Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Searching for workable clues to ace the CompTIA 220-1102 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 220-1102 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 81

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Full Access
Question # 82

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

A.

Enable multifactor authentication for each support account

B.

Limit remote access to destinations inside the corporate network

C.

Block all support accounts from logging in from foreign countries

D.

Configure a replacement remote-access tool for support cases.

E.

Purchase a password manager for remote-access tool users

F.

Enforce account lockouts after five bad password attempts

Full Access
Question # 83

Which of the following Wi-Fi protocols is the MOST secure?

A.

WPA3

B.

WPA-AES

C.

WEP

D.

WPA-TKIP

Full Access
Question # 84

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

A.

Personalization

B.

Apps

C.

Updates

D.

Display

Full Access
Question # 85

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

A.

Windows updates

B.

DNS settings

C.

Certificate store

D.

Browser plug-ins

Full Access
Question # 86

A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?

A.

RDP

B.

VPN

C.

SSH

D.

MSRA

Full Access
Question # 87

A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue. Which of the following should the technician do before modifying the registry keys?

A.

Update the anti-malware software.

B.

Create a restore point.

C.

Run the PC in sate mode.

D.

Roll back the system updates.

Full Access
Question # 88

Which of the following would most likely be used to extend the life of a device?

A.

Battery backup

B.

Electrostatic discharge mat

C.

Proper ventilation

D.

Green disposal

Full Access
Go to page: