Exam Details

  • Exam Code
    :220-1002
  • Exam Name
    :CompTIA A+ Certification: Core 2
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :898 Q&As
  • Last Updated
    :Apr 16, 2025

CompTIA CompTIA Certifications 220-1002 Questions & Answers

  • Question 671:

    A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users' mobile devices.

    Which of the following should the security administrator recommend? (Choose two.)

    A. Change management policy

    B. EULA

    C. BYOD policy

    D. Risk analysis

    E. MDM policy

    F. Time-based login policies

  • Question 672:

    Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

    A. Shoulder surfing

    B. Phishing

    C. Tailgating

    D. Dumpster diving

  • Question 673:

    A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs.

    Which of the following types of documentation has the user MOST likely received? (Choose two.)

    A. Inventory management policy

    B. Knowledge base articles

    C. End-user acceptance document

    D. Acceptable use policy

    E. Incident documentation

    F. Network diagrams

  • Question 674:

    Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some websites, and web services are not responding from any of the web browsers, although Joe can access these services from his smartphone without issue. The computer's malware scanner has the latest definitions installed.

    Which of the following would BEST explain why the computer is functioning this way?

    A. Expired root certificate

    B. OS update failures

    C. Pop-up blocker

    D. Hijacked email

  • Question 675:

    A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST?

    A. Contact the application vendor support staff for more information

    B. Boot into safe mode, and then load the ERD and restore the most recent files

    C. Boot the PC, run misconfig, check the safe boot box under the Boot tab, and then restart

    D. Log in as an administrative user and determine if the problem persists

  • Question 676:

    An end user reports a Windows computer is infected with a virus. Which of the following should be the technician's FIRST troubleshooting step?

    A. Identify malware symptoms

    B. Disable System Restore

    C. Run Windows Update

    D. Educate the end user

  • Question 677:

    A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs.

    Which of the following types of documentation has the user MOST likely received? (Choose two.)

    A. Inventory management policy

    B. Knowledge base articles

    C. End-user acceptance document

    D. Acceptable use policy

    E. Incident documentation

    F. Network diagrams

  • Question 678:

    A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page.

    Which of the following should the user check to troubleshoot the cause of the issue?

    A. The existing wireless network connection

    B. The signal strength from the ISP regional satellite

    C. The data speeds from the user's ISP

    D. The user's default gateway settings

  • Question 679:

    Which of the following attack types exploits vulnerabilities in human nature?

    A. Zero-day

    B. Man-in-the-middle

    C. Spoofing

    D. Phishing

  • Question 680:

    A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed?

    A. Password policy

    B. Acceptable use policy

    C. Regulatory policy

    D. Compliance policy

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.