aiotestking uk

220-1002 Exam Questions - Online Test


220-1002 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Realistic of 220-1002 rapidshare materials and dumps for CompTIA certification for IT learners, Real Success Guaranteed with Updated 220-1002 pdf dumps vce Materials. 100% PASS CompTIA A+ Certification Exam: Core 2 exam Today!

CompTIA 220-1002 Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?

  • A. Restart the table
  • B. Disable and then renewable Bluetooth
  • C. Calibrate the touchscreen sensor
  • D. Disconnect and then reconnect the stylus

Answer: C

NEW QUESTION 2
Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?

  • A. Files disappearing
  • B. File permission changes
  • C. Application crash
  • D. Too many start items

Answer: A

NEW QUESTION 3
A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?

  • A. Preserve data integrity
  • B. Identify violations of acceptable use
  • C. Collect evidence of illegal activity
  • D. Report through proper channels

Answer: A

NEW QUESTION 4
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

  • A. Politely ask the user to call back
  • B. Ask another technician to take the call
  • C. Troubleshoot the issue for the user
  • D. Input the issue as a ticket and escalate to Tier 2
  • E. Put the user on hold and troubleshoot after the scheduled break

Answer: B

NEW QUESTION 5
A user calls a technician to report issues when logging in to a vendor’s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user’s office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Choose two.)

  • A. System files have been deleted
  • B. Proxy settings are configured improperly
  • C. The OS has been updated recently
  • D. There are disabled services on the vendor website
  • E. Program file permissions have changed recently
  • F. There is a rogue anti-malware program

Answer: BF

NEW QUESTION 6
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

  • A. WPA2
  • B. AES
  • C. MAC filtering
  • D. RADIUS
  • E. WPS

Answer: D

NEW QUESTION 7
A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

  • A. Standard formatting
  • B. HD drilling
  • C. Low-level formatting
  • D. HD partitioning

Answer: C

NEW QUESTION 8
A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).

  • A. Full device encryption
  • B. Remote backup application
  • C. SSO authentication
  • D. Device profiles update
  • E. OS security updates
  • F. Biometric authentication

Answer: AF

NEW QUESTION 9
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP. Which of the following would be the NEXT appropriate act?

  • A. Promptly notify the administrator’s immediate supervisor
  • B. Rename the folder on the server, and notify the information security officer
  • C. Move the folder to another location on the server, and notify the local authorities
  • D. Ask the owner to move the files from the server to a local computer

Answer: A

NEW QUESTION 10
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

  • A. Uninterruptible power supply
  • B. Surge protector
  • C. Power strip
  • D. Power distribution unit

Answer: A

NEW QUESTION 11
Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

  • A. Acceptable use policy violations
  • B. Server configuration
  • C. Chain of custody
  • D. Data loss incidents

Answer: C

NEW QUESTION 12
A user reports that a cell phone application is loading slowly and not functioning properly Which of the following should a technician do FIRST to remedy this issue?

  • A. Remove and reinstall the application.
  • B. Hard reset the cell phone.
  • C. Reconnect the wireless network connection
  • D. Close all running applications

Answer: D

NEW QUESTION 13
A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?

  • A. Practice electrical fire safety.
  • B. Clean tools properly before use.
  • C. Remove any jewelry.
  • D. Connect a proper ESD strap.

Answer: D

NEW QUESTION 14
Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

  • A. Acceptable use policy
  • B. Inventory management
  • C. EULA
  • D. MDM policy

Answer: B

NEW QUESTION 15
A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Select two.)

  • A. dir
  • B. chdsk
  • C. dism
  • D. ipconfig
  • E. format
  • F. diskpart

Answer: BC

NEW QUESTION 16
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.
Which of the following security measures should be used?

  • A. Biometric device
  • B. Common access card
  • C. Cable lock
  • D. Privacy screen
  • E. Mantrap

Answer: D

NEW QUESTION 17
A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user’s workstation?

  • A. chkdsk
  • B. netstat
  • C. gpupdate
  • D. diskpart

Answer: C

NEW QUESTION 18
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).

  • A. MAC filtering
  • B. Default SSID
  • C. Radio power levels
  • D. Content filtering
  • E. Physical security

Answer: DE

NEW QUESTION 19
During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?

  • A. Backout plan
  • B. Contingency plan
  • C. Alternative plan
  • D. Backup plan

Answer: D

NEW QUESTION 20
A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?

  • A. Performance Monitor
  • B. Component Services
  • C. Task Manager
  • D. Event Viewer

Answer: D

NEW QUESTION 21
Which of the following is the maximum RAM limit of a Windows 32-bit version?

  • A. no limit
  • B. 4GB
  • C. 8GB
  • D. 32GB

Answer: B

NEW QUESTION 22
Which of the following provide the BEST security for a server room? (Select two.)

  • A. Badge reader
  • B. Bollard
  • C. Biometric lock
  • D. Cable lock
  • E. USB token
  • F. Privacy window shades

Answer: AC

NEW QUESTION 23
Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

  • A. Folder Redirection
  • B. Group Policy
  • C. Security Groups
  • D. Home Folder

Answer: C

NEW QUESTION 24
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

  • A. Fingerprint lock
  • B. Passcode lock
  • C. Swipe lock
  • D. PIN lock

Answer: A

NEW QUESTION 25
Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

  • A. Acceptable use policy
  • B. Incident documentation policy
  • C. Password compliance policy
  • D. Change control policy

Answer: C

NEW QUESTION 26
A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following tasks should be done FIRST?

  • A. Disconnect the network cable.
  • B. Update the antivirus software.
  • C. Run an antivirus scan.
  • D. Shut down the PC

Answer: A

NEW QUESTION 27
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

  • A. Use an antivirus product capable of performing heuristic analysis
  • B. Use a host-based intrusion detection system on each computer
  • C. Disallow the password caching of accounts in the administrators group
  • D. Install a UTM in between PC endpoints to monitor for suspicious traffic
  • E. Log all failed login attempts to the PCs and report them to a central server

Answer: D

NEW QUESTION 28
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are:
Two 1GHz CPUs 2GB of memory 15GB hard drive
800x600 screen resolution
Which of the following should the technician do to resolve the problem?

  • A. Increase the number of CPUs
  • B. Increase the amount of memory
  • C. Increase the amount of hard drive space
  • D. Increase the screen resolution

Answer: C

NEW QUESTION 29
......

Thanks for reading the newest 220-1002 exam dumps! We recommend you to try the PREMIUM Certstest 220-1002 dumps in VCE and PDF here: https://www.certstest.com/dumps/220-1002/ (188 Q&As Dumps)