New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 113

Which of the following ensures data is unrecoverable on a lost or stolen mobile device?

A.

Device encryption

B.

Remote wipe

C.

Data backup

D.

Fingerprint reader

Full Access
Question # 114

An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?

A.

Smart card

B.

Biometrics

C.

Hard token

D.

One-time password

Full Access
Question # 115

An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?

A.

Scan all of the infected files with up-to-date, anti-malware cleaning software.

B.

Fully patch the server operating systems hosting the fileshares.

C.

Change the files to be read-only.

D.

Restore critical data from backup.

Full Access
Question # 116

A technician assigns the equivalent of root-level permissions to a user to perform a task. Which of the following user roles within the Windows OS should the technician choose?

A.

Power

B.

Default

C.

Administrator

D.

Superuser

Full Access
Question # 117

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?

A.

NIC

B.

USB

C.

GPU

D.

HDMI

Full Access
Question # 118

An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

A.

Spyware is redirecting browser searches.

B.

A cryptominer is verifying transactions.

C.

Files were damaged from a cleaned virus infection.

D.

A keylogger is capturing user passwords.

Full Access
Question # 119

Which of the following Is a package management utility for PCs that are running the Linux operating system?

A.

chmod

B.

yum

C.

man

D.

grep

Full Access
Question # 120

A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?

A.

Disabling UAC

B.

Restricting local administrators

C.

Enabling UPnP

D.

Turning off AutoPlay

Full Access
Go to page: