Pass the CompTIA A+ 220-1102 Questions and answers with CertsForce

Viewing page 4 out of 17 pages
Viewing questions 46-60 out of questions
Questions # 46:

A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?

Options:

A.

Fingerprint and pattern


B.

Facial recognition and PIN code


C.

Primary account and password


D.

Secondary account and recovery code


Expert Solution
Questions # 47:

A customer is accessing a public kiosk in a company's lobby. Which of the following should be enforced to mitigate the risk of customer data being accidentally saved to the kiosk?

Options:

A.

Manually clearing browsing data


B.

Private-browsing mode


C.

Browser data synchronization


D.

Password manager


Expert Solution
Questions # 48:

Which of the following best describes when to use the YUM command in Linux?

Options:

A.

To add functionality


B.

To change folder permissions


C.

To show documentation


D.

To list file contents


Expert Solution
Questions # 49:

Which of the following Is used to identify potential issues with a proposed change poor lo implementation?

Options:

A.

Request form


B.

Rollback plan


C.

End-user acceptance


D.

Sandbox testing


Expert Solution
Questions # 50:

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

Options:

A.

The device does not have enough free space lo download the OS updates.


B.

The device needs domain administrator confirmation to update to a major release.


C.

The device is not compatible with the newest version of the OS.


D.

The device is restricted from updating due to a corporate security policy.


Expert Solution
Questions # 51:

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

Options:

A.

Cryptominers


B.

Rootkit


C.

Spear phishing


D.

Keylogger


Expert Solution
Questions # 52:

A user's permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?

Options:

A.

SMS


B.

MFA


C.

ACL


D.

MDM


Expert Solution
Questions # 53:

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM


B.

Removing the applications from startup


C.

Installing a faster SSD


D.

Running the Disk Cleanup utility


E.

Defragmenting the hard drive


F.

Ending the processes in the Task Manager


Expert Solution
Questions # 54:

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

Options:

A.

Preserving chain of custody


B.

Implementing data protection policies


C.

Informing law enforcement


D.

Creating a summary of the incident


Expert Solution
Questions # 55:

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

Options:

A.

USB drive


B.

DVD Installation media


C.

PXE boot


D.

Recovery partition


Expert Solution
Questions # 56:

Which of the following protects a mobile device against unwanted access when it is left unattended?

Options:

A.

PIN code


B.

OS updates


C.

Antivirus software


D.

BYOD policy


Expert Solution
Questions # 57:

Which of the following is an advantage of using WPA2 instead of WPA3?

Options:

A.

Connection security


B.

Encryption key length


C.

Device compatibility


D.

Offline decryption resistance


Expert Solution
Questions # 58:

A salesperson's computer is unable to print any orders on a local printer that is connected to the computer Which of the following tools should the salesperson use to restart the print spooler?

Options:

A.

Control Panel


B.

Processes


C.

Startup


D.

Services


Expert Solution
Questions # 59:

A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which of the following types of infections are the workstations most likely experiencing? (Select two)

Options:

A.

Zombies


B.

Keylogger


C.

Adware


D.

Botnet


E.

Ransomvvare


F.

Spyware


Expert Solution
Questions # 60:

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

Options:

A.

fdisk


B.

Diskpart


C.

Disk Utility


D.

FileVault


Expert Solution
Viewing page 4 out of 17 pages
Viewing questions 46-60 out of questions