CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Online Training
CompTIA 220-1002 Online Training
The questions for 220-1002 were last updated at Jan 07,2025.
- Exam Code: 220-1002
- Exam Name: CompTIA A+ Certification Exam: Core 2
- Certification Provider: CompTIA
- Latest update: Jan 07,2025
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.
Which of the following built-in utilities should be used?
- A . Time Machine
- B . Snapshot
- C . System Restore
- D . Boot Camp
Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.
Which of the following Control Panel utilities can Joe use to help with this situation?
- A . Credential Manager
- B . Network and Sharing Center
- C . Security and Maintenance
- D . Troubleshooting
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
- A . WPA2
- B . AES
- C . MAC filtering
- D . RADIUS
- E . WPS
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns.
Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)
- A . Default SSID
- B . MAC filtering
- C . NAT
- D . QoS
- E . Signal strength
- F . Encryption
A user calls a technician to report issues when logging in to a vendor’s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user’s office. The user also informs the technician of strange pop-up notifications.
Which of the following are the MOST likely causes of these issues? (Choose two.)
- A . System files have been deleted
- B . Proxy settings are configured improperly
- C . The OS has been updated recently
- D . There are disabled services on the vendor website
- E . Program file permissions have changed recently
- F . There is a rogue anti-malware program
A user is trying to access a popular email website but is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue.
Which of the following should the technician do to remove the threat from the system?
- A . Remove all parameters after the FQDN website address.
- B . Remove all files from the temporary folder and restart the computer.
- C . Remove and reinstall the web browser in safe mode.
- D . Remove all lines that are not comments from the hosts file.
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.
Which of the following naming convention formats should the technician follow?
- A . Domain name, location, IP address
- B . Domain name, location, asset ID
- C . Asset ID, MAC address
- D . Location, RFID
Which of the following technologies is used by malicious employees to obtain user passwords?
- A . Main-in-the-middle
- B . Phishing
- C . Tailgating
- D . Shoulder surfing
A technician needs to remove malware from a Windows system. The technician has already performed research on the malware and determined it is a memory virus.
Which of the following steps should the technician take NEXT?
- A . Disable the restore points.
- B . Remediate the affected system.
- C . Educate the user.
- D . Quarantine the affected system.
Which of the following is the maximum RAM limit of a Windows 32-bit version?
- A . no limit
- B . 4GB
- C . 8GB
- D . 32GB
GREAT