Down To Date 220-1002 Free Draindumps For CompTIA A+ Certification Exam: Core 2 Certification
Want to know Certleader 220-1002 Exam practice test features? Want to lear more about CompTIA CompTIA A+ Certification Exam: Core 2 certification experience? Study Accurate CompTIA 220-1002 answers to Up to the immediate present 220-1002 questions at Certleader. Gat a success with an absolute guarantee to pass CompTIA 220-1002 (CompTIA A+ Certification Exam: Core 2) test on your first attempt.
CompTIA 220-1002 Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
- A. GPT
- B. Dynamic
- C. Basic
- D. Extended
Answer: A
NEW QUESTION 2
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.
Which of the following installation methods would the technician MOST likely use to accomplish this quickly?
- A. Unattended installation
- B. Remote network installation
- C. In-place upgrade
- D. Clean installation
Answer: A
NEW QUESTION 3
Which of the following is a community supported, open source OS used for both services and workstations?
- A. IOS
- B. Windows 10
- C. Linux
- D. OS X
Answer: C
NEW QUESTION 4
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?
- A. Task Manager
- B. MSTSC
- C. MSConfig
- D. PerfMon
Answer: A
NEW QUESTION 5
Which of the following installation types would require the use of an answer file to install the OS?
- A. Unattended
- B. Clean
- C. Repair
- D. Upgrade
Answer: A
NEW QUESTION 6
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.
Which of the following protocols and authentication methods should the technician implement? (Select two.)
- A. WPA
- B. WPA2
- C. WEP
- D. TKIP
- E. RADIUS
- F. Multifactor
- G. TACACS
- H. SSO
Answer: BF
NEW QUESTION 7
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?
- A. BranchCache
- B. Swap partition
- C. Domain access
- D. Proxy server
Answer: A
NEW QUESTION 8
A user's personal settings are not saving, and a technician suspects the user's local Windows profile is corrupt. The technician wants to check the size of the ntuser.dat file, but It does not appear in the user's profile directory. Which of the following Control Panel utilities should the technician use to correct this?
- A. Folder Options
- B. Sync Center
- C. Display Settings
- D. User Accounts
Answer: A
NEW QUESTION 9
A technician accessed a network share from a computer joined to workgroup. The technician logged in as “user1” and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the “user1” account. Which of the following would allow the technician to log in using the “administrator” username?
- A. Use the command: net use Z: \fileservershare
- B. Go to the Sync Center and disable the offline files feature.
- C. Delete the “user” account for the network share in Credential Manager.
- D. Join the computer and file server to a domain and delegate administrator rights to “user1”.
- E. Use the Advanced Sharing options in the Network and Sharing Center and enable “turn on network discovery”.
Answer: A
NEW QUESTION 10
A systems administrator needs to add security to the server room.
Which of the following would provide the BEST security for the room? (Choose two.)
- A. Universal serial bus locks
- B. Personal identity verification cards
- C. Privacy screen
- D. Entry control roster
- E. Door locks
- F. Privacy window
Answer: EF
NEW QUESTION 11
An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?
- A. Create a risk analysis report for review
- B. Submit a change order for approval
- C. Insist the worker accepts the standard desktop
- D. Document the request and place the order
Answer: B
NEW QUESTION 12
A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user’s workstation?
- A. chkdsk
- B. netstat
- C. gpupdate
- D. diskpart
Answer: C
NEW QUESTION 13
A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory. Which of the following should the technician use to accomplish this?
- A. Devices and Printers
- B. Sync Center
- C. Device Manger
- D. Power Options
Answer: C
NEW QUESTION 14
Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?
- A. Restart the table
- B. Disable and then renewable Bluetooth
- C. Calibrate the touchscreen sensor
- D. Disconnect and then reconnect the stylus
Answer: C
NEW QUESTION 15
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?
- A. Open license
- B. Personal license
- C. Corporate license
- D. Enterprise license
Answer: A
NEW QUESTION 16
When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT?
- A. Change the browser’s home page
- B. Check the Windows host file
- C. Update the default web browser
- D. Restore Windows to a previous date
Answer: B
NEW QUESTION 17
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
- A. Guest network
- B. TKIP
- C. Default login
- D. Outdated firmware
- E. WPS
- F. WEP
Answer: CF
NEW QUESTION 18
Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar.
She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?
- A. There is unauthenticated wireless connectivity
- B. She has exceeded the data allowance
- C. The phone is only 3G capable
- D. It is an unrooted phone
- E. The SIM card was not activated
- F. A data plan was not purchased
Answer: A
NEW QUESTION 19
An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?
- A. Phishing
- B. Spear phishing
- C. Dumpster diving
- D. Impersonation
Answer: C
NEW QUESTION 20
A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?
- A. Practice electrical fire safety.
- B. Clean tools properly before use.
- C. Remove any jewelry.
- D. Connect a proper ESD strap.
Answer: D
NEW QUESTION 21
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
- A. Unattended installation
- B. Remote installation
- C. Repair installation
- D. Image deployment installation
Answer: D
NEW QUESTION 22
Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)
- A. Firewall
- B. Antivirus
- C. Email filtering
- D. ACLs
- E. VPN
Answer: AE
NEW QUESTION 23
A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system Which of the following did the technician forget to do to prevent reinfection?
- A. Connect to the network and update the OS with the latest security patches
- B. Scan and dean the USB device used to transfer data from the equipment
- C. Disable System Restore and remove all restore points from the system
- D. Update the local antivirus and set it to scan automatically every evening
Answer: D
NEW QUESTION 24
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)
- A. UPS
- B. Server rack
- C. PoE phone
- D. Desktop printer
- E. Modem
- F. Patch panel
Answer: AB
NEW QUESTION 25
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
- A. Time Machine
- B. Snapshot
- C. System Restore
- D. Boot Camp
Answer: A
NEW QUESTION 26
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.
Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
- A. Full device encryption
- B. Account lock
- C. Multifactor authentication
- D. Strong password requirements
Answer: C
NEW QUESTION 27
......
P.S. DumpSolutions.com now are offering 100% pass ensure 220-1002 dumps! All 220-1002 exam questions have been updated with correct answers: https://www.dumpsolutions.com/220-1002-dumps/ (188 New Questions)