220-1002試験無料問題集「CompTIA A+ Certification Exam: Core 2 認定」

Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot. A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here" button to resolve it. There is a timer in the pop-up, counting down the time until the computer is no longer usable.
Which of the following should the technician do NEXT?

A customer's computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?

Which of the following features in Windows 10 combines the functionality from Windows 7 and Windows 8 while also introducing Metro-style applications?

A technician is setting up a new laptop for an employee who travels.
Which of the following is the BEST security practice for this scenario?

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

Following instructions from the help desk, a company employee turns off a workstation that has a suspected ransomware infection. A technician is dispatched later to investigate the workstation.
Which of the following should the technician perform FIRST?

A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory". Which of the following commands would BEST accomplish this?

After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications. Which of the following permissions should be revoked to disable the unwanted notifications?

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server.
Joe has verified he is connected to the Internet.
Which of the following would explain why Joe cannot access his personal shares?

The network administrator is investigating latency on a WiFi network. The administrator discovers a number of unidentified devices connected and wishes to limit access to only authorized users.
Which of the following will BEST meet the requirement?

A network support technician takes a call from an office manager who wants to change the wireless security key on the access point in that particular office. The office manager explains that a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect securely to the access point to make the change?

A technician is monitoring a network and notices an outage has occurred that could potentially cause a major disruption to the business workflow.
Which of the following should the technician do NEXT?

An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)