CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam Online Training
CompTIA 220-1102 Online Training
The questions for 220-1102 were last updated at Nov 19,2024.
- Exam Code: 220-1102
- Exam Name: CompTIA A+ Certification Core 2 Exam
- Certification Provider: CompTIA
- Latest update: Nov 19,2024
A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites.
Which of the following is MOST likely the cause of the user’s issue?
- A . Keylogger
- B . Cryptominers
- C . Virus
- D . Malware
Which of the following is MOST likely contained in an EULA?
- A . Chain of custody
- B . Backup of software code
- C . Personally identifiable information
- D . Restrictions of use
A technician has been asked to set up a new wireless router with the best possible security.
Which of the following should the technician implement?
- A . WPS
- B . TKIP
- C . WPA3
- D . WEP
A user purchased a netbook that has a web-based, proprietary operating system.
Which of the following operating systems is MOST likely installed on the netbook?
- A . macOS
- B . Linux
- C . Chrome OS
- D . Windows
A user purchased a netbook that has a web-based, proprietary operating system.
Which of the following operating systems is MOST likely installed on the netbook?
- A . macOS
- B . Linux
- C . Chrome OS
- D . Windows
A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer.
Which of the following filesystems will the technician MOST likely use?
- A . FAT32
- B . ext4
- C . NTFS
- D . exFAT
A technician needs to manually set an IP address on a computer that is running macOS.
Which of the following commands should the technician use?
- A . ipconfig
- B . ifconfig
- C . arpa
- D . ping
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet.
Which of the following attacks MOST likely occurred?
- A . Brute force
- B . Zero day
- C . Denial of service
- D . On-path
An organization’s Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years.
Which of the following backup methods would BEST meet the requirements?
- A . A daily, incremental backup that is saved to the corporate file server
- B . An additional, secondary hard drive in a mirrored RAID configuration
- C . A full backup of the data that is stored of site in cold storage
- D . Weekly, differential backups that are stored in a cloud-hosting provider
A user reports a computer is running slow.
Which of the following tools will help a technician identity the issued
- A . Disk Cleanup
- B . Group Policy Editor
- C . Disk Management
- D . Resource Monitor