A customer contacts an IT technician regarding a PC's performance. The customer explains that the computer struggles to run several applications simultaneously,
Which of the following changes should the technician recommend FIRST to address the customer's concern?
A. Increase the allocation of virtual memory.
B. Upgrade the RAM to a larger capacity.
C. Replace the existing HDD with an SSD.
D. Enable fastboot in the BIOS
A technician is implementing a change to a piece of production environment. The change is causing other several other problem to occur. Which of the following should the technician do NEXT?
A. Complete the change to the production environment within the allotted time frame.
B. Attempt to recreate the issues in the QA environment troubleshoot them quickly.
C. Begin following the back-out plan that was outlined in the planning meeting.
D. Complete a risk analysis of the new changes and their potential impact on other systems.
An administrator changed the lite permissions on a Linux server from -rwxrw-r-x to - rwxrwxrwx. Which of the following commands did the administrator use?
A. chmod
B. rm
C. apt-get
D. chown
A customer has called the help desk because a word processing application will no longer open. It was working fine earlier, but the user had to close a document quickly. An error message popped up about a network resource, and then the document crashed. Now, when the user clicks on the icon to launch the application, it does not give an error and will not open. Which of the following should a technician do FIRST?
A. Run full antivirus and anti-malware scans on the computer.
B. Check the processes to see if the task is still running and kill it.
C. Reinstall the proprietary office suite of applications.
D. Connect the computer to the network and remap the share.
A technician is setting up a SOHO router for a customer. Per the customer's requirements, data security is the highest priority. Which of the following provides the MOST security for the network?
A. Set up encryption for wireless
B. Set up port forwarding.
C. Set static IP addresses.
D. Change the default SSID.
Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).
A. .vbs
B. .txt
C. .exe
D. .Up
E. .bat
F. .xlsx
A technician maps a network printer for a few users in an office. The users are initially able to print, but about a week later, they cannot print to the network printer. Which of the following should the technician do to ensure all users can print?
A. Configure the printer NIC to use full duplexing.
B. Locally attach the printer to the user's device.
C. Configure the printer to use a dynamic IP address.
D. Map the printer by hostname rather than IP address.
A technician is remediating a virus on an infected workstation. All user files are set to system and hidden. Which of the following should a technician perform NEXT to remediate the system?
A. Back up user data and rebuild the user profile.
B. Restore user data and reset the user file attributes via a command line.
C. Run System Restore to a date before the infection
D. Perform a clean install of the OS and restore the user data
E. Reset all file attributes on the user's profile via command line
A technician is working on a computer that has the following symptoms
1.
Unable to access the Internet
2.
Unable to send email
3.
Network connection (limited or no connectivity)
The technician runs hardware diagnostics on the computer and verifies the computer's NIC is funcboning correctly. The technician attempts to access the Internet and receives the message: page cannot be displayed. The technician runs a command to verify the computer network settings and sees the following information
1.
IP address:192.166.0.100
2.
Subnet mask.: 255.255.255.0
3.
Gateway: 192.168.0.1
4.
DNS: 192.168.0.1
The technician confirms other computers on the network can access the Internet. Which of the following is MOST likely causing the issues?
A. Rogue antivirus
B. Firewall rule
C. Ransomware
D. Proxy settings
Which of the following threats commonly relies on DNS poisoning and spoofing to exploit an unknowing victim?
A. Rainbow tables
B. Brute force
C. Man-in-the-middle
D. Zero-day attacks
E. Phishing
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.