Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102

220-1002 Exam Dumps - CompTIA A+ Certification Exam: Core 2

Go to page:
Question # 89

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

A.

netstat

B.

net use

C.

nslookup

D.

ping

Full Access
Question # 90

When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues The network administrator notices abnormally high network utilization Which of the following is the MOST likely issue the company is experiencing?

A.

Malware infection

B.

Rogue antivirus

C.

Browser redirection

D.

OS update failures

Full Access
Question # 91

company's website is responsible for the theft of customer credit card numbers. An investigation determined private keys for certificates were stolen, allowing attackers to decrypt traffic between clients and the website. Which of the following types of attacks does this describe?

A.

Man-in-the-middle

B.

Keylogger

C.

Zero-day ®

D.

Brute force

Full Access
Question # 92

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?

A.

macOS

B.

Windows

C.

Linux

D.

Chrome

Full Access
Question # 93

Which of the following is the MOST common method of allowing outside access through a wireless SOHO router for specific program access?

A.

Enabling port forwarding

B.

Creating a content filter whitelist

C.

Increasing radio power levels

D.

Properly placing access points

Full Access
Question # 94

A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software Which of the following would be MOST important during this phase of the request process?

A.

Back-out plan

B.

End-user acceptance

C.

Risk analysis

D.

Test plan

Full Access
Question # 95

Which of the following must be enabled to configure 20 new machines to be booted over a network?

A.

Multi-boot

B.

Dynamic

C.

PXE

D.

GPT

Full Access
Question # 96

A company wants to move the contents of its users’ My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?

A.

Organizational units

B.

Folder redirection

C.

Group Policy

D.

Login script

Full Access
Go to page: