CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam Online Training
CompTIA 220-1102 Online Training
The questions for 220-1102 were last updated at Jan 28,2025.
- Exam Code: 220-1102
- Exam Name: CompTIA A+ Certification Core 2 Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.
Which of the following types of malware is the system MOST likely infected with?
- A . Keylogger
- B . Rootkit
- C . Ransomware
- D . Trojan
A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website.
Which of the following would MOST likely solve the issue?
- A . Updating the operating system
- B . Changing proxy settings
- C . Reinstalling the browser
- D . Enabling port forwarding
Sensitive data was leaked from a user’s smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device’s command shell.
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
- A . Restore the device to factory settings.
- B . Uninstall the unapproved application.
- C . Disable the ability to install applications from unknown sources.
- D . Ensure the device is connected to the corporate WiFi network.
Which of the following Linux commands would be used to install an application?
- A . yum
- B . grep
- C . Is
- D . sudo
Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?
- A . Remote Assistance
- B . Remote Desktop Protocol
- C . Screen Sharing
- D . Virtual Network Computing
A systems administrator is creating a new document with a list of the websites that users are allowed to access.
Which of the following types of documents is the administrator MOST likely creating?
- A . Access control list
- B . Acceptable use policy
- C . Incident report
- D . Standard operating procedure
A user receives an error message from an online banking site that states the following:
Your connection is not private. Authority invalid.
Which of the following actions should the user take NEXT?
- A . Proceed to the site.
- B . Use a different browser.
- C . Report the error to the bank.
- D . Reinstall the browser.
A company needs to securely dispose of data stored on optical discs.
Which of the following is the MOST effective method to accomplish this task?
- A . Degaussing
- B . Low-level formatting
- C . Recycling
- D . Shredding
Which of the following is a data security standard for protecting credit cards?
- A . PHI
- B . NIST
- C . PCI
- D . GDPR
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network.
Which of the following configurations should the technician employ to achieve this goal?
- A . Configure the network as private
- B . Enable a proxy server
- C . Grant the network administrator role to the user
- D . Create a shortcut to public documents