Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA A+ 220-1102 Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 81-100 out of questions
Questions # 81:

Which of the following is protected by government policy for end-user information?

Options:

A.

DRM


B.

EULA


C.

PCI


D.

PII


Expert Solution
Questions # 82:

An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?

Options:

A.

Scan all of the infected files with up-to-date, anti-malware cleaning software.


B.

Fully patch the server operating systems hosting the fileshares.


C.

Change the files to be read-only.


D.

Restore critical data from backup.


Expert Solution
Questions # 83:

A computer is restarting automatically and displaying the following error message: "Your PC ran into a problem and needs to restart. We're just collecting some error info, and then we'll restart for you. (0% complete)." Which of the following should the technician do first to diagnose the issue?

Options:

A.

Check the system event logs.


B.

Verify the hardware driver versions.


C.

Install Windows updates.


D.

Perform a RAM diagnostic.


Expert Solution
Questions # 84:

Which of the following is used to detect and record access to restricted areas?

Options:

A.

Bollards


B.

Video surveillance


C.

Badge readers


D.

Fence


Expert Solution
Questions # 85:

A company needs to securely and remotely access network devices. Which of the following will allow the company to access these devices?

Options:

A.

Telnet


B.

TKIP


C.

RDP


D.

SSH


Expert Solution
Questions # 86:

h company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

Options:

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.


B.

Turn off inheritance at the top-level folder and remove all inherited permissions.


C.

Turn off Inheritance at the top-level folder and set permissions to each file and subfolder manually.


D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.


Expert Solution
Questions # 87:

Internet speeds on a user's Windows 10 device are slow, but other devices on the same network are running at normal speeds. A technician thinks the issue may be related to the proxy settings. Which of the following should the technician check to verify the proxy configuration?

Options:

A.

Network and Sharing Center


B.

Internet Options


C.

Firewall settings


D.

System settings


Expert Solution
Questions # 88:

Which of the following applications allows a user to create backups in macOS?

Options:

A.

Time Machine


B.

FileVault


C.

Keychain


D.

Mission Control


Expert Solution
Questions # 89:

After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address. Which of the following is most likely the issue?

Options:

A.

TheswitchIs only providing IPv6 addresses.


B.

TheOS must be updated to be compatible with the imaging software.


C.

Theswitchhas port security enabled.


D.

Theswitchdoes not support multicast traffic.


Expert Solution
Questions # 90:

After access to a server room was breached, a technician needs to implement a secure method to prevent unauthorized access. Which of the following is the most secure solution?

Options:

A.

Smart cards


B.

Key fobs


C.

Biometrics


D.

Security guard


Expert Solution
Questions # 91:

Which of the following ensures data is unrecoverable on a lost or stolen mobile device?

Options:

A.

Device encryption


B.

Remote wipe


C.

Data backup


D.

Fingerprint reader


Expert Solution
Questions # 92:

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?

Options:

A.

End-user license agreement


B.

Non-disclosure agreement


C.

Regulatory compliance


D.

Acceptable use policy


Expert Solution
Questions # 93:

When a user is browsing a website on a smartphone, a pop-up appears. The pop-up states that the system has been breached and directs the user to an application to resolve the breach. Which of the following should the user do?

Options:

A.

Close the website and ignore the pop-up


B.

Replace the smartphone


C.

Download and install the application to resolve the issue


D.

Analyze the smartphone to find the source of the breach


Expert Solution
Questions # 94:

A user downloads an application with a plug-in that is designed to automatically prompt for an OTP when the user browses to a specific website. The plug-in installs without any warnings or errors. The first time the user goes to the site, the prompt does not open, and the user cannot access the site. Which of the following browser settings should the user configure?

Options:

A.

Extensions/add-ins


B.

Certificate validity


C.

Proxy settings


D.

Trusted sources


Expert Solution
Questions # 95:

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.

Scope of the change


B.

Purpose of the change


C.

Change rollback plan


D.

Change risk analysis


Expert Solution
Questions # 96:

An MDM report shows that a user's company cell phone has unauthorized applications installed. The device has recently checked into the MDM server, and the company still has access to remotely wipe the device. Which of the following describes the action the user has performed?

Options:

A.

Obtained root access


B.

Upgraded the OS


C.

Installed a VPN


D.

Uninstalled the MDM software


Expert Solution
Questions # 97:

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

Options:

A.

The user is in a poor signal area.


B.

The user has too many processes running.


C.

The smartphone has malware on it.


D.

The smartphone has been jailbroken.


Expert Solution
Questions # 98:

A technician needs to reimage a desktop in an area without network access. Which of the following should the technician use? (Select two).

Options:

A.

USB


B.

PXE


C.

Optical media


D.

Partition


E.

Boot record


F.

SMB


Expert Solution
Questions # 99:

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

Options:

A.

Apps and Features


B.

Personalization


C.

File Explorer


D.

Task Manager


Expert Solution
Questions # 100:

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

Options:

A.

ipconfig


B.

arp


C.

nslookup


D.

pathping


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 81-100 out of questions