New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 89

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

A.

Regression

B.

Cloud

C.

Production

D.

Sandbox

Full Access
Question # 90

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Full Access
Question # 91

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Full Access
Question # 92

A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?

A.

Port forwarding

B.

Unused ports

C.

SSID broadcast

D.

Allow list

Full Access
Question # 93

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?

A.

Investigate the reported symptoms.

B.

Run anti-malware software.

C.

Educate the user about dangerous links.

D.

Quarantine the workstation.

Full Access
Question # 94

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

A.

Move the application to the desktop and press delete

B.

Identify the application in Finder and drag it to the trash can.

C.

Use Spotlight to search for the application, and then run the application.

D.

Use Time Machine to go back to the date before the installation.

Full Access
Question # 95

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

A.

Cross-site scripting

B.

SQL injection

C.

Brute-force attack

D.

DDoS attack

Full Access
Question # 96

A technician needs to implement password requirements that apply to all domain-joined computers. Which of the following commands should the technician most likely run?

A.

gpugdate

B.

devmgmt

C.

regedit

D.

resmon

Full Access
Go to page: