Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

220-1102 CompTIA A+ Certification Core 2 Exam Questions and Answers

Questions 4

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

Options:

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Buy Now
Questions 5

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

Options:

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Buy Now
Questions 6

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

Options:

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.

Buy Now
Questions 7

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?

    msconfig

Options:

A.

chkdsk

B.

sfc

C.

diskpart

D.

mstsc

Buy Now
Questions 8

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

Options:

A.

cat

B.

chmod

C.

pwd

D.

cacls

Buy Now
Questions 9

A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?

Options:

A.

Startup

B.

Performance

C.

Application history

D.

Processes

Buy Now
Questions 10

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

Options:

A.

Programs and Features

B.

Network and Sharing Center

C.

User Accounts

D.

Device Manager

Buy Now
Questions 11

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

Options:

A.

ipconfig

B.

arp

C.

nslookup

D.

pathping

Buy Now
Questions 12

A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?

Options:

A.

VNC

B.

SSH

C.

VPN

D.

RMM

Buy Now
Questions 13

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

Options:

A.

APFS

B.

FAT32

C.

NTFS

D.

ext4

Buy Now
Questions 14

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.

Bash

B.

SQL

C.

PHP

D.

PowerShell

Buy Now
Questions 15

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

Options:

A.

Quarantining system files

B.

Reimaging the workstation

C.

Encrypting the hard drive

D.

Disabling TLS 1.0 support

Buy Now
Questions 16

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

Options:

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Buy Now
Questions 17

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Options:

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Buy Now
Questions 18

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

Options:

A.

Biometric lock

B.

Badge reader

C.

USB token

D.

Video surveillance

E.

Locking rack

F.

Access control vestibule

Buy Now
Questions 19

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Options:

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Buy Now
Questions 20

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

Options:

A.

Spyware

B.

Cryptominer

C.

Ransormvare

D.

Boot sector virus

Buy Now
Questions 21

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

Options:

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Buy Now
Questions 22

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

Options:

A.

set AirDrop so that transfers are only accepted from known contacts

B.

completely disable all wireless systems during the flight

C.

discontinue using iMessage and only use secure communication applications

D.

only allow messages and calls from saved contacts

Buy Now
Questions 23

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Buy Now
Questions 24

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

Options:

A.

Shut down the infected computer and swap it with another computer

B.

Investigate what the interface is and what triggered it to pop up

C.

Proceed with initiating a full scan and removal of the viruses using the presented interface

D.

Call the phone number displayed in the interface of the antivirus removal tool

Buy Now
Questions 25

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Buy Now
Questions 26

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

Options:

A.

Scope of change

B.

Risk level

C.

Rollback plan

D.

End user acceptance

Buy Now
Questions 27

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

Options:

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Buy Now
Questions 28

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

Options:

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

Buy Now
Questions 29

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?

Options:

A.

FreeBSD

B.

Chrome OS

C.

macOS

D.

Windows

Buy Now
Questions 30

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Options:

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Buy Now
Questions 31

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

Options:

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Buy Now
Questions 32

A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item?

Options:

A.

The hardware does not meet BitLocker's minimum system requirements.

B.

BitLocker was renamed for Windows 10.

C.

BitLocker is not included on Windows 10 Home.

D.

BitLocker was disabled in the registry of the laptop

Buy Now
Questions 33

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Options:

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Buy Now
Questions 34

A technician is investigating an employee's smartphone that has the following symptoms

• The device is hot even when it is not in use.

•Applications crash, especially when others are launched.

• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO).

Options:

A.

Turn on autorotation

B.

Activate airplane mode.

C.

Close unnecessary applications

D.

Perform a factory reset

E.

Update the device's operating system

F.

Reinstall the applications that have crashed.

Buy Now
Questions 35

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

Options:

A.

Operating system updates

B.

Remote wipe

C.

Antivirus

D.

Firewall

Buy Now
Questions 36

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Options:

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Buy Now
Questions 37

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Options:

A.

Full

B.

Differential

C.

Off-site

D.

Grandfather-father-son

Buy Now
Questions 38

A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

Options:

A.

Services

B.

Processes

C.

Performance

D.

Startup

Buy Now
Questions 39

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

Options:

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Buy Now
Questions 40

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.

Multifactor authentication will be forced for Wi-Fi

B.

All Wi-Fi traffic will be encrypted in transit

C.

Eavesdropping attempts will be prevented

D.

Rogue access points will not connect

Buy Now
Questions 41

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

Options:

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Buy Now
Questions 42

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

Options:

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

Buy Now
Questions 43

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

Options:

A.

WPA2 with TKIP

B.

WPA2 with AES

C.

WPA3withAES-256

D.

WPA3 with AES-128

Buy Now
Questions 44

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

Options:

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Buy Now
Questions 45

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Options:

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Buy Now
Questions 46

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?

Options:

A.

macOS

B.

Linux

C.

Chrome OS

D.

Windows

Buy Now
Questions 47

A technician needs to configure a newly installed SSD. Which of the following tools should the technician use? (Select two).

Options:

A.

regedit.exe

B.

resmon.exe

C.

gpedit.msc

D.

diskmgmt.msc

E.

dfrgui.exe

F.

diskpart.msc

Buy Now
Questions 48

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Options:

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Buy Now
Questions 49

A user is attempting to access a shared drive from a company-issued laptop while working from home. The user is unable to access any files and notices a red X next to each shared drive. Which of the following needs to be configured in order to restore the user's access to the shared drives?

Options:

A.

IPv6

B.

VPN

C.

IPS

D.

DNS

Buy Now
Questions 50

A user's laptop is shutting down every time the laptop lid is closed, which is leading to frequent work interruptions. Which of the following should a help desk specialist do to remediate the issue?

Options:

A.

Configure the sleep settings.

B.

Disablehibernation.

C.

Edit thepower plan.

D.

Turn onfast startup.

Buy Now
Questions 51

A company’s help desk receives numerous calls from employees reporting issues related to a current security breach. Which of the following steps should the help desk team take to document the breach?

Options:

A.

Record the details in the ticketing system.

B.

Take screenshots and attach them to the root cause analysis.

C.

Discuss the incident with the company’s legal team.

D.

List the details in the company’s knowledge base.

Buy Now
Questions 52

Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician discovers the emails were sent from the following address:

john@cOmptia.org

Which of the following social engineering attacks is this an example of?

Options:

A.

Whaling

B.

Insider threat

C.

Phishing

D.

Vishing

E.

Evil twin

Buy Now
Questions 53

Which of the following authentication types is the most secure?

Options:

A.

WPA3

B.

WEP

C.

RADIUS

D.

TACACS+

E.

WPS

Buy Now
Questions 54

A user is unable to browse a website on a PC. Which of the following commands should a technician use to verify the PC's DNS resolution for the website?

Options:

A.

nslookup

B.

hostname

C.

tracert

D.

netstat

Buy Now
Questions 55

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do next?  

Options:

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate policies for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.  

Buy Now
Questions 56

A company wants a new software program installed on all company computers, including remote employees’ machines. Which of the following methods should the IT department use to remotely deploy the software?

Options:

A.

Clone

B.

Scripted

C.

In-place

D.

Image

Buy Now
Questions 57

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Buy Now
Questions 58

A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network. Which of the following steps should the technician take next?

Options:

A.

Schedule and perform an antivirus scan and system update

B.

Educate the end user on internet usage

C.

Perform a system scan to remove the malware

D.

Create a system restore point

Buy Now
Questions 59

A user with a disability needs to be able to press the Ctrl+Alt+Del keyboard sequence one key at a time. Which of the following turns on this Ease of Access feature?

Options:

A.

Press the Shift key five times in a row.

B.

Press Ctrl+Alt+Esc simultaneously.

C.

Press Ctrl+Alt+Tab simultaneously.

D.

Press the Windows key+Tab.

Buy Now
Questions 60

A business lost all data and equipment after a disaster. Due to the disaster, the business no longer maintains system backups. Which of the following should the business implement to prevent future losses?

Options:

A.

Test environment

B.

Local backups

C.

Cold site

D.

Cloud storage

Buy Now
Questions 61

A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following settings should the technician review?

Options:

A.

Wireless protocol

B.

DHCP pool

C.

Content filtering

D.

Firewall

Buy Now
Questions 62

Given the following information:

jdoe pizza

jdoe rock

jdoe guitar

Which of the following types of attacks is occurring?

Options:

A.

Dictionary

B.

Spoofing

C.

SQL injection

D.

DDoS

Buy Now
Questions 63

A help desk technician is preparing to upgrade the company's desktop OS from Windows 7 to Windows 10. The technician needs to ensure the upgrade will preserve the users’ applications and data but also minimize the time and effort required for the upgrade. Which of the following would the technician most likely do?

Options:

A.

Perform a clean install of the new OS.

B.

Utilize the Windows Update tool.

C.

Utilize the "Refresh this PC" option in the Settings menu.

D.

Use the Update Assistant tool.

Buy Now
Questions 64

Which of the following is the weakest wireless security protocol?

Options:

A.

WEP

B.

WPA2

C.

TKIP

D.

AES

Buy Now
Questions 65

Which of the following environmental effects can be the result of using virtualization?

Options:

A.

Greater energy consumption

B.

Noise pollution

C.

Reduced space requirements

D.

Fewer maintenance needs

Buy Now
Questions 66

Which of the following operating systems is most commonly installed on home IoT devices?

Options:

A.

Windows

B.

macOS

C.

Linux

D.

Chrome OS

Buy Now
Questions 67

A user recently accessed several websites that required log-in credentials. During subsequent visits, the user noticed that the log-in credential fields were already filled in. Which of the following is a way to prevent the browser from remembering the credentials for future visits?

Options:

A.

Disabling the password manager

B.

Removing the secure connections

C.

Clearing the browser cache

D.

Deleting the trusted sources

Buy Now
Questions 68

A technician needs to override DNS and map IP addresses and URLs to different locations. Which of the following should the technician do?

Options:

A.

Install signal repeaters.

B.

Edit the hosts file.

C.

Configure the firewall.

D.

Enable port forwarding.

Buy Now
Questions 69

A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?

Options:

A.

Transaction log

B.

Incremental

C.

Synthetic

D.

Differential

Buy Now
Questions 70

A technician is setting up backup and recovery solutions that must restore quickly. Storage space is not a factor. Which of the following backup methods should the technician implement?

Options:

A.

Differential

B.

Synthetic

C.

Full

D.

Incremental

Buy Now
Questions 71

A technician is installing a new SOHO wireless router and wants to ensure it is secure and uses the latest network features. Which of the following should the technician do first?

Options:

A.

Disable the unused ports.

B.

Enable DHCP reservations.

C.

Update the firmware.

D.

Disable the guest account.

Buy Now
Questions 72

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

Options:

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Buy Now
Questions 73

A technician is implementing the latest application security updates for endpoints on an enterprise network. Which of the following solutions should the technician use to ensure device security on the network while adhering to industry best practices?

Options:

A.

Automate the patching process.

B.

Monitor the firewall configuration.

C.

Implement access control lists.

D.

Document all changes.

Buy Now
Questions 74

A customer needs to verify an executable file that the customer downloaded from a website. Which of the following should the customer use to verify the file?

Options:

A.

Password manager

B.

BitLocker

C.

FileVault

D.

Checksum

E.

Secure site

Buy Now
Questions 75

Which of the following can be used for multifactor authentication when logging in to a computer system? (Select two).

Options:

A.

Mobile application

B.

Video surveillance

C.

Access control list

D.

Door locks

E.

Login script

F.

Short Message Service

Buy Now
Questions 76

After access to a server room was breached, a technician needs to implement a secure method to prevent unauthorized access. Which of the following is the most secure solution?

Options:

A.

Smart cards

B.

Key fobs

C.

Biometrics

D.

Security guard

Buy Now
Questions 77

A technician needs to configure security settings on a Windows 10 workstation. Which of the following should the technician configure to limit password attempts?

Options:

A.

Account Lockout Policy

B.

User Access Control

C.

System Protection

D.

Firewall

Buy Now
Questions 78

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

Options:

A.

Make the user a member of Domain Admins.

B.

Add the user to the local Administrators group.

C.

Let the user use credentials from another user who has rights.

D.

Give the user the local, high-privileged account password.

Buy Now
Questions 79

A systems administrator receives notification about unauthorized access to company resources outside normal business hours. Which of the following security measures should the systems administrator implement to prevent further unauthorized use?

Options:

A.

Perimeter firewalls

B.

SSL-enabled DNS

C.

Anonymizing VPNs

D.

Multifactor authentication

Buy Now
Questions 80

The user often hosts meetings from a Windows desktop, and meeting participants ask the user to make the text larger when the user shares the computer screen. When not in meetings, the user wants the text be smaller for work tasks. Which of the following is the most efficient way to change text font size?

Options:

A.

Issuinga laptop to the user with increased font size to be used only for meetings

B.

Using display settings to adjust the text size during meetings

C.

Addinga local user account, which has a larger font size set, for the user to log In toduring meetings

D.

Addinga second monitor to the user's desktop and increase the font size for only that display

Buy Now
Questions 81

Which of the following scripting languages is the most commonly used for system administration on Windows operating systems?

Options:

A.

PowerShell

B.

Python

C.

Bash

D.

