Which of the following security principles help to prevent employees from changing files they are intended only to view?
- A. DLP
- B. MDM
- C. ACL
- D. MFA
Free 220-1002 sample questions for the CompTIA A+ Certification Exam: Core 2 exam. No account required: study at your own pace.
Want an interactive quiz? Take the full 220-1002 practice testLooking for more? Click here to get the full PDF with 462+ practice questions for $10 for offline study and deeper preparation.
Which of the following security principles help to prevent employees from changing files they are intended only to view?
Which of the following identifies changes in the environment, such as alternating current failure?
A technician is reinstalling Windows for a user and wants to keep the user's files and settings. Afterward, the user notices that personal files are no longer available and settings have been restored to default. Which of the following did the technician MOST likely execute to cause this issue?
A technician needs to update the network firewall, which will cause a temporary outage. The technician submits a change management request to perform the required maintenance. Which of the following provides details about what the technician will need to do if the update fails?
Which of the following provide the BEST security for a server room? (Choose two.)
A customer has a Windows 7 x86 computer with 4GB of RAM and needs to upgrade the RAM to meet the minimum specifications for a new piece of software. Which of the following should a technician recommend to the customer FIRST?
A customer keeps receiving the following message: Website blocked due to PUP. The customer asks a technician to resolve the issue immediately. Which of the following should the technician do to help resolve the customer's issue?
Which of the following WiFi protocols is the MOST secure?
A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?
A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a `Stop` error on every boot. Which of the following should the technician complete to resolve the issue?
Which of the following threats uses personalized information in an attempt at obtaining information?
A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user's BEST option given the situation?
A technician is updating a Linux server that had been in storage. After booting into single-user mode, a command is issued that displays the technician's current location in the filesystem. Which of the following commands was issued?
A Linux user types the following command: apt-get update The action is denied due to insufficient privileges. Which of the following should precede the above command to successful execution?
Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?
A company wants to move the contents of its users' My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?
An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Choose two.)
Which of the following techniques is used by malicious employees to obtain user passwords?
Download the complete 220-1002 study bundle with 462+ questions in a single printable PDF.