Exam Details

  • Exam Code
    :220-1002
  • Exam Name
    :CompTIA A+ Certification: Core 2
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :898 Q&As
  • Last Updated
    :Apr 16, 2025

CompTIA CompTIA Certifications 220-1002 Questions & Answers

  • Question 661:

    A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?

    A. Loop

    B. Integer

    C. String

    D. Variable

  • Question 662:

    Which of the following would BEST support an 8TB hard drive with one partition?

    A. GPT

    B. FAT16

    C. FAT32

    D. EFS

  • Question 663:

    A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

    A. Download and apply the security patch that addresses the vulnerability that was exploited

    B. Use System Restore to bring the PC back to a previous restore point.

    C. Reimage the computer and update it with all the latest patches

    D. Download another antivirus software that will quarantine the virus.

  • Question 664:

    A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom.

    Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

    A. Enable System Restore on the file server and make frequent restore points.

    B. Disable full disk encryption on the file server.

    C. Install a next-generation firewall at the network edge.

    D. Use a host-based intrusion detection system and continuously monitor filesystem changes.

    E. Use granular file permissions on the share and follow the principle of least privilege.

  • Question 665:

    A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)

    A. Reboot into safe mode

    B. Clear the application data

    C. Contact the application's developer

    D. Reinstall the application

    E. Do a force stop

    F. Clear the application cache

  • Question 666:

    A company wants to move the contents of its users' My Documents folders from their local hard drives to a file server so they are backed up every night.

    Which of the following security concepts does this describe?

    A. Organizational units

    B. Folder redirection

    C. Group Policy

    D. Login script

  • Question 667:

    A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level Which of the following should the technician configure?

    A. Attributes

    B. Shares

    C. Inheritance

    D. Replication

  • Question 668:

    After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly

    Which of the following should the technician do NEXT?

    A. Verify the browser's proxy configuration settings

    B. Instruct the user to use the alternate web browser instead.

    C. Disconnect and reconnect from the corporate VPN

    D. Flush the workstation's DNS cache

    E. Scan the user's workstation for malware

  • Question 669:

    A workstation needs to be hardened against brute force attacks. It also needs to be protected if a user walks away and leaves the computer unlocked.

    Which of the following would harden the workstation as required? (Select TWO).

    A. Set up a failed attempts lockout setting.

    B. Enable a screen saver password.

    C. Use a stronger Active Directory password.

    D. Disable local logon time restrictions.

    E. Create a BIOS password

    F. Enforce a password reset policy.

  • Question 670:

    A technician is in the process of removing a recently discovered Trojan horse application from a users laptop. Which of the following should the technician complete to prevent reinfection of the same machine?

    A. Reenable Windows System Restore after rebooting the device

    B. Research the symptoms to identify the threat.

    C. Update the operating system and anti-malware signatures.

    D. Isolate the infected machine from all networks.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.