Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

220-1102 CompTIA A+ Certification Core 2 Exam Questions and Answers

Questions 4

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

Options:

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Buy Now
Questions 5

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

Options:

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Buy Now
Questions 6

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

Options:

A.

OS compatibility

B.

Quality of service

C.

32- vs. 64-bit architecture

D.

Storage requirements

Buy Now
Questions 7

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:

Protocol/PortActionDirection

1 AllowOut

445 BlockOut

53 BlockOut

123 BlockOut

80 BlockOut

Which of the following ports should be opened to allow for DNS recursion?

Options:

A.

1

B.

53

C.

80

D.

123

E.

445

Buy Now
Questions 8

Which of the following documents in criminal proceedings must be updated every time a piece of evidence is touched or transferred in order for the evidence to be considered valid?

Options:

A.

Licensing agreement

B.

Regulatory compliance

C.

Incident documentation

D.

Chain of custody

Buy Now
Questions 9

A technician is assisting a customer who is having difficulty accessing the company’s website. Which of the following should the technician do first?

Options:

A.

Ask the customer for their log-in credentials.

B.

Check the company's internal knowledge base for solutions.

C.

Refer the customer to a more experienced technician.

D.

Record the details of the issue in the company’s ticketing system.

Buy Now
Questions 10

Which of the following best describes a rollback plan?

Options:

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Buy Now
Questions 11

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

Options:

A.

Enable boot logging on the system.

B.

Launch the last known-good configuration.

C.

Check the system resource usage in Task Manager.

D.

Run the sfc /scannow command.

E.

Use the Event Viewer to open the application log

Buy Now
Questions 12

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Options:

Buy Now
Questions 13

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

Options:

A.

NIC

B.

CPU

C.

PSU

D.

KVM

E.

RAM

F.

DVI

Buy Now
Questions 14

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

Options:

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Buy Now
Questions 15

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

Options:

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Buy Now
Questions 16

Which of the following change management practices lists all the changes that are taking place for a project to ensure that no unexpected changes happen?

Options:

A.

Risk analysis

B.

Scope

C.

Rollbackplan

D.

Review

Buy Now
Questions 17

Which of the following operating systems were designed for smartphones? (Select two).

Options:

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Buy Now
Questions 18

A user's Windows desktop has low disk space. A technician thinks some upgrade files were never removed. Which of the following tools should the technician use to correct the issue?

Options:

A.

devmgmt.msc

B.

cleanmgr.exe

C.

dfrgui.exe

D.

diskmgmt.mac

Buy Now
Questions 19

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

Options:

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Buy Now
Questions 20

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after

each response to continue the chat. If at any time you would like to bring back

the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 21

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

Options:

A.

Network & Internet

B.

System

C.

Personalization

D.

Accounts

Buy Now
Questions 22

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

Options:

A.

NDA

B.

AUP

C.

VPN

D.

SOP

Buy Now
Questions 23

Which of the following operating systems uses the ext4 filesystem type?

Options:

A.

macOS

B.

iOS

C.

Linux

D.

Windows

Buy Now
Questions 24

A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following settings should the technician review?

Options:

A.

Wireless protocol

B.

DHCP pool

C.

Content filtering

D.

Firewall

Buy Now
Questions 25

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

Options:

A.

ext

B.

APFS

C.

FAT

D.

EFS

Buy Now
Questions 26

A technician is installing a new copy of Windows on all computers in the enterprise Given the following requirements:

• The install phase must be scripted to run over the network • Each computer requires a new SSD as the system drive, • The existing HDD should remain as a backup drive.

Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share? (Select three).

Options:

A.

net use

B.

robocopy

C.

winver

D.

diskpart

E.

sfc

F.

r.etstat

G.

ping

Buy Now
Questions 27

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

Options:

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Buy Now
Questions 28

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

Options:

A.

Programs and Features

B.

Network and Sharing Center

C.

User Accounts

D.

Device Manager

Buy Now
Questions 29

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

Options:

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Buy Now
Questions 30

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

Options:

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Buy Now
Questions 31

Which of the following operating systems was the app file type designed to run under as an application file bundle?

Options:

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Buy Now
Questions 32

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

Options:

A.

Perform a safe mode boot.

B.

Run the System Restore wizard.

C.

Start the computer in the last known-good configuration.

D.

Reset the BIOS settinqs.

Buy Now
Questions 33

h company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

Options:

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off Inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Buy Now
Questions 34

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

Options:

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Buy Now
Questions 35

A technician, who is completing hardware upgrades at a company, is approached by a user who submitted a computer upgrade request. After checking the list of offices to upgrade, the technician finds that the user's office is not listed for an upgrade. Which of the following actions should the technician take next?

Options:

A.

Ask the company's human resources department to address the issue.

B.

Notify the project manager about the user's concern.

C.

Tell the user that this request is not on the list to be upgraded.

D.

Ask the user's supervisor if the technician should upgrade the computer.

Buy Now
Questions 36

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

Options:

A.

Synchronize the browser data.

B.

Enable private browsing mode.

C.

Mark the site as trusted.

D.

Clear the cached file.

Buy Now
Questions 37

Which of the following Is a package management utility for PCs that are running the Linux operating system?

Options:

A.

chmod

B.

yum

C.

man

D.

grep

Buy Now
Questions 38

A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

Options:

A.

Access control

B.

Authentication application

C.

Group Policy

D.

Folder redirection

Buy Now
Questions 39

Which of the following macOS features can help a user close an application that has stopped responding?

Options:

A.

Finder

B.

Mission Control

C.

System Preferences

D.

Force Quit

Buy Now
Questions 40

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

Options:

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Buy Now
Questions 41

Which of the following would most likely be used in a small office environment?

Options:

A.

Print server

B.

Virtualization

C.

Domain access

D.

Workgroup

Buy Now
Questions 42

A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?

Options:

A.

Biometrics

B.

Soft token

C.

Access control lists

D.

Smart card

Buy Now
Questions 43

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

Options:

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Buy Now
Questions 44

A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?

Options:

A.

DNS

B.

IPS

C.

VPN

D.

SSH

Buy Now
Questions 45

Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?

Options:

A.

WPA3

B.

MAC filleting

C.

RADIUS

D.

TACACS+

Buy Now
Questions 46

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide fast data recovery in this situation?

    Full

Options:

A.

Differential

B.

Synthetic

C.

Incremental

Buy Now
Questions 47

Which of the following is an advantage of using WPA2 instead of WPA3?

Options:

A.

Connection security

B.

Encryption key length

C.

Device compatibility

D.

Offline decryption resistance

Buy Now
Questions 48

During an enterprise rollout of a new application, a technician needs to validate compliance with an application's EULA while also reducing the number of licenses to manage. Which of the following licenses would best accomplish this goal?

Options:

A.

Personal use license

B.

Corporate use license

C.

Open-source license

D.

Non-expiring license

Buy Now
Questions 49

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

    Document the date and time of the change.

Options:

A.

Submit a change request form.

B.

Determine the risk level of this change.

C.

Request an unused IP address.

Buy Now
Questions 50

A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?

Options:

A.

Disk Management

B.

Disk Defragment

C.

Disk Cleanup

D.

Device Manager

Buy Now
Questions 51

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.

Biometrics

B.

Full disk encryption

C.

Enforced strong system password

D.

Two-factor authentication

Buy Now
Questions 52

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

Options:

A.

Screened subnet

B.

Firewall

C.

Anti-phishing training

D.

Antivirus

Buy Now
Questions 53

Which of the following operating systems is considered closed source?

Options:

A.

Ubuntu

B.

Android

C.

CentOS

D.

OSX

Buy Now
Questions 54

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

Options:

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Buy Now
Questions 55

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Buy Now
Questions 56

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

    Implementing data-at-rest encryption

Options:

A.

Disabling AutoRun

B.

Restricting user permissions

C.

Restricting log-in times

D.

Enabling a screen lock

E.

Disabling local administrator accounts

Buy Now
Questions 57

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen Immediately before network use is authorized?

Options:

A.

Document the date and time of the change.

B.

Submit a change request form

C.

Determine the risk level of this change

D.

Request an unused IP address.

Buy Now
Questions 58

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

Options:

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Buy Now
Questions 59

A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Secondary account and recovery code

Buy Now
Questions 60

A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?

Options:

A.

Restart the mobile device.

B.

Turn on airplane mode.

C.

Check that the accessory is ready to pair.

D.

Clear all devices from the phone's Bluetooth settings.

Buy Now
Questions 61

A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two).

    Disable Wi-Fi autoconnect.

Options:

A.

Stay offline when in public places.

B.

Uninstall all recently installed applications.

C.

Schedule an antivirus scan.

D.

Reboot the device

E.

Update the OS

Buy Now
Questions 62

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

Options:

A.

Uninstall one antivirus software program and install a different one.

B.

Launch Windows Update, and then download and install OS updates

C.

Activate real-time protection on both antivirus software programs

D.

Enable the quarantine feature on both antivirus software programs.

E.

Remove the user-installed antivirus software program.

Buy Now
Questions 63

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

Options:

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

Buy Now
Questions 64

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Select two).

Options:

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomware

F.

Spyware

Buy Now
Questions 65

A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Buy Now
Questions 66

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

Options:

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Buy Now
Questions 67

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Options:

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Buy Now
Questions 68

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Options:

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Buy Now
Questions 69

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Options:

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Buy Now
Questions 70

A developer receives the following error while trying to install virtualization software on a workstation:

VTx not supported by system

Which of the following upgrades will MOST likely fix the issue?

Options:

A.

Processor

B.

Hard drive

C.

Memory

D.

Video card

Buy Now
Questions 71

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

Options:

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Buy Now
Questions 72

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

Options:

A.

Personalization

B.

Apps

C.

Updates

D.

Display

Buy Now
Questions 73

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

Options:

A.

Scope of change

B.

Risk level

C.

Rollback plan

D.

End user acceptance

Buy Now
Questions 74

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Buy Now
Questions 75

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?

    Performing annual network topology reviews

Options:

A.

Requiring all network changes include updating the network diagrams

B.

Allowing network changes once per year

C.

Routinely backing up switch configuration files

Buy Now
Questions 76

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

Options:

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Buy Now
Questions 77

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

Options:

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Buy Now
Questions 78

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

Options:

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

Buy Now
Questions 79

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

Options:

A.

set AirDrop so that transfers are only accepted from known contacts

B.

completely disable all wireless systems during the flight

C.

discontinue using iMessage and only use secure communication applications

D.

only allow messages and calls from saved contacts

Buy Now
Questions 80

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

Options:

A.

Reset the phone to factory settings

B.

Uninstall the fraudulent application

C.

Increase the data plan limits

D.

Disable the mobile hotspot.

Buy Now
Questions 81

A technician is investigating an employee's smartphone that has the following symptoms

• The device is hot even when it is not in use.

•Applications crash, especially when others are launched.

• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO).

Options:

A.

Turn on autorotation

B.

Activate airplane mode.

C.

Close unnecessary applications

D.

Perform a factory reset

E.

Update the device's operating system

F.

Reinstall the applications that have crashed.

Buy Now
Questions 82

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Options:

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Buy Now
Questions 83

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

Options:

A.

Have the user consider using an iPad if the user is unable to complete updates

B.

Have the user text the user's password to the technician.

C.

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.

Advise the user to wait for an upcoming, automatic patch

Buy Now
Questions 84

A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?

Options:

A.

Change the DNS address to 1.1.1.1

B.

Update Group Policy

C.

Add the site to the client's exceptions list

D.

Verity the software license is current.

Buy Now
Questions 85

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

Options:

A.

RDP

B.

VNC

C.

SSH

D.

VPN

Buy Now
Questions 86

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

Options:

A.

Quarantining system files

B.

Reimaging the workstation

C.

Encrypting the hard drive

D.

Disabling TLS 1.0 support

Buy Now
Questions 87

A department has the following technical requirements for a new application:

The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

Options:

A.

CPU

B.

Hard drive

C.

RAM

D.

Touch screen

Buy Now
Questions 88

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Options:

A.

Pretexting

B.

Spoofing

C.

Vishing

D.

Scareware

Buy Now
Questions 89

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

Options:

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Buy Now
Questions 90

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

Options:

A.

Use Settings to access Screensaver settings

B.

Use Settings to access Screen Timeout settings

C.

Use Settings to access General

D.

Use Settings to access Display.

Buy Now
Questions 91

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

Options:

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Buy Now
Questions 92

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

Options:

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Buy Now
Questions 93

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

Options:

A.

Scan the computer with the company-provided antivirus software

B.

Install a new hard drive and clone the user's drive to it

C.

Deploy an ad-blocking extension to the browser.

D.

Uninstall the company-provided antivirus software

E.

Click the link in the messages to pay for virus removal

F.

Perform a reset on the user's web browser

Buy Now
Questions 94

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

Options:

A.

The smartphone's line was not provisioned with a data plan

B.

The smartphone's SIM card has failed

C.

The smartphone's Bluetooth radio is disabled.

D.

The smartphone has too many applications open

Buy Now
Questions 95

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

Options:

A.

Prevent a device root

B.

Disable biometric authentication

C.

Require a PIN on the unlock screen

D.

Enable developer mode

E.

Block a third-party application installation

F.

Prevent GPS spoofing

Buy Now
Questions 96

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

Options:

A.

Reinstalling Windows

B.

Performing a quick format

C.

Using disk-wiping software

D.

Deleting all files from command-line interface

Buy Now
Questions 97

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

Options:

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

Buy Now
Questions 98

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

Options:

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

Buy Now
Questions 99

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

Options:

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Buy Now
Questions 100

A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:

SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture

The technician analyses the following Windows firewall information:

Which of the following protocols most likely allowed the data theft to occur?

Options:

A.

1

B.

53

C.

110

D.

445

Buy Now
Questions 101

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

Options:

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

Buy Now
Questions 102

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

Options:

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Buy Now
Questions 103

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

Options:

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Buy Now
Questions 104

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Buy Now
Questions 105

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

Options:

A.

Encryption

B.

Antivirus

C.

AutoRun

D.

Guest accounts

E.

Default passwords

F.

Backups

Buy Now
Questions 106

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods

would BEST meet the requirements?

Options:

A.

A daily, incremental backup that is saved to the corporate file server

B.

An additional, secondary hard drive in a mirrored RAID configuration

C.

A full backup of the data that is stored of site in cold storage

D.

Weekly, differential backups that are stored in a cloud-hosting provider

Buy Now
Questions 107

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

Options:

A.

The instructions from the software company are not being followed.

B.

Security controls will treat automated deployments as malware.

C.

The deployment script is performing unknown actions.

D.

Copying scripts off the internet is considered plagiarism.

Buy Now
Questions 108

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Buy Now
Questions 109

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

Options:

A.

Run a startup script that removes files by name.

B.

Provide a sample to the antivirus vendor.

C.

Manually check each machine.

D.

Monitor outbound network traffic.

Buy Now
Questions 110

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.

Multifactor authentication will be forced for Wi-Fi

B.

All Wi-Fi traffic will be encrypted in transit

C.

Eavesdropping attempts will be prevented

D.

Rogue access points will not connect

Buy Now
Questions 111

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

Options:

A.

Update the browser's CRLs

B.

File a trouble ticket with the bank.

C.

Contact the ISP to report the CFCs concern

D.

Instruct the CFO to exit the browser

Buy Now
Questions 112

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

Options:

A.

Language

B.

System

C.

Personalization

D.

Ease of Access

Buy Now
Questions 113

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Options:

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Buy Now
Questions 114

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

Options:

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

Buy Now
Questions 115

A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install package" message. Which of the following should the technician do first?

Options:

A.

Ensure internet connectivity.

B.

Check for Windows updates.

C.

Enable SSH.

D.

Reboot computer.

Buy Now
Questions 116

A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?

    Do not notify the customer if arriving before the customer.

Options:

A.

Dismiss the customer and proceed with the after-hours work.

B.

Contact the customer if the technician is arriving late.

C.

Disclose the experience via social media.

Buy Now
Questions 117

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Options:

A.

Full

B.

Non-parity

C.

Differential

D.

Incremental

Buy Now
Questions 118

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

Options:

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Buy Now
Questions 119

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

Options:

A.

cat

B.

chmod

C.

pwd

D.

cacls

Buy Now
Questions 120

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

Options:

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Buy Now
Questions 121

A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?

    End user training

Options:

A.

Progress notes

B.

Knowledge base

C.

Acceptable use policy document

Buy Now
Questions 122

Which of the following file extensions should a technician use for a PowerShell script?

Options:

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Buy Now
Questions 123

Which of the following is also known as something you know, something you have, and something you are?

    ACL

Options:

A.

MFA

B.

SMS

C.

NFC

Buy Now
Questions 124

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis

Buy Now
Questions 125

A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?

    Copy the program file to a USB drive and install.

Options:

A.

Burn the program file to a CD and install.

B.

Format the HDD and then do the installation.

C.

Replace the HDD and then do the installation.

Buy Now
Questions 126

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

Options:

A.

Event Viewer

B.

System Configuration

C.

Device Manager

D.

Performance Monitor

Buy Now
Questions 127

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

Options:

A.

Software firewall

B.

Password complexity

C.

Antivirus application

D.

Anti-malware scans

Buy Now
Questions 128

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

    Restart the phone.

Options:

A.

Reimage the OS.

B.

Reinstall the application.

C.

Clear the cache.

Buy Now
Questions 129

A technician is trying to connect to a user's laptop in order to securely install updates. Given the following information about the laptop:

Which of the following should the technician do to connect via RDP?

Options:

A.

Confirm the user can ping the default gateway.

B.

Change the IP address on the user's laptop.

C.

Change the subnet mask on the user's laptop.

D.

Open port 3389 on the Windows firewall.

Buy Now
Questions 130

A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?

Options:

A.

Disable System Restore.

B.

Utilize a Linux live disc.

C.

Quarantine the infected system.

D.

Update the anti-malware.

Buy Now
Questions 131

Which of the following is the most likely to use NTFS as the native filesystem?

Options:

A.

macOS

B.

Linux

C.

Windows

D.

Android

Buy Now
Questions 132

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.

Bash

B.

SQL

C.

PHP

D.

PowerShell

Buy Now
Questions 133

An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?

Options:

A.

Image deployment

B.

Recovery partition installation

C.

Remote network installation

D.

Repair installation

Buy Now
Questions 134

A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?

Options:

A.

Group Policy Editor

B.

Local Users and Groups

C.

Device Manager

D.

System Configuration

Buy Now
Questions 135

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Buy Now
Questions 136

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Options:

A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Buy Now
Questions 137

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

Options:

A.

Data usage limits

B.

Wi-Fi connection speed

C.

Status of airplane mode

D.

System uptime

Buy Now
Questions 138

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

Options:

A.

File Explorer

B.

User Account Control

C.

Windows Backup and Restore

D.

Windows Firewall

E.

Windows Defender

F.

Network Packet Analyzer

Buy Now
Questions 139

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

Options:

A.

A new IT policy requires users to set up a lock screen PIN.

B.

A user is overseas and wants to use a compatible international SIM Card.

C.

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.

A user traded in the company phone for a cell carrier upgrade by mistake.

E.

A user cannot locate the phone after attending a play at a theater.

F.

A user forgot the phone in a taxi, and the driver called the company to return the device.

Buy Now
Questions 140

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?

Options:

A.

.py

B.

.js

C.

.vbs

D.

.sh

Buy Now
Questions 141

A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?

Options:

A.

PIN-based login

B.

Quarterly password changes

C.

Hard drive encryption

D.

A physical laptop lock

Buy Now
Questions 142

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Options:

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Buy Now
Questions 143

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Buy Now
Questions 144

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Buy Now
Questions 145

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

Options:

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Buy Now
Questions 146

When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?

Options:

A.

Reimage the system and install SSL.

B.

Install Trusted Root Certificate.

C.

Select View Certificates and then Install Certificate.

D.

Continue to access the website.

Buy Now
Questions 147

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

Options:

A.

Disable System Restore.

B.

Remediate the system.

C.

Educate the system user.

D.

Quarantine the system.

Buy Now
Questions 148

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

Options:

A.

Password-protected Wi-Fi

B.

Port forwarding

C.

Virtual private network

D.

Perimeter network

Buy Now
Questions 149

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

Options:

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Buy Now
Questions 150

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

    Place the customer on hold until the customer calms down.

Options:

A.

Disconnect the call to avoid a confrontation.

B.

Wait until the customer is done speaking and offer assistance.

C.

Escalate the issue to a supervisor.

Buy Now
Questions 151

Which of the following items require special e-waste recycling? (Select two).

    Solid-state drive

Options:

A.

A/C adapter

B.

Surge protector

C.

Laptop battery

D.

CRT monitor

E.

Power supply

Buy Now
Questions 152

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?

Options:

A.

Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.

B.

Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.

C.

Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

D.

Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.

Buy Now
Questions 153

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

Options:

A.

Regression

B.

Cloud

C.

Production

D.

Sandbox

Buy Now
Questions 154

After a security event, a technician removes malware from an affected laptop and disconnects the laptop from the network. Which of the following should the technician do to prevent the operating system from automatically returning to an infected state?

Options:

A.

Enable System Restore.

B.

Disable System Restore.

C.

Enable antivirus.

D.

Disable antivirus.

E.

Educate the user.

Buy Now
Questions 155

Which of the following data is MOST likely to be regulated?

Options:

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

Buy Now
Questions 156

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?

Options:

A.

Updating the operating system

B.

Changing proxy settings

C.

Reinstalling the browser

D.

Enabling port forwarding

Buy Now
Questions 157

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Buy Now
Questions 158

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?

Options:

A.

Privacy

B.

Accounts

C.

Personalization

D.

Shared resources

Buy Now
Questions 159

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

Options:

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Buy Now
Questions 160

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

Options:

A.

The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozenapplication in the list, and clicks Force Quit.

B.

The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.

C.

The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.

D.

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.

Buy Now
Questions 161

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

Options:

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Buy Now
Questions 162

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

Options:

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Buy Now
Questions 163

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT?

Options:

A.

Quarantine the computer.

B.

use a previous restore point,

C.

Educate the end user about viruses

D.

Download the latest virus definitions

Buy Now
Questions 164

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

Options:

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Buy Now
Questions 165

Which of the following is MOST likely contained in an EULA?

Options:

A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Buy Now
Questions 166

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

Options:

A.

Dock

B.

Spotlight

C.

Mission Control

D.

Launchpad

Buy Now
Questions 167

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?

Options:

A.

Remove the microphone from the USB hub and plug it directly into a USB port on the PC.

B.

Enable the microphone under Windows Privacy settings to allow desktop applications to access it.

C.

Delete the microphone from Device Manager and scan for new hardware,

D.

Replace the USB microphone with one that uses a traditional 3.5mm plug.

Buy Now
Questions 168

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

Options:

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

Buy Now
Questions 169

Which of the following is a data security standard for protecting credit cards?

Options:

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Buy Now
Questions 170

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

Options:

A.

acceptable use policy.

B.

regulatory compliance requirements.

C.

non-disclosure agreement

D.

incident response procedures

Buy Now
Questions 171

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

Options:

A.

Guards

B.

Bollards

C.

Motion sensors

D.

Access control vestibule

Buy Now
Questions 172

A user calls the help desk to report that mapped drives are no longer accessible. The technician verifies that clicking on any of the drives on the user's machine results in an error message. Other users in the office are not having any issues. As a first step, the technician would like to remove and attempt to reconnect the drives. Which of the following command-line tools should the technician use?

Options:

A.

net use

B.

set

C.

mkdir

D.

rename

Buy Now
Questions 173

Which of the following should be done NEXT?

Options:

A.

Send an email to Telecom to inform them of the issue and prevent reoccurrence.

B.

Close the ticket out.

C.

Tell the user to take time to fix it themselves next time.

D.

Educate the user on the solution that was performed.

Buy Now
Questions 174

Which of the following command-line tools will delete a directory?

Options:

A.

md

B.

del

C.

dir

D.

rd

E.

cd

Buy Now
Questions 175

Which of the following change management documents includes how to uninstall a patch?

Options:

A.

Purpose of change

B.

Rollback plan

C.

Scope of change

D.

Risk analysis

Buy Now
Questions 176

A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The technician needs to make use of a tool natively designed for Linux. Which of the following tools will the technician MOST likely use?

Options:

A.

VNC

B.

MFA

C.

MSRA

D.

RDP

Buy Now
Questions 177

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

Options:

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Buy Now
Questions 178

A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?

Options:

A.

eventvwr.msc

B.

perfmon.msc

C.

gpedic.msc

D.

devmgmt.msc

Buy Now
Questions 179

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

Options:

A.

Windows Professional

B.

Windows Education

C.

Windows Enterprise

D.

Windows Home

Buy Now
Questions 180

A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:

    Index number of the Event Viewer issue

    First command to resolve the issue

    Second command to resolve the issue

BSOD

Commands:

Event Viewer:

System Error:

Options:

Buy Now
Questions 181

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.

apt-get

B.

CIFS

C.

Samba

D.

greP

Buy Now
Questions 182

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

Options:

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Buy Now
Questions 183

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

Options:

A.

copy

B.

xcopy

C.

robocopy

D.

Copy-Item

Buy Now
Questions 184

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

Options:

A.

TKIP

B.

RADIUS

C.

WPA2

D.

AES

Buy Now
Questions 185

Which of the following is used to explain issues that may occur during a change implementation?

Options:

A.

Scope change

B.

End-user acceptance

C.

Risk analysis

D.

Rollback plan

Buy Now
Questions 186

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Buy Now
Questions 187

A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done NEXT?

Options:

A.

Document the date and time of change.

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document findings of the sandbox test.

Buy Now
Questions 188

A user reports that the pages flash on the screen two or three times before finally staying open when attempting to access banking web pages. Which of the following troubleshooting steps should the technician perform NEXT to resolve the issue?

Options:

A.

Examine the antivirus logs.

B.

Verify the address bar URL.

C.

Test the internet connection speed.

D.

Check the web service status.

Buy Now
Questions 189

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

Options:

A.

Enable promiscuous mode.

B.

Clear the browser cache.

C.

Add a new network adapter.

D.

Reset the network adapter.

Buy Now
Questions 190

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

Options:

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Buy Now
Questions 191

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

Options:

A.

Home

B.

Pro

C.

Pro for Workstations

D.

Enterprise

Buy Now
Questions 192

Which of the following is MOST likely used to run .vbs files on Windows devices?

Options:

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Buy Now
Questions 193

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

Options:

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Buy Now
Questions 194

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the

available RAM?

Options:

A.

The system is missing updates.

B.

The systems utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates.

Buy Now
Questions 195

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

Options:

A.

Security groups

B.

Access control list

C.

Group Policy

D.

Login script

Buy Now
Questions 196

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

Options:

A.

Convert the PC from a DHCP assignment to a static IP address.

B.

Run a speed test to ensure the advertised speeds are met.

C.

Test all network sharing and printing functionality the customer uses.

D.

Change the default passwords on new network devices.

Buy Now
Questions 197

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

Options:

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Buy Now
Questions 198

A technician receives a call (rom a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user's screen with the user. Which of the following would BEST accomplish this task?

Options:

A.

SSH

B.

VPN

C.

VNC

D.

RDP

Buy Now
Questions 199

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use?

Options:

A.

Ease of Access

B.

Privacy

C.

Personalization

D.

Update and Security

Buy Now
Questions 200

The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves around. Which of the following should a technician perform to troubleshoot the issue?

Options:

A.

Verify the Wi-Fi connection status.

B.

Enable the NFC setting on the device.

C.

Bring the device within Bluetooth range.

D.

Turn on device tethering.

Buy Now
Questions 201

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

Options:

A.

System

B.

Network and Sharing Center

C.

User Accounts

D.

Security and Maintenance

Buy Now
Questions 202

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Buy Now
Questions 203

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

Options:

A.

Stop code

B.

Event Mewer

C.

Services

D.

System Configuration

Buy Now
Questions 204

A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

Options:

A.

LCD

B.

Battery

C.

Accelerometer

D.

Digitizer

Buy Now
Questions 205

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

Options:

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

Buy Now
Questions 206

Which of the following only has a web browser interface?

Options:

A.

Linux

B.

Microsoft Windows

C.

iOS

D.

Chromium

Buy Now
Questions 207

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

Options:

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Sep 10, 2024
Questions: 691
220-1102 pdf

220-1102 PDF

$28  $80
220-1102 Engine

220-1102 Testing Engine

$33.25  $95
220-1102 PDF + Engine

220-1102 PDF + Testing Engine

$45.5  $130