CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Online Training
CompTIA 220-1002 Online Training
The questions for 220-1002 were last updated at Jan 06,2025.
- Exam Code: 220-1002
- Exam Name: CompTIA A+ Certification Exam: Core 2
- Certification Provider: CompTIA
- Latest update: Jan 06,2025
A user’s computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses.
Which of the following is MOST likely the problem?
- A . Rootkit
- B . Zero-day malware
- C . Rogue antivirus
- D . Old virus definitions
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP.
Which of the following would be the NEXT appropriate act?
- A . Promptly notify the administrator’s immediate supervisor
- B . Rename the folder on the server, and notify the information security officer
- C . Move the folder to another location on the server, and notify the local authorities
- D . Ask the owner to move the files from the server to a local computer
During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade.
Which of the following plans must be implemented to revert back to the most recent version of the firmware?
- A . Backout plan
- B . Contingency plan
- C . Alternative plan
- D . Backup plan
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon.
Which of the following actions should the user take FIRST?
- A . Check to ensure the printer selected is the default printer
- B . Check the status of the print server queue
- C . Cancel all documents and print them again
- D . Check that the printer is not offline print mode
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.
Which of the following protocols and authentication methods should the technician implement? (Select two.)
- A . WPA
- B . WPA2
- C . WEP
- D . TKIP
- E . RADIUS
- F . Multifactor
- G . TACACS
- H . SSO
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade.
Which of the following documents did the network administrator MOST likely give to the technician?
- A . Process diagram
- B . Physical network diagram
- C . Fiber backbone diagram
- D . Logical topology diagram
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.
Which of the following can Joe do to ensure the backups will work if needed?
- A . Frequently restore the servers from backup files and test them
- B . Configure the backups to restore to virtual machines for quick recovery
- C . Set up scripts that automatically rerun failed backup jobs
- D . Set up alerts to let administrators know when backups fail
- E . Store copies of the backups off-side in a secure datacenter
A technician is disposing of computer hardware that contains PHI. The drive must be reusable.
Which of the following methods should be used?
- A . Degauss
- B . Drive wipe
- C . Standard format
- D . Low-level format
A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.
Which of the following should the network administrator do NEXT?
- A . Delete the user’s AD account.
- B . Decrease the user’s AD privileges.
- C . Disable the user’s AD account.
- D . Reset the password on the user’s AD account.
A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal.
Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?
- A . Pad and chmod
- B . Node and vi
- C . Is an chown
- D . Ps and kill
- E . Op and rm
GREAT