CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Online Training
CompTIA 220-1002 Online Training
The questions for 220-1002 were last updated at Jan 07,2025.
- Exam Code: 220-1002
- Exam Name: CompTIA A+ Certification Exam: Core 2
- Certification Provider: CompTIA
- Latest update: Jan 07,2025
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.
Which of the following actions should be taken to close the vulnerability? (Select two.)
- A . Disable guest account
- B . Remove admin permissions
- C . Modify AutoRun settings
- D . Change default credentials
- E . Run OS security updates
- F . Install a software firewall
Which of the following built-in accounts was removed in Windows 10?
- A . Power User
- B . Administrator
- C . Guest
- D . Standard User
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
- A . Unattended installation
- B . Remote installation
- C . Repair installation
- D . Image deployment installation
Which of the following is the memory limitation of a 32-bit OS?
- A . 16MB
- B . 2048MB
- C . 4GB
- D . 1024GB
- E . 2TB
- F . 8TB
A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user.
Which of the following commands should the administrator run on the user’s workstation?
- A . chkdsk
- B . netstat
- C . gpupdate
- D . diskpart
A user calls the help desk to report issues with multiple pop-ups and degraded PC performance. The user is out of the area, and assistance can only be provided remotely.
Which of the following steps should a technician perform?
- A . Establish a remote connection, install free third-party malware software, scan the machine for malware, and restart the machine.
- B . Explain the steps to access safe mode with networking, establish a remote connection, run approved malware tools, and restart the machine.
- C . Establish a remote connection, install a free third-party backup tool, back up the user’s software, and instruct the user on how to reinstall Windows.
- D . Explain the steps to access safe mode with networking, set a restore point, run company-approved malware tools, and restart the machine.
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again.
Which of the following recommendations should the contractor give to the customer? (Select two.)
- A . Backup testing
- B . Cloud storage
- C . Local storage backups
- D . Data recovery
- E . Hot site
- F . Waterproof devices
Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?
- A . Folder Redirection
- B . Group Policy
- C . Security Groups
- D . Home Folder
Which of the following NTFS security settings overrides all other settings?
- A . Deny
- B . Modify
- C . Read
- D . Write
A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors.
Which of the following Is MOST likely the Issue?
- A . PSU alarm
- B . Humidity alarm
- C . Temperature alarm
- D . Motion alarm
GREAT