Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 113

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Full Access
Question # 114

Which of the following best describes a rollback plan?

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Full Access
Question # 115

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

A.

Internal antenna connections

B.

Static IP settings

C.

Airplane mode

D.

Digitizer calibration

Full Access
Question # 116

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Full Access
Question # 117

A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?

A.

Requiring four character types

B.

Decreasing the password expiration times

C.

Enabling an automatic lock timer

D.

Adding two characters to the minimum password length

Full Access
Question # 118

Which of the following operating systems is most commonly used in embedded systems?

A.

Chrome OS

B.

macOS

C.

Windows

D.

Linux

Full Access
Question # 119

Which of the following is the MOST basic version of Windows that includes BitLocker?

A.

Home

B.

pro

C.

Enterprise

D.

Pro for Workstations

Full Access
Question # 120

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

A.

Consoltf

B.

Disk Utility

C.

Time Machine

D.

FileVault

Full Access
Go to page: