer.

Discussion 0
Question # 7

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

Options:

A.  

Convert the PC from a DHCP assignment to a static IP address.

B.  

Run a speed test to ensure the advertised speeds are met.

C.  

Test all network sharing and printing functionality the customer uses.

D.  

Change the default passwords on new network devices.

Discussion 0
Question # 8

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Options:

A.  

Data-in-transit encryption

B.  

File encryption

C.  

USB drive encryption

D.  

Disk encryption

Discussion 0
Question # 9

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

Options:

A.  

Trojan

B.  

Rootkit

C.  

Cryptominer

D.  

Keylogger

Discussion 0
Question # 10

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

Options:

A.  

Privacy

B.  

Indexing Options

C.  

System

D.  

Device Manager

Discussion 0
Question # 11

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

Options:

A.  

Zero day

B.  

Vishing

C.  

DDoS

D.  

Evil twin

Discussion 0
Question # 12

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

Options:

A.  

Workgroup network

B.  

Public network

C.  

Wide area network

D.  

Domain network

Discussion 0
Question # 13

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

Options:

A.  

Run the virus scanner in an administrative mode.

B.  

Reinstall the operating system.

C.  

Reboot the system in safe mode and rescan.

D.  

Manually delete the infected files.

Discussion 0
Question # 14

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Options:

A.  

Degaussing

B.  

Low-level formatting

C.  

Recycling

D.  

Shredding

Discussion 0
Question # 15

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

Options:

A.  

Power user account

B.  

Standard account

C.  

Guest account

D.  

Administrator account

Discussion 0
Question # 16

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

Options:

A.  

User account status

B.  

Mobile OS version

C.  

Data plan coverage

D.  

Network traffic outages

Discussion 0
Question # 17

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

Options:

A.  

Trojan

B.  

Rootkit

C.  

Cryptominer

D.  

Keylogger

Discussion 0
Question # 18

Which of the following is used to explain issues that may occur during a change implementation?

Options:

A.  

Scope change

B.  

End-user acceptance

C.  

Risk analysis

D.  

Rollback plan

Discussion 0
Question # 19

Which of the following is an example of MFA?

Options:

A.  

Fingerprint scan and retina scan

B.  

Password and PIN

C.  

Username and password

D.  

Smart card and password

Discussion 0
Question # 20

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.

INSTRUCTIONS

Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 20

Question # 20

Question # 20

Question # 20

Question # 20

Question # 20

Question # 20

Question # 20

Question # 20

Options:

Discussion 0
Question # 21

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

Options:

A.  

.mac

B.  

.Pkg

C.  

.deb

D.  

.dmg

E.  

.msi

F.  

.appx

G.  

.app

Discussion 0
Question # 22

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE REA

D.  

txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

Options:

A.  

Quarantine the host in the antivirus system.

B.  

Run antivirus scan tor malicious software.

C.  

Investigate how malicious software was Installed.

D.  

Reimage the computer.

Discussion 0
Question # 23

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Options:

A.  

MSRA

B.  

VNC

C.  

VPN

D.  

SSH

Discussion 0
Question # 24

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?

Options:

A.  

Expired certificate

B.  

OS update failure

C.  

Service not started

D.  

Application crash

E.  

Profile rebuild needed

Discussion 0
Question # 25

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.  

File Explorer

B.  

Startup Folder

C.  

System Information

D.  

Programs and Features

E.  

Task Scheduler

F.  

Device Manager

Discussion 0
Question # 26

Which of the following script types is used with the Python language by default?

Options:

A.  

.ps1

B.  

.vbs

C.  

.bat

D.  

.py

Discussion 0
Question # 27

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

Options:

A.  

Full

B.  

Mirror

C.  

Incremental

D.  

Differential

Discussion 0
Question # 28

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?

Options:

A.  

Privacy

B.  

Accounts

C.  

Personalization

D.  

Shared resources

Discussion 0
Question # 29

A technician is setting up a new laptop for an employee who travels, Which of the following is the BEST security practice for this scenario?

Options:

A.  

PIN-based login

B.  

Quarterly password changes

C.  

Hard drive encryption

D.  

A physical laptop lock

Discussion 0
Question # 30

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.  

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.  

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.  

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.  

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Discussion 0
Question # 31

Which of the following should be done NEXT?

Options:

A.  

Send an email to Telecom to inform them of the issue and prevent reoccurrence.

B.  

Close the ticket out.

C.  

Tell the user to take time to fix it themselves next time.

D.  

Educate the user on the solution that was performed.

Discussion 0
Question # 32

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

Options:

A.  

Private-browsing mode

B.  

Invalid certificate

C.  

Modified file

D.  

Browser cache

Discussion 0
Question # 33

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

Options:

A.  

acceptable use policy.

B.  

regulatory compliance requirements.

C.  

non-disclosure agreement

D.  

incident response procedures

Discussion 0
Question # 34

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

Options:

A.  

Uninstall and reinstall the application

B.  

Reset the phone to factory settings

C.  

Install an alternative application with similar functionality

D.  

Clear the application cache.

Discussion 0
Question # 35

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

Options:

A.  

clear the browser cache and contact the bank.

B.  

close out of the site and contact the bank.

C.  

continue to the site and contact the bank.

D.  

update the browser and contact the bank.

Discussion 0
Question # 36

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.  

Differential backup

B.  

Off-site backup

C.  

Incremental backup

D.  

Full backup

Discussion 0
Question # 37

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

Options:

A.  

Scope of change

B.  

Risk level

C.  

Rollback plan

D.  

End user acceptance

Discussion 0
Question # 38

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

Options:

A.  

Enable multifactor authentication.

B.  

Increase the failed log-in threshold.

C.  

Remove complex password requirements.

D.  

Implement a single sign-on with biometrics.

Discussion 0
Question # 39

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

Options:

A.  

Risk analysis

B.  

Sandbox testing

C.  

End user acceptance

D.  

Lessons learned

Discussion 0
Question # 40

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.  

The SNTP server is offline.

B.  

A user changed the time zone on a local machine.

C.  

The Group Policy setting has disrupted domain authentication on the system,

D.  

The workstations and the authentication server have a system clock difference.

Discussion 0
Question # 41

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

Options:

A.  

DHCP

B.  

SMTP

C.  

DNS

D.  

RDP

Discussion 0
Question # 42

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured?

Options:

A.  

Power Plans

B.  

Hibernate

C.  

Sleep/Suspend

D.  

Screensaver

Discussion 0
Question # 43

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

Options:

A.  

Quarantining system files

B.  

Reimaging the workstation

C.  

Encrypting the hard drive

D.  

Disabling TLS 1.0 support

Discussion 0
Question # 44

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

Options:

A.  

Disable System Restore.

B.  

Schedule a malware scan.

C.  

Educate the end user.

D.  

Run Windows Update.

Discussion 0
Question # 45

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

Options:

A.  

Educate the user on malware removal.

B.  

Educate the user on how to reinstall the laptop OS.

C.  

Educate the user on how to access recovery mode.

D.  

Educate the user on common threats and how to avoid them.

Discussion 0
Question # 46

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

Options:

A.  

Installer_x64.exe

B.  

Installer_Files.zip

C.  

Installer_32.msi

D.  

Installer_x86.exe

E.  

Installer_Win10Enterprise.dmg

Discussion 0
Question # 47

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?

Options:

A.  

Enable firewall ACLs.

B.  

Examine the localhost file entries.

C.  

Verify the routing tables.

D.  

Update the antivirus definitions.

Discussion 0
Question # 48

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.  

Lock all devices in a closet.

B.  

Ensure all devices are from the same manufacturer.

C.  

Change the default administrative password.

D.  

Install the latest operating system and patches

Discussion 0
Question # 49

Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).

Options:

A.  

Multifactor authentication

B.  

Badge reader

C.  

Personal identification number

D.  

Firewall

E.  

Motion sensor

F.  

Soft token

Discussion 0
Question # 50

Which of the following is MOST likely contained in an EULA?

Options:

A.  

Chain of custody

B.  

Backup of software code

C.  

Personally identifiable information

D.  

Restrictions of use

Discussion 0
Question # 51

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

Options:

A.  

MFA

B.  

WPA2

C.  

AES

D.  

RADIUS

Discussion 0
Question # 52

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Options:

A.  

Cryptominer

B.  

Phishing

C.  

Ransomware

D.  

Keylogger

Discussion 0
Question # 53

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

Options:

A.  

The device does not have enough free space lo download the OS updates.

B.  

The device needs domain administrator confirmation to update to a major release.

C.  

The device is not compatible with the newest version of the OS.

D.  

The device is restricted from updating due to a corporate security policy.

Discussion 0
Question # 54

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

Options:

A.  

Dock

B.  

Spotlight

C.  

Mission Control

D.  

Launchpad

Discussion 0
Question # 55

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

Options:

A.  

FAT32

B.  

ext4

C.  

NTFS

D.  

exFAT

Discussion 0
Question # 56

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

Options:

A.  

Device Manager

B.  

Indexing Options

C.  

File Explorer

D.  

Administrative Tools

Discussion 0
Question # 57

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Options:

A.  

Power off the machine.

B.  

Run a full antivirus scan.

C.  

Remove the LAN card.

D.  

Install a different endpoint solution.

Discussion 0
Question # 58

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

Options:

A.  

Data usage limits

B.  

Wi-Fi connection speed

C.  

Status of airplane mode

D.  

System uptime

Discussion 0
Question # 59

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

Options:

A.  

Boot into safe mode.

B.  

Perform a malware scan.

C.  

Restart the machine.

D.  

Reinstall the browser

Discussion 0
Question # 60

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.  

Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper

B.  

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper

C.  

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper

D.  

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Discussion 0
Question # 61

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.  

apt-get

B.  

CIFS

C.  

Samba

D.  

greP

Discussion 0
Question # 62

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

Options:

A.  

Put on an ESD strap

B.  

Disconnect the power before servicing the P

C.  

C.  

Place the PC on a grounded workbench.

D.  

Place components on an ESD mat.

Discussion 0
Question # 63

Which of the following Wi-Fi protocols is the MOST secure?

Options:

A.  

WPA3

B.  

WPA-AES

C.  

WEP

D.  

WPA-TKIP

Discussion 0
Question # 64

A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?

Options:

A.  

eventvwr.msc

B.  

perfmon.msc

C.  

gpedic.msc

D.  

devmgmt.msc

Discussion 0
Question # 65

Which of the following editions of Windows 10 requires reactivation every 180 days?

Options:

A.  

Enterprise

B.  

Pro for Workstation

C.  

Home

D.  

Pro

Discussion 0
Question # 66

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

Options:

A.  

Screen-sharing software

B.  

Secure shell

C.  

Virtual private network

D.  

File transfer software

Discussion 0
Question # 67

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

Options:

A.  

A system patch disabled the antivirus protection and host firewall.

B.  

The system updates did not include the latest anti-malware definitions.

C.  

The system restore process was compromised by the malware.

D.  

The malware was installed before the system restore point was created.

Discussion 0
Question # 68

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT?

Options:

A.  

Quarantine the computer.

B.  

use a previous restore point,

C.  

Educate the end user about viruses

D.  

Download the latest virus definitions

Discussion 0
Question # 69

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

Question # 69

Question # 69

Which of the following should be done NEXT?

Options:

A.  

Educate the user on the solution that was performed.

B.  

Tell the user to take time to fix it themselves next time.

C.  

Close the ticket out.

D.  

Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Discussion 0
Question # 70

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

Options:

A.  

Disable unused ports.

B.  

Remove the guest network

C.  

Add a password to the guest network

D.  

Change the network channel.

Discussion 0
Question # 71

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

Options:

A.  

Disk Cleanup

B.  

Group Policy Editor

C.  

Disk Management

D.  

Resource Monitor

Discussion 0
Question # 72

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Options:

A.  

Full

B.  

Non-parity

C.  

Differential

D.  

Incremental

Discussion 0
Question # 73

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?

Options:

A.  

Registry Editor

B.  

Task Manager

C.  

Event Viewer

D.  

Local Users and Groups

Discussion 0
Question # 74

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

Options:

A.  

Operating system updates

B.  

Remote wipe

C.  

Antivirus

D.  

Firewall

Discussion 0
Question # 75

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

Options:

A.  

A new IT policy requires users to set up a lock screen PIN.

B.  

A user is overseas and wants to use a compatible international SIM Card.

C.  

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.  

A user traded in the company phone for a cell carrier upgrade by mistake.

E.  

A user cannot locate the phone after attending a play at a theater.

F.  

A user forgot the phone in a taxi, and the driver called the company to return the device.

Discussion 0
Question # 76

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

Options:

A.  

Login times

B.  

Screen lock

C.  

User permission

D.  

Login lockout attempts

Discussion 0
Question # 77

Which of the following protects a mobile device against unwanted access when it is left unattended?

Options:

A.  

PIN code

B.  

OS updates

C.  

Antivirus software

D.  

BYOD policy

Discussion 0
Question # 78

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

Options:

A.  

The smartphone's line was not provisioned with a data plan

B.  

The smartphone's SIM card has failed

C.  

The smartphone's Bluetooth radio is disabled.

D.  

The smartphone has too many applications open

Discussion 0
Question # 79

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

Options:

A.  

Device Manager

B.  

System

C.  

Ease of Access Center

D.  

Programs and Features

Discussion 0
Question # 80

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

Options:

A.  

Run sfc / scannow on the drive as the administrator.

B.  

Run clearnmgr on the drive as the administrator

C.  

Run chkdsk on the drive as the administrator.

D.  

Run dfrgui on the drive as the administrator.

Discussion 0
Question # 81

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.  

Differential backup

B.  

Off-site backup

C.  

Incremental backup

D.  

Full backup

Discussion 0
Question # 82

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

Options:

A.  

Evil twin

B.  

Impersonation

C.  

Insider threat

D.  

Whaling

Discussion 0
Question # 83

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

Options:

A.  

Prevent a device root

B.  

Disable biometric authentication

C.  

Require a PIN on the unlock screen

D.  

Enable developer mode

E.  

Block a third-party application installation

F.  

Prevent GPS spoofing

Discussion 0
Question # 84

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

Options:

A.  

.deb

B.  

.vbs

C.  

.exe

D.  

.app

Discussion 0
Question # 85

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

Options:

A.  

USB drive

B.  

DVD Installation media

C.  

PXE boot

D.  

Recovery partition

Discussion 0
Question # 86

Which of the following is a proprietary Cisco AAA protocol?

Options:

A.  

TKIP

B.  

AES

C.  

RADIUS

D.  

TACACS+

Discussion 0
Question # 87

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

Options:

A.  

Run a startup script that removes files by name.

B.  

Provide a sample to the antivirus vendor.

C.  

Manually check each machine.

D.  

Monitor outbound network traffic.

Discussion 0
Question # 88

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.  

Rearranging the monitor's position in display settings

B.  

Swapping the cables for the monitors

C.  

Using the Ctrl+AIt+> to correct the display orientation

D.  

Updating the display drivers for the video card

Discussion 0
Question # 89

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

Options:

A.  

Encryption

B.  

Wi-Fi channel

C.  

Default passwords

D.  

Service set identifier

Discussion 0
Question # 90

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

Options:

A.  

afc

B.  

ehkdsk

C.  

git clone

D.  

zobocopy

Discussion 0
Question # 91

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

Options:

A.  

Install and run Linux and the required application in a PaaS cloud environment

B.  

Install and run Linux and the required application as a virtual machine installed under the Windows OS

C.  

Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed

D.  

Set up a dual boot system by selecting the option to install Linux alongside Windows

Discussion 0
Question # 92

Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

Options:

A.  

Uninstalling the application

B.  

Gaining root access to the tablet

C.  

Resetting the web browser cache

D.  

Deleting the application cache

E.  

Clearing the application storage

F.  

Disabling mobile device management

Discussion 0
Question # 93

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

Options:

A.  

AUP

B.  

EULA

C.  

EOL

D.  

UAC

Discussion 0
Question # 94

Which of the following is a data security standard for protecting credit cards?

Options:

A.  

PHI

B.  

NIST

C.  

PCI

D.  

GDPR

Discussion 0
Question # 95

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

Options:

A.  

compmgmt.msc

B.  

regedit.exe

C.  

explorer.exe

D.  

taskmgt.exe

E.  

gpmc.msc

F.  

services.msc

Discussion 0
Question # 96

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

Options:

A.  

Spyware

B.  

Cryptominer

C.  

Ransormvare

D.  

Boot sector virus

Discussion 0
Question # 97

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.  

Biometrics

B.  

Full disk encryption

C.  

Enforced strong system password

D.  

Two-factor authentication

Discussion 0
Question # 98

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

Options:

A.  

System

B.  

Network and Sharing Center

C.  

User Accounts

D.  

Security and Maintenance

Discussion 0
Question # 99

Which of the following is the default GUI and file manager in macOS?

Options:

A.  

Disk Utility

B.  

Finder

C.  

Dock

D.  

FileVault

Discussion 0
Question # 100

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.  

Delete the application's cache.

B.  

Check for application updates.

C.  

Roll back the OS update.

D.  

Uninstall and reinstall the application.

Discussion 0
Question # 101

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

Options:

A.  

Ransomware

B.  

Failed OS updates

C.  

Adware

D.  

Missing system files

Discussion 0
Question # 102

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

Options:

A.  

TACACS+

B.  

Kerberos

C.  

Preshared key

D.  

WPA2/AES

Discussion 0
Question # 103

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

Options:

A.  

Enable multifactor authentication for each support account

B.  

Limit remote access to destinations inside the corporate network

C.  

Block all support accounts from logging in from foreign countries

D.  

Configure a replacement remote-access tool for support cases.

E.  

Purchase a password manager for remote-access tool users

F.  

Enforce account lockouts after five bad password attempts

Discussion 0
Question # 104

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

Options:

A.  

Factory reset

B.  

System Restore

C.  

In-place upgrade

D.  

Unattended installation

Discussion 0
Question # 105

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Options:

A.  

Requiring strong passwords

B.  

Disabling cached credentials

C.  

Requiring MFA to sign on

D.  

Enabling BitLocker on all hard drives

Discussion 0
Get 220-1102 dumps and pass your exam in 24 hours!

Free Exams Sample Questions