Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA A+ 220-1102 Questions and answers with CertsForce

Viewing page 10 out of 13 pages
Viewing questions 181-200 out of questions
Questions # 181:

Which of the following is an example of MFA?

Options:

A.

Fingerprint scan and retina scan


B.

Password and PIN


C.

Username and password


D.

Smart card and password


Expert Solution
Questions # 182:

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

Options:

A.

Windows Enterprise Edition


B.

Windows Professional Edition


C.

Windows Server Standard Edition


D.

Windows Home Edition


Expert Solution
Questions # 183:

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

Options:

A.

.deb


B.

.vbs


C.

.exe


D.

.app


Expert Solution
Questions # 184:

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

Options:

A.

A new IT policy requires users to set up a lock screen PIN.


B.

A user is overseas and wants to use a compatible international SIM Card.


C.

A user left the phone at home and wants to prevent children from gaining access to the phone.


D.

A user traded in the company phone for a cell carrier upgrade by mistake.


E.

A user cannot locate the phone after attending a play at a theater.


F.

A user forgot the phone in a taxi, and the driver called the company to return the device.


Expert Solution
Questions # 185:

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

Options:

A.

Language


B.

System


C.

Personalization


D.

Ease of Access


Expert Solution
Questions # 186:

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

Options:

A.

Power user account


B.

Standard account


C.

Guest account


D.

Administrator account


Expert Solution
Questions # 187:

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

Options:

A.

Run sfc / scannow on the drive as the administrator.


B.

Run clearnmgr on the drive as the administrator


C.

Run chkdsk on the drive as the administrator.


D.

Run dfrgui on the drive as the administrator.


Expert Solution
Questions # 188:

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

Options:

A.

Scan the computer with the company-provided antivirus software


B.

Install a new hard drive and clone the user's drive to it


C.

Deploy an ad-blocking extension to the browser.


D.

Uninstall the company-provided antivirus software


E.

Click the link in the messages to pay for virus removal


F.

Perform a reset on the user's web browser


Expert Solution
Questions # 189:

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

Options:

A.

afc


B.

ehkdsk


C.

git clone


D.

zobocopy


Expert Solution
Questions # 190:

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

Options:

A.

Use Settings to access Screensaver settings


B.

Use Settings to access Screen Timeout settings


C.

Use Settings to access General


D.

Use Settings to access Display.


Expert Solution
Questions # 191:

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Options:

A.

Encrypt the files


B.

Clone any impacted hard drives


C.

Contact the cyber insurance company


D.

Inform law enforcement


Expert Solution
Questions # 192:

Which of the following Linux commands would be used to install an application?

Options:

A.

yum


B.

grep


C.

Is


D.

sudo


Expert Solution
Questions # 193:

A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

Options:

A.

Services


B.

Processes


C.

Performance


D.

Startup


Expert Solution
Questions # 194:

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?

Options:

A.

Verify all third-party applications are disabled


B.

Determine if the device has adequate storage available.


C.

Check if the battery is sufficiently charged


D.

Confirm a strong internet connection is available using Wi-Fi or cellular data


Expert Solution
Questions # 195:

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

Options:

A.

Shut down the infected computer and swap it with another computer


B.

Investigate what the interface is and what triggered it to pop up


C.

Proceed with initiating a full scan and removal of the viruses using the presented interface


D.

Call the phone number displayed in the interface of the antivirus removal tool


Expert Solution
Questions # 196:

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Question # 196


Expert Solution
Questions # 197:

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

Options:

A.

Scope of change


B.

Risk level


C.

Rollback plan


D.

End user acceptance


Expert Solution
Questions # 198:

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Options:

A.

Acceptable use


B.

Chain of custody


C.

Security policy


D.

Information management


Expert Solution
Questions # 199:

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

Options:

A.

Privacy


B.

Indexing Options


C.

System


D.

Device Manager


Expert Solution
Questions # 200:

Which of the following Wi-Fi protocols is the MOST secure?

Options:

A.

WPA3


B.

WPA-AES


C.

WEP


D.

WPA-TKIP


Expert Solution
Viewing page 10 out of 13 pages
Viewing questions 181-200 out of questions