Exam Details

  • Exam Code
    :220-1102
  • Exam Name
    :CompTIA A+ Certification Exam: Core 2
  • Certification
    :CompTIA A+
  • Vendor
    :CompTIA
  • Total Questions
    :718 Q&As
  • Last Updated
    :May 13, 2024

CompTIA CompTIA A+ 220-1102 Questions & Answers

  • Question 471:

    A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network.

    Which of the following BEST describes what the systems administrator should tell the user?

    A. Use the application only on the home laptop because it contains the initial license.

    B. Use the application at home and contact the vendor regarding a corporate license.

    C. Use the application on any computer since the user has a license.

    D. Use the application only on corporate computers.

  • Question 472:

    A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems.

    Which of the following is the MOST effective method for dealing with this Issue?

    A. Adjusting the spam gateway

    B. Updating firmware for the spam appliance

    C. Adjusting AV settings

    D. Providing user training

  • Question 473:

    Which of the following is the STRONGEST wireless configuration?

    A. WPS

    B. WPA3

    C. WEP

    D. WMN

  • Question 474:

    A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

    A. Use a network share to share the installation files.

    B. Save software to an external hard drive to install.

    C. Create an imaging USB for each PC.

    D. Install the software from the vendor's website

  • Question 475:

    A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware.

    Which of the following will MOST likely help to permanently remove the malware?

    A. Enabling System Restore

    B. Educating the user

    C. Booting into safe mode

    D. Scheduling a scan

  • Question 476:

    Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell.

    Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

    A. Restore the device to factory settings.

    B. Uninstall the unapproved application.

    C. Disable the ability to install applications from unknown sources.

    D. Ensure the device is connected to the corporate WiFi network.

  • Question 477:

    A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines.

    Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

    A. UEFI password

    B. Secure boot

    C. Account lockout

    D. Restricted user permissions

  • Question 478:

    An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?

    A. Perform a risk analysis.

    B. Implement the deployment.

    C. Verify end user acceptance

    D. Document the lessons learned.

  • Question 479:

    A network technician installed a SOHO router for a home office user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks.

    Which of the following can the technician MOST likely do to defend against this threat?

    A. Add network content filtering.

    B. Disable the SSID broadcast.

    C. Configure port forwarding.

    D. Change the default credentials.

  • Question 480:

    A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Choose two.)

    A. Implementing data-at-rest encryption

    B. Disabling AutoRun

    C. Restricting user permissions

    D. Restricting log-in times

    E. Enabling a screen lock

    F. Disabling local administrator accounts

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1102 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.