A+ Certification Exam: Core 2

Here you have the best CompTIA 220-1002 practice exam questions

  • You have 472 total questions to study from
  • Each page has 5 questions, making a total of 95 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on December 12, 2024
Question 1 of 472

SIMULATION -

A technician has installed two new drives in one of the computers in the computer lab. Disk1 will be utilized for user and application data. Disk 2 has already been properly configured and has production data on in. The technician has been unable to format the appropriate disk from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user's files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.

INSTRUCTIONS:

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Correct Answer:

    Please review explanation for detailed answer.

    Please review explanation for detailed answer.

    ✑ Right click on disk 1, click on initialize

    ✑ Choose disk and option as MBR. Hit ok.

    ✑ Again, right click on disk 1 and choose convert to dynamic disk.

    ✑ Now right click on disk 1 and choose new simple volume.

    ✑ Specify storage as 256000 and assign a drive letter F and choose file system as NTFS and click finish.

    ✑ Do the same thing for rest of space of disk 1, assigning 512000MB and using Disc G

    Here are the screen shots showing this process:

Question 2 of 472

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.

Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

    Correct Answer: C

    When an application fails to launch and gives an error message on two smartphones, the first step is to clear the application cache. This can resolve issues caused by corrupted cached data without making more drastic changes like updating the OS or reinstalling the application. Clearing the cache is a quick, non-intrusive step that often resolves such problems.

Question 3 of 472

A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Choose two.)

    Correct Answer: B, C

    To address a slow Windows 10 PC, the CHKDSK utility (Check Disk) is valuable as it checks for and attempts to repair file system errors and bad sectors on the hard drive, potentially resolving issues causing the system to slow down. The DISM (Deployment Image Servicing and Management) tool can be used to repair and restore the health of the Windows image, which may correct deeper system issues and enhance performance. Both utilities are appropriate for troubleshooting and rectifying conditions that can contribute to the system's slow performance.

Question 4 of 472

An administrator is setting up a Windows terminal server.

Which of the following settings should the administrator modify to increase server security? (Choose two.)

    Correct Answer: C, E

    To increase the security of a Windows terminal server, two effective settings to modify would be changing the default access port and enforcing password complexity. Changing the default access port makes it harder for attackers to locate and potentially exploit the service, as it is no longer on a well-known port number. Enforcing password complexity ensures that users create strong, hard-to-guess passwords, which significantly reduces the risk of unauthorized access through brute force attacks.

Question 5 of 472

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

    Correct Answer: B

    To securely manage network switches and routers remotely, the best protocol to use is SSH (Secure Shell). SSH provides a secure channel over an unsecured network by using encryption, ensuring that the data transmitted between the IT firm and the company's devices remains confidential and protected from interception. Other options such as Telnet, RDP, and VNC do not offer the same level of security for accessing network devices.