Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 217

A user is unable to see the devices that are present on the network after changing some network settings in the Control Panel. Which of the following settings did the user change on the Windows 10 computer?

A.

The network type from private to public

B.

The Windows Firewall from on to off

C.

The UAC level to its highest level

D.

The file-sharing permissions

Full Access
Question # 218

Which of the following commands should be used to display current processor activity on a Linux workstation?

A.

top

B.

ls

C.

procmon

D.

taskmgr

Full Access
Question # 219

A technician is investigating a workstation that has not received the latest policy changes. Which of the following commands should the technician use to apply the latest domain policy changes?

A.

sfc /scannow

B.

gpupdare /force

C.

chkdsk /y

D.

xcopy Zp

Full Access
Question # 220

A technician is configuring security for a computer that is located in a common area. A sign above the computer indicates only authorized users can use the computer. Guests visiting the office must walk past the computer to enter and leave the office. Which of the following will offer the best protection against physical threats?

A.

Using screen lock

B.

Installing a privacy screen

C.

Implementing password complexity

D.

Locking the computer case

E.

Enabling drive encryption

Full Access
Question # 221

A technician is helping a customer connect to a shared drive. The technician notices some unused drives that have already been mapped and wants to disconnect those drives first. Which of the following commands should the technician use?

A.

format

B.

netstat

C.

diskpart

D.

net use

E.

rmdir

Full Access
Question # 222

A technician needs to configure a backup solution that will have the least additional expenses and impact on users. Which of the following steps should the technician complete? (Select two.)

A.

Configure the backup to run when the user logs in

B.

Configure the backup to run after peak hours

C.

Use third-party licensed backup software

D.

Use the built-in OS backup utility

E.

Configure the backup job to run every hour

F.

Use an external storage device for the backup

Full Access
Question # 223

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do next?  

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate policies for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.  

Full Access
Question # 224

A user's home system has been infected with malware. A technician has isolated the system from the network and disabled System Restore. Which of the following should the technician do next?

A.

Perform an antivirus scan.

B.

Run Windows updates.

C.

Reimage the system.

D.

Enable System Restore.

Full Access
Go to page: