시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / 220-1102 덤프  / 220-1102 문제 연습

CompTIA 220-1102 시험

CompTIA A+ Certification Core 2 Exam 온라인 연습

최종 업데이트 시간: 2025년09월30일

당신은 온라인 연습 문제를 통해 CompTIA 220-1102 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 220-1102 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 77개의 시험 문제와 답을 포함하십시오.

 / 10

Question No : 1


A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists.
Which of the following would MOST likely resolve the issue?

정답:
Explanation:
A. Quarantining system files - Quarantining system files may not necessarily resolve the issue. While it's true that quarantining can help protect the system from further infection, it doesn't ensure that the malware is completely removed. If the malware is deeply embedded or is a rootkit, it might still persist even after quarantining files.
B. Reimaging the workstation - This is typically the most effective way to ensure that all malware is removed from a system. Reimaging wipes the hard drive clean and reinstalls the operating system and software from a known good source. This completely removes any malware that might be present and restores the workstation to a clean state.
C. Encrypting the hard drive - Encrypting the hard drive protects data from being accessed without authorization, but it won't remove existing malware or prevent it from executing.
D. Disabling TLS 1.0 support - TLS (Transport Layer Security) is a protocol for secure communication over a network. Disabling a specific version of TLS has nothing to do with removing malware from a system.
So, the best option for resolving the issue would be to reimage the workstation, which will erase all data and software, eliminating any malware, and then reinstall the operating system and necessary software.

Question No : 2


A company needs employees who work remotely to have secure access to the corporate intranet.
Which of the following should the company implement?

정답:
Explanation:
A virtual private network (VPN) is a technology that creates a secure and encrypted connection over a public network, such as the internet. A VPN allows remote employees to access the corporate intranet as if they were physically connected to the local network3. Password-protected Wi-Fi is a security measure for wireless networks that does not provide access to the corporate intranet. Port forwarding is a technique that allows external devices to access services on a private network through a router, but does not provide access to the corporate intranet. A perimeter network is a network segment that lies between an internal network and an external network, such as the internet, and provides an additional layer of security, but does not provide access to the corporate intranet.

Question No : 3


A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes.
Which of the following encryption solutions should the technician choose?

정답:
Explanation:
A. Encrypting File System (EFS) - This is a feature of Windows that allows you to store information on your hard disk in an encrypted format. However, it is not full disk encryption. EFS only encrypts individual files or folders.
B. FileVault - FileVault is a disk encryption program available in Mac OS X 10.3 and later. It uses XTS-AES-128 encryption with a 256-bit key to help prevent unauthorized access to information on the startup disk. Since the laptop is a Windows device, FileVault would not be applicable here.
C. BitLocker - BitLocker is a full disk encryption feature included with Windows Vista and later. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining (CBC) or XTS mode with a 128-bit or 256-bit key. This is the correct choice for a Windows laptop that needs full disk encryption.
D. Encrypted LVM - LVM stands for Logical Volume Management. It is a storage device management technology that gives users the power to pool and abstract the physical layout of component storage devices for easier and flexible administration. While LVM can be encrypted, it is typically used in Linux environments, not Windows.

Question No : 4


A data center is required to destroy SSDs that contain sensitive information.
Which of the following is the BEST method to use for the physical destruction of SSDs?

정답:
Explanation:
Shredding is the best method to use for the physical destruction of SSDs because it reduces them to small pieces that cannot be recovered or accessed. Wiping, low-level formatting, and erasing are not effective methods for destroying SSDs because they do not physically damage the flash memory chips that store data1.

Question No : 5


Before leaving work, a user wants to see the traffic conditions for the commute home.
Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?

정답:
Explanation:
The user can use the Task Scheduler (taskschd.msc) to schedule the browser to automatically launch a traffic website at 4:45 p.m. The Task Scheduler is a tool in Windows that allows users to schedule tasks to run automatically at specified times or in response to certain events.

Question No : 6


A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

정답:
Explanation:
The user can most likely make the change of extending the display to a second monitor in the System option in the Windows settings. The System option allows users to manage system settings and features, such as display, sound, notifications, power and storage. The user can extend the display to a second monitor by selecting Display from the System option and then choosing Extend these displays from the Multiple displays drop-down menu. This will allow the user to use both monitors as one large desktop area. Devices is an option in the Windows settings that allows users to add and manage devices connected to the computer, such as printers, scanners, mice and keyboards. Devices is not related to extending the display to a second monitor but to configuring device settings and preferences. Personalization is an option in the Windows settings that allows users to customize the appearance and behavior of their desktop, such as themes, colors, backgrounds, lock screen and screensaver.

Question No : 7


A user's corporate phone was stolen, and the device contains company trade secrets.
Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

정답:
Explanation:
Remote wipe is a feature that allows data to be deleted from a device or system remotely by an administrator or owner1. It is used to protect data from being compromised if the device is lost, stolen, or changed hands1. Device encryption is a feature that helps protect the data on a device by making it unreadable to unauthorized users2. It requires a key or a password to access the data2. Both features can help mitigate the risk of losing company trade secrets if a corporate phone is stolen.
References:
1: How to remote wipe Windows laptop (https://www.thewindowsclub.com/remote-wipe-windows-10)
2: Device encryption in Windows (https://support.microsoft.com/en-us/windows/device-encryption-in-windows-ad5dcf4b-dbe0-2331-228f-7925c2a3012d)

Question No : 8


Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

정답:
Explanation:
The feature that allows a technician to configure policies in a Windows 10 Professional desktop is gpedit. Gpedit is a command that opens the Local Group Policy Editor, which is a utility that allows users to view and modify local group policies on their Windows PC. Local group policies are a set of rules and settings that control the behavior and configuration of the system and its users. Local group policies can be used to configure policies such as security, network, software installation and user rights. Gpmc is a command that opens the Group Policy Management Console, which is a utility that allows users to view and modify domain-based group policies on a Windows Server. Domain-based group policies are a set of rules and settings that control the behavior and configuration of the computers and users in a domain. Domain-based group policies are not available on a Windows 10 Professional desktop. Gpresult is a command that displays the result of applying group policies on a Windows PC. Gpresult can be used to troubleshoot or verify group policy settings but not to configure them. Gpupdate is a command that updates or refreshes the group policy settings on a Windows PC. Gpupdate can be used to apply new or changed group policy settings but not to configure them. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.6

Question No : 9


A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account.
Which of the following should the systems administrator do?

정답:
Explanation:
This will ensure that the user is the only one who knows their password, and that the new password is secure.
The CompTIA A+ Core 2 220-1002 exam covers this topic in the domain 1.4 Given a scenario, use appropriate data destruction and disposal methods.

Question No : 10


Which of the following is a proprietary Cisco AAA protocol?

정답:
Explanation:
TACACS+ is a proprietary Cisco AAA protocol

Question No : 11


Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred.
Which of the following steps should the technician try FIRST to correct the issue?

정답:
Explanation:
The technician should run the System File Checker (SFC) first to correct file corruption errors on computers after a power outage. SFC is a command-line utility that scans for and repairs corrupted system files. It can be run from the command prompt or from the Windows Recovery Environment. Rebuilding the Windows profiles, restoring the computers from backup, and reimaging the computers are more drastic measures that should be taken only if SFC fails to correct the issue1

Question No : 12


A user calls the help desk to report that mapped drives are no longer accessible. The technician verifies that clicking on any of the drives on the user's machine results in an error message. Other users in the office are not having any issues. As a first step, the technician would like to remove and attempt to reconnect the drives.
Which of the following command-line tools should the technician use?

정답:
Explanation:
The technician should use net use command-line tool to remove and reconnect mapped drives. Net use is a command that allows users to manage network connections and resources, such as shared folders or printers. Net use can be used to map or unmap network drives by specifying their drive letters and network paths. For example, net use Z: \server\share maps drive Z: to \server\share folder, and net use Z: /delete unmaps drive Z:. Set is a command that displays or modifies environment variables for the current user or process. Set is not related to managing mapped drives. Mkdir is a command that creates a new directory or folder in the current or specified location. Mkdir is not related to managing mapped drives. Rename is a command that renames a file or folder in the current or specified location. Rename is not related to managing mapped drives. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.6

Question No : 13


A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension
Which pf the following actions is the FIRST step the technician should take?

정답:
Explanation:
The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2 Given a scenario, use appropriate resources to support users and 1.3 Explain the importance of security awareness.

Question No : 14


A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive.
Which of the following tools should the technician use?

정답:
Explanation:
The technician should use dfrgui.exe to defragment the hard drive1

Question No : 15


A company installed a new backup and recovery system.
Which of the following types of backups should be completed FIRST?

정답:
Explanation:
The type of backup that should be completed FIRST after installing a new backup and recovery system is a full backup. This is because a full backup is a complete backup of all data and is the foundation for all other backups. After a full backup is completed, other types of backups, such as differential and incremental backups, can be performed.

 / 10