Customers Passed CompTIA 220-1002 Exam
Average Score In Real 220-1002 Exam
Questions came from our 220-1002 dumps.
Welcome to PassExamHub's comprehensive study guide for the CompTIA A+ Certification Exam: Core 2 exam. Our 220-1002 dumps is designed to equip you with the knowledge and resources you need to confidently prepare for and succeed in the 220-1002 certification exam.
PassExamHub's 220-1002 dumps PDF is carefully crafted to provide you with a comprehensive and effective learning experience. Our study material includes:
In-depth Content: Our study guide covers all the key concepts, topics, and skills you need to master for the 220-1002 exam. Each topic is explained in a clear and concise manner, making it easy to understand even the most complex concepts.
Online Test Engine: Test your knowledge and build your confidence with a wide range of practice questions that simulate the actual exam format. Our test engine cover every exam objective and provide detailed explanations for both correct and incorrect answers.
Exam Strategies: Get valuable insights into exam-taking strategies, time management, and how to approach different types of questions.
Real-world Scenarios: Gain practical insights into applying your knowledge in real-world scenarios, ensuring you're well-prepared to tackle challenges in your professional career.
Expertise: Our 220-1002 exam questions answers are developed by experienced CompTIA certified professionals who have a deep understanding of the exam objectives and industry best practices.
Comprehensive Coverage: We leave no stone unturned in covering every topic and skill that could appear on the 220-1002 exam, ensuring you're fully prepared.
Engaging Learning: Our content is presented in a user-friendly and engaging format, making your study sessions enjoyable and effective.
Proven Success: Countless students have used our study materials to achieve their 220-1002 certifications and advance their careers.
Start Your Journey Today!
Embark on your journey to CompTIA A+ Certification Exam: Core 2 success with PassExamHub. Our study material is your trusted companion in preparing for the 220-1002 exam and unlocking exciting career opportunities.
A user lives in a location that experiences frequent lightning storms. Which of the followingwould be the LEAST expensive solution to protect the user's computer hardware?
A. A surge protector
B. Grounding
C. A power generator
D. An uninterruptible power supply
Which of the following is required to receive GPOs from a system's centralized servers?
A. Encrypting File System
B. Workgroup membership
C. Domain access Is
D. BitLocker
A customer has been using a computer to download and copy files to a USB flash drive.The customer accidentally stepped on the power strip, and the computer suddenly poweredoff. When the computer turned back on, it displayed an error message: No OS found.Which of the following should a technician perform NEXT?
A. Connect a UPS.
B. Repair the OS.
C. Check the boot order.
D. Run hardware diagnostics.
A user wants a phone with an operating system that is highly customizable. Which of thefollowing operating systems will a technician MOST likely recommend?
A. Windows Mobile
B. Android
C. Fire OS
D. iOS
A remote user has reported a suspicious pop-up. and a technician is troubleshooting theuser's laptop. The technician needs to connect securely to the computer to view the user'sscreen and investigate the issue Which of the following should the technician use?
A. SSH
B. MSTSC
C. SFTP
D. MSRA
A technician needs to connect to a server using a secure terminal application. Thetechnician must be able to reboot the server quickly and restart all the daemons with thisapplication Which of the following methods will the technician MOST likely use? (SelectTWO)
A. SSH
B. Telnet
C. Putty
D. HTTPS
E. Remote Assistance
F. RDP
A user’s company phone was recently wiped. The user Is unsure if an IT administratorwiped the phone or if it was the result of a hacking attempt. A new company policy wasrecently implemented to tighten security. The newpolicy requirements include:* An allowance for the remote wiping of company data* PIN unlock* Failed-attempt device wiping‘The user normally keeps the phone in a pocket, so it is unlikely that anyone else hadaccess to It. Which of the following is the MOST likely cause of the device being wiped?
A. Unauthorized remote access
B. A system lockout
C. A virus
D. A faulty device
A technician is helping a remote user who has a Windows issue. The user is working froma shared office space and is not on the corporate network. Which of the following remoteaccess methods is MOST to be successful in this case?
A. Telnet
B. Remote desktop
C. Third-party screen sharing
D. Secure shell
A Microsoft application will not open when a user clicks on it. Instead, the following errormessage pops up: This application has crashed. Would you like to send an error report toMicrosoft? Which of the following should the user try FIRST
A. Open the application with administrative privileges.
B. Open a run command and then type the application name.
C. Reboot the computer into sate mode and try to open the program.
D. Uninstall the program alter saving any associated data and reinstall the program.
A user installed an application that now requires a license key to enable lull functionality.The user contacts support, and the technician decides to enter a license key in thesoftware GUI on behalf of the user. Which of the following will support this task''
A. SSH
B. RDP
C. FTP
D. Telnet
Which of the following security principles help to prevent employees from changing filesthey are intended only to view?
A. DLP
B. MDM
C. ACL
D. MFA
Ann, an employee, has been trying to use a company-issued mobile device to access aninternal fileshare while traveling abroad. She restarted the device due to a mobile OSupdate, but she is now unable to access company information Ann calls the help desk forassistance, and a technician verifies she can make calls and access websites Which of thefollowing should the technician suggest NEXT to try to fix the issue?
A. Navigate to the VPN profile in the device settings, delete the pre-shared key. and restartthe device
B. Instruct Ann to open the company's MDM application to ensure proper functionality
C. Navigate to the corporate intranet page and use hyperlinks to access the fileshare.
D. Instruct Ann to disable TLS 1.0 in the device settings
Which of the following is a risk to computer equipment when the humidity is low?
A. Static discharge
B. Corrosion
C. Frequent brownouts
D. Increased dust
A user’s computer is quick to boot up but very slow at login. It tends to get fasterthroughout the day. A technician checks the RAM usage, and it looks fine during the day.The slowdown is MOST likely being caused by too many:
A. boot devices.
B. startup applications.
C. device drivers.
D. Windows profiles loading.
A technician recently upgrade a leptop a replo’s RAM from 2GB to 4hb. However , theoperating system only recognizes the RAM as 3.5GB. Which of the following is the MOSTlikely reason the leptop does not recognize the full amount of RAM?
A. The RS-232 connector pins are damaged.
B. A 32-bit operating system is installed.
C. The msinfo32 executable is compute.
D. A FAT32 filesystem is configured.
A technician is attempting to remove a virus from the machine of a user who just retunedfrom leave. The virus is a known signature that was identified 30 days ago. The antivirussolution the company is using was updated seven days ago with the most currentsignatures. Which of the following MOST likely allowed the infection?
A. The last antivirus update the machine received was seven days ago.
B. The user changed the machine's password 30 days ago.
C. The user manually killed the antivirus process.
D. The machine has not received an antivirus update in the past 30 days.
Which of the following are method used to prevent an unauthenticated compute fromestablishing a connection as a node on a corporate network? (Select TWO.)
A. Port security
B. Anti-malware
C. Certificate
D. IDS
E. Firewall
F. Captive portal
An employee is taking a credit card payment over the phone, but the payment system hasa temporary outage. To avoid inconveniencing the customer, the employee writes down thecredit card number and expiration date on a notepad to be entered later This is in violationof:
A. PHI
B. PCI
C. Pll
D. PGP
A customer’s computer was turned off overnight, When the customer restarts the computer,an advanced startup menu is displayed.The startup repair option is unsuccessful and causes the computer to reboot repeatly untillthe advanced startup screen reappears. Which of the following should a technician attemptFIRST?
A. Go back to the previous build.
B. Refresh the PC.
C. Run System Restore.
D. Perform System image Recovery.
E. Reset the PC.
Which of the following extensions identify files that are typically implemented as scripts?(Select TWO).
A. .vbs
B. .txt
C. .exe
D. .Up
E. .bat
F. .xlsx
Malware has been identified on a critical system that is currently quarantined. Which of thefollowing should a technician do after the malware symptoms are correctly identified?
A. Educate the power user for that system.
B. Schedule weekly scans and run routine updates.
C. Disable System Restore.
D. Remediate the infected system.
A user in a SOHO wants to allow Joe, a remote technician, to connect securely to theuser's workstation Joe informs the user that the VPN was successful, but he still cannotconnect. Which of the following settings in the SOHO router MOST likely need to beadjusted?
A. Encryption
B. Firewall
C. DHCP
D. DNS
E. NAT
A technician discovers a user’s home computer has Windows Update disabled andsuspects malware has replaced several Windows OS files. After completing a malwarescan, which of the following command line utilities would the technician MOST likely runbefore enabling Windows Update?
A. xcopy
B. chkdsk
C. sfc
D. gpupdate
A technician recently built a gaming PC with a multicode CPU, 32GB DDR4 memory, a1TB SSD. and a high-end GPU The technician installed the OS and a new game butnoticed the frame-rate performance was much lower than expected Which of the followingshould the technician do NEXT to address the performance issues?
A. Install a higher wattage PSU.
B. Download security patches
C. Defragment the drive
D. Update the device drivers
The Chief Information Security Officer (CISO) wants to ensure the company is prepared incase of a ransomware attack. The CISO has requested network vulnerability scans, firewallaudits, and ACL logs. Which of the following should the CISO also request?
A. Audits of the cloud storage platform
B. Tests of the data backups
C. Physical penetration tests
D. NIDS signature updates
An end user set up a gaming server on an extra Windows PC. The user wants the PC torestart automatically during the night using the shutdown -r -£ commandWhich of the following is the BEST tool to accomplish this?
A. Computer Management
B. Task Scheduler b
C. Task Manager
D. Control Panel
A technician is reviewing system updates. Some of the updates address vulnerabilitiesfound in mission-critical servers, and they need to be performed immediately. Which of thefollowing should the technician perform FIRST?
A. Risk analysis
B. Back-out plan
C. Change board
D. Implementation plan
A user is working with the command line interface on a Linux computer To show thecontents of the current directory, which of the following commands should be used'
A. Is
B. dir
C. -get
D. mv
A user opens a phishing email and types logon credentials into a fake banking website.The computer's antivirus software then reports it has severalfrom the network. Which of the following should the technician perform NEXT?
A Have the user change the password.
B. Update the antivirus software and run scans.
C. Disable the user's local computer account.
D. Quarantine the phishing email.
A user reports that since installing updates earlier that day, several of the productivityapplications that were installed no longer open. The applications start to load, and thenthey crash immediately. A technician tries switching users and logging in as the localadministrator, but the same issue still occurs. Which of the following should the technicianperform NEXT?
A. Escalate the ticket to Tier 2 support.
B. Uninstall and reinstall the productivity applications.
C. Reimage the user's workstation.
D. Reboot the system to complete the updates.
A technician is implementing multifactor authentication for logins to the network. Thenetwork already requires a username and password to authenticate users. Which of thefollowing should the technician add to meet the multifactor requirement?
A. Passphrase
B. Knowledge-based authentication
C. PIN
D. Thumbprint
A technician is installing an application on a Linux system using the Bash shell console.Which of the following extensions should the technician select to install the application?
A. .Exe
B. .Apk
C. .Sh
D. .app
A junior technician needs to obtain a list of all the processes that are running on Linuxsystem. Which of the following commands should the technician use to obtain theinformation?
A. Nv
B. Is
C. Ps
D. V1
A technician is able to connect to a website: however, the technician receives the followingerror, when alternating to access a different website: Page cannot be displayed. Which ofthe following command line tools would be BEST to identify the root cause of theconnection problem?
A. ipconfig
B. tracert
C. nslookup
D. netstat
E. ping
A user’s login screen does not look normal when booting the computer. A technician statesthe computer was showing the company’s workstation imaging system screen, but it hassince been fixed. Which of the following did the technician update?
A. Operating system
B. Drivers
C. Boot order
D. BIOS firmware
A company recently experienced a security incident in which an unauthorized user wasable to insert a USB flash drive into a kiosk, launch a non-native OS. and deliver maliciouspayloads across the network. Which of the following security measures would have beenBEST to prevent the attack from being executed in the first place' (Select TWO)
A. Using a host-based antivirus with real-time scanning
B. Implementing automatic screen locks after 60 seconds of inactivity
C. Creating a strong BIOS'UEFI password
D. Disabling AutoRun for USB devices
E. Enabling the Secure Boot option
F. Changing the default administrator credentials
When a user logs in to a computer, desktop icons and documents are missing. The useronly has one account, 2and none of the personalized settings are there. Everything workedfine the previous day. Which of the following should a technician do to resolve the issue?
A. Perform a system refresh.
B. Change the account permissions.
C. Repair the profile.
D. Restore the data from backup.
Which of the following would be the FASTEST method to perform a clean install of thelatest Windows OS?
A. USB media
B. Optical drive
C. Network boot
D. In-place upgrade
Which of the following OS types provides a lightweight option for workstations that need aneasy-to-use browser-based interface?
A. macOS
B. Windows
C. Linux
D. Chrome
An IT manager receives an email from an upset. The customer has been reporting an issuewith a computer virus for a weeks. The customer has already put in a support ticket for theissue and left phone messages with IT support requesting an update on when the issuemight be fixed, but the customer’s call s has not been returned. The IT manager knows theIT staff is very busy and not purchased ignore the customer. Which of the should the do toaddress customer’s complaint?
A. Contact the customer and explain the IT staff a busy. and the customer will have to waitfor service.
B. Contact the customer and attempt to get more details on the issue, and then assign atechnician to follow up with the customer.
C. Contact the customer and attempt to fix the issue without assigning it to a technician.
D. Contact the customer and recommend that the customer call the IT support desk totroubleshoot the issue.
A technician is investigating connectivity issues over the corporate network. The technicianattempts to Telnet into an access point in the break room, which is labeled AP-1. but isunable to proceed any further or authenticate Which of the following commands will beMOST beneficial in determining the connectivity issues?
A. netstat
B. tracert
C. ipconfig
D. nslookup
A security learn recommends a disaster recovery plan with the following requirements:* Recent backups should be readily available.* Only long-term backups should be stored off premises* There should be minimum expenditure on hardware.Which of the following satisfies all of these requirements?
A. Store 30 days of backups on premises and then age the backups to the public cloud
B. Store backups on premises and burst to the public cloud if needed.
C. Store backups both on premises and in a public cloud infrastructure
D. Store all the backups in a public cloud with no on-premises backup storage
Joe. a user, cannot read encrypted email messages on a corporate smartphone, but hehas been able to read them in the past A technician restarts Joe's smartphone. but theissue remains. The technician deletes the corporate email account and has Joe re-add it.verifying all settings are correct Despite these steps, the issue persists Which of thefollowing is MOST likely causing the issue7
A. The certificate is expired
B. The TPM is bad.
C. The phone is not encrypted
D. The incorrect mail server is selected in settings
Joe, a user, reports the programs and icons on his Windows desktop are much larger thanthey were the day before. He tried changing the screen resolution and restarting thecomputer, but it still does not look right. Joe also states the computer showed it wasfinishing updates when he first powered it on. Which of the following should a technicianperform NEXT?
A. Reboot the computer.
B. Roll back the video driver.
C. Reload the OS.
D. Boot into safe mode.
Ann a customer, allowed someone else to use her computer, and now some web pages do not display correctly in the browser A technician determines many of the browser settingslive been changed Which of the following Control Panel utilities should the technician useto reset the browser settings to the defaults?
A. System/System Protection
B. Programs and Features
C. Network and Sharing Center
D. Internet Options/Advanced tab
Which of the following operating systems has mandatory update installation built in?
A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10
A technician needs to make changes to a production system. Before doing so, which of thefollowing should be completed in case the changes have unintended consequencesbeyond their original scope?
A. Draft a complete scope of the changes.
B. Formulate a back-out plan for the changes.
C. Ensure all relevant end users are notified of the changes.
D. Create a risk analysis involving the changes.
A technician is working on a computer that has the following symptoms• Unable to access the Internet• Unable to send email• Network connection (limited or no connectivity)The technician runs hardware diagnostics on the computer and verifies the computer's NICis funcboning correctly. The technician attempts to access the Internet and receives themessage: page cannot be displayed. The technician runs a command to verify thecomputer network settings and sees the following informationIP address:192.166.0.100Subnet mask.: 255.255.255.0Gateway: 192.168.0.1DNS: 192.168.0.1The technician confirms other computers on the network can access the Internet. Which ofthe following is MOST likely causing the issues?
A. Rogue antivirus
B. Firewall rule
C. Ransomware
D. Proxy settings
A user’s mobile device has slow data speeds. The user first noticed the slow speeds afterdownloading a largeapplication to the device. The application download MOST likely caused:
A. a hardware issue on the device.
B. the device to run more slowly.
C. the user to exceed the monthly data limit.
D. the device to change to WiFi settings.
The default Windows 7 web browser will not display most websites correctly on a user’sPC. The issue started after the user changed many of the settings, but the user does notremember which settings were altered.Which of the following should a technician use to restore the original configuration?
A. Internet Options
B. Programs and Features
C. Device Manager
D. Network Options
A technician asks a customer who wants to purchase a new computer a series of openended questions. The technician determines the customer wants to use the system mainlyto experiment with cross-platform software development using community-maintained toolsand strongly prefers an open system. Which of the following should the technicianrecommend?
A. Windows OS
B. CentOS
C. Linux OS
D. Mec OS
A technician needs to install Windows 10 on a 4TB hard drive. Which of the followingshould the technician perform to accomplish this task?
A. Format the drive to use exFAT.
B. Configure the drive to use the GPT.
C. Configure the drive to use an MBR.
D. Format the drive to use CDFS.
A company’s computers have continuously been infected with malware. Multiple usershave been bringing in USB flash drives, which they use to work on project while at homeand the office. Which of the following security best practices should a technician implementto minimize exposure with the LEAST amount of impact to the users?
A. Disable AutoRun.
B. Enable data encryption.
C. Restrict user permissions.
D. Configure logon time restrictions
A technician notices a Windows computer is running slowly. The computer boots up slowlyand has long delays when executing large files. The technician runs Disk Cleanup, but theproblem persists Which of the following will MOST likely help speed up the computer?
A. Boot into safe mode.
B. Reboot the computer
C. Defragment the hard drive
D. Install device drivers
A technician receives a security alert stating a vendor has left a Keylogger on certainsystems that shipped configured from the factory. The technician needs to research thesystem model numbers to determine if any production computers are affected. II thetechnician finds vulnerable systems, which of the following is the BEST method to removethe Keylogger?
A. Update all antivirus definitions and run a full scan on all networked computers.
B. Make sure the operating systems on all networked computers are fully patched and upto date
C. Update all software drivers and firmware on all the affected computers.
D. Enable geofiltering on the network firewall to stop unwanted communications.
A user receives the following error message while browsing the Internet on a PC: Theconnection is not private. Upon inspection, a technician discovers the issue only occurs onthe user’s banking website, and the issue can be duplicated on another PC. The function toview the certificate shows it is valid and has yesterday’s date as the expiration. Which ofthe following should the technician do NEXT?
A. Ignore the error and accept the certificate.
B. Report the certificate error to the bank.
C. Download an updated certificate.
D. Stop and restart the certificate services.
E. Reimage the desktop, as it contains malware.
A customer is planning to recycle a computer. The customer wants to ensure any personaldata on the computer is no longer recoverable, but the hardware must will still the beuseable. Which of the following is the BEST method to dispose of the customer’s data?
A. OS reinstallation
B. TPM configuration
C. Low-level format
D. Drive incineration
A user needs to transfer some information from a work computer to a server. The userplugs a personal USB into the computer but is denied access to save information on thestorage medium due to the security policy. This is an example of:
A. port security.
B. an access control list
C. a Trojan horse,
D. data loss prevention
Which of the following operating systems has versions for servers, workstations, andphones?
A. Android
B. iOS
C. Chrome OS
D. Windows
A customer is missing files from the Desktop and Documents folders after logging on to aPC. A technician looks in the Recycle Bin for the items, but nothing is there. Which of thefollowing steps should the technician take NEXT?
A. Disable application startup.
B. Rebuild the user profile.
C. Reinstall the operating system.
D. Disable Update Services.
Which of the following may include the use of a password and a rotating PIN lo access awireless network?
A. RADIUS authentication
B. TKIP authentication
C. Multifactor authentication
D. TACACS authentication
A user is trying to find a file that contains a specific string on a Linux workstation. The userlocates the file and then needs to navigate to another directory to work with it. Which of thefollowing commands should the user enterto accomplish both of these tasks? (Select TWO).
A. grep
B. chmod
C. =rm
D. pwd
E. sudo
F. cd
A technician is setting up a SOHO router for a customer. Per the customer’s requirements,data security is the highest priority. Which of the following provides the MOST security forthe network?
A. Set up encryption for wireless
B. Set up port forwarding.
C. Set static IP addresses.
D. Change the default SSID.
A user's PC has been running slowly. The user says there have been no changes to thePC Which of the following tools should the technician use to troubleshoot the cause of thespeed reduction?
A. DxDiag
B. Windows Memory Diagnostic
C. Performance tab in Task Manager
D. Disk defragmenter
The Chief Executive Officer (CEO) of an organization frequently travels with sensitive dataon a laptop and is concerned the data could be compromised if the laptop is lost or stolen.Which of the following should the technician recommend to BEST ensure the data is notcompromised if the laptop is lost or stolen?
A. Implement strong password policies.
B. Encrypt the hard drive on the laptop.
C. Set up a BIOS password on the laptop.
D. Enable multifactor authentication on the laptop.
A technician is scheduled to upgrade a grocery store's network equipment at 11 00 p.m.There are only a few shoppers in the store, therefore, the store manager wants thetechnician to start the upgrade early Which of the following is the NEXT step the technicianshould perform?
A. Create a back-out plan for the store.
B. Review the change request document
C. Draft the new network diagrams.
D. Get approval from the Change Advisory Board
A user's computer has been performing sluggishly The user reports the computer lakes along time to be ready to use after powering it on A technician decides to use MSConfig toreview the applications that might be causing the slowdown On which of the followingshould the technician focus'? (Select TWO).
A. Startup
B. Disk Defragmenter
C. Windows Updates
D. Services
E. Disk Cleanup
F. Event Viewer