更新された2023年11月合格させる220-1102試験リアル練習テスト問題 [Q62-Q81]

Share

更新された2023年11月合格させる220-1102試験リアル練習テスト問題

無料ダウンロードCompTIA 220-1102リアル試験問題


CompTIA A+認定試験:Core 2(220-1102)は、90分間の試験で、90の多肢選択問題およびパフォーマンスベースの問題から構成されています。試験の合格スコアは、100〜900のスケールで700です。この試験は、英語、ドイツ語、日本語、ポルトガル語、およびスペイン語で利用可能で、世界中のPearson VUEテストセンターで受験することができます。試験に合格することで、ITプロフェッショナルは、IT業界でのキャリアアップに必要な知識とスキルを証明できます。この認定は、グローバルに認められ、IT業界の雇用主から高く評価されています。

 

質問 # 62
A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

  • A. Enable the quarantine feature on both antivirus software programs.
  • B. Launch Windows Update, and then download and install OS updates
  • C. Activate real-time protection on both antivirus software programs
  • D. Uninstall one antivirus software program and install a different one.
  • E. Remove the user-installed antivirus software program.

正解:E

解説:
Removing the user-installed antivirus software program is the best way to resolve the issue of extremely slow performance caused by installing additional real-time protection antivirus software on a PC. Having more than one antivirus software program running at the same time can cause conflicts, resource consumption and performance degradation. Uninstalling one antivirus software program and installing a different one, activating real-time protection on both antivirus software programs, enabling the quarantine feature on both antivirus software programs and launching Windows Update are not effective ways to resolve the issue. Verified Reference: https://www.comptia.org/blog/why-you-shouldnt-run-multiple-antivirus-programs-at-the-same-time https://www.comptia.org/certifications/a


質問 # 63
A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

  • A. Installer_x86.exe
  • B. Installer_32.msi
  • C. Installer_Win10Enterprise.dmg
  • D. Installer_Files.zip
  • E. Installer_x64.exe

正解:A

解説:
Explanation
The 32-bit operating system can only run 32-bit applications, so the technician should execute the 32-bit installer. The "x86" in the file name refers to the 32-bit architecture.
https://www.digitaltrends.com/computing/32-bit-vs-64-bit-operating-systems/


質問 # 64
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

  • A. VPN
  • B. MSRA
  • C. VNC
  • D. SSH

正解:A

解説:
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. The technician should implement VPN


質問 # 65
Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

  • A. Windows updates
  • B. DNS servers
  • C. IP address
  • D. System time

正解:B

解説:
When a user experiences unexpected or erratic behavior while browsing the internet, it could be caused by the DNS servers. DNS translates human-readable domain names (like google.com) into IP addresses, which computers can use to communicate with web servers. If the DNS servers are not functioning correctly or have been compromised, it can result in the browser being redirected to unintended websites.


質問 # 66
A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?

  • A. Adjust the content filtering.
  • B. Unmap port forwarding.
  • C. Reduce the encryption strength
  • D. Disable unused ports.

正解:A

解説:
Content filtering is a process that manages or screens access to specific emails or webpages based on their content categories1. Content filtering can be used by organizations to control content access through their firewalls and enforce corporate policies around information system management2. A SOHO client may have content filtering enabled on their network and may need to adjust it to allow access to a corporate website that is blocked by default. The client can use a software program, a hardware device, or a subscription service to configure the content filtering settings and whitelist the desired website2.


質問 # 67
A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change.
The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

  • A. Configure a hardened SFTP portal for file transfers between file servers
  • B. Require files to be individually password protected with unique passwords
  • C. Enable BitLocker To Go with a password that meets corporate requirements
  • D. Deploy a secondary hard drive with encryption on the appropriate workstation

正解:C

解説:
Explanation
The BEST way to secure the current workflow of transferring sensitive personal information between offices when conducting business is to enable BitLocker To Go with a password that meets corporate requirements.
This is because BitLocker To Go is a full-disk encryption feature that encrypts all data on a USB drive, which is what the company currently uses, and requires a password to access the data.


質問 # 68
A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

  • A. Firewall
  • B. Screened subnet
  • C. Antivirus
  • D. Anti-phishing training

正解:D

解説:
Anti-phishing training is a method of educating users on how to identify and avoid phishing attacks, which are attempts to trick users into revealing sensitive information or performing malicious actions by impersonating legitimate entities or persons. Whaling attacks are a specific type of phishing attack that target high-level executives or influential individuals within an organization. Anti-phishing training can help users recognize the signs of whaling attacks and prevent them from falling victim to them. Screened subnet, firewall, and antivirus are not items that can directly address the issue of whaling attacks.


質問 # 69
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

  • A. Reboot the system in safe mode and rescan.
  • B. Reinstall the operating system.
  • C. Run the virus scanner in an administrative mode.
  • D. Manually delete the infected files.

正解:A

解説:
Rebooting the system in safe mode will limit the number of programs and processes running, allowing the antivirus system to more effectively identify and remove the malware. Rescanning the system will allow the antivirus system to identify and remove the malware while preserving the user's files.


質問 # 70
Which of the following allows access to the command line in macOS?

  • A. Terminal
  • B. PsExec
  • C. command.com
  • D. CMD

正解:A

解説:
Terminal is an application that allows access to the command line in macOS. The command line is an interface that allows users to interact with the operating system and perform various tasks by typing commands and arguments. Terminal can be used to launch programs, manage files and folders, configure settings, troubleshoot issues, and run scripts in macOS. PsExec, command.com, and CMD are not applications that allow access to the command line in macOS.


質問 # 71
A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

  • A. VNC
  • B. MSRA
  • C. SFTP
  • D. SSH

正解:A

解説:
Explanation
The administrator can use Virtual Network Computing (VNC) to troubleshoot the server effectively. VNC is a graphical desktop sharing system that allows the administrator to remotely control the desktop of a Linux server.


質問 # 72
A help desk technician runs the following script: Inventory.py. The technician receives the following error message:
How do you want to Open this file?
Which of the following is the MOST likely reason this script is unable to run?

  • A. The script was not built for Windows.
  • B. Scripts are not permitted to run.
  • C. The script requires administrator privileges,
  • D. The runtime environment is not installed.

正解:D

解説:
The error message is indicating that the script is not associated with any program on the computer that can open and run it. This means that the script requires a runtime environment, such as Python, to be installed in order for it to execute properly. Without the appropriate runtime environment, the script will not be able to run.


質問 # 73
Which of the following is the default GUI and file manager in macOS?

  • A. Finder
  • B. FileVault
  • C. Disk Utility
  • D. Dock

正解:A

解説:
Explanation
Finder is the default GUI and file manager in macOS. Finder is an application that allows users to access and manage files and folders on their Mac computers. Finder also provides features such as Quick Look, Spotlight, AirDrop and iCloud Drive. Finder uses a graphical user interface that consists of icons, menus, toolbars and windows to display and interact with files and folders. Disk Utility is a utility that allows users to view and manage disk drives and partitions on their Mac computers. Disk Utility is not a GUI or a file manager but a disk management tool. Dock is a feature that allows users to access and launch applications on their Mac computers. Dock is not a GUI or a file manager but an application launcher. FileVault is a feature that allows users to encrypt and protect their data on their Mac computers. FileVault is not a GUI or a file manager but an encryption tool. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.1


質問 # 74
During an enterprise rollout of a new application, a technician needs to validate compliance with an application's EULA while also reducing the number of licenses to manage. Which of the following licenses would best accomplish this goal?

  • A. Personal use license
  • B. Open-source license
  • C. Corporate use license
  • D. Non-expiring license

正解:C

解説:
A corporate use license, also known as a volume license, is a type of software license that allows an organization to purchase and use multiple copies of a software product with a single license key. A corporate use license can help validate compliance with an application's EULA (end-user license agreement), which is a legal contract that defines the terms and conditions of using the software. A corporate use license can also reduce the number of licenses to manage, as it eliminates the need to activate and track individual licenses for each copy of the software. Personal use license, open-source license, and non-expiring license are not types of licenses that can best accomplish this goal.


質問 # 75
Which of the following editions of Windows 10 requires reactivation every 180 days?

  • A. Pro for Workstation
  • B. Pro
  • C. Home
  • D. Enterprise

正解:D

解説:
Windows 10 Enterprise is an edition of Windows 10 that is designed for large organizations that need advanced security and management features. Windows 10 Enterprise can be activated using different methods, such as Multiple Activation Key (MAK), Active Directory-based Activation (ADBA), or Key Management Service (KMS)1. KMS is a method of activation that uses a local server to activate multiple devices on a network. KMS activations are valid for 180 days and need to be renewed periodically by connecting to the KMS server2. If a device does not renew its activation within 180 days, it will enter a grace period of 30 days, after which it will display a warning message and lose some functionality until it is reactivated3. The other editions of Windows 10 do not require reactivation every 180 days. Windows 10 Pro for Workstation is an edition of Windows 10 that is designed for high-performance devices that need advanced features such as ReFS file system, persistent memory, and faster file sharing. Windows 10 Pro for Workstation can be activated using a digital license or a product key. Windows 10 Home is an edition of Windows 10 that is designed for personal or home use. Windows 10 Home can be activated using a digital license or a product key. Windows 10 Pro is an edition of Windows 10 that is designed for business or professional use. Windows 10 Pro can be activated using a digital license or a product key. None of these editions require reactivation every 180 days unless there are significant hardware changes or other issues that affect the activation status.


質問 # 76
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the best choice for accessing the necessary configuration to complete this goal?

  • A. Network and Sharing Center
  • B. Windows Defender Firewall
  • C. Internet Options
  • D. Security and Maintenance

正解:C

解説:

Explore
The correct answer is D. Internet Options. The Internet Options utility in Windows allows you to configure various settings related to your internet connection, including the proxy server settings. To access the Internet Options utility, you can either open the Control Panel and click on Internet Options, or open any web browser and click on the Tools menu and then on Internet Options. In the Internet Options window, go to the Connections tab and click on the LAN settings button. Here, you can enable or disable the use of a proxy server, as well as enter the address and port number of the proxy server you want to use12.
Security and Maintenance is a utility in Windows that allows you to view and manage the security and maintenance status of your computer, such as firewall, antivirus, backup, troubleshooting, and recovery settings. It does not have any option to configure proxy server settings.
Network and Sharing Center is a utility in Windows that allows you to view and manage your network connections, such as Wi-Fi, Ethernet, VPN, or dial-up. It also allows you to change network settings, such as network discovery, file and printer sharing, homegroup, and adapter settings. It does not have any option to configure proxy server settings.
Windows Defender Firewall is a utility in Windows that allows you to enable or disable the firewall protection for your computer, as well as configure firewall rules for inbound and outbound traffic. It does not have any option to configure proxy server settings.


質問 # 77
A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

  • A. Operating system updates
  • B. Firewall
  • C. Antivirus
  • D. Remote wipe

正解:C


質問 # 78
A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

  • A. Ensuring equipment is grounded
  • B. Ensuring proper ventilation
  • C. Utilizing an ESD strap
  • D. Placing the PSU in an antistatic bag
  • E. Disconnecting the computer from the power source
  • F. Removing dust from the ventilation fans

正解:C、D

解説:
Explanation
The two safety procedures that would best protect the components in the PC are:
Utilizing an ESD strap
Placing the PSU in an antistatic bag
https://www.professormesser.com/free-a-plus-training/220-902/computer-safety-procedures-2/
https://www.skillsoft.com/course/comptia-a-core-2-safety-procedures-environmental-impacts-cbdf0f2c-61c0-4f4


質問 # 79
A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

  • A. ipconfig /all
  • B. hostname
  • C. ping :: 1
  • D. nslookup localhost
  • E. arp -a
  • F. netstat /?

正解:A、B


質問 # 80
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

  • A. WPA3 with AES-128
  • B. WPA3withAES-256
  • C. WPA2 with AES
  • D. WPA2 with TKIP

正解:C

解説:
This is because WPA2 with AES is the most secure wireless network configuration that is available on a ten-year-old SOHO wireless router.


質問 # 81
......

220-1102問題集100パー合格保証には最新のサンプル:https://www.jpntest.com/shiken/220-1102-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