Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CompTIA 220-1002 Actual Questions

Page: 12 / 25
Total 665 questions

CompTIA A+ Certification Exam: Core 2 Questions and Answers

Question 45

A technician is setting up network adapter settings on Windows clients that have static IP address assignments. The technician has more than 100 workstation to complete and wants to automate the process. The requirements for the adapter settings are as follows:

* They must utilize a command line utility

* The technician has no access to Group Policy

* All workstation should have an IP address assigned by the DHCP.

Which of the following steps should the technician perform to meet these requirements?

Options:

A.

Use the ipconfig/release and ipconfig /renev command to have the workstation contact the DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

B.

Use the petsh command to reset the workstation adapter. Then use the ipconfig /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

C.

Use the net use command to view active connection on the network. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

D.

Use the netstat command to find connections on the workstation adapter. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a .bat file to execute on all systems.

Question 46

A user tries to open a client/server application, but a prompt appears for the username and password The user is able to open and use the email client with no issues. The user's workstation is a loaner laptop Everyone at the company is given administrator rights on their individual workstations. Which of the following is MOST likely preventing the user from running this program?

Options:

A.

EFS

B.

NTFS

C.

UTP

D.

UAC

Question 47

A user’s company phone was recently wiped. The user Is unsure if an IT administrator wiped the phone or if it was the result of a hacking attempt. A new company policy was recently implemented to tighten security. The new

policy requirements include:

* An allowance for the remote wiping of company data

* PIN unlock

* Failed-attempt device wiping

‘The user normally keeps the phone in a pocket, so it is unlikely that anyone else had access to It. Which of the following is the MOST likely cause of the device being wiped?

Options:

A.

Unauthorized remote access

B.

A system lockout

C.

A virus

D.

A faulty device

Question 48

A technician is setting up a SOHO router for a customer. Per the customer’s requirements, data security is the highest priority. Which of the following provides the MOST security for the network?

Options:

A.

Set up encryption for wireless

B.

Set up port forwarding.

C.

Set static IP addresses.

D.

Change the default SSID.

Page: 12 / 25
Total 665 questions