Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 25

A user identified that a program installed in a workstation does not have optional features enabled. Which of the following must the technician do to install the optional features?

A.

Goto Programs andFeatures, uninstall the program, and reinstallit.

B.

Goto AdministrativeTools and edit System Configuration.

C.

Goto AdministrativeTools and run Disk Cleanup.

D.

Goto Programs andFeatures, select the program, and click onChange.

Full Access
Question # 26

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Full Access
Question # 27

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

Which of the following should be done NEXT?

A.

Educate the user on the solution that was performed.

B.

Tell the user to take time to fix it themselves next time.

C.

Close the ticket out.

D.

Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Full Access
Question # 28

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

A.

Biometric lock

B.

Badge reader

C.

USB token

D.

Video surveillance

E.

Locking rack

F.

Access control vestibule

Full Access
Question # 29

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

A.

Prevent a device root

B.

Disable biometric authentication

C.

Require a PIN on the unlock screen

D.

Enable developer mode

E.

Block a third-party application installation

F.

Prevent GPS spoofing

Full Access
Question # 30

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

A.

Language

B.

System

C.

Personalization

D.

Ease of Access

Full Access
Question # 31

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

A.

Network and Sharing Center

B.

net use

C.

User Accounts

D.

regedit

E.

Group Policy

Full Access
Question # 32

A customer needs to verify an executable file that the customer downloaded from a website. Which of the following should the customer use to verify the file?

A.

Password manager

B.

BitLocker

C.

FileVault

D.

Checksum

E.

Secure site

Full Access
Go to page: