CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Online Training
CompTIA 220-1002 Online Training
The questions for 220-1002 were last updated at Jan 05,2025.
- Exam Code: 220-1002
- Exam Name: CompTIA A+ Certification Exam: Core 2
- Certification Provider: CompTIA
- Latest update: Jan 05,2025
A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem.
Which of the following should the technician do NEXT?
- A . Provide documentation of the repair to the customer
- B . Allow the customer to voice concerns and post the story to social media later
- C . Inform the customer the job is done and return to the office
- D . Defend each step and why it was necessary
An employee reported that a suspicious individual was looking through the recycle bin.
Which of the following types of social engineering threats is this?
- A . Phishing
- B . Spear phishing
- C . Dumpster diving
- D . Impersonation
Which of the following is considered government-regulated data?
- A . PII
- B . End-user license agreement
- C . Digital Millennium Copyright Act
- D . DRM
A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email.
Which of the following is MOST likely causing the missing folders issue?
- A . The Internet security options have changed
- B . The operating system updates have changed
- C . The network directory permissions have changed
- D . The user account permissions have changed
Which of the following is the MOST secure wireless security protocol?
- A . AES
- B . WPA
- C . WPA2
- D . WEP
Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?
- A . Local Administrator
- B . Standard User
- C . Power User
- D . Guest User
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.
Which of the following should the technician do?
- A . Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot
- B . Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one
- C . Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
- D . Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved
A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low.
Which of the following tasks should be done FIRST?
- A . Disconnect the network cable.
- B . Update the antivirus software.
- C . Run an antivirus scan.
- D . Shut down the PC
Which of the following threats uses personalized information in an attempt at obtaining information?
- A . Whaling
- B . Impersonation
- C . Spoofing
- D . Spear phishing
A manager with a restricted user account receives the following error message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem.
Which of the following should the technician do NEXT?
- A . Reboot the computer
- B . Restart the network services
- C . Roll back the device drivers
- D . Rebuild the Windows profiles
GREAT