220-1002試験無料問題集「CompTIA A+ Certification Exam: Core 2 認定」

A user receives an error message when trying upgrade an application on a work computer. Which of the following is the MOST likely reason the user cannot complete this task?

A user reports personal files have been renamed and are undecipherable. Images have been to the user's folder that request payment to unlock the files. The technician has quarantined the infected system and disabled System Restore. Which of the following should the technician do to unlock the user's files?

Which of the following Windows technologies can render a Me unreadable by anyone other than the file's creator?

A user calls the help desk regarding a new Windows issue that started in the morning.
The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem.
Which of the following would MOST likely fix the issue?

A customer has called the help desk because a word processing application will no longer open.
It was working fine earlier, but the user had to close a document quickly. An error message popped up about a network resource, and then the document crashed. Now, when the user clicks on the icon to launch the application, it does not give an error and will not open. Which of the following should a technician do FIRST?

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 is very high, while inbound network traffic is low. Which of the following tasks should be done FIRST?

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

Which of the following is a risk to computer equipment when the humidity is low?

A technician is restoring files, which were deleted more than one month ago, from a backup on Mac OS X.
Using the available GUI utility, which of the following utilities should the technician launch to accomplish this task?

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

A network technician is setting up a secure WAP for a small office. The owner insists on using the best security available. Which of the following techniques would BEST protect this WiFi setup?

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

Joe, a user, notices the data stored on his desktop has disappeared. Joe is able to log in to the computer and use it normally, but he cannot create any new files. All of the applications Joe installed are present, and he is the only person who uses the computer.
Which of the following steps should Joe perform FIRST to resolve the issue and recover the data with minimal effort?

Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

A security administrator is developing mobile device hardening standards to protect the confidentiality of data. As part of the baseline the administrator recommends implementing controls to mitigate risks associated with physical theft.
Which of the following would BEST meet the administrator's requirements?

Which of the following operating systems has mandatory update installation built in?

To implement additional security on a small office wireless network, the administrator disables the DHCP server on the wireless router. To ensure traffic from specific network interfaces is able to traverse the router, which of the following should be used to limit traffic?

A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed?

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)