Vivid of 220-1102 free practice exam materials and testing engine for CompTIA certification for IT learners, Real Success Guaranteed with Updated 220-1102 pdf dumps vce Materials. 100% PASS CompTIA A+ Certification Exam: Core 2 exam Today!
Online CompTIA 220-1102 free dumps demo Below:
NEW QUESTION 1
A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?
- A. Change the DNS address to 1.1.1.1
- B. Update Group Policy
- C. Add the site to the client's exceptions list
- D. Verity the software license is current.
Answer: A
NEW QUESTION 2
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?
- A. Home
- B. Pro for Workstations
- C. Enterprise
- D. Pro
Answer: D
NEW QUESTION 3
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?
- A. Scope of change
- B. Risk level
- C. Rollback plan
- D. End user acceptance
Answer: C
NEW QUESTION 4
Someone who is fraudulently claiming to be from a reputable bank calls a company employee.
Which of the following describes this incident?
A . Pretexting
B . Spoofing
C . Vishing
D . Scareware
- A.
Answer: C
NEW QUESTION 5
An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?
- A. Encrypt the files.
- B. Clone any impacted hard drives.
- C. Contact the cyber insurance company.
- D. Inform law enforcement.
Answer: B
NEW QUESTION 6
A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)
- A. Scan the computer with the company-provided antivirus software
- B. Install a new hard drive and clone the user's drive to it
- C. Deploy an ad-blocking extension to the browser.
- D. Uninstall the company-provided antivirus software
- E. Click the link in the messages to pay for virus removal
- F. Perform a reset on the user's web browser
Answer: CF
NEW QUESTION 7
A technician has been tasked with installing a workstation that will be used tor point-of-sale
transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the
following encryption technologies should be used to secure the workstation in case of theft?
- A. Data-in-transit encryption
- B. Disk encryption
- C. USB drive encryption
- D. File encryption
Answer: B
NEW QUESTION 8
A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night.
Which of the following is the FIRST step in troubleshooting?
- A. Install alternate open-source software in place of the applications with issues
- B. Run both CPU and memory tests to ensure that all hardware functionality is normal
- C. Check for any installed patches and roll them back one at a time until the issue is resolved
- D. Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.
Answer: C
NEW QUESTION 9
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?
- A. Removed all jewelry
- B. Completed an inventory of tools before use
- C. Practiced electrical fire safety
- D. Connected a proper ESD strap
Answer: A
NEW QUESTION 10
A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?
- A. Default gateway
- B. Host address
- C. Name server
- D. Subnet mask
Answer: A
NEW QUESTION 11
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
- A. Acceptable use.
- B. Chain of custody.
- C. Security policy.
- D. Information management.
Answer: B
NEW QUESTION 12
A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?
- A. Shut down the infected computer and swap it with another computer.
- B. Investigate what the interface is and what triggered it to pop up.
- C. Proceed with initiating a full scan and removal of the viruses using the presented interface.
- D. Call the phone number displayed in the interface of the antivirus removal tool.
Answer: C
NEW QUESTION 13
A technician is troubleshooting a customer's PC and receives a phone call. The technician does
not take the call and sets the phone to silent. Which of the following BEST describes the technician's
actions?
- A. Avoid distractions
- B. Deal appropriately with customer's confidential material
- C. Adhere to user privacy policy
- D. Set and meet timelines
Answer: D
NEW QUESTION 14
Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?
- A. Install and run Linux and the required application in a PaaS cloud environment
- B. Install and run Linux and the required application as a virtual machine installed under the Windows OS
- C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed
- D. Set up a dual boot system by selecting the option to install Linux alongside Windows
Answer: B
NEW QUESTION 15
Which of the following could be used to implement secure physical access to a data center?
- A. Geofence.
- B. Alarm system.
- C. Badge reader.
- D. Motion sensor.
Answer: A
NEW QUESTION 16
......
100% Valid and Newest Version 220-1102 Questions & Answers shared by Dumps-hub.com, Get Full Dumps HERE: https://www.dumps-hub.com/220-1102-dumps.html (New 0 Q&As)