Last Updated on July 1, 2021 by InfraExam
220-1002 : CompTIA A+ Certification Exam: Core 2 : Part 09
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).
- MAC filtering
- Default SSID
- Radio power levels
- Content filtering
- Physical security
A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?
A customer’s computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?
A technician wants to deploy a solution to manage a computer remotely. The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices. Which of the following remote access technologies would be BEST suited for this situation?
- Remote desktop protocol
- Telnet client
- Virtual network computer
- Third-party tools
- Secure shell
A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?
- Task Scheduler
- Device Manager
- Drive Status
Which of the following is the memory limitation of a 32-bit OS?
The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:
Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.
Which of the following would be the MOST secure solution to this error?
- Add Ann to the local Power Users group
- Set the software to save to the %APPDATA% folder
- Add Ann to the local administrator group
- Give Ann write access to C:\Program Files\
- Give Ann permission to elevate her permissions through a UAC prompt
A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?
- Zero-day malware
- Safari code injection
- OS corruption
- Time sync failure
Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)
- Email filtering
A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?
- Check for and apply software updates
- Perform repair installation on the application
- Add the user to the local administrators group
- Rebuild the user’s mail profile
A technician is called to troubleshoot a user’s Windows workstation that fails to boot. The user reports that, after updating the workstation’s graphics driver to a beta version, the machine gives a “Stop” error on every boot. Which of the following should the technician complete to resolve the issue?
- Boot the workstation in safe mode and disable the graphics driver system tray menu
- Boot the workstation in safe mode with networking and install the latest stable graphics driver
- Boot the workstation in safe mode and disable Windows driver signing requirements
- Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user’s BEST option given the situation?
- Install to a network drive
- Install to a USB drive
- Install to a DVD-RW
- Install to a secondary internal HDD
A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?
- Component Services
- System Configuration
- Security Policy
- Local Users and Groups
A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)
- Risk analysis
- End-user acceptance
- Backout plan
- Plan for change
- Business processes
- Request for proposal
Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?
- Contact his supervisor so the supervisor can make scheduling changes.
- Move the appointments to the next business day.
- Reach out to a colleague to assist in completing the jobs.
- Continue to work on the current call, and get to the other as soon as possible.
Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?
- Windows 7
- Windows 8
- Windows 8.1
- Windows 10
A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic.
Which of the following is MOST likely causing the high resource usage?
- A keylogger is running
- The computer is part of a botnet
- The computer is receiving a DDoS attack
- A software firewall is blocking traffic
Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user’s computer.
Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
- Educate the end user on safe browsing and email habits.
- Scan and remove the malware from the infected system.
- Create a system restore point and reboot the system.
- Schedule antivirus scans and perform Windows updates.
A technician is cleaning up a warehouse and has several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.
Which of the following should the technician do NEXT to proceed with disposal of the batteries?
- Place securely in trash receptacles.
- Refer to the manufacturer’s specific usage.
- Review the material safety data sheet.
- Conduct an Internet search of disposal techniques.
Ann, an external user, has received several calls from a company asking why she has been sending the company communications with internal users’ names in the “from field”. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.
Which of the following should the technician check NEXT?
- Hijacked email
- DNS entries
- Hosts file
- POP3 errors