JavaScript

Buy Now
Questions 82

A customer reports high data usage on a smartphone that reaches its monthly data limit within the first week of each billing cycle. The customer uses the phone primarily for calls and SMS messages with minimal content streaming. A technician troubleshoots the phone and notices that both developer mode and installs from unknown sources are enabled. Which of the following should the technician check next?

Options:

A.

Storage cache

B.

Malicious applications

C.

Privacy settings

D.

Permissions

Buy Now
Questions 83

An employee utilizes a personal smartphone to work remotely. The employee is unable to reach the portal using the company-provided VPN service. Which of the following describes the cause of the issue?

Options:

A.

The application must be purchased by the company.

B.

The smartphone is not on the latest OS version.

C.

The smartphone is not enrolled in MDM service.

D.

The application fails to install and launch.

Buy Now
Questions 84

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Options:

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Buy Now
Questions 85

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

Options:

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Buy Now
Questions 86

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

Options:

A.

Disable System Restore.

B.

Schedule a malware scan.

C.

Educate the end user.

D.

Run Windows Update.

Buy Now
Questions 87

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

Options:

A.

copy

B.

xcopy

C.

robocopy

D.

Copy-Item

Buy Now
Questions 88

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

Options:

A.

Boot order

B.

Malware

C.

Drive failure

D.

Windows updates

Buy Now
Questions 89

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

Options:

A.

DHCP

B.

SMTP

C.

DNS

D.

RDP

Buy Now
Questions 90

Which of the following editions of Windows 10 requires reactivation every 180 days?

Options:

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Buy Now
Questions 91

Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems?

Options:

A.

APFS

B.

ext4

C.

CDFS

D.

FAT32

Buy Now
Questions 92

The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves around. Which of the following should a technician perform to troubleshoot the issue?

Options:

A.

Verify the Wi-Fi connection status.

B.

Enable the NFC setting on the device.

C.

Bring the device within Bluetooth range.

D.

Turn on device tethering.

Buy Now
Questions 93

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the

technician perform to fix the issue?

Options:

A.

Disable the Windows Update service.

B.

Check for updates.

C.

Restore hidden updates.

D.

Rollback updates.

Buy Now
Questions 94

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

Options:

A.

Default gateway settings

B.

DHCP settings

C.

IP address settings

D.

Firewall settings

E.

Antivirus settings

Buy Now
Questions 95

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

Options:

A.

The Windows 10 desktop has Windows 10 Home installed.

B.

The Windows 10 desktop does not have DHCP configured.

C.

The Windows 10 desktop is connected via Wi-Fi.

D.

The Windows 10 desktop is hibernating.

Buy Now
Questions 96

A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done NEXT?

Options:

A.

Document the date and time of change.

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document findings of the sandbox test.

Buy Now
Questions 97

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

Options:

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

Buy Now
Questions 98

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.

File Explorer

B.

Startup Folder

C.

System Information

D.

Programs and Features

E.

Task Scheduler

F.

Device Manager

Buy Now
Questions 99

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

Options:

A.

Recalibrating the magnetometer

B.

Recalibrating the compass

C.

Recalibrating the digitizer

D.

Recalibrating the accelerometer

Buy Now
Questions 100

Which of the following defines the extent of a change?

Options:

A.

Scope

B.

Purpose

C.

Analysis

D.

Impact

Buy Now
Questions 101

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

Options:

A.

Keylogger

B.

Rootkit

C.

Ransomware

D.

Trojan

Buy Now
Questions 102

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?

Options:

A.

Adjust the content filtering.

B.

Unmap port forwarding.

C.

Disable unused ports.

D.

Reduce the encryption strength

Buy Now
Questions 103

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

Options:

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Buy Now
Questions 104

A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?

Options:

A.

Changing the office's Wi-Fi SSID and password

B.

Performing a remote wipe on the device

C.

Changing the user's password

D.

Enabling remote drive encryption

Buy Now
Questions 105

A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was

deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation?

Options:

A.

Offer to wipe and reset the device for the customer.

B.

Advise that the help desk will investigate and follow up at a later date.

C.

Put the customer on hold and escalate the call to a manager.

D.

Use open-ended questions to further diagnose the issue.

Buy Now
Questions 106

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Buy Now
Questions 107

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

Options:

A.

Rebuild Windows profiles.

B.

Reimage the workstation

C.

Roll back updates

D.

Perform a system file check

Buy Now
Questions 108

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

Options:

A.

Proceed to the site.

B.

Use a different browser.

C.

Report the error to the bank.

D.

Reinstall the browser.

Buy Now
Questions 109

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

Options:

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Buy Now
Questions 110

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

Options:

A.

Remote wipe

B.

Firewall

C.

Device encryption

D.

Remote backup

E.

Antivirus

F.

Global Positioning System

Buy Now
Questions 111

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?

Options:

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate polices for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.

Buy Now
Questions 112

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

Options:

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Buy Now
Questions 113

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Buy Now
Questions 114

A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user do after changing the network configuration to prevent the neighbor from being able to connect again?

Options:

A.

Disable the SSID broadcast.

B.

Disable encryption settings.

C.

Disable DHCP reservations.

D.

Disable logging.

Buy Now
Questions 115

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

Options:

A.

Security groups

B.

Access control list

C.

Group Policy

D.

Login script

Buy Now
Questions 116

A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?

Options:

A.

Wiping

B.

Low-level formatting

C.

Shredding

D.

Erasing

Buy Now
Questions 117

Which of the following macOS features provides the user with a high-level view of all open windows?

Options:

A.

Mission Control

B.

Finder

C.

Multiple Desktops

D.

Spotlight

Buy Now
Questions 118

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

Options:

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Buy Now
Questions 119

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

Options:

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Buy Now
Questions 120

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

Options:

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Buy Now
Questions 121

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

Options:

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Buy Now
Questions 122

An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?

Options:

A.

Perform a risk analysis.

B.

Implement the deployment.

C.

Verify end user acceptance

D.

Document the lessons learned.

Buy Now
Questions 123

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

Options:

A.

Golden image

B.

Remote network install

C.

In-place upgrade

D.

Clean install

Buy Now
Questions 124

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?

Options:

A.

Remove the microphone from the USB hub and plug it directly into a USB port on the PC.

B.

Enable the microphone under Windows Privacy settings to allow desktop applications to access it.

C.

Delete the microphone from Device Manager and scan for new hardware,

D.

Replace the USB microphone with one that uses a traditional 3.5mm plug.

Buy Now
Questions 125

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

Options:

A.

Runa live disk clone.

B.

Run a full antivirus scan.

C.

Use a batch file to rename the files-

D.

Disconnect the machine from the network

Buy Now
Questions 126

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

Options:

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Buy Now
Questions 127

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

Options:

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Buy Now
Questions 128

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

Options:

A.

Data usage limits

B.

Wi-Fi connection speed

C.

Status of airplane mode

D.

System uptime

Buy Now
Questions 129

Which of the following command-line tools will delete a directory?

Options:

A.

md

B.

del

C.

dir

D.

rd

E.

cd

Buy Now
Questions 130

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

Options:

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

Buy Now
Questions 131

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

Options:

A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

Buy Now
Questions 132

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

Options:

A.

SFTP

B.

SSH

C.

VNC

D.

MSRA

Buy Now
Questions 133

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Options:

A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Buy Now
Questions 134

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

Options:

A.

Device Manager

B.

System

C.

Ease of Access Center

D.

Programs and Features

Buy Now
Questions 135

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

Options:

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Buy Now
Questions 136

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

Options:

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Buy Now
Questions 137

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

Options:

A.

.mac

B.

.Pkg

C.

.deb

D.

.dmg

E.

.msi

F.

.appx

G.

.app

Buy Now
Questions 138

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

Options:

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

Buy Now
Questions 139

A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do?

Options:

A.

Require the user to change the password at the next log-in.

B.

Disallow tie user from changing the password.

C.

Disable the account

D.

Choose a password that never expires.

Buy Now
Questions 140

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Buy Now
Questions 141

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods

would BEST meet the requirements?

Options:

A.

A daily, incremental backup that is saved to the corporate file server

B.

An additional, secondary hard drive in a mirrored RAID configuration

C.

A full backup of the data that is stored of site in cold storage

D.

Weekly, differential backups that are stored in a cloud-hosting provider

Buy Now
Questions 142

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?

Options:

A.

Updating the operating system

B.

Changing proxy settings

C.

Reinstalling the browser

D.

Enabling port forwarding

Buy Now
Questions 143

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Options:

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Buy Now
Questions 144

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

Options:

A.

incineration

B.

Resale

C.

Physical destruction

D.

Dumpster for recycling plastics

Buy Now
Questions 145

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

Options:

A.

Services in Control Panel to check for overutilization

B.

Performance Monitor to check for resource utilization

C.

System File Checker to check for modified Windows files

D.

Event Viewer to identify errors

Buy Now
Questions 146

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Options:

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Buy Now
Questions 147

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?

Options:

A.

Expired certificate

B.

OS update failure

C.

Service not started

D.

