Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102

220-1002 Exam Dumps - CompTIA A+ Certification Exam: Core 2

Go to page:
Question # 73

A user's desktop icons appear much larger than before, and the display colors look unusual A technician runs hardware diagnostics but finds no issues. The system logs show the update service ran last night; however, no new applications were installed. Which of the following is me BEST solution?

A.

Restore the system image

B.

Reinstall the application

C.

Restart the services.

D.

Roll back the device driver

Full Access
Question # 74

A user is having issues with website access. The user is trying to access a site that is used every day by everyone in the company. When the user goes to the site a message appears stating the site is not secure, and the address bar turns red. A technician contains the site is working fine kw everyone else The technician verifies the address was entered correctly but when the message shows up. the address is different than what was typed Which of the following is causing this issue?

A.

Rogue antivirus

B.

Browser redirection

C.

Invalid certificate

D.

Untrusted root CA

Full Access
Question # 75

A technician is attempting to remove a virus from the machine of a user who just retuned from leave. The virus is a known signature that was identified 30 days ago. The antivirus solution the company is using was updated seven days ago with the most current signatures. Which of the following MOST likely allowed the infection?

A.

The last antivirus update the machine received was seven days ago.

B.

The user changed the machine's password 30 days ago.

C.

The user manually killed the antivirus process.

D.

The machine has not received an antivirus update in the past 30 days.

Full Access
Question # 76

Which of the following are method used to prevent an unauthenticated compute from establishing a connection as a node on a corporate network? (Select TWO.)

A.

Port security

B.

Anti-malware

C.

Certificate

D.

IDS

E.

Firewall

F.

Captive portal

Full Access
Question # 77

Ann, a user, is receiving automatic replies from some email addresses she knows and others she does not. Which of the following is happening?

A.

Computer virus

B.

Invalid certificate

C.

Spam email

D.

Hijacked email

Full Access
Question # 78

A user is having network printing issues. The user indicates printing was working fine moments ago, but now there are no printers displayed in Microsoft Word. Which of the following should a technician check FIRST?

A.

The toner volume in the printer

B.

The USB cable from the PC to the printer

C.

The printer driver version

D.

The print spooler service

Full Access
Question # 79

A user visited a website and infected a Windows 10 computer with a virus. A technician troubleshoots the issue, but the virus runs every time the computer is restarted. Which of the following should the technician try NEXT to resolve the issue?

A.

Use Advanced Startup to run a System Image Recovery.

B.

Boot to safe mode and run System File Checker.

C.

Boot to safe mode and run Task Manager.

D.

Use Advanced Startup to run Windows System Restore.

Full Access
Question # 80

An IT manager receives an email from an upset. The customer has been reporting an issue with a computer virus for a weeks. The customer has already put in a support ticket for the issue and left phone messages with IT support requesting an update on when the issue might be fixed, but the customer’s call s has not been returned. The IT manager knows the IT staff is very busy and not purchased ignore the customer. Which of the should the do to address customer’s complaint?

A.

Contact the customer and explain the IT staff a busy. and the customer will have to wait for service.

B.

Contact the customer and attempt to get more details on the issue, and then assign a technician to follow up with the customer.

C.

Contact the customer and attempt to fix the issue without assigning it to a technician.

D.

Contact the customer and recommend that the customer call the IT support desk to troubleshoot the issue.

Full Access
Go to page: