Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA A+ 220-1202 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

Options:

A.

Disable built-in hotspots


B.

Configure VPN software


C.

Install an antivirus application


D.

Use PIN authentication


E.

Turn on location services


F.

Enable screen timeout


Expert Solution
Questions # 42:

A technician is creating an MDM policy using hardening techniques that are unique to each user. Which of the following techniques is the technician using?

Options:

A.

A drawn pattern


B.

A fingerprint


C.

A password


D.

A PIV card (corrected from “APIV card”)


Expert Solution
Questions # 43:

A user hears an unexpected noise coming from their desktop computer. To troubleshoot the issue, a technician needs to open the case. Which of the following actions should the technician take next?

Options:

A.

Open the system cover


B.

Ground the system


C.

Disconnect the power


D.

Remove any peripheral devices


Expert Solution
Questions # 44:

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings


B.

Restart the phone


C.

Check the phone’s battery state


D.

Uninstall unneeded applications


Expert Solution
Questions # 45:

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user ' s session. Which of the following remote access technologies would support the use case?

Options:

A.

VPN


B.

VNC


C.

SSH


D.

RDP


Expert Solution
Questions # 46:

Which of the following file types is best for performing automated tasks on startup on a Windows computer?

Options:

A.

SH


B.

MSI


C.

BAT


D.

EXE


Expert Solution
Questions # 47:

Which of the following is used to apply corporate restrictions on an Apple device?

Options:

A.

App Store


B.

VPN configuration


C.

Apple ID


D.

Management profile


Expert Solution
Questions # 48:

A systems administrator logs in to a developer ' s machine to update the system and notices a performance issue. To troubleshoot the issue, the administrator attempts to open Task Manager multiple times, but it does not open. Which of the following is most likely the cause of this issue?

Options:

A.

A software development application is running.


B.

Windows Update Service is set to manual.


C.

The operating system has a malware infection.


D.

A pagefile was moved to D:\ drive.


Expert Solution
Questions # 49:

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?

Options:

A.

Knowledge base article


B.

Non-disclosure agreement


C.

Incident report


D.

Standard operating procedure


Expert Solution
Questions # 50:

Which of the following methods involves requesting a user ' s approval via a push notification to verify the user ' s identity?

Options:

A.

Call


B.

Authenticator


C.

Hardware token


D.

SMS


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions