Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Go to page:
Question # 57

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Full Access
Question # 58

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?

    Devices and Printers

A.

Ease of Access

B.

Programs and Features

C.

Device Manager

Full Access
Question # 59

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Select two).

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomware

F.

Spyware

Full Access
Question # 60

A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?

A.

DNS

B.

IPS

C.

VPN

D.

SSH

Full Access
Question # 61

A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?

A.

Disabling UAC

B.

Restricting local administrators

C.

Enabling UPnP

D.

Turning off AutoPlay

Full Access
Question # 62

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

Full Access
Question # 63

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

A.

fdisk

B.

Diskpart

C.

Disk Utility

D.

FileVault

Full Access
Question # 64

A customer is accessing a public kiosk in a company's lobby. Which of the following should be enforced to mitigate the risk of customer data being accidentally saved to the kiosk?

A.

Manually clearing browsing data

B.

Private-browsing mode

C.

Browser data synchronization

D.

Password manager

Full Access
Go to page: