Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA A+ 220-1102 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 61-80 out of questions
Questions # 61:

All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue?

Options:

A.

Rolling back video card drivers


B.

Restoring the PC to factory settings


C.

Repairing the Windows profile


D.

Reinstalling the Windows OS


Expert Solution
Questions # 62:

A technician is an administrator on a messaging application for a private work group of mixed departments. One of the technician’s colleagues discloses to the group that their employer recently suffered a major security breach and shared details about the breach to the group Which of the following should the technician do first7

Options:

A.

Ignore the messages as all of the group members work for the same employer.


B.

Remove the colleague from the group and ask members to delete the messages.


C.

Message the colleague privately and ask the colleague to delete the messages immediately.


D.

Contact the supervisor and report the colleague with screen shots of the messages


Expert Solution
Questions # 63:

A technician thinks a customer's computer may have a malware infection and wants to determine whether the computer is in communication with any other machines. Which of the following commands should the technician use?

Options:

A.

netstat


B.

tracert


C.

net use


D.

net user


E.

nslookup


Expert Solution
Questions # 64:

When a user is in the office, web pages are loading slowly on the user’s phone. Which of the following best explains this issue?

Options:

A.

Exceeded the data usage limit


B.

Sluggish response time


C.

Degraded network service


D.

Low storage space


Expert Solution
Questions # 65:

A user's corporate iPhone had issues and was repaired while the user was on vacation. The mobile phone has compared to an identical phone. Which of the following best describes what is happening to the phone?

Options:

A.

APK Source


B.

Connectivity issues


C.

Developer Mode


D.

Jailbreak


Expert Solution
Questions # 66:

A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?

Options:

A.

Reenroll the user's mobile device to be used as an MFA token.


B.

Use a private browsing window to avoid local session conflicts.


C.

Bypass single sign-on by directly authenticating to the application.


D.

Reset the device being used to factory defaults.


Expert Solution
Questions # 67:

A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?

Options:

A.

Disconnect the computer from the network


B.

Run an antivirus scan


C.

Reboot the computer


D.

Educate the user about cybersecurity best practices


Expert Solution
Questions # 68:

A technician is adding some Windows 10 workstations to the corporate domain. A script was able to add the majority of the workstations, but failed on a couple. Which of the following menus should the technician check in order to complete the task manually?

Options:

A.

User Accounts


B.

System Properties


C.

Windows Firewall


D.

Network and Sharing


Expert Solution
Questions # 69:

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

Options:

A.

OS compatibility


B.

Quality of service


C.

32- vs. 64-bit architecture


D.

Storage requirements


Expert Solution
Questions # 70:

A network administrator is showing an email application on a personal cell phone to a coworker. The cell phone is enrolled in the company's MDM program. When launching the application store to download the email application, the coworker receives a security warning stating the device violates company policies due to root-level access. Which of the following should the coworker perform next to resolve the issue?

Options:

A.

Download and install a similar application.


B.

Install the latest mobile OS updates.


C.

Reimage the device with the OS from the OEM.


D.

Return the cell phone to the manufacturer.


Expert Solution
Questions # 71:

A technician needs to configure a backup solution that will have the least additional expenses and impact on users. Which of the following steps should the technician complete? (Select two.)

Options:

A.

Configure the backup to run when the user logs in


B.

Configure the backup to run after peak hours


C.

Use third-party licensed backup software


D.

Use the built-in OS backup utility


E.

Configure the backup job to run every hour


F.

Use an external storage device for the backup


Expert Solution
Questions # 72:

A customer's workstation cannot connect to the internet. A technician runs a command on the workstation to view the network settings. The following is a partial readout of the response:

Question # 72

Which of the following is the most likely cause of the issue?

Options:

A.

The IP address is incorrect.


B.

The subnet mask is incorrect.


C.

The gateway setting is incorrect.


D.

The DNS servers are incorrect.


E.

The physical address is spoofed.


Expert Solution
Questions # 73:

While testing a new computer, a technician hears a loud buzzing sound, smells smoke, and sees a flame inside the power supply. Which of the following actions should the technician take first?

Options:

A.

Extinguish the fire with water.


B.

Smother the fire by replacing the system case.


C.

Turn off the power supply switch.


D.

Disconnect the power cord from the wall outlet.


Expert Solution
Questions # 74:

A technician is performing hardware maintenance on a desktop PC. Which of the following is the most important safety precaution the technician should take?

Options:

A.

Disconnect the power cord from the computer.


B.

Wear a grounding strap to avoid electrostatic discharge.


C.

Ensure the work area is well ventilated.


D.

Wear appropriate safety eyewear.


Expert Solution
Questions # 75:

Which of the following technologies used for wireless networks provides the greatest security?

Options:

A.

MAC filtering and WEP


B.

WPA3 and no password


C.

TLS 1.1 and MFA


D.

Kerberos and SSL


Expert Solution
Questions # 76:

A technician is configuring a workstation's security settings, and the following options are available:

    Account lockout policy

    Group policy

    Two-factor authentication

    Password complexity requirements

    Firewalls

    User accounts

    Access control lists

    Antivirus software

Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?

Options:

A.

Account lockout policy


B.

Group policy


C.

Two-factor authentication


D.

Access control lists


Expert Solution
Questions # 77:

Which of the following is a preventive physical security control?

Options:

A.

Video surveillance system


B.

Bollards


C.

Alarm system


D.

Motion sensors


Expert Solution
Questions # 78:

A technician is troubleshooting an issue on a PC that has low disk space. Which of the following Control Panel utilities should the technician most likely use to investigate and remediate the issue?

Options:

A.

Internet Options


B.

System


C.

Programs and Features


D.

Device Manager


Expert Solution
Questions # 79:

A technician is installing an operating system on a new computer. Which of the following is the first step of the process?

Options:

A.

Setting the boot order


B.

Formatting the hard drive


C.

Entering the product key


D.

Selecting the filesystem


Expert Solution
Questions # 80:

A change management review board denied an administrator's request for change. The administrator had provided the purpose and scope of the change, the date and time, and impacted systems with the risk analysis. Which of the following should be included to approve this change?

Options:

A.

End-user acceptance


B.

Cost analysis


C.

Rollback plan


D.

Standard maintenance window


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 61-80 out of questions