CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Online Training
CompTIA 220-1002 Online Training
The questions for 220-1002 were last updated at Jan 07,2025.
- Exam Code: 220-1002
- Exam Name: CompTIA A+ Certification Exam: Core 2
- Certification Provider: CompTIA
- Latest update: Jan 07,2025
A technician has identified malware on a user’s system.
Which of the following should the technician do NEXT according to malware removal best practices?
- A . Enable System Restore and create a restore point so no data is lost
- B . Educate the user about how to avoid malware in the future
- C . Update the antivirus software and run a full system scan
- D . Move the infected system to a lab with no network connectivity
Which of the following provide the BEST security for a server room? (Select two.)
- A . Badge reader
- B . Bollard
- C . Biometric lock
- D . Cable lock
- E . USB token
- F . Privacy window shades
A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files.
Which of the following is the BEST method to implement to prevent any data loss for the sales representative?
- A . Give the sales representative a USB security lock.
- B . Encrypt the laptop’s image on the server.
- C . Create a redundant cloud storage drive.
- D . Give the sales representative an external hard drive.
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.
Which of the following should the technician have covered previously as part of the original repair?
- A . End-user education
- B . Pre-installation environment cleaning
- C . Disabling of System Restore
- D . Infected system quarantine
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.
Which of the following best practices could have prevented the attack?
- A . Implementing strong passwords
- B . Changing default credentials
- C . Disabling AutoRun
- D . Removing Guest account
- E . Encrypting data
A Windows user is attempting to install a local printer and is unsuccessful on permissions.
Which of the following user types BEST describes this user?
- A . Guest
- B . Power User
- C . Administrator
- D . Standard User
With which of the following types is a man-in-the-middle attack associated?
- A . Brute force
- B . Spoofing
- C . DDoS
- D . Zero-day
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet.
Which of the following actions should the user take?
- A . Update antivirus definitions
- B . Install anti-malware software
- C . Enable the pop-up blocker
- D . Reboot the PC
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?
- A . BranchCache
- B . Swap partition
- C . Domain access
- D . Proxy server
A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive.
Which of the following actions should the IT department perform NEXT?
- A . Preserve data integrity
- B . Identify violations of acceptable use
- C . Collect evidence of illegal activity
- D . Report through proper channels
GREAT