1 / 13

CompTIA A 220-1002 Updated Exam Quetions Killtest V14.02

Use the updated CompTIA A 220-1002 exam questions to prepare the test well.

Download Presentation

CompTIA A 220-1002 Updated Exam Quetions Killtest V14.02

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The safer , easier way to help you pass any IT exams. 1.A user's computer was infected with malware, and a technician successfully removed the infection However, the user reports certain web-based services are still inaccessible. Which of the following should the technician perform FIRST to resolve the issue? A. Turn off System Restore B. Update the malware signatures C. Reset the Internet Explorer settings. D. Check the hosts file Answer: C 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 2.A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used? A. Degauss B. Drive wipe C. Standard format D. Low-level format Answer: B 3.A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST? A. Disconnect the PC from the network B. Perform an antivirus scan C. Run a backup and restore D. Educate the end user Answer: A 4.A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour. Which of the following steps should be performed prior to traveling to prevent further infection? (Select TWO) A. Start system updates. B. Backup PC data C. Run antivirus D. Install the firewall. E. Turn off System Restore F. Install a keylogger Answer: C,D 5.Which of the following would BEST support an 8TB hard drive with one partition? A. GPT B. FAT16 C. FAT32 D. EFS Answer: A 1 / 11

  2. The safer , easier way to help you pass any IT exams. 6.A technician needs to ensure users are prompted or warned when an installation takes place on a Windows system. Which of the following would meet this requirement? A. Educate the user to run the installation with runas. B. Add the user to the local administrators group. C. Enable UAC on the workstation. D. Log in as the administrator to install the application. Answer: C 7.A technician was contacted regarding an issue affecting hundreds of users on a domain network. Which of the following would be MOST effective al remediating future issues through documentation? A. Take personal notes for future reference. B. Document the findings in the technician ticketing system C. Document the solution in a user-facing FAQ page D. Brief upper management in a meeting regarding the findings. Answer: A 8.A remotely managed self-checkout machine in a retail store runs Windows 10. The image contains drivers for locally attached third-party hardware (i.e., receipt printers), third-party applications, and proprietary applications made by the company's IT department. The self-checkout machine is experiencing errors, and the store employees are instructed to reload the OS. Which of the following would be the BEST option to restore full functionality to this machine with the least administrative effort? A. CD-RW B. BD-R C. Thin client D. Network boot Answer: D 9.Which of the following BEST describes the Guest account on a Windows system? A. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. B. This account is designed to provide basic permission for completing common daily tasks. Users of this account are restricted from performing things like installing new software. C. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. D. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. Answer: D 10.Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link. This email is BEST described as: 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 2 / 11

  3. The safer , easier way to help you pass any IT exams. A. phishing. B. zombie. C. whaling. D. spoofing. Answer: D 11.A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT? A. Provide documentation of the repair to the customer B. Allow the customer to voice concerns and post the story to social media later C. Inform the customer the job is done and return to the office D. Defend each step and why it was necessary Answer: A 12.CORRECT TEXT To connect to a secure wireless network, a guest user logs in and is prompted to enter a code that is sent as a text message to the user. Which of the following types of authentication is this an example? A. Multifactor B. RADIUS C. TACACS D. Kerberos Answer: A 13.An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem? A. Untrusted software B. Outdated antivirus C. MDM policies D. Inactive VPNs Answer: D 14.A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC? A. Download and apply the security patch that addresses the vulnerability that was exploited B. Use System Restore to bring the PC back to a previous restore point. C. Reimage the computer and update it with all the latest patches D. Download another antivirus software that will quarantine the virus. Answer: C 15.Which of the following employs content filtering to prevent data leaks within an organization? A. DLP 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 3 / 11

  4. The safer , easier way to help you pass any IT exams. B. IPS C. ACL D. VPN Answer: A 16.A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack? A. Implementing strong passwords B. Changing default credentials C. Disabling AutoRun D. Removing Guest account E. Encrypting data Answer: D 17.An organization is developing testing schedules to ensure its disaster recovery plans will be effective in case of a disaster. In addition to the generators and UPS systems, which of the following should the technician recommend testing? A. Server backups B. Fire suppression systems C. Emergency lighting D. Alarm systems Answer: A 18.A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices? A. Telnet B. SSH C. RDP D. VNC Answer: B 19.Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features? A. Install the third-party driver from the manufacturer's website. B. Update the included Windows driver from Windows Update C. Flash the firmware on the BIOS to the latest version. D. Replace the video card with one that is supported by Windows natively. Answer: B 20.An administrator wants to search a file on a Linux server for the plus symbol (+). 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 4 / 11

  5. The safer , easier way to help you pass any IT exams. Which of the following will the administrator MOST likely use? A. 12 B. sh C. cat D. grep Answer: D 21.A company recently upgraded its computers from Windows XP SP3 lo Windows 7. Due to budget constraints, the company was not able to purchase newer machines. The computers do not have TPM chips. Out the company would like to secure the information on the local hard disk in case the hard drive is stolen, while being able to access all of its information even if users leave. Which of the following would allow the company to accomplish this task? A. Encrypted file system B. BitLocker C. Secure Boot D. BIOS password Answer: B 22.A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use? A. apt-get B. iwconfig C. sudo D. ifconfig Answer: B 23.A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed? A. Default gateway B. Proxy server C. WINS server D. DHCP settings Answer: B 24.After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly. Which of the following should the technician do NEXT? A. Verify the browser's proxy configuration settings B. Instruct the user to use the alternate web browser instead. C. Disconnect and reconnect from the corporate VPN 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 5 / 11

  6. The safer , easier way to help you pass any IT exams. D. Flush the workstation's DNS cache E. Scan the user's workstation for malware Answer: A 25.A technician recently built a gaming PC with a multicode CPU, 32GB DDR4 memory, a 1TB SSD. and a high-end GPU. The technician installed the OS and a new game but noticed the frame-rate performance was much lower than expected. Which of the following should the technician do NEXT to address the performance issues? A. Install a higher wattage PSU. B. Download security patches C. Defragment the drive D. Update the device drivers Answer: D 26.A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.) A. Run a virus scan with updated signature files B. Uninstall any unknown browser extensions or add-ons C. Install the latest version of the Internet browser D. Enable SSL 3.0 in the browser settings E. Delete all unknown registry keys and reboot Answer: A,B 27.A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.) A. Guest network B. TKIP C. Default login D. Outdated firmware E. WPS F. WEP Answer: C,F 28.An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers? A. Uninterruptible power supply B. Voltage regulator C. Surge suppressor D. Generator Answer: A 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 6 / 11

  7. The safer , easier way to help you pass any IT exams. 29.A systems administrator is configuring a new workstation. Which of the following will MOST likely be the administrator's FIRST step? A. Set the screen timeout lock B. Change the default administrator account C. Require a BIOS/UEFI password. D. Enable full-disk encryption. Answer: C 30.A technician is performing service on a computer and notices it is responding very slowly. The computer has 4GB of RAM. a four-core 3GHz processor, and a SATA I 54O0rpm 300GB HOD. The technician logs the following process information: 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test Based on this data, which of the following is the MOST likely cause of the performance issues? A. The dtfhost.exe is likely a virus, and the computer has slowed down due to an infection B. The WSFTPD application is overloading the NIC. causing the computer to freeze periodically. C. The chrome application is using loo much memory and causing excessive paging D. The operating system is performing an installation that is slowing down the computer. E. The Windows Defender application is using too much CPU, causing the slowdown. Answer: D 31.A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step? A. Disable System Restore. B. Create a restore point. C. Apply system updates. D. Restart into safe mode. Answer: D 32.An end user reports a Windows computer is infected with a virus. Which of the following should be the technician’s FIRST troubleshooting step? A. Identify malware symptoms B. Disable System Restore C. Run Windows Update D. Educate the end user Answer: A 7 / 11

  8. The safer , easier way to help you pass any IT exams. 33.A technician is cleaning malware on a Windows workstation. Which of the following would MOST likely prevent a recurrence of the same malware? A. Enable Shadow Copy. B. Disable System Restore. C. Update root certificates D. Modify file permissions Answer: B 34.A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning Answer: C 35.Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware. Which of the following should the technician check NEXT? A. Hijacked email B. DNS entries C. Hosts file D. POP3 errors Answer: A 36.A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router? A. RDP B. SSH C. TFTP D. HTTP Answer: B 37.A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC address D. Location, RFID Answer: C 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 8 / 11

  9. The safer , easier way to help you pass any IT exams. 38.Which of the following provide the BEST security for a server room? (Select two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades Answer: A,C 39.A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue? A. PSU alarm B. Humidity alarm C. Temperature alarm D. Motion alarm Answer: C 40.A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP. Which of the following would be the NEXT appropriate act? A. Promptly notify the administrator’s immediate supervisor B. Rename the folder on the server, and notify the information security officer C. Move the folder to another location on the server, and notify the local authorities D. Ask the owner to move the files from the server to a local computer Answer: A 41.A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message. Which of the following is causing the error? A. Small hard drive B. Insufficient RAM C. OS compatibility D. Folder permissions Answer: C 42.Which of the following Windows versions introduced using applications in the Metro interface? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10 Answer: B 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 9 / 11

  10. The safer , easier way to help you pass any IT exams. 43.A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques. Which of the following should the technician do NEXT to proceed with disposal of the batteries? A. Place security In trash receptacles B. Refer to the manufacture’s specific usage C. Review the material safety data sheet D. Conduct an Internal search of disposal techniques Answer: B 44.A user wants a phone with an operating system that is highly customizable. Which of the following operating systems will a technician MOST likely recommend? A. Windows Mobile B. Android C. Fire OS D. iOS Answer: B 45.Joe. a user, is receiving automated replies but does not remember sending any emails to those recipients He checks the sent items folder and sees email messages he did not send. Which of the following would be the BEST way to resolve this issue? A. Reset Joe's email password B. Set up a rule to delete the automated replies C. Mark the automated replies as spam D. Rebuild Joe's profile Answer: A 46.Which of the following NTFS security settings overrides all other settings? A. Deny B. Modify C. Read D. Write Answer: D 47.A customer recently lost data because it was accidentally deleted. The customer calls a technician and asks to have a Windows backup solution installed. The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made. Which of the following solutions would the technician MOST likely recommend? (Select TWO) A. File level B. Bare metal C. Snapshot D. Shadow Copy E. Critical applications F. Image level Answer: C,D 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 10 / 11

  11. The safer , easier way to help you pass any IT exams. 48.A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection? A. Connect to the network and update the OS with the latest security patches B. Scan and dean the USB device used to transfer data from the equipment C. Disable System Restore and remove all restore points from the system D. Update the local antivirus and set it to scan automatically every evening Answer: D 49.A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT? A. Scope of the change B. Back-out plan C. Purpose of the change D. Change request Answer: A 50.A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer? A. Unattended installation B. Refresh upgrade C. Clean installation D In-place upgrade Answer: B 220-1002 Com pTIA A+ Com pTIA Q uesti ons Ki l l test 11 / 11

More Related