Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102

220-1002 Exam Dumps - CompTIA A+ Certification Exam: Core 2

Go to page:
Question # 25

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server.

Joe has verified he is connected to the Internet.

Which of the following would explain why Joe cannot access his personal shares?

A.

An IP conflict is present

B.

A corporate VPN is enabled

C.

A firewall exception must be set

D.

HomeGroup must be enabled

Full Access
Question # 26

With which of the following types is a man-in-the-middle attack associated?

A.

Brute force

B.

Spoofing

C.

DDoS

D.

Zero-day

Full Access
Question # 27

Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?

A.

Restart the table

B.

Disable and then renewable Bluetooth

C.

Calibrate the touchscreen sensor

D.

Disconnect and then reconnect the stylus

Full Access
Question # 28

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

A.

UPS

B.

Server rack

C.

PoE phone

D.

Desktop printer

E.

Modem

F.

Patch panel

Full Access
Question # 29

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

A.

WPA2

B.

AES

C.

MAC filtering

D.

RADIUS

E.

WPS

Full Access
Question # 30

Which of the following would MOST likely contain troubleshooting guides?

A.

Acceptable use policy

B.

Topology diagram

C.

Knowledge base

D.

Incident documentation

Full Access
Question # 31

A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

A.

Domain name, location, IP address

B.

Domain name, location, asset ID

C.

Asset ID, MAC address

D.

Location, RFID

Full Access
Question # 32

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

A.

Phishing

B.

Spear phishing

C.

Dumpster diving

D.

Impersonation

Full Access
Go to page: