Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Searching for workable clues to ace the CompTIA 220-1102 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 220-1102 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 177

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

A.

Trojan

B.

Rootkit

C.

Cryptominer

D.

Keylogger

Full Access
Question # 178

A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?

A.

Changing the office's Wi-Fi SSID and password

B.

Performing a remote wipe on the device

C.

Changing the user's password

D.

Enabling remote drive encryption

Full Access
Question # 179

The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves around. Which of the following should a technician perform to troubleshoot the issue?

A.

Verify the Wi-Fi connection status.

B.

Enable the NFC setting on the device.

C.

Bring the device within Bluetooth range.

D.

Turn on device tethering.

Full Access
Question # 180

Which of the following is used as a password manager in the macOS?

A.

Terminal

B.

FileVault

C.

Privacy

D.

Keychain

Full Access
Question # 181

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Full Access
Question # 182

Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).

A.

Multifactor authentication

B.

Badge reader

C.

Personal identification number

D.

Firewall

E.

Motion sensor

F.

Soft token

Full Access
Question # 183

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

A.

apt-get

B.

CIFS

C.

Samba

D.

greP

Full Access
Question # 184

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Full Access
Go to page: