Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 89

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

A.

Configure the firewall.

B.

Restore the system from backups.

C.

Educate the end user

D.

Update the antivirus program.

Full Access
Question # 90

When a user is browsing a website on a smartphone, a pop-up appears. The pop-up states that the system has been breached and directs the user to an application to resolve the breach. Which of the following should the user do?

A.

Close the website and ignore the pop-up

B.

Replace the smartphone

C.

Download and install the application to resolve the issue

D.

Analyze the smartphone to find the source of the breach

Full Access
Question # 91

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

A.

Remote wipe

B.

Firewall

C.

Device encryption

D.

Remote backup

E.

Antivirus

F.

Global Positioning System

Full Access
Question # 92

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

A.

Acceptable use policy

B.

Security protocols

C.

Data flow diagram

Full Access
Question # 93

Which of the following security threats requires a phone call to launch the attack?

A.

Vishing

B.

XSS

C.

Spoofing

D.

DDoS

Full Access
Question # 94

Which of the following is a situation in which a surge suppressor is considered critical?

A.

The electrical source is not grounded.

B.

A device requires 220V or higher.

C.

A device is being turned on for the first time.

D.

The electrical source is near high humidity.

Full Access
Question # 95

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

A.

ipconfig

B.

arp

C.

nslookup

D.

pathping

Full Access
Question # 96

Which of the following languages is used for scripting the creation of Active Directory accounts?

A.

Bash

B.

SQL

C.

PHP

D.

PowerShell

Full Access
Go to page: