The latest CompTIA A+ Core 2 220-1002 Certification Dumps are new updated to help you for your A+ Certification. You can use PassQuestion CompTIA A+ Core 2 220-1002 Certification Dumps multiple times so you can ensure your success in the real exam. It will provide you a real exam scenario so you can get a better idea of how you can prepare for the CompTIA A+ 220-1002 exam. It is the right way to proceed so you can manage things in the perfect way. Make sure that you are using up to date CompTIA A+ Core 2 220-1002 Certification Dumps so you can easily clear CompTIA A+ 220-1002 exam on the first attempt.
CompTIA A+ Core 2 (220-1002) Certification
Candidates are encouraged to use this document to help prepare for CompTIA A+ Core 2. In order to receive the CompTIA A+ certification, you must pass two exams: Core 1 (220- 1001) and Core 2 (220-1002). CompTIA A+ Core 2 measures the necessary skills for an entry level IT professional. Successful candidates will have the knowledge required to:
• Assemble components based on customer requirements
• Install, configure, and maintain PCs, mobile devices, and software for end users
• Understand the basics of networking and security forensics
• Properly and safely diagnose, resolve, and document common hardware and software issues
• Apply troubleshooting skills
• Provide appropriate customer support
• Understand the basics of scripting, virtualization, desktop imaging, and deployment
CompTIA A+ Core 2 (220-1002) Test Details
Required exam Core 2
Number of questions Maximum of 90
Types of questions Multiple choice and performance-based
Length of test 90 minutes
Recommended experience 12 months of experience as an IT support specialist
Passing score 700 (on a scale of 100–900)
CompTIA A+ Core 2 (220-1002) Exam Topics
1.0 Operating Systems 27%
2.0 Security 24%
3.0 Software Troubleshooting 26%
4.0 Operational Procedures 23%
View Online CompTIA A+ Core 2 220-1002 Free Questions
Which of the following is a reason to use WEP over WPA?
A. Device compatibility
B. Increased security
D. Multifactor authentication
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.
With which of the following types of infections are the PCs MOST likely infected? (Select two.)
A technician is repairing a computer.
Which of the following should the technician do to protect the computer from accidental voltage spikes?
A. Practice electrical fire safety.
B. Clean tools properly before use.
C. Remove any jewelry.
D. Connect a proper ESD strap.
A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory,.
Which of the following should the technician use to accomplish this?
A. Devices and Printer
B. Sync Center
C. Device Manager
D. Power Option
Which of the following devices provides protection against brownouts?
A. battery backup
B. surge suppressor
C. rack grounding
D. line conditioner
Which of the following is a community supported, open source OS used for both services and workstations?
B. Windows 10
D. OS X
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license.
Which of the following license type should the technician recommend?
A. Open license
B. Personal license
C. Corporate license
D. Enterprise license
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
A. Access control lists
B. Multifactor authentication
C. Organizational unit
D. Trusted software sources
E. Data loss prevention
F. Pre-shared key
Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?
A. Local Administrator
B. Standard User
C. Power User
D. Guest User
A technician has set up a new computer for a customer and needs to add a login with administrative privileges.
Which of the following tools should the technician use?
A. Component Services
B. System Configuration
C. Security Policy
D. Local Users and Groups