Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 73

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

A.

Screened subnet

B.

Firewall

C.

Anti-phishing training

D.

Antivirus

Full Access
Question # 74

A remote user is experiencing issues connecting to a corporate email account on a laptop. The user clicks the internet connection icon and does not recognize the connected Wi-Fi. The help desk technician, who is troubleshooting the issue, assumes this is a rogue access point. Which of the following is the first action the technician should take?

A.

Restart the wireless adapter.

B.

Launch the browser to see if it redirects to an unknown site.

C.

Instruct the user to disconnect the Wi-Fi.

D.

Instruct the user to run the installed antivirus software.

Full Access
Question # 75

Which of the following ensures data is unrecoverable on a lost or stolen mobile device?

A.

Device encryption

B.

Remote wipe

C.

Data backup

D.

Fingerprint reader

Full Access
Question # 76

A technician has verified that a user's computer has a virus and the antivirus software is out of date. Which of the following steps should the technician take next?

A.

Quarantine the computer.

B.

Use a previous restore point.

C.

Educate the end user about viruses.

D.

Download the latest virus definitions.

Full Access
Question # 77

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

A.

SSH

B.

VNC

C.

VPN

D.

RDP

Full Access
Question # 78

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?

A.

Access control list

B.

Multifactor authentication

C.

Least privilege

D.

Mobile device management

Full Access
Question # 79

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Full Access
Question # 80

Which of the following is the weakest wireless security protocol?

A.

WEP

B.

WPA2

C.

TKIP

D.

AES

Full Access
Go to page: