220-1002 the Most Up to Date VCE And PDF Instant Download

Tens of thousands of competitors, pages of hard questions and unsatisfied exam preparation situations… Do not worried about all those annoying things! We, help you with your CompTIA A 220-1002 CompTIA A Certification Exam: Core 2 exam. We will assist you clear the 220-1002 exam with CompTIA A 220-1002 dumps. We 220-1002 exam questions are the most comprehensive ones.

Visit our site to get more 220-1002 Q and As:https://www.passcerty.com/220-1002.html (898 QAs Dumps)
Question 1:

Which of the following is a reason to use WEP over WPA?

A. Device compatibility

B. Increased security


D. Multifactor authentication

Correct Answer: A

WEP (Wired Equivalent Privacy) was introduced when the 802.11 standard for Wi-Fi networks was launched. It allows the use of a 64-bit or 128-bit key. However, researchers discovered vulnerabilities in WEP in 2001 and proved that it was

possible to break into any WEP network by using a brute-force method to decipher the key. Using WEP is not recommended.

WPA, which stands for Wi-Fi Protected Access, is a newer standard and is much more secure.

Question 2:

Which of the following types of scripts would be seen on the user end of a web page?

A. .bat

B. .js

C. .sh

D. .vbs

Correct Answer: D

Question 3:

A user\’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

A. Reboot into safe mode and roll back the updates

B. Repair the Windows Registry

C. Configure boot options in the BIOS

D. Disable Windows services and applications

Correct Answer: A

Question 4:

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

A. Spyware

B. Zombies

C. Virus

D. Ransomware

E. Worm

F. Botnet

Correct Answer: BE

Question 5:

A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

A. Remove any proxy servers configured on the user\’s browsers.

B. Assist the user with purchasing an SSL certificate and save the certificate to the desktop.

C. Disable the SPI firewall on the office\’s gateway and any other routers.

D. Instruct the user to ignore the certificate error since the user is connecting to a secure website.

E. Create an outbound rule in Windows Firewall named after the user\’s homepage.

F. Run anti-malware scans and download the latest Windows updates.

Correct Answer: AF

Question 6:

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

A. The computer has GRUB Legacy installed

B. Windows Startup services are not running

C. An incompatible partition is marked as active

D. An unsupported version of Windows is installed

Correct Answer: C

Question 7:

A technician is called to troubleshoot a user\’s Windows workstation that fails to boot. The user reports that, after updating the workstation\’s graphics driver to a beta version, the machine gives a “Stop” error on every boot

Which of the following should the technician complete to resolve the issue?

A. Boot the workstation in safe mode and disable the graphics driver system tray menu

B. Boot the workstation in safe mode with networking and install the latest stable graphics driver.

C. Boot the workstation in safe mode and disable Windows driver signing requirements

D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

Correct Answer: A

Question 8:

A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?

A. Practice electrical fire safety.

B. Clean tools properly before use.

C. Remove any jewelry.

D. Connect a proper ESD strap.

Correct Answer: D

Question 9:

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory, Which of the following should the technician use to accomplish this?

A. Devices and Printer

B. Sync Center

C. Device Manager

D. Power Option

Correct Answer: C

Question 10:

Which of the following devices provides protection against brownouts?

A. battery backup

B. surge suppressor

C. rack grounding

D. line conditioner

Correct Answer: A

Question 11:

Which of the following is a community supported, open source OS used for both services and workstations?


B. Windows 10

C. Linux


Correct Answer: C

Question 12:

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the “My Documents” folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

A. Remove the registry entry and rename the local account folder

B. Delete or rename the local user folder

C. Run DISM and re-add the local power user account

D. Remove the user account in Credential Manager and restart the PC

Correct Answer: C

Question 13:

A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?

A. Open license

B. Personal license

C. Corporate license

D. Enterprise license

Correct Answer: A

Question 14:

A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

A. Universal serial bus locks

B. Personal identity verification cards

C. Privacy screen

D. Entry control roster

E. Door locks

F. Privacy window

Correct Answer: EF

Question 15:

Which of the following BEST describes the purpose of an ESD mat?

A. Protects against accidental static discharge

B. Protects against dust/dirt contamination

C. Protects against accidental scratches

D. Protects against accidental water damage

Correct Answer: A

Visit our site to get more 220-1002 Q and As:https://www.passcerty.com/220-1002.html (898 QAs Dumps)

Leave a Reply

Your email address will not be published. Required fields are marked *