2021 220-1002 Question Bank Free PDF Download Recently Updated Questions [Q324-Q349]

Share

2021 220-1002 Question Bank: Free PDF Download Recently Updated Questions

220-1002 Certification Exam Dumps with 620 Practice Test Questions


Prerequisites for CompTIA 220-1002 Exam

The 220-1002 (Core 2) exam is designed for a certain target audience, so you should go for this test if you believe that you fall into this category of people. The ideal candidates for this exam are those individuals who work as technical support, IT help desk, or IT support specialists. It is also suitable for those who want to get the required skills and prove them with the associated certification to become such a professional. You can also increase your chances for success by having at least a year of experience as an IT specialist before going for this test. Without that experience, you may have some struggles while learning the exam content and answering the questions.

 

NEW QUESTION 324
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved.
Which of the following methods would the technician MOST likely perform on the computer?

  • A. Unattended installation
  • B. In-place upgrade
  • C. Clean installation
  • D. Refresh upgrade

Answer: D

Explanation:
Explanation/Reference:

 

NEW QUESTION 325
A technician notices a workstation is connecting to an IP address on the network and wants to determine the machine name that belongs to that IP address. Which of the following commands should the technician use?

  • A. gpresult
  • B. net user
  • C. nslookup
  • D. ipconfig

Answer: C

 

NEW QUESTION 326
Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting email issues. Which of the following is MOST likely the cause of the issue?

  • A. There is an OS update failure.
  • B. SMTP services are not running.
  • C. Out-of-office is turned on.
  • D. There is an Internet connectivity issue.

Answer: D

 

NEW QUESTION 327
A company has hired a new IT firm to manage its network switches and routers.
The firm is geographically separated from the company and will need to able to securely access the
devices.
Which of the following will provide the ability to access these devices?

  • A. RDP
  • B. VNC
  • C. Telnet
  • D. SSH

Answer: D

 

NEW QUESTION 328
A technician is called to troubleshoot a user's Windowsworkstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot Which of the following should the technician complete to resolve the issue?

  • A. Boot the workstation in safe mode and disable Windows driversigning requirements
  • B. Boot the workstation in safe mode and disable the graphics driver system tray menu
  • C. Boot the workstation in safe mode with networking and install the latest stable graphics driver.
  • D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

Answer: B

 

NEW QUESTION 329
A technician is PXE booting a computer.
Which of the following is the technician MOST likely performing on the computer?

  • A. Multiboot configuration
  • B. In-place upgrade
  • C. Image deployment
  • D. System repair

Answer: C

Explanation:
Explanation

 

NEW QUESTION 330
A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)

  • A. Outdated firmware
  • B. WPS
  • C. Guest network
  • D. Default login
  • E. TKIP
  • F. WEP

Answer: D,F

Explanation:
Explanation

 

NEW QUESTION 331
A special type of ESD-sale vacuum cleaner may be necessary to safely clean large spills of:

  • A. battery acid.
  • B. toner.
  • C. filament
  • D. ink.

Answer: B

 

NEW QUESTION 332
A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point.
Which of the following should the technician do NEXT?

  • A. Run the scan again to ensure all malware has been removed
  • B. Educate the user on safe browsing practices
  • C. Quarantine the infected workstation from the network
  • D. Install all of the latest Windows Updates to patch the system

Answer: D

Explanation:
Explanation

 

NEW QUESTION 333
A smartphone user receives notice that a threshold for high-speed data usage, despite the user's usage behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST?

  • A. Wipe the device and restore to the factory default.
  • B. Change the lock screen password.
  • C. Check network access permissions on recently loaded applications.
  • D. Limit data usage to WiFi networks only.

Answer: C

 

NEW QUESTION 334
A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office.
The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).

  • A. System files have been deleted
  • B. Program file permissions have changed recently.
  • C. There are disabled services on the vendor website.
  • D. The OS has been updated recently.
  • E. There is a rogue anti-malware program.
  • F. Proxy settings are configured improperly

Answer: C,E

 

NEW QUESTION 335
A technician is setting up a SOHO router for a customer. Per the customer's requirements, data security is the highest priority. Which of the following provides the MOST security for the network?

  • A. Set static IP addresses.
  • B. Set up port forwarding.
  • C. Set up encryption for wireless
  • D. Change the default SSID.

Answer: C

 

NEW QUESTION 336
An administrator created a connection to a private network using TLS 1.2. The Linux servers on the network do not support secure protocols. Which of the following will the administrator MOST likely use to log in to these servers?

  • A. RDP
  • B. Telnet
  • C. SSH
  • D. SSL

Answer: C

 

NEW QUESTION 337
A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?

  • A. Telnet
  • B. SFTP
  • C. SSH
  • D. HTTP
  • E. SMB

Answer: C

 

NEW QUESTION 338
A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation.
Which of the following upgrade methods should the technician use?

  • A. network installation
  • B. in-place upgrade
  • C. image deployment
  • D. clean install

Answer: B

 

NEW QUESTION 339
A172
technician logged in as "user1" and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the "user1" account. Which of the following would allow the technician to log in using the "administrator" username?

  • A. Join the computer and file server to a domain and delegate administrator rights to "user1".
  • B. Use the command: net use Z: \\fileserver\share
  • C. Go to the Sync Center and disable the offline files feature.
  • D. Delete the "user" account for the network share in Credential Manager.
  • E. Use the Advanced Sharing options in the Network and Sharing Center and enable "turn on network discovery".

Answer: D

Explanation:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/gg651155(v%3Dws.11)

 

NEW QUESTION 340
Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?

  • A. Restart the table
  • B. Calibrate the touchscreen sensor
  • C. Disable and then renewable Bluetooth
  • D. Disconnect and then reconnect the stylus

Answer: B

 

NEW QUESTION 341
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.
Which of the following security measures should be used?

  • A. Biometric device
  • B. Common access card
  • C. Cable lock
  • D. Mantrap
  • E. Privacy screen

Answer: E

Explanation:
Explanation

 

NEW QUESTION 342
A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager, and the hard disk and the standard AHC11.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

  • A. Update the SATA controller driver from the manufacturer's website.
  • B. Roll back the OS upgrade. Continue using the older version of Windows.
  • C. Reset the PC to its factory conditions Perform the OS upgrade again.
  • D. Perform a full backup and replace the hard drive.

Answer: D

 

NEW QUESTION 343
To which of the following should a technician ground an ESD strap when adding memory to a workstation?

  • A. Computer chassis
  • B. Power supply
  • C. Wooden workbench
  • D. Surge protector

Answer: A

 

NEW QUESTION 344
A technician is removing a virus from a user's Windows workstation. The virus was installed by the user while downloading pirated software from the Internet. Which of the following should the technician do to address this issue?

  • A. End the current explorer.exe task using the command line. Update and run an antivirus scanning utility to remove the threat.
  • B. Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.
  • C. Launch explorer.exe using Task Manager. Update and run an antivirus scanning utility to remove the threat.
  • D. End the current explorer.exe task. Update and run an antivirus scanning utility to remove the threat. Relaunch explorer.exe using Task Manager.

Answer: B

 

NEW QUESTION 345
A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)

  • A. Convince the user to use a different web browser that is currently unaffected
  • B. Download the update to the user's web browser of choice
  • C. Reboot the user's computer and install a secondary antivirus
  • D. Reset the user's browser to default settings
  • E. Remove any unapproved applications from the user's startup items
  • F. Delete the user's cached images, temporary files, and cookies

Answer: D,E

 

NEW QUESTION 346
Which of the following OS installation methods provides previously unavailable features and functionality white maintaining user settings?

  • A. Restore
  • B. Clean install
  • C. In-place upgrade
  • D. Repair installation

Answer: C

 

NEW QUESTION 347
A recent ransomware attack caused several datasets to be inaccessible. Security technicians were able to mitigate any additional attacks and remove any unauthorized software. Which of the following should the technicians do NEXT?

  • A. Restore from backup.
  • B. Run an antivirus tool.
  • C. Boot to the Recovery Console.
  • D. Update the software firewall.

Answer: D

 

NEW QUESTION 348
Anetwork administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

  • A. Make the downtime window larger than actually anticipated
  • B. Document a backout plan to roll back changes to the router
  • C. Inform management regarding the anticipated amount of downtime
  • D. Configure a redundant data path to eliminate downtime

Answer: B

 

NEW QUESTION 349
......


CompTIA 220-1002 Exam Syllabus Topics:

TopicDetails

Operating Systems - 27%

Compare and contrast common operating system types and their purposes.1. 32-bit vs. 64-bit
  • RAM limitations
  • Software compatibility

2. Workstation operating systems

  • Microsoft Windows
  • Apple Macintosh OS
  • Linux

3. Cell phone/tablet operating systems

  • Microsoft Windows
  • Android
  • iOS
  • Chrome OS

4. Vendor-specific limitations

  • End-of-life
  • Update limitations

5. Compatibility concerns between operating systems

Compare and contrast features of Microsoft Windows versions.1. Windows 7
2. Windows 8
3. Windows 8.1
4. Windows 10
5. Corporate vs. personal needs
  • Domain access
  • BitLocker
  • Media center
  • BranchCache
  • EFS

6. Desktop styles/user interface

Summarize general OS installation considerations and upgrade methods.1. Boot methods
  • Optical disc(CD-ROM, DVD, Blu-ray)
  • External drive/flash drive (USB/eSATA)
  • Network boot (PXE)
  • Internal fixed disk (HDD/SSD)
  • Internal hard drive (partition)

2. Type of installations

  • Unattended installation
  • In-place upgrade
  • Clean install
  • Repair installation
  • Multiboot
  • Remote network installation
  • Image deployment
  • Recovery partition
  • Refresh/restore

3. Partitioning

  • Dynamic
  • Basic
  • Primary
  • Extended
  • Logical
  • GPT

4. File system types/formatting

  • ExFAT
  • FAT32
  • NTFS
  • CDFS
  • NFS
  • ext3, ext4
  • HFS
  • Swap partition
  • Quick format vs. full format

5. Load alternate third-party drivers when necessary
6. Workgroup vs. Domain setup
7. Time/date/region/language settings
8. Driver installation, software, and Windows updates
9. Factory recovery partition
10. Properly formatted boot drive with the correct partitions/format
11. Prerequisites/hardware compatibility
12. Application compatibility
13. OS compatibility/upgrade path

Given a scenario, use appropriate Microsoft command line tools.1. Navigation
  • dir
  • cd
  • ..

2. ipconfig
3. ping
4. tracert
5. netstat
6. nslookup
7. shutdown
8. dism
9. sfc
10. chkdsk
11. diskpart
12. taskkill
13. gpupdate
14. gpresult
15. format
16. copy
17. xcopy
18. robocopy
19. net use
20. net user
21. [command name] /?
22. Commands available with standard privileges vs. administrative privileges

Given a scenario, use Microsoft operating system features and tools.1. Administrative
  • Computer Management
  • Device Manager
  • Local Users and Groups
  • Local Security Policy
  • Performance Monitor
  • Services
  • System Configuration
  • Task Scheduler
  • Component Services
  • Data Sources
  • Print Management
  • Windows Memory Diagnostics
  • Windows Firewall
  • Advanced Security
  • Event Viewer
  • User Account Management

2. MSConfig

  • General
  • Boot
  • Services
  • Startup
  • Tools

3. Task Manager

  • Applications
  • Processes
  • Performance
  • Networking
  • Users

4. Disk Management

  • Drive status
  • Mounting
  • Initializing
  • Extending partitions
  • Splitting partitions
  • Shrink partitions
  • Assigning/changing drive letters
  • Adding drives
  • Adding arrays
  • Storage spaces

5. System utilities

  • Regedit
  • Command
  • Services.msc
  • MMC
  • MSTSC
  • Notepad
  • Explorer
  • Msinfo32
  • DxDiag
  • Disk Defragmenter
  • System Restore
  • Windows Update
Given a scenario, use Microsoft Windows Control Panel utilities.1. Internet Options
  • Connections
  • Security
  • General
  • Privacy
  • Programs
  • Advanced

