CompTIA A+ Core 2 220-1102

CompTIA A+ 220-1102 FAQs

Question #1      

SIMULATION –

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect to the wireless network. Other users have reported that their personal devices are connecting without issues. She has asked you to assist with getting the device online without adjusting her home WiFi configuration.

INSTRUCTIONS –

Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Correct Answer: See explanation below.

Click on 802.11 and Select ac –

Click on SSID and select BYOD –

Click on Frequency and select 5GHz

At Wireless Security Mode, Click on Security Mode Select the WPA and the password should be set to TotallySecure!

Question #2

A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

A. Anti-malware

B. Remote wipe

C. Locator applications

D. Screen lock

Correct Answer: B

Question #3

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

A. Keyboard

B. Touch pad

C. Ease of Access Center

D. Display settings

Correct Answer: C

Question #4

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

A. WPA2 with TKIP

B. WPA2 with AES

C. WPA3 with AES-256

D. WPA3 with AES-128

Correct Answer: B

Question #5

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

A. Privacy

B. Indexing Options

C. System

D. Device Manager

Correct Answer: B

Question #6

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

A. Encrypt the files.

B. Clone any impacted hard drives.

C. Contact the cyber insurance company.

D. Inform law enforcement.

Correct Answer: B

Question #7

A user’s smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user’s concern?

A. Operating system updates

B. Remote wipe

C. Antivirus

D. Firewall

Correct Answer: D

Question #8

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A. .deb

B. .vbs

C. .exe

D. .app

Correct Answer: D

Question #9

A user’s mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.)

A. Prevent a device root.

B. Disable biometric authentication.

C. Require a PIN on the unlock screen.

D. Enable developer mode.

E. Block a third-party application installation.

F. Prevent GPS spoofing.

Correct Answer: AE

Question #10

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software’s cloud server. Which of the following is MOST likely to be of concern to the IT manager?

A. All updated software must be tested with all system types and accessories.

B. Extra technician hours must be budgeted during installation of updates.

C. Network utilization will be significantly increased due to the size of CAD files.

D. Large update and installation files will overload the local hard drives.

Correct Answer: C

Question #11

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

A. Device Manager

B. Indexing Options

C. File Explorer

D. Administrative Tools

Correct Answer: C

Question #12

Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?

A. Owners can be notified a change is being made and can monitor it for performance impact.

B. A risk assessment can be performed to determine if the software is needed.

C. End users can be aware of the scope of the change.

D. A rollback plan can be implemented in case the software breaks an application.

Correct Answer: A

Question #13

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

A. Language

B. System

C. Personalization

D. Ease of Access

Correct Answer: D

Question #14

An organization is centralizing support functions and requires the ability to support a remote user’s desktop. Which of the following technologies will allow a technician to see the issue along with the user?

A. RDP

B. VNC

C. SSH

D. VPN

Correct Answer: B

Question #15

Which of the following is a proprietary Cisco AAA protocol?

A. TKIP

B. AES

C. RADIUS.

D. TACACS+

Correct Answer: D

Question #16

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

A. Scope of change

B. Risk level

C. Rollback plan

D. End user acceptance

Correct Answer: C

Question #17

After a company installed a new SOHO router, customers were unable to access the company-hosted public website. Which of the following will

MOST likely allow customers to access the website?

A. Port forwarding

B. Firmware updates

C. IP filtering

D. Content filtering

Correct Answer: A

Question #18

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

A. Changing channels

B. Modifying the wireless security

C. Disabling the SSID broadcast

D. Changing the access point name

Correct Answer: A

Question #19

A police oficer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the oficer can secure the workstation quickly when walking away?

A. Use a key combination to lock the computer when leaving.

B. Ensure no unauthorized personnel are in the area.

C. Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D. Turn off the monitor to prevent unauthorized visibility of information.

Correct Answer: A

Question #20

A technician is setting up a conference room computer with a script that boots the application on log-in. Which of the following would the technician use to accomplish this task? (Choose two.)

A. File Explorer

B. Startup Folder

C. System Information

D. Programs and Features

E. Task Scheduler

F. Device Manager

Correct Answer: BE

Pages: 1 2