Pass the CompTIA A+ 220-1102 Questions and answers with CertsForce

Viewing page 5 out of 17 pages
Viewing questions 61-75 out of questions
Questions # 61:

A user wants to back up a Windows 10 device. Which of the following should the user select?

Options:

A.

Devices and Printers


B.

Email and Accounts


C.

Update and Security


D.

Apps and Features


Expert Solution
Questions # 62:

A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?

Options:

A.

Disabling UAC


B.

Restricting local administrators


C.

Enabling UPnP


D.

Turning off AutoPlay


Expert Solution
Questions # 63:

During an enterprise rollout of a new application, a technician needs to validate compliance with an application's EULA while also reducing the number of licenses to manage. Which of the following licenses would best accomplish this goal?

Options:

A.

Personal use license


B.

Corporate use license


C.

Open-source license


D.

Non-expiring license


Expert Solution
Questions # 64:

A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two).

Options:

A.

Disable Wi-Fi autoconnect.


B.

Stay offline when in public places.


C.

Uninstall all recently installed applications.


D.

Schedule an antivirus scan.


E.

Reboot the device


F.

Update the OS


Expert Solution
Questions # 65:

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

Options:

A.

Network and Sharing Center


B.

net use


C.

User Accounts


D.

regedit


E.

Group Policy


Expert Solution
Questions # 66:

Which of the following operating systems is considered closed source?

Options:

A.

Ubuntu


B.

Android


C.

CentOS


D.

OSX


Expert Solution
Questions # 67:

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

Options:

A.

Document the date and time of change


B.

Document the purpose of the change.


C.

Document the risk level.


D.

Document the findings of the sandbox test,


Expert Solution
Questions # 68:

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Select two).

Options:

A.

Zombies


B.

Keylogger


C.

Adware


D.

Botnet


E.

Ransomware


F.

Spyware


Expert Solution
Questions # 69:

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.

Quarantine the computer.


B.

Disable System Restore.


C.

Update the antivirus software definitions.


D.

Boot to safe mode.


Expert Solution
Questions # 70:

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

Options:

A.

Amount of system RAM


B.

NIC performance


C.

Storage IOPS


D.

Dedicated GPU


Expert Solution
Questions # 71:

Which of the following will automatically map network drives based on Group Policy configuration?

Options:

A.

Log-in scripts


B.

Access controllists


C.

Organizationalunits


D.

Folder redirection


Expert Solution
Questions # 72:

A user downloads an application with a plug-in that is designed to automatically prompt for an OTP when the user browses to a specific website. The plug-in installs without any warnings or errors. The first time the user goes to the site, the prompt does not open, and the user cannot access the site. Which of the following browser settings should the user configure?

Options:

A.

Extensions/add-ins


B.

Certificate validity


C.

Proxy settings


D.

Trusted sources


Expert Solution
Questions # 73:

A customer recently upgraded their computer to the latest Windows version and is now having issues with the display. The icons and text are too large, and the colors are not accurate. Which of the following Control Panel options should the technician adjust to help the customer?

Options:

A.

Ease of Access


B.

Device Manager


C.

Network and SharingCenter


D.

Programs and Features


Expert Solution
Questions # 74:

A technician is configuring remote access to a Linux server in a cloud environment for administration through a terminal window. Which of the following should the technician use to configure remote access?

Options:

A.

RDP


B.

VPN


C.

SSH


D.

RMM


Expert Solution
Questions # 75:

After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?

Options:

A.

Shut down and cold start the smartphone


B.

Delete the email containing the attachment


C.

Wipe the device and reset it to factory defaults


D.

Uninstall and reinstall the mobile browser


Expert Solution
Viewing page 5 out of 17 pages
Viewing questions 61-75 out of questions