Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102

220-1002 Exam Dumps - CompTIA A+ Certification Exam: Core 2

Go to page:
Question # 33

A help desk technician receives a call from a user who is experiencing a recurring issue. The user complains and demands an immediate, permanent resolution. Which of the following

actions should the technician take NEXT?

A.

Review all existing case notes from previous calls and restate the issue.

B.

Apologize for the inconvenience and then escalate the call to a supervisor.

C.

Ask the user to walk through each step taken that created the issue.

D.

Establish a theory of probable cause based on what the user reported.

Full Access
Question # 34

A technician is working on an infected computer that is currently turned off. The technician is concerned the boot sector is affected. Which of the following is the BEST method for the technician to use to scan the boot sector?

A.

Mount the drive using a forensic platform

B.

Boot into safe mode

C.

Boot to last known good configuration

D.

Boot the drive in another computer.

Full Access
Question # 35

A user installs a flashlight application on a phone. The user later discovers this application was stealing users' data files, pictures, call history, and other private information The user wants to prevent this from happening in the future. Which of the following would BEST prevent this from reoccurring?

A.

Only install applications that request appropriate permissions

B.

Only install applications made by large and well-known companies

C.

Install an antivirus on the mobile OS.

D.

Use a mobile device manager to increase security on the phone.

Full Access
Question # 36

A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

A.

Download and apply the security patch that addresses the vulnerability that was exploited

B.

Use System Restore to bring the PC back to a previous restore point.

C.

Reimage the computer and update it with all the latest patches

D.

Download another antivirus software that will quarantine the virus.

Full Access
Question # 37

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.

Which of the following would be the BEST resolution to Ann’s issue?

A.

Restart the tablet.

B.

Disable and then reenable Bluetooth.

C.

Calibrate the touchscreen sensor.

D.

Disconnect and then reconnect the stylus.

Full Access
Question # 38

A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes?

A.

Terminal

B.

Disk maintenance

C.

iCloud

D.

Image recovery

Full Access
Question # 39

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.)

A.

Image deployment

B.

Multiboot

C.

PXE

D.

Unattended installation

E.

USB

F.

Wake-on-LAN

Full Access
Question # 40

A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

A.

Run a virus scan with updated signature files

B.

Uninstall any unknown browser extensions or add-ons

C.

Install the latest version of the Internet browser

D.

Enable SSL 3.0 in the browser settings

E.

Delete all unknown registry keys and reboot

Full Access
Go to page: