post page top logo

Refreshed 2022 - CompTIA A+ (Plus) 220-1002 Exam Dumps with free 220-1002 (Core 2) Practice Exam Questions.

Practice on 2022 updated CompTIA A+ (Plus) 220-1002 Core 2 Dumps offered by Certspilot, Our free practice questions will help you in preparation for your CompTIA A+ Exam. You can Download a Complete set of CompTIA 220-1002 Dumps from our site, Our 220-1002 PDF contains real exam questions with verified answers and detailed explanations of each answer which help you in understanding the concepts of exam. Learn more about here CompTIA certification Roadmap.

Our below Practice questions will help you in passing your 220-1002 exam on the first attempt.

CompTIA A+ (Plus) 220-1002 Free Dumps Are below let Practice on Free Updated 220-1002 Practice exam.

1. A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?

2. A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive.

 

Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

3. Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link.

 

This email is BEST described as:

4. A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:

 

There are 1033 infected files on this computer. Click here to disinfect.

 

The link is blocked by the corporate content filter and displays a message stating the site contains known malware.

 

Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

 

5. A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:

 

There are 1033 infected files on this computer. Click here to disinfect.

 

The link is blocked by the corporate content filter and displays a message stating the site contains known malware.

 

Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

 

6. A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email.

 

Which of the following is MOST likely causing the missing folders issue?

7. During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade.

 

Which of the following plans must be implemented to revert back to the most recent version of the firmware?

8. An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement.

 

Which of the following should the technician do NEXT?

9. Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

10. A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization.

 

Which of the following security concepts has the company just enabled?

11. A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?

12. A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website.

 

Which of the following should the technician do NEXT?

13. A user calls a technician to report issues when logging in to a vendor’s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user’s office.

The user also informs the technician of strange pop-up notifications.

 

Which of the following are the MOST likely causes of these issues? (Choose two.)

14. Which of the following BEST describes the purpose of an ESD mat?

15. Which of the following is a reason to use WEP over WPA?

16. When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists.

 

Which of the following troubleshooting steps should the technician complete NEXT?

17. Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

18. Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joe’s phone and sees the following:

Which of the following is the MOST likely cause of the

19. A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the “My Documents” folder is empty, and personal settings are reset.

 

Which of the following would be required to resolve the issue?

20. A technician accessed a network share from a computer joined to workgroup. The technician logged in as “user1” and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the “user1” account.

 

Which of the following would allow the technician to log in using the “administrator” username?

21. A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop.

 

Which of the following is the most likely NEXT step?

22. Which of the following user types should be used in a Windows environment to grant Internet access without

 

220-1002

 

 

allowing the permanent storage of files on the system?

23. A company has just experienced a data breach that affected all mobile devices.

 

Which of the following would BEST secure access to user’s mobile devices? (Choose two.)

24. A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory.

 

Which of the following should the technician use to accomplish this?

25. A technician logs on to a Linux computer and runs the following command:

 

ps -aux | grep vi

 

220-1002

 

 

 

Which of the following MOST accurately describes the effect of the command?

 

26. A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user attempts to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error.

 

Which of the following should the technician do NEXT? (Choose two.)

27. A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error.

 

Which of the following tools should the technician use?

28. Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation.

 

Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

29. A technician is repairing a computer.

 

Which of the following should the technician do to protect the computer from accidental voltage spikes?

30. Which of the following would MOST likely contain troubleshooting guides?

31. A systems administrator needs to add security to the server room.

 

Which of the following would provide the BEST security for the room? (Choose two.)

32. A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.

 

Which of the following should the network administrator do NEXT?

33. Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?

34. Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?

35. A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message. Which of the following is causing the error?

36. A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files.

 

Which of the following is the BEST method to implement to prevent any data loss for the sales representative?

37. A technician is contacted by a user who is working from home but is unable to connect to any office resources (e.g., files, printers). The user is able to access the Internet.

 

Which of the following should the technician check FIRST?

38. A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.

 

Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

39. A user’s mobile device is losing its battery charge very quickly. The user reports a 90% charge at 9:00 a.m., but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is a relatively new, high-end phone. The user claims most of the usage involves checking emails for a few minutes three or four times per hour.

 

Which of the following should a technician perform FIRST to diagnose the issue properly?

40. A customer’s computer is having difficulty opening programs and regularly receives error messages regarding low system resources. Which of the following performance setting changes would BEST help the customer temporarily until a proper upgrade can be made?

41. Which of the following is a community-supported, open-source OS used for both servers and workstations?

42. Joe, a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

43. A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue?

44. Which of the following types of scripts would be seen on the user end of a web page?

45. Which of the following can be applied directly to an organizational unit in Active Directory to provide security to both the user and the machine?

46. A user’s personal settings are not saving, and a technician suspects the user’s local Windows profile is corrupt. The technician wants to check the size of the ntuser.dat file, but it does not appear in the user’s profile directory. Which of the following Control Panel utilities should the technician use to correct this?

47. Which of the following file types should be opened when executing a PowerShell script?

48. Which of the following must be enabled to configure 20 new machines to be booted over a network?

49. A customer is pressuring a project manager to get things done on time. Which of the following has the project manager failed to do in this case?

50. An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).

51. Which of the following BEST describes the Guest account on a Windows system?

52. A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).

53. A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?

54. A customer’s computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?

55. A technician wants to deploy a solution to manage a computer remotely. The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices. Which of the following remote access technologies would be BEST suited for this situation?

56. A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?

57. Which of the following is the memory limitation of a 32-bit OS?

58. The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

 

Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.

 

Which of the following would be the MOST secure solution to this error?

59. A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?

60. Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

61. A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

62. A technician is called to troubleshoot a user’s Windows workstation that fails to boot. The user reports that, after updating the workstation’s graphics driver to a beta version, the machine gives a “Stop” error on every boot. Which of the following should the technician complete to resolve the issue?

63. While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user’s BEST option given the situation?

64. A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

65. A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)

66. Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

67. Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

68. A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic.

 

Which of the following is MOST likely causing the high resource usage?

69. Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user’s computer.

 

Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

70. A technician is cleaning up a warehouse and has several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.

 

Which of the following should the technician do NEXT to proceed with disposal of the batteries?

71. A technician is cleaning up a warehouse and has several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.

 

Which of the following should the technician do NEXT to proceed with disposal of the batteries?

72. While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user’s BEST option given the situation?

73. A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

74. A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)

75. Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

76. Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

77. A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic.

 

Which of the following is MOST likely causing the high resource usage?

78. Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user’s computer.

 

Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

79. Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user’s computer.

 

Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

80. A technician is cleaning up a warehouse and has several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.

 

Which of the following should the technician do NEXT to proceed with disposal of the batteries?

81. Ann, an external user, has received several calls from a company asking why she has been sending the company communications with internal users’ names in the “from field”. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.

 

Which of the following should the technician check NEXT?

82. Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.

 

Which of the following Control Panel utilities can Joe use to help with this situation?

83. A technician is working on a virtual server migration project. The technician has already completed the SOW; however, the servers will not work without a critical network configuration that was missed in the original SOW. The technician needs to make the adjustments quickly.

 

Which of the following best practice processes should the technician perform NEXT?

84. Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.

 

Which of the following would be the BEST resolution to Ann’s issue?

85. Which of the following should be enacted to reduce a company’s liability and exposure to a potential lawsuit?

86. Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.

 

Which of the following is MOST likely the cause?

87. A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

88. A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

89. A Linux user reports that an application will not open and gives the error. Only one instance of the application may run at one time. A root administrator logs on to the device and opens a terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running?

90. A technician responds to a report that a user’s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

91. Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot. A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here” button to resolve it. There is a timer in the pop-up, counting down the time until the computer is no longer usable.

 

Which of the following should the technician do NEXT?

92. Which of the following NTFS security settings overrides all other settings?

93. A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 is very high, while inbound network traffic is low. Which of the following tasks should be done FIRST?

94. A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user’s laptop is currently using the corporate network for access to network resources as well as the cloud. Which of the following should the help desk recommend performing prior to using the hotel network?

95. An executive has contacted you through the help-desk chat support about an issue with a mobile device. Assist the executive to help resolve the issue.

INSTRUCTIONS

Select the MOST appropriate statement for each response.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button

Let’s take a look at your phone settings

Please change the port number on your mail settings to 993.

Which of the following should be done NEXT?

96. A Windows 7 machine appears to have a failure. Every time it is rebooted, the message “BOOTMGR is missing” appears.

You have previously inserted a Windows 7 installation DVD into the DVD-ROM.

Please repair this failure without overwriting the customers’ local user profiles. INSTRUCTIONS

Use the Windows recovery and repair utilities to remediate the issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

                                                                                                    

97. A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following settings must be enabled to make this possible?

98. The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable. Which of the following methods should the technician use to meet the requirement?

99. A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account?

100. A company needs to destroy several SSDs that contain sensitive information. Which of the following methods is BEST suited for the total destruction of the SSDs?

101. Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some websites, and web services are not responding from any of the web browsers, although Joe can access these services from his smartphone without issue. The computer’s malware scanner has the latest definitions installed. Which of the following would BEST explain why the computer is functioning this way?

102. Which of the following is protected data that can be found in a medical record?

103. A network support technician takes a call from an office manager who wants to change the wireless security key on the access point in that particular office. The office manager explains that a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect securely to the access point to make the change?

104. A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the

following command line tools should the technician use to check these files?

105. What a user is allowed to do on a computer network would be addressed in:

106. A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

107. A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which of the following should the user check to troubleshoot the cause of the issue?

108. Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?

109. A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which of the following should the technician monitor during the installation?

110. A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?

111. An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work. Which of the following is the BEST solution for the technician to recommend?

112. Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

113. A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?

114. Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the Internet?

115. A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?

116. Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

117. Which of the following key and mouse combinations can be used to run an application as a different user?

118. The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?

119. A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

120. Which of the following variable types should be used to store the data “Chicago” within a script or code?

121. A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

122. A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?

123. A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)

124.


 

Download full version

Related Exams

Are Splunk certifications worth it?

Splunk is a popular software platform used for searching, analyzing, and visualizing machine-generated data. It’s commonly used in fields such as IT, security, and finance to help organizations make data-driven decisions. One way to increase

About The Author

Certspilot

Certspilot is a platform where you can get to access to free Practice test questions for all IT certification like Microsoft, AWS, CompTIA, Salesforce, Cisco, CISSP and others certifications exam, you can download Updated and Valid Exam Dumps in PDF format and prepare yourself for certification exam in very short time. If you have any other question or need assistance regarding to your certification exam, click on Live Chat Icon and get in touch with our customer support agent, we are available 24/7 for customer support or send email at
[email protected].

Leave a Comment