Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102

220-1002 Exam Dumps - CompTIA A+ Certification Exam: Core 2

Go to page:
Question # 81

A technician performed some maintenance on a server via remote desktop and needs to restart the machine to apply the changes. The restart command is not available on the Start menu. Which of the following commands can the technician use to initiate an immediate restart?

A.

Shutdown /s /t 0

B.

Shutdown /t

C.

Shutdown /r /t 10

D.

Shutdown /t /t 0

Full Access
Question # 82

A technician is securing a Linux workstation. One of the requirements is to remediate cleartext|passwords on the local system. Which of the following steps should the technician perform to BEST meet this requirement?

A.

Ensure the /etc/hosts file is used on the system.

B.

Ensure the /ete/shadow file is used on the system.

C.

Ensure the /et¢/passwd file is used on the system.

D.

Ensure the /etc/httpd file is used on the system.

Full Access
Question # 83

A technician is trying to repair a computer that was infected with an encrypting virus. After disconnecting the system from the network, the technician images the computer. Upon startup, the system consistently presents a blue screen at the Windows logo. Which of the following should the technician perform NEXT to resolve the issue?

A.

Perform a BIOS'UEFI update

B.

Execute a clean install of the OS

C.

Check the boot mode of the computer

D.

Apply a different workstation image

Full Access
Question # 84

An administrator is creating a new user account and wants to grant access to only the resources required to perform the user's assigned job duties. Which of the following will the administrator MOST likely use?

A.

Access control lists

B.

Multifactor authentication

C.

Directory permissions

D.

Principle of least privilege

Full Access
Question # 85

A technician is working on an infected computer After running a scan and removing the malicious software, only one issue remains. When opening up the browser, it is redirected to an unwanted site The technician checks the home page settings, and they are correct. The technician types the home page address in the browser, and it is still redirected. Which of the following does the technician need to edit to resolve this issue?

A.

MSConfig

B.

Registry

C.

Hosts file

D.

boot.ini

Full Access
Question # 86

An end user who travels frequently receives a lot of spam and ransomware emails. The user has asked a technician to help ensure the data is secure and duplicated regularly without the need for equipment. Which of the following would be the BEST method?

A.

Account recovery

B.

Local restore point

C.

Cloud storage

D.

File-level encryption

Full Access
Question # 87

The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.

Which of the following would be the MOST secure solution to this error?

A.

Add Ann to the local Power Users group

B.

Set the software to save to the %APPDATA% folder

C.

Add Ann to the local administrator group

D.

Give Ann write access to C:\Program Files\

E.

Give Ann permission to elevate her permissions through a UAC prompt

Full Access
Question # 88

Which of the following standards controls the processing of credit cards?

A.

PCI

B.

PHI

C.

PGP

D.

PII

Full Access
Go to page: