CompTIA A+ 220-1202 Question A-20

Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

A. Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop
B. Verify Ann’s laptop has the correct browser settings
C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website
D. Attempt to log on to another vendor’s website from Ann’s laptop
E. Ask Ann about the notification and review the installed programs
F. Reinstall the browser, reboot the laptop, and check the vendor’s website again

Correct Answer: CE

CompTIA A+ 220-1202 Question A-19

Which of the following provide the BEST security for a server room? (Select two.)

A. Badge reader
B. Bollard
C. Biometric lock
D. Cable lock
E. USB token
F. Privacy window shades

Correct Answer: AC

CompTIA A+ 220-1202 Question A-18

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

A. UPS
B. Server rack
C. PoE phone
D. Desktop printer
E. Modem
F. Patch panel

Correct Answer: AB

CompTIA A+ 220-1202 Question A-17

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.)

A. WPA
B. WPA2
C. WEP
D. TKIP
E. RADIUS
F. Multifactor
G. TACACS
H. SSO

Correct Answer: BF

CompTIA A+ 220-1202 Question A-16

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)

A. Disable guest account
B. Remove admin permissions
C. Modify AutoRun settings
D. Change default credentials
E. Run OS security updates
F. Install a software firewall

Correct Answer: AC

CompTIA A+ 220-1202 Question A-15

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

A. Reduce the transmit power
B. Reduce the channel availably
C. Disable the DHCP server
D. Enable QoS management
E. Disable the SSID broadcast
F. Implement WPA encryption

Correct Answer: AE

CompTIA A+ 220-1202 Question A-14

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

A. Default SSID
B. MAC filtering
C. NAT
D. QoS
E. Signal strength
F. Encryption

Correct Answer: BE

CompTIA A+ 220-1202 Question A-13

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)

A. dir
B. chdsk
C. dism
D. ipconfig
E. format
F. diskpart

Correct Answer: BC

CompTIA A+ 220-1202 Question A-12

Emily, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Emily is experiencing?

A. There is unauthenticated wireless connectivity
B. She has exceeded the data allowance
C. The phone is only 3G capable
D. It is an unrooted phone
E. The SIM card was not activated
F. A data plan was not purchased

Correct Answer: A

CompTIA A+ 220-1202 Question A-11

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

A. Spyware
B. Zombies
C. Virus
D. Ransomware
E. Worm
F. Botnet

Correct Answer: BE