New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF 220-1102 Study Guide

Page: 40 / 57
Total 756 questions

CompTIA A+ Certification Core 2 Exam Questions and Answers

Question 157

Which of the following is the STRONGEST wireless configuration?

Options:

A.

WPS

B.

WPA3

C.

WEP

D.

WMN

Question 158

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Options:

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Question 159

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

Options:

A.

Run the virus scanner in an administrative mode.

B.

Reinstall the operating system.

C.

Reboot the system in safe mode and rescan.

D.

Manually delete the infected files.

Question 160

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

Options:

A.

File Explorer

B.

User Account Control

C.

Windows Backup and Restore

D.

Windows Firewall

E.

Windows Defender

F.

Network Packet Analyzer

Page: 40 / 57
Total 756 questions