Application crash

E.

Profile rebuild needed

Buy Now
Questions 148

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Buy Now
Questions 149

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

Options:

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

Buy Now
Questions 150

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

Options:

A.

System time

B.

IP address

C.

DNS servers

D.

Windows updates

Buy Now
Questions 151

Which of the following is MOST likely contained in an EULA?

Options:

A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Buy Now
Questions 152

Which of the following should be done NEXT?

Options:

A.

Send an email to Telecom to inform them of the issue and prevent reoccurrence.

B.

Close the ticket out.

C.

Tell the user to take time to fix it themselves next time.

D.

Educate the user on the solution that was performed.

Buy Now
Questions 153

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

Options:

A.

The GPS application is installing software updates.

B.

The GPS application contains malware.

C.

The GPS application is updating its geospatial map data.

D.

The GPS application is conflicting with the built-in GPS.

Buy Now
Questions 154

A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?

Options:

A.

PIN-based login

B.

Quarterly password changes

C.

Hard drive encryption

D.

A physical laptop lock

Buy Now
Questions 155

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Buy Now
Questions 156

A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

Options:

A.

Access control

B.

Authentication application

C.

Group Policy

D.

Folder redirection

Buy Now
Questions 157

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

Options:

A.

fdisk

B.

Diskpart

C.

Disk Utility

D.

FileVault

Buy Now
Questions 158

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

Options:

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Buy Now
Questions 159

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide fast data recovery in this situation?

Options:

A.

Full

B.

Differential

C.

Synthetic

D.

Incremental

Buy Now
Questions 160

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

Options:

A.

Implementing data-at-rest encryption

B.

Disabling AutoRun

C.

Restricting user permissions

D.

Restricting log-in times

E.

Enabling a screen lock

F.

Disabling local administrator accounts

Buy Now
Questions 161

A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two).

Options:

A.

Disable Wi-Fi autoconnect.

B.

Stay offline when in public places.

C.

Uninstall all recently installed applications.

D.

Schedule an antivirus scan.

E.

Reboot the device

F.

Update the OS

Buy Now
Questions 162

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

Options:

A.

gpupdate

B.

net use

C.

hostname

D.

dir

Buy Now
Questions 163

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Buy Now
Questions 164

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

Options:

A.

Screened subnet

B.

Firewall

C.

Anti-phishing training

D.

Antivirus

Buy Now
Questions 165

A remote user is experiencing issues connecting to a corporate email account on a laptop. The user clicks the internet connection icon and does not recognize the connected Wi-Fi. The help desk technician, who is troubleshooting the issue, assumes this is a rogue access point. Which of the following is the first action the technician should take?

Options:

A.

Restart the wireless adapter.

B.

Launch the browser to see if it redirects to an unknown site.

C.

Instruct the user to disconnect the Wi-Fi.

D.

Instruct the user to run the installed antivirus software.

Buy Now
Questions 166

A user wants to back up a Windows 10 device. Which of the following should the user select?

Options:

A.

Devices and Printers

B.

Email and Accounts

C.

Update and Security

D.

Apps and Features

Buy Now
Questions 167

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

Options:

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Buy Now
Questions 168

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured?

Options:

A.

Power Plans

B.

Hibernate

C.

Sleep/Suspend

D.

Screensaver

Buy Now
Questions 169

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

Options:

A.

nslookup

B.

net use

C.

netstat

D.

net user

Buy Now
Questions 170

A technician is investigating options to secure a small office's wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?

Options:

A.

RADIUS

B.

AES

C.

EAP-EKE

D.

MFA

Buy Now
Questions 171

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

Options:

A.

Synchronize the browser data.

B.

Enable private browsing mode.

C.

Mark the site as trusted.

D.

Clear the cached file.

Buy Now
Questions 172

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?

Options:

A.

Data integrity form

B.

Valid operating system license

C.

Documentation of an incident

D.

Chain of custody

Buy Now
Questions 173

An administrator is designing and implementing a server backup system that minimizes the capacity of storage used. Which of the following is the BEST backup approach to use in conjunction with synthetic full backups?

Options:

A.

Differential

B.

Open file

C.

Archive

D.

Incremental

Buy Now
Questions 174

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

Options:

A.

Add a user account to the local administrator's group.

B.

Configure Windows Defender Firewall to allow access to all networks.

C.

Create a Microsoft account.

D.

Disable the guest account.

Buy Now
Questions 175

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

Options:

A.

compmgmt.msc

B.

regedit.exe

C.

explorer.exe

D.

taskmgt.exe

E.

gpmc.msc

F.

services.msc

Buy Now
Questions 176

A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?

