CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam Online Training
CompTIA 220-1102 Online Training
The questions for 220-1102 were last updated at May 15,2024.
- Exam Code: 220-1102
- Exam Name: CompTIA A+ Certification Core 2 Exam
- Certification Provider: CompTIA
- Latest update: May 15,2024
A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.
Which of the following types of malware is the system MOST likely infected with?
- A . Keylogger
- B . Rootkit
- C . Ransomware
- D . Trojan
C
Explanation:
Ransomware is a type of malware that encrypts the files on the victim’s computer and demands a ransom for their decryption. Ransomware can cause high disk throughput by encrypting large amounts of data in a short time.
A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website.
Which of the following would MOST likely solve the issue?
- A . Updating the operating system
- B . Changing proxy settings
- C . Reinstalling the browser
- D . Enabling port forwarding
B
Explanation:
Sensitive data was leaked from a user’s smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device’s command shell.
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
- A . Restore the device to factory settings.
- B . Uninstall the unapproved application.
- C . Disable the ability to install applications from unknown sources.
- D . Ensure the device is connected to the corporate WiFi network.
B
Explanation:
The technician should disable the user’s access to the device’s command shell. This will prevent the user from accessing sensitive data and will help to prevent further data leaks. The technician should then investigate the unapproved application to determine if it is the cause of the data leak. If the application is found to be the cause of the leak, the technician should uninstall the application and restore the device to factory settings. If the application is not the cause of the leak, the technician should investigate further to determine the cause of the leak. Disabling the ability to install applications from unknown sources can help to prevent future data leaks, but it is not the next step the technician should take in this scenario. Ensuring the device is connected to the corporate WiFi network is not relevant to this scenario1
Which of the following Linux commands would be used to install an application?
- A . yum
- B . grep
- C . Is
- D . sudo
A
Explanation:
Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?
- A . Remote Assistance
- B . Remote Desktop Protocol
- C . Screen Sharing
- D . Virtual Network Computing
C
Explanation:
Screen Sharing is the default system tool that can be used in macOS to allow the technician to view the screen simultaneously with the user. Screen Sharing is a built-in app that lets users share their Mac screen with another Mac on the network. The user can enable screen sharing in the System Preferences > Sharing pane, and then allow other users to request or enter a password to access their screen1. The technician can launch the Screen Sharing app from the Spotlight search or the Finder sidebar, and then enter the user’s name, address, or Apple ID to connect to their screen2. Remote Assistance is a Windows feature that allows users to invite someone to help them with a problem on their PC3. Remote Desktop Protocol (RDP) is a protocol that allows users to connect to a remote computer over a network4. Virtual Network Computing (VNC) is a technology that allows users to share their screen with other devices using a VNC viewer app1. These are not default system tools in macOS, although they can be used with third-party software or settings.
References:
1: https://support.apple.com/guide/mac-help/share-the-screen-of-another-mac-mh14066/mac
2: https://www.howtogeek.com/449239/how-to-share-your-macs-screen-with-another-mac/
3: https://support.microsoft.com/en-us/windows/solve-pc-problems-over-a-remote-connection-b077e31a-16f4-2529-1a47-21f6a9040bf3
4: https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/remote-desktop-protocol
A systems administrator is creating a new document with a list of the websites that users are allowed to access.
Which of the following types of documents is the administrator MOST likely creating?
- A . Access control list
- B . Acceptable use policy
- C . Incident report
- D . Standard operating procedure
B
Explanation:
A user receives an error message from an online banking site that states the following:
Your connection is not private. Authority invalid.
Which of the following actions should the user take NEXT?
- A . Proceed to the site.
- B . Use a different browser.
- C . Report the error to the bank.
- D . Reinstall the browser.
C
Explanation:
The error message “Your connection is not private. Authority invalid.” means that the web browser cannot verify the identity or security of the website’s SSL certificate. This could indicate that the website has been compromised, has a configuration error, or has an expired or invalid certificate. The user should not proceed to the site or use a different browser, as this could expose their sensitive information to potential attackers. The user should also not reinstall the browser, as this is unlikely to fix the error and could cause data loss. The best action for the user to take is to report the error to the bank and wait for them to resolve it.
References: : How to Fix “Your Connection Is Not Private” Errors (https://www.howtogeek.com/874436/how-to-fix-your-connection-is-not-private-errors/) : Fix connection errors (https://support.google.com/chrome/answer/6098869?hl=en)
A company needs to securely dispose of data stored on optical discs.
Which of the following is the MOST effective method to accomplish this task?
- A . Degaussing
- B . Low-level formatting
- C . Recycling
- D . Shredding
D
Explanation:
Shredding is the most effective method to securely dispose of data stored on optical discs12
References: 4.
How Can I Safely Destroy Sensitive Data CDs/DVDs? – How-To Geek. Retrieved from https://www.howtogeek.com/174307/how-can-i-safely-destroy-sensitive-data-cdsdvds/ 5. Disposal ― UK Data Service. Retrieved from https://ukdataservice.ac.uk/learning-hub/research-data-management/store-your-data/disposal/
Which of the following is a data security standard for protecting credit cards?
- A . PHI
- B . NIST
- C . PCI
- D . GDPR
C
Explanation:
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network.
Which of the following configurations should the technician employ to achieve this goal?
- A . Configure the network as private
- B . Enable a proxy server
- C . Grant the network administrator role to the user
- D . Create a shortcut to public documents
A
Explanation:
The technician should configure the network as private to allow the user to access files on a drive shared from another desktop on the network1