[27-July-2020] New A+ 220-1002 Dumps with VCE and PDF from PassLeader (New Questions)

PassLeader released the NEWEST CompTIA 220-1002 exam dumps recently! Both 220-1002 VCE dumps and 220-1002 PDF dumps are available on PassLeader, either 220-1002 VCE dumps or 220-1002 PDF dumps have the NEWEST 220-1002 exam questions in it, they will help you passing CompTIA 220-1002 exam easily! You can download the valid 220-1002 dumps VCE and PDF from PassLeader here: https://www.passleader.com/220-1002.html (528 Q&As Dumps –> 634 Q&As Dumps –> 695 Q&As Dumps –> 752 Q&As Dumps –> 794 Q&As Dumps –> 868 Q&As Dumps)

Also, previewing the NEWEST PassLeader 220-1002 dumps online for free on Google Drive: https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o

NEW QUESTION 371
A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer’s drive require?

A.    NTFS
B.    Ext4
C.    HFS
D.    FAT32

Answer: B

NEW QUESTION 372
A technician receives the Chief Executive Officer’s (CEO’s) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.)

A.    Disconnect the device from the network.
B.    Identify and research the symptoms.
C.    Restore the computer to the previous checkpoint.
D.    Scan and use removal techniques.
E.    Create a restore point.
F.    Educate the end user.
G.    Schedule scans and run updates.

Answer: ABD

NEW QUESTION 373
While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

A.    Reimage the machine from a network share.
B.    Change the boot order and boot to an external drive.
C.    Remove and then replace the CMOS battery.
D.    Use the BIOS user password to reset the supervisor password.

Answer: C

NEW QUESTION 374
Which of the following wireless security protocols supports the use of a 40-bit encryption key?

A.    TKIP
B.    WEP
C.    WPA
D.    WPA2

Answer: B

NEW QUESTION 375
A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)

A.    Reboot into safe mode.
B.    Clear the application data.
C.    Contact the application’s developer.
D.    Reinstall the application.
E.    Do a force stop.
F.    Clear the application cache.

Answer: EF

NEW QUESTION 376
A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

A.    Inventory management policy.
B.    Knowledge base articles.
C.    End-user acceptance document.
D.    Acceptable use policy.
E.    Incident documentation.
F.    Network diagrams.

Answer: BD

NEW QUESTION 377
An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?

A.    Increase the amount of RAM.
B.    Reboot the server.
C.    Check the system logs.
D.    Perform disk defragmentation.

Answer: C

NEW QUESTION 378
A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

A.    netstat
B.    net use
C.    nslookup
D.    ping

Answer: A

NEW QUESTION 379
Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

A.    LCD monitor
B.    Power supply
C.    Laptop screen
D.    CRT monitor
E.    Motherboard
F.    Tablet

Answer: BD

NEW QUESTION 380
A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes?

A.    Terminal
B.    Disk maintenance
C.    iCloud
D.    Image recovery

Answer: A

NEW QUESTION 381
An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?

A.    Uninterruptible power supply
B.    Voltage regulator
C.    Surge suppressor
D.    Generator

Answer: A

NEW QUESTION 382
A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

A.    exFAT security
B.    Ext3 security
C.    HFS security
D.    EFS security
E.    CDFS security

Answer: D

NEW QUESTION 383
A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

A.    Enable System Restore on the file server and make frequent restore points.
B.    Disable full disk encryption on the file server.
C.    Install a next-generation firewall at the network edge.
D.    Use a host-based intrusion detection system and continuously monitor filesystem changes.
E.    Use granular file permissions on the share and follow the principle of least privilege.

Answer: D

NEW QUESTION 384
A technician must manually modify the HOSTS system file in order to resolve a website address to a specified local destination. Which of the following utilities should the technician use to BEST accomplish the task?

A.    Regedit
B.    services.msc
C.    Msinfo32
D.    Notepad
E.    MMC

Answer: D

NEW QUESTION 385
An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?

A.    Network-based
B.    Client/server
C.    Application streaming
D.    Peer-to-peer

Answer: B

NEW QUESTION 386
A technician needs to connect securely to a Linux-based network appliance in a remote datacenter. Which of the following will the technician MOST likely use?

A.    SSH
B.    SFTP
C.    RDP
D.    Telnet

Answer: A

NEW QUESTION 387
A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or replacement. The PC has numerous errors during the boot process and is running a very outdated operating system. Which of the following should the technician do?

A.    Ask if the customer would like to donate the PC to a school.
B.    Offer to sell a slightly newer computer to the customer.
C.    Work on the computer and bill the customer for the time.
D.    Advise the customer that the cost of repair is more than a new PC.

Answer: D

NEW QUESTION 388
A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed?

A.    Password policy.
B.    Acceptable use policy.
C.    Regulatory policy.
D.    Compliance policy.

Answer: B

NEW QUESTION 389
An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent any further emails from this organization?

A.    Click the “Unsubscribe” button on each unwanted email.
B.    Send the unwanted items to the spam or junk folder.
C.    Deploy an email address whitelist.
D.    Create domain-based filters.

Answer: D

NEW QUESTION 390
A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?

A.    apt-get
B.    iwconfig
C.    sudo
D.    ifconfig

Answer: B

NEW QUESTION 391
A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?

A.    Plan for the change.
B.    Scope of the change.
C.    Risk analysis of the change.
D.    Documentation of the change.

Answer: C

NEW QUESTION 392
An end user reports a Windows computer is infected with a virus. Which of the following should be the technician’s FIRST troubleshooting step?

A.    Identify malware symptoms.
B.    Disable System Restore.
C.    Run Windows Update.
D.    Educate the end user.

Answer: A

NEW QUESTION 393
A user has changed the MAC address of a laptop to gain access to a network. This is an instance of ____.

A.    spoofing
B.    brute force
C.    man-in-the-middle
D.    a botnet

Answer: A

NEW QUESTION 394
Ann, a technician, is dispatched to a corporate customer that has reported a malware infection. Upon arrival, Ann notices the system is shut off, and she is able to start the computer without incident. Ann also notices numerous pop-ups appear when the web browser is opened. Which of the following should Ann do NEXT?

A.    Report the incident to the appropriate contact.
B.    Clear the system logs and browser history.
C.    Take a screenshot of the pop-ups.
D.    Advise the customer to use the browser in private mode.

Answer: A

NEW QUESTION 395
A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?

A.    Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.
B.    Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.
C.    Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.
D.    Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

Answer: A

NEW QUESTION 396
A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?

A.    After granting these permissions, disable the camera and GPS.
B.    Install the application and change the permissions later.
C.    Cancel installation of the application and report it to the application source.
D.    Accept these permission requests and install the application.

Answer: C

NEW QUESTION 397
Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. Which of the following should Joe check NEXT to troubleshoot the issue?

A.    Services
B.    Device Manager
C.    Event Viewer
D.    Programs and Features

Answer: B

NEW QUESTION 398
Which of the following would BEST support an 8TB hard drive with one partition?

A.    GPT
B.    FAT16
C.    FAT32
D.    EFS

Answer: A

NEW QUESTION 399
A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST?

A.    Contact the application vendor support staff for more information.
B.    Boot into safe mode, and then load the ERD and restore the most recent files.
C.    Boot the PC, run msconfig, check the safe boot box under the Boot tab, and then restart.
D.    Log in as an administrative user and determine if the problem persists.

Answer: D

NEW QUESTION 400
A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands would help the technician gain information about the network settings on the machine?

A.    chmod
B.    grep
C.    ifconfig
D.    sudo

Answer: C

NEW QUESTION 401
……


Welcome to choose PassLeader 220-1002 dumps for 100% passing CompTIA 220-1002 exam: https://www.passleader.com/220-1002.html (528 Q&As VCE Dumps and PDF Dumps –> 634 Q&As VCE Dumps and PDF Dumps –> 695 Q&As VCE Dumps and PDF Dumps –> 752 Q&As VCE Dumps and PDF Dumps –> 794 Q&As VCE Dumps and PDF Dumps –> 868 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader 220-1002 dumps online for free on Google Drive: https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o