CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Online Training
CompTIA 220-1002 Online Training
The questions for 220-1002 were last updated at Jan 06,2025.
- Exam Code: 220-1002
- Exam Name: CompTIA A+ Certification Exam: Core 2
- Certification Provider: CompTIA
- Latest update: Jan 06,2025
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.
Which of the following needs to be adjusted on the workstation to fix the issue?
- A . Date and time
- B . UEFI boot mode
- C . Logon times
- D . User access control
A user is attempting to open Outlook, Outlook seems to have cached some invalid user login information, causing it to fail when trying to connect to Office 365 applications.
Which of the following Control Panel applets should a technician use to clear the cached invalid user login information?
- A . Network and Sharing Center
- B . Sync Center
- C . User Account Control
- D . Credential manager
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.
If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
- A . Default SSID
- B . MAC filtering
- C . Power levels
- D . Content filtering
- E . Firewall
A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car.
Which of the following troubleshooting steps should the technician take NEXT?
- A . Reset the device’s network settings
- B . Check the data usage statistics on the device
- C . Verify the SSID with which the device is associated
- D . Run any pending application or OS updates
A technician has set up a new computer for a customer and needs to add a login with administrative privileges.
Which of the following tools should the technician use?
- A . Component Services
- B . System Configuration
- C . Security Policy
- D . Local Users and Groups
A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user’s computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard.
Which of the following would be BEST suited for this task?
- A . VNC
- B . Telnet
- C . SSH
- D . RDP
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
- A . Guest network
- B . TKIP
- C . Default login
- D . Outdated firmware
- E . WPS
- F . WEP
A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs.
Which of the following would be the MOST effective method to accomplish this task?
- A . Drill
- B . Hammer
- C . Low-level format
- D . Degaussing
A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network.
Which of the following boot methods initiates such an upgrade?
- A . SSD
- B . Optical drive
- C . Flash drive
- D . PXE
An end user’s PC is taking a long time to boot.
Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)
- A . Remove applications from startup
- B . Defragment the hard drive
- C . Install additional RAM
- D . Install a faster hard drive
- E . End the processes in Task Manager
- F . Run the Disk Cleanup utility
GREAT