220-1002試験無料問題集「CompTIA A+ Certification Exam: Core 2 認定」

A user wishes to install applications on a mobile phone via .apk files loaded on a MicroSD card, rather than downloading them from the factory installed app store. This practice is referred to as:

Following instructions from the help desk, a company employee turns off a workstation that has a suspected ransomware infection. A technician is dispatched later to investigate the workstation.
Which of the following should the technician perform FIRST?

Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information.
Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites.
Which of the following should the technician suggest NEXT to try to fix the issue?

A user downloaded a program from a website. After saving the file, the user cannot find the executable. Which of the following is MOST likely the cause?

An administrator wants to search a file on a Linux server for the plus symbol (+).
Which of the following will the administrator MOST likely use?

A technician needs to troubleshoot a user's computer while the user is connected to the system.
The technician must also connect to the user's system using remote access tools built in to Windows.
Which of the following is the BEST option to troubleshoot the user's computer?

A technician receives an end user's computer that displays erratic behavior upon startup.
When the technician starts the computer performance is reduced.
A window appears on the screen stating a purchase must be made to disinfect the computer.
The technician quarantines the computer and disables System Restore.
Which of the following should the technician do NEXT?

A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?

Which of the following Windows Enterprise OS versions offers BitLocker as a feature that can be enabled?

A technician just replaced a network copier's toner cartridges and wants to dispose of the used ones. Which of the following represents the BEST way to handle the waste?

A network technician is creating a set of scripts to help complete some common tasks. The technician wants to leave notes within the scripts to explain the purpose of each section and allow for changes later. Which of the following should the technician use?

A technician maps a network printer for a few users in an office. The users are initially able to print, but about a week later, they cannot print to the network printer. Which of the following should the technician do to ensure all users can print?

Which of the following technologies is used by malicious employees to obtain user passwords?

A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop.
The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation.
While showing the last video, it starts to buffer, times out. and will not display.
The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play.
Which of the following is MOST likely causing the Issue?

Which of the following NTFS security settings overrides all other settings?

A new security policy stores all remote access to network devices must be performed using secure connections whenever possible. Which of the following remote access technologies would a technician MOST likely use to manage a Windows-based device remote without using a CLI?

Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

A technician notices a workstation is connecting to an IP address on the network and wants to determine the machine name that belongs to that IP address, Which of the following commands should the technician use?

A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?