Options:

A.

Restart the mobile device.

B.

Turn on airplane mode.

C.

Check that the accessory is ready to pair.

D.

Clear all devices from the phone's Bluetooth settings.

Buy Now
Questions 177

Which of the following best describes when to use the YUM command in Linux?

Options:

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

Buy Now
Questions 178

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?

Options:

A.

Performing annual network topology reviews

B.

Requiring all network changes include updating the network diagrams

C.

Allowing network changes once per year

D.

Routinely backing up switch configuration files

Buy Now
Questions 179

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

Options:

A.

Escalating the issue to Tier 2

B.

Verifying warranty status with the vendor

C.

Replacing the motherboard

D.

Purchasing another PC

Buy Now
Questions 180

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

Options:

A.

Document the date and time of change

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document the findings of the sandbox test,

Buy Now
Questions 181

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

Options:

A.

Verify the DNS server settings.

B.

Turn off the Windows firewall.

C.

Confirm the subnet mask is correct.

D.

Configure a static IP address.

Buy Now
Questions 182

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

Options:

A.

Windows updates

B.

DNS settings

C.

Certificate store

D.

Browser plug-ins

Buy Now
Questions 183

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

Options:

A.

TACACS+

B.

Kerberos

C.

Preshared key

D.

WPA2/AES

Buy Now
Questions 184

Which of the following would most likely be used to extend the life of a device?

Options:

A.

Battery backup

B.

Electrostatic discharge mat

C.

Proper ventilation

D.

Green disposal

Buy Now
Questions 185

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

Options:

A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

Buy Now
Questions 186

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Buy Now
Questions 187

A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Secondary account and recovery code

Buy Now
Questions 188

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

Options:

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.

Buy Now
Questions 189

A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?

Options:

A.

DNS

B.

IPS

C.

VPN

D.

SSH

Buy Now
Questions 190

Which of the following physical security controls can prevent laptops from being stolen?

Options:

A.

Encryption

B.

LoJack

C.

Multifactor authentication

D.

Equipment lock

E.

Bollards

Buy Now
Questions 191

A systems administrator is experiencing Issues connecting from a laptop to the corporate network using PKI. Which to the following tools can the systems administrator use to help remediate the issue?

Options:

A.

certmgr.msc

B.

msconfig.exe

C.

lusrmgr.msc

D.

perfmon.msc

Buy Now
Questions 192

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

Options:

A.

Authenticator application

B.

Access control lists

C.

Biometrics

D.

Smart card readers

Buy Now
Questions 193

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

Options:

A.

Release notes

B.

Antivirus software

C.

Backup of critical data

D.

Device drivers

E.

Word processing software

F.

Safe boot mode

Buy Now
Questions 194

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

Options:

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Buy Now
Questions 195

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

Options:

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Buy Now
Questions 196

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

Options:

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Buy Now
Questions 197

A company wants to take advantage of modern technology and transition away from face-to-face meetings. Which of the following types of software would benefit the company the most? (Select two).

Options:

A.

Videoconferencing

B.

File transfer

C.

Screen-sharing

D.

Financial

E.

Remote access

F.

Record-keeping

Buy Now
Questions 198

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

Options:

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Buy Now
Questions 199

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?

Options:

A.

Wi-Fi

B.

iCloud

C.

Antivirus

D.

AirDrop

Buy Now
Questions 200

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

Options:

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Buy Now
Questions 201

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

Options:

A.

Move the application to the desktop and press delete

B.

Identify the application in Finder and drag it to the trash can.

C.

Use Spotlight to search for the application, and then run the application.

D.

Use Time Machine to go back to the date before the installation.

Buy Now
Questions 202

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

Options:

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Buy Now
Questions 203

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

Options:

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Buy Now
Questions 204

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

Options:

A.

Reviewing System Information

B.

Running Disk Cleanup

C.

Editing the Registry

D.

Checking the Performance Monitor

E.

Increasing the memory

Buy Now
Questions 205

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

Options:

A.

NIC

B.

CPU

C.

PSU

D.

KVM

E.

RAM

F.

DVI

Buy Now
Questions 206

Which of the following operating systems was the app file type designed to run under as an application file bundle?

Options:

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Buy Now
Questions 207

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

Options:

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Buy Now
Questions 208

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

220-1102 Question 208

220-1102 Question 208

220-1102 Question 208

Options:

Buy Now
Questions 209

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

Options:

A.

Delete the browser cookies and history.

B.

Reset all browser settings.

C.

Change the browser default search engine.

D.

Install a trusted browser.

Buy Now
Questions 210

Which of the following does MFA provide?

Options:

A.

Security enhancement

B.

Encryption

C.

Digital signature

D.

Public key infrastructure

Buy Now
Questions 211

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

Options:

A.

Differential

B.

Image

C.

Synthetic

D.

Archive

Buy Now
Questions 212

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

Options:

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Buy Now
Questions 213

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

Options:

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Buy Now
Questions 214

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

Options:

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Buy Now
Questions 215

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?

Options:

A.

Scan the system for malware.

B.

Clear the web browser cache.

C.

Enroll the device in an MDM system.

D.

Confirm the compatibility of the applications with the OS.

Buy Now
Questions 216

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

Options:

A.

netstat

B.

ping

C.

format

D.

tracert

Buy Now
Questions 217

Which of the following operating systems were designed for smartphones? (Select two).

Options:

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Buy Now
Questions 218

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

Options:

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Buy Now
Questions 219

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

Options:

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Buy Now
Questions 220

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

Options:

A.

Perform a safe mode boot.

B.

Run the System Restore wizard.

C.

Start the computer in the last known-good configuration.

D.

Reset the BIOS settinqs.

Buy Now
Questions 221

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

Options:

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Buy Now
Questions 222

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

Options:

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Buy Now
Questions 223

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

Options:

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Buy Now
Questions 224

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

Options:

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Buy Now
Questions 225

A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?

Options:

A.

Requiring four character types

B.

Decreasing the password expiration times

C.

Enabling an automatic lock timer

D.

Adding two characters to the minimum password length

Buy Now
Questions 226

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

Options:

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

Buy Now
Questions 227

Which of the following commands lists running processes in Linux?

Options:

A.

top

B.

apt-get

C.

Is

D.

cat

Buy Now
Questions 228

When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender?

Options:

A.

Keys

B.

Token

C.

Password

D.

RootCA

Buy Now
Questions 229

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

Options:

A.

HTTPS

B.

VLAN

C.

DNS

D.

SMTP

Buy Now
Questions 230

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

Options:

A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Buy Now
Questions 231

A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?

Options:

A.

c: \minutes

B.

dir

C.

rmdir

D.

md

Buy Now
Questions 232

A technician is trying to connect to a user's laptop in order to securely install updates. Given the following information about the laptop:

Which of the following should the technician do to connect via RDP?

Options:

A.

Confirm the user can ping the default gateway.

B.

Change the IP address on the user's laptop.

C.

Change the subnet mask on the user's laptop.

D.

Open port 3389 on the Windows firewall.

Buy Now
Questions 233

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

Options:

A.

Apps and Features

B.

Personalization

C.

File Explorer

D.

Task Manager

Buy Now
Questions 234

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

    Group Policy

Options:

A.

User accounts

B.

Access control lists

C.

Authenticator applications

Buy Now
Questions 235

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

Options:

A.

Corporate

B.

Open-source

C.

Personal

D.

Enterprise

Buy Now
Questions 236

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

Options:

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Buy Now
Questions 237

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

Options:

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Buy Now
Questions 238

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

Options:

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

Buy Now
Questions 239

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

Options:

A.

Acceptable use policy

B.

Security protocols

C.

Data flow diagram

Buy Now
Questions 240

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

Options:

A.

Configure the firewall.

B.

Restore the system from backups.

C.

Educate the end user

D.

Update the antivirus program.

Buy Now
Questions 241

When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue?

Options:

A.

Certificate warning

B.

Malware

C.

JavaScript error

D.

Missing OS update

Buy Now
Questions 242

Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?

Options:

A.

gpedit.msc

B.

perfmon.msc

C.

devmgmt.msc

Buy Now
Questions 243

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

Options:

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

Buy Now
Questions 244

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

    Restart the phone.

Options:

A.

Reimage the OS.

B.

Reinstall the application.

C.

Clear the cache.

Buy Now
Questions 245

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Buy Now
Questions 246

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

Options:

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

Buy Now
Questions 247

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?

Options:

A.

Access control list

B.

Multifactor authentication

C.

Least privilege

D.

Mobile device management

Buy Now
Questions 248

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?

Options:

A.

msinfo32.exe

B.

dxdiag.exe

C.

msconfig.exe

D.

regedit.exe

Buy Now
Questions 249

A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?

Options:

A.

Reimage the computer.

B.

Replace the system RAM.

C.

Reinstall and update the failing software.

D.

Decrease the page file size.

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Oct 4, 2025
Questions: 840

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90