Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA A+ 220-1102 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 141-160 out of questions
Questions # 141:

When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender?

Options:

A.

Keys


B.

Token


C.

Password


D.

RootCA


Expert Solution
Questions # 142:

Which of the following operating systems were designed for smartphones? (Select two).

Options:

A.

Ubuntu


B.

CentOS


C.

macOS


D.

Chrome OS


E.

iOS


F.

Android


Expert Solution
Questions # 143:

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

Options:

A.

Restart the smartphone.


B.

Reset the network settings.


C.

Unpair the Bluetooth speaker.


D.

Check for system updates.


Expert Solution
Questions # 144:

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

Options:

A.

Configure MAC filtering.


B.

Disable DHCP.


C.

Configure port forwarding.


D.

Disable guest access.


Expert Solution
Questions # 145:

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

Options:

A.

Reviewing System Information


B.

Running Disk Cleanup


C.

Editing the Registry


D.

Checking the Performance Monitor


E.

Increasing the memory


Expert Solution
Questions # 146:

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

Options:

A.

NDA


B.

AUP


C.

VPN


D.

SOP


Expert Solution
Questions # 147:

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

Options:

A.

Cross-site scripting


B.

SQL injection


C.

Brute-force attack


D.

DDoS attack


Expert Solution
Questions # 148:

A technician needs to troubleshoot a user's computer while the user is connected to the system. The technician must also connect to the user's system using remote access tools built in to Windows Which of the following is the best option to troubleshoot the user's computer?

Options:

A.

Screen share


B.

MSRA


C.

Virtual network computer


D.

RDP


Expert Solution
Questions # 149:

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

Options:

A.

Request physical media


B.

Mount the ISO file.


C.

Install a third-party software.


D.

Download an appropriate 32-bit/64-bit OS file.


Expert Solution
Questions # 150:

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.

Configuring firewall settings


B.

Implementing expiration policies


C.

Defining complexity requirements


D.

Updating antivirus definitions


Expert Solution
Questions # 151:

A user's Windows desktop has low disk space. A technician thinks some upgrade files were never removed. Which of the following tools should the technician use to correct the issue?

Options:

A.

devmgmt.msc


B.

cleanmgr.exe


C.

dfrgui.exe


D.

diskmgmt.mac


Expert Solution
Questions # 152:

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

Options:

A.

Trojan


B.

Boot sector virus


C.

Spyware


D.

Rootkit


Expert Solution
Questions # 153:

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

Options:

A.

Services in Control Panel to check for overutilization


B.

Performance Monitor to check for resource utilization


C.

System File Checker to check for modified Windows files


D.

Event Viewer to identify errors


Expert Solution
Questions # 154:

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

Options:

A.

incineration


B.

Resale


C.

Physical destruction


D.

Dumpster for recycling plastics


Expert Solution
Questions # 155:

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?

Options:

A.

Privacy


B.

Accounts


C.

Personalization


D.

Shared resources


Expert Solution
Questions # 156:

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

Options:

A.

Zero day


B.

Vishing


C.

DDoS


D.

Evil twin


Expert Solution
Questions # 157:

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

Options:

A.

Zero day


B.

SOL injection


C.

Cross-site scripting


D.

Distributed denial of service


Expert Solution
Questions # 158:

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.

Use a network share to share the installation files.


B.

Save software to an external hard drive to install.


C.

Create an imaging USB for each PC.


D.

Install the software from the vendor's website


Expert Solution
Questions # 159:

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

Options:

A.

Data usage limits


B.

Wi-Fi connection speed


C.

Status of airplane mode


D.

System uptime


Expert Solution
Questions # 160:

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

Options:

A.

UEFI password


B.

Secure boot


C.

Account lockout


D.

Restricted user permissions


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 141-160 out of questions