최신 220-1002 무료덤프 - CompTIA A+ Certification Exam: Core 2
Which of the following types filesystems is in use when data is endiphered on a disk using a key?
정답: A
A user has been receiving reply emails from many contacts but the content of the emails is not familiar and the user did not send the original messages. The user calls the help desk for assistance. Which of the following is the BEST way the technician can fix this problem?
정답: A
Which of the following operating systems has mandatory update installation built in?
정답: B
Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information.
Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites.
Which of the following should the technician suggest NEXT to try to fix the issue?
Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites.
Which of the following should the technician suggest NEXT to try to fix the issue?
정답: B
Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?
정답: B
company's website is responsible for the theft of customer credit card numbers. An investigation determined private keys for certificates were stolen, allowing attackers to decrypt traffic between clients and the website. Which of the following types of attacks does this describe?
정답: C
A technician is upgrading hard drives on several workstations however the office would like to convert the old SATA drives into external drives for additional storage Which of the following would be the BEST method of ensuring the drives do not contain any PII prior to reusing the drives?
정답: B
After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites.
A technician discovers launching a different web browser on the same computer reaches the websites correctly.
Which of the following should the technician do NEXT?
A technician discovers launching a different web browser on the same computer reaches the websites correctly.
Which of the following should the technician do NEXT?
정답: E
When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen.
Which of the following tools would the technician use to resolve this issue?
Which of the following tools would the technician use to resolve this issue?
정답: D
Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?
정답: B
Which of the following operating systems has versions for servers, workstations, and phones?
정답: B
Which of the following types of security threats is used to attempt to learn a user's password?
정답: C
A user contains the help desk the restore an application that was lost when a System Restore was performed last week. A technician development the application was emitted to the user from an unknown source and downloaded from a link in the email. Which of the following should the technician do NEXT?
정답: A
The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:
Cannot save file C: \Program Files\Business Application\file1.wrk ?Access is denied.
Which of the following would be the MOST secure solution to this error?
Cannot save file C: \Program Files\Business Application\file1.wrk ?Access is denied.
Which of the following would be the MOST secure solution to this error?
정답: D
A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT?
정답: C
A user recently had malware removed from a computer, but the user is still experiencing issues with accessing websites. All the websites appear to display the same page. However, when a technician attempts to access the same websites from another computer, they display properly.
Which of the following should the technician do NEXT?
Which of the following should the technician do NEXT?
정답: A
A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.
Which of the following should the network administrator do NEXT?
Which of the following should the network administrator do NEXT?
정답: D
A user's workstation is running extremely slow. A technician sees a pop-up on the workstation offering what appears to be fake technical support, so the technician begins the malware removal procedure. After disabling System Restore, the technician runs a malware scan, but the scan does not find any malware on the machine.
Which of the following is the MOST likely reason the technician cannot find any malware?
Which of the following is the MOST likely reason the technician cannot find any malware?
정답: A
A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?
Which of the following BEST enforces this policy?
정답: C
A technician needs to load several new computers with the company's customized OS configuration. The technician asks if the systems can be PXE booted. To save the most time which of the following should be considered if the technician plans to use PXE to boot the systems?
정답: A