Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the CompTIA A+ 220-1102 Questions and answers with ValidTests

Exam 220-1102 All Questions
Exam 220-1102 Premium Access

View all detail and faqs for the 220-1102 exam

Viewing page 13 out of 13 pages
Viewing questions 241-260 out of questions
Questions # 241:

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

Options:

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Expert Solution
Questions # 242:

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.

Biometrics

B.

Full disk encryption

C.

Enforced strong system password

D.

Two-factor authentication

Expert Solution
Questions # 243:

Which of the following physical security controls can prevent laptops from being stolen?

Options:

A.

Encryption

B.

LoJack

C.

Multifactor authentication

D.

Equipment lock

E.

Bollards

Expert Solution
Questions # 244:

Which of the following macOS features can help a user close an application that has stopped responding?

Options:

A.

Finder

B.

Mission Control

C.

System Preferences

D.

Force Quit

Expert Solution
Questions # 245:

Which of the following would most likely be used in a small office environment?

Options:

A.

Print server

B.

Virtualization

C.

Domain access

D.

Workgroup

Expert Solution
Questions # 246:

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

Options:

A.

gpupdate

B.

net use

C.

hostname

D.

dir

Expert Solution
Questions # 247:

A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Secondary account and recovery code

Expert Solution
Questions # 248:

Which of the following threats will the use of a privacy screen on a computer help prevent?

Options:

A.

Impersonation

B.

Shoulder surfing

C.

Whaling

D.

Tailgating

Expert Solution
Questions # 249:

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Expert Solution
Questions # 250:

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

Options:

A.

Keylogger

B.

Rootkit

C.

Ransomware

D.

Trojan

Expert Solution
Questions # 251:

Which of the following editions of Windows 10 requires reactivation every 180 days?

Options:

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Expert Solution
Questions # 252:

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

Options:

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Expert Solution
Questions # 253:

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.

apt-get

B.

CIFS

C.

Samba

D.

greP

Expert Solution
Questions # 254:

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

Options:

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Expert Solution
Questions # 255:

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the

available RAM?

Options:

A.

The system is missing updates.

B.

The systems utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates.

Expert Solution
Questions # 256:

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

Options:

A.

Services in Control Panel to check for overutilization

B.

Performance Monitor to check for resource utilization

C.

System File Checker to check for modified Windows files

D.

Event Viewer to identify errors

Expert Solution
Questions # 257:

Which of the following is the most likely to use NTFS as the native filesystem?

Options:

A.

macOS

B.

Linux

C.

Windows

D.

Android

Expert Solution
Questions # 258:

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

Options:

A.

Acceptable use policy

B.

Security protocols

C.

Data flow diagram

Expert Solution
Questions # 259:

A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?

Options:

A.

VPN

B.

RDP

C.

RMM

D.

SSH

Expert Solution
Questions # 260:

Which of the following would most likely be used to extend the life of a device?

Options:

A.

Battery backup

B.

Electrostatic discharge mat

C.

Proper ventilation

D.

Green disposal

Expert Solution
Viewing page 13 out of 13 pages
Viewing questions 241-260 out of questions