Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102

220-1002 Exam Dumps - CompTIA A+ Certification Exam: Core 2

Go to page:
Question # 49

A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with a yellow warning graphic. This icon advises the user that:

A.

BitLocker is operating on the system but not for the user

B.

BitLocker has locked the drive, and it is no longer accessible

C.

BitLocker is suspended, and the drive is no longer encrypted

D.

BitLocker has encountered an error and the user should run the check disk utility.

Full Access
Question # 50

A technician was alerted by IT security of a potentially infected desktop, which is at a remote location The technician will arrive on site after one hour Which of the following steps should be performed prior to traveling to prevent further infection'' (Select TWO).

A.

Start system updates.

B.

Backup PC data

C.

Run antivirus

D.

Install the firewall.

E.

Turn off System Restore

F.

Install a keylogger

Full Access
Question # 51

Ann. a network engineer is performing an after-hours upgrade on a network switch During the activity. Ann notices an unrelated setting she believes is misconfigured She decides to change the setting during the upgrade which causes an outage. Which of the following change management practices would MOST likely have prevented this outage?

A.

Risk analysis

B.

Change board approval

C.

Scoping the change

D.

End-user acceptance

Full Access
Question # 52

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

A.

Process diagram

B.

Physical network diagram

C.

Fiber backbone diagram

D.

Logical topology diagram

Full Access
Question # 53

A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.

Which of the following should the technician do NEXT to proceed with disposal of the batteries?

A.

Place security In trash receptacles

B.

Refer to the manufacture’s specific usage

C.

Review the material safety data sheet

D.

Conduct an Internal search of disposal techniques

Full Access
Question # 54

A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)

A.

Reset the user’s browser to default settings

B.

Delete the user’s cached images, temporary files, and cookies

C.

Reboot the user’s computer and install a secondary antivirus

D.

Convince the user to use a different web browser that is currently unaffected

E.

Download the update to the user’s web browser of choice

F.

Remove any unapproved applications from the user’s startup items

Full Access
Question # 55

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.

Which of the following actions should be taken to close the vulnerability? (Select two.)

A.

Disable guest account

B.

Remove admin permissions

C.

Modify AutoRun settings

D.

Change default credentials

E.

Run OS security updates

F.

Install a software firewall

Full Access
Question # 56

A technician is setting up a new laptop for a doctor to take to a conference. The laptop contains private health information, and the technician needs to ensure the laptop is protected from unauthorized access in case it us lost or stolen. Which of the following the technician implement the BEST meet this requirement? (Select TWO.)

A.

UEFI password

B.

Privacy screen protector

C.

Login time restrictions

D.

User account restrictions

E.

Password expiration

F.

Full disk encryption

Full Access
Go to page: