Exam Details

  • Exam Code
    :220-1002
  • Exam Name
    :CompTIA A+ Certification: Core 2
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :898 Q&As
  • Last Updated
    :Apr 16, 2025

CompTIA CompTIA Certifications 220-1002 Questions & Answers

  • Question 271:

    Ann, a user, received an email from an unknown source with an attachment claiming to be pictures from her beach vacation. When Ann opened the attachment, she was prompted to enable macros. Once the macros were enabled, the antivirus software triggered an alert. The malicious activity was stepped by the antivirus software.

    Which of the following should be recommended as the FIRST line of defense to prevent this attack vector from reoccurring?

    A. A trusted CA

    B. An outgoing proxy

    C. A content scanner

    D. A stateful firewall

  • Question 272:

    A technician is installing new software on an older laptop that has a current OS. The software contains a database back end that also requires installation.

    Which of the following should the technician review to ensure the software will run before installing it? (Choose two.)

    A. Memory usage

    B. Display settings.

    C. Network utilization

    D. Storage capacity

    E. Firewall rules

    F. Antivirus signatures

  • Question 273:

    A technician needs to access the user Interface of a server outside the network. The technician added network security with MAC filtering and port forwarding to allow tor the connection

    Which of the following will the technician MOST likely use to connect to the server?

    A. Remote Assistance

    B. SSH

    C. Telnet

    D. RDP

  • Question 274:

    A technician is removing a virus from a user's Windows workstation. The virus was installed by the user while downloading pirated software from the Internet.

    Which of the following should the technician do to address this issue?

    A. End the current explorer.exe task. Update and run an antivirus scanning utility to remove the threat. Relaunch explorer.exe using Task Manager.

    B. End the current explorer.exe task using the command line. Update and run an antivirus scanning utility to remove the threat.

    C. Launch explorer.exe using Task Manager. Update and run an antivirus scanning utility to remove the threat.

    D. Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.

  • Question 275:

    A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs.

    Which of the following should the technician implement to ensure maximum uptime of the client VM?

    A. Cloud storage backup

    B. Large file storage

    C. Image-level backup

    D. Uninterruptible power supply

  • Question 276:

    A company recently experienced a security incident in which an unauthorized user was able to insert a USB flash drive into a kiosk, launch a non-native OS. and deliver malicious payloads across the network.

    Which of the following security measures would have been BEST to prevent the attack from being executed in the first place? (Select TWO) A. Using a host-based antivirus with real-time scanning

    B. Implementing automatic screen locks after 60 seconds of inactivity

    C. Creating a strong BIOS'UEFI password

    D. Disabling AutoRun for USB devices

    E. Enabling the Secure Boot option

    F. Changing the default administrator credentials

  • Question 277:

    A customer has been using a computer to download and copy files to a USB flash drive. The customer accidentally stepped on the power strip, and the computer suddenly powered off. When the computer turned back on, it displayed an error message: No OS found.

    Which of the following should a technician perform NEXT?

    A. Connect a UPS.

    B. Repair the OS.

    C. Check the boot order.

    D. Run hardware diagnostics.

  • Question 278:

    A technician is encrypting the company's laptops using BitLocker, but some of the laptops do not have a built-in TPM. Which of the following would enable the technician to use BitLocker on these machines?

    A. A USB key

    B. A firmware update

    C. A local disk

    D. Two-factor authentication

  • Question 279:

    A user reports a computer is experiencing the following issues:

    1.

    Slowness at different points in the day

    2.

    Screensaver engaging randomly

    3.

    BSODs

    Which of the following tools should the technician use to analyze the computer's behavior?

    A. Computer Management

    B. Event Viewer

    C. Performance Monitor

    D. Task Manager

  • Question 280:

    A technician needs to remediate an infected computer. Which of the following is the FIRST step the technician should take?

    A. Quarantine the system.

    B. Update the anti-malware software

    C. Scan and remove the infections

    D. Research the malware symptoms

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.