2. Display/Display Settings

  • Resolution
  • Color depth
  • Refresh rate

3. User Accounts
4. Folder Options

  • View hidden files
  • Hide extensions
  • General options
  • View options

5. System

  • Performance (virtual memory)
  • Remote settings
  • System protection

6. Windows Firewall
7. Power Options

  • Hibernate
  • Power plans
  • Sleep/suspend
  • Standby

8. Credential Manager
9. Programs and features
10. HomeGroup
11. Devices and Printers
12. Sound
13. Troubleshooting
14. Network and Sharing Center
15. Device Manager
16. BitLocker
17. Sync Center

Summarize application installation and configuration concepts.1. System requirements
  • Drive space
  • RAM

2. OS requirements

  • Compatibility

3. Methods of installation and deployment

  • Local (CD/USB)
  • Network-based

4. Local user permissions

  • Folder/file access for installation

5. Security considerations

  • Impact to device
  • Impact to network
Given a scenario, configure Microsoft Windows networking on a client/desktop.1. HomeGroup vs. Workgroup
2. Domain setup
3. Network shares/administrative shares/mapping drives
4. Printer sharing vs. network printer mapping
5. Establish networking connections
  • VPN
  • Dial-ups
  • Wireless
  • Wired
  • WWAN (Cellular)

6. Proxy settings
7. Remote Desktop Connection
8. Remote Assistance
9. Home vs. Work vs. Public network settings
10. Firewall settings

  • Exceptions
  • Configuration
  • Enabling/disabling Windows Firewall

11. Configuring an alternative IP address in Windows

  • IP addressing
  • Subnet mask
  • DNS
  • Gateway

12. Network card properties

  • Half duplex/full duplex/auto
  • Speed
  • Wake-on-LAN
  • QoS
  • BIOS (on-board NIC)
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.1. Best practices
  • Scheduled backups
  • Scheduled disk maintenance
  • System updates/App Store
  • Patch management
  • Driver/firmware updates
  • Antivirus/Anti-malware updates

2. Tools

  • Backup/Time Machine
  • Restore/Snapshot
  • Image recovery
  • Disk maintenance utilities
  • Shell/Terminal
  • Screen sharing
  • Force Quit

3. Features

  • Multiple desktops/Mission Control
  • Key Chain
  • Spot Light
  • iCloud
  • Gestures
  • Finder
  • Remote Disc
  • Dock
  • Boot Camp

4. Basic Linux commands

  • ls
  • grep
  • cd
  • shutdown
  • pwd vs. passwd
  • mv
  • cp
  • rm
  • chmod
  • chown
  • iwconfig/ifconfig
  • ps
  • su/sudo
  • apt-get
  • vi
  • dd
  • kill

Security - 24%

Summarize the importance of physical security measures.1. Access control vestibule
2. Badge reader
3. Smart card
4. Security guard
5. Door lock
6. Biometric locks
7. Hardware tokens
8. Cable locks
9. Server locks
10. USB locks
11. Privacy screen
12. Key fobs
13. Entry control roster
Explain logical security concepts.1. Active Directory
  • Login script
  • Domain
  • Group Policy/Updates
  • Organizational Units
  • Home Folder
  • Folder redirection

2. Software tokens
3. MDM policies
4. Port security
5. MAC address filtering
6. Certificates
7. Antivirus/Anti-malware
8. Firewalls
9. User authentication/strong passwords
10. Multifactor authentication
11. Directory permissions
12. VPN
13. DLP
14. Access control lists
15. Smart card
16. Email filtering
17. Trusted/untrusted software sources
18. Principle of least privilege

Compare and contrast wireless security protocols and authentication methods.1. Protocols and encryption
  • WEP
  • WPA
  • WPA2
  • TKIP
  • AES

2. Authentication

  • Single-factor
  • Multifactor
  • RADIUS
  • TACACS
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.1. Malware
  • Ransomware
  • Trojan
  • Keylogger
  • Rootkit
  • Virus
  • Botnet
  • Worm
  • Spyware

2. Tools and methods

  • Antivirus
  • Anti-malware
  • Recovery console
  • Backup/restore
  • End user education
  • Software firewalls