New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

220-1102 Exam Dumps - CompTIA A+ Questions and Answers

Question # 124

A user's smartphone screen is not rotating. The technician confirms the rotation lock is deactivated. Which of the following steps should the technician perform next?

Options:

A.

Remove the screen protector.

B.

Update the smartphone’s software.

C.

Restart the smartphone.

D.

Replace the smartphone.

Buy Now
Question # 125

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

Options:

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Buy Now
Question # 126

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

Options:

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Buy Now
Question # 127

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Options:

Buy Now
Question # 128

An organization has a goal to perform daily backups of a particular workstation and save them locally to the NAS. The organization needs to ensure these backup jobs are successful. Which of the following should the IT department do?

Options:

A.

Write scripts to rerun backups that fail.

B.

Store copies of the backups off site.

C.

Perform incremental backups instead.

D.

Set up alerts to be notified when backups fail.

Buy Now
Question # 129

Which of the following is a reason why PII is regulated?

Options:

A.

To establish a chain-of-custody

B.

To increase efficiency of databases

C.

To stop information leaks

D.

To protect privacy rights

E.

To discourage anonymity

Buy Now
Question # 130

A user's enterprise-issued smartphone does not respond to touch after starting up the operating system. Which of the following should a technician try next?

Options:

A.

Contact the vendor for assistance.

B.

Replace the screen assembly.

C.

Replace the smartphone battery.

D.

Restore to factory settings.

Buy Now
Question # 131

Which of the following is the most secure method of preventing someone from accessing a cell phone?

Options:

A.

PIN

B.

Swipe

C.

Passphrase

D.

Pattern

Buy Now
Question # 132

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

Options:

A.

Remote wipe

B.

Mandatory screen locks

C.

Location applications

D.

Device data encryption

Buy Now
Question # 133

A technician is setting up backup and recovery solutions that must restore quickly. Storage space is not a factor. Which of the following backup methods should the technician implement?

Options:

A.

Differential

B.

Synthetic

C.

Full

D.

Incremental

Buy Now
Question # 134

A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?

Options:

A.

Disconnect the computer from the network

B.

Run an antivirus scan

C.

Reboot the computer

D.

Educate the user about cybersecurity best practices

Buy Now
Question # 135

Which of the following operating systems uses the ext4 filesystem type?

Options:

A.

macOS

B.

iOS

C.

Linux

D.

Windows

Buy Now
Question # 136

A technician needs to configure a newly installed SSD. Which of the following tools should the technician use? (Select two).

Options:

A.

regedit.exe

B.

resmon.exe

C.

gpedit.msc

D.

diskmgmt.msc

E.

dfrgui.exe

F.

diskpart.msc

Buy Now
Question # 137

A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network. Which of the following steps should the technician take next?

Options:

A.

Schedule and perform an antivirus scan and system update

B.

Educate the end user on internet usage

C.

Perform a system scan to remove the malware

D.

Create a system restore point

Buy Now
Question # 138

A company needs to securely and remotely access network devices. Which of the following will allow the company to access these devices?

Options:

A.

Telnet

B.

TKIP

C.

RDP

D.

SSH

Buy Now
Question # 139

Which of the following are common commands that are used when installing applications in Linux? (Select two).

Options:

A.

top

B.

ps

C.

chmod

D.

yum

E.

grep

F.

apt-get

Buy Now
Question # 140

A technician is configuring security for a computer that is located in a common area. A sign above the computer indicates only authorized users can use the computer. Guests visiting the office must walk past the computer to enter and leave the office. Which of the following will offer the best protection against physical threats?

Options:

A.

Using screen lock

B.

Installing a privacy screen

C.

Implementing password complexity

D.

Locking the computer case

E.

Enabling drive encryption

Buy Now
Question # 141

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

Options:

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Buy Now
Question # 142

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.

apt-get

B.

CIFS

C.

Samba

D.

greP

Buy Now
Question # 143

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Dec 15, 2025
Questions: 845
220-1102 pdf

220-1102 PDF

$25.5  $84.99
220-1102 Engine

220-1102 Testing Engine

$28.5  $94.99
220-1102 PDF + Engine

220-1102 PDF + Testing Engine

$40.5  $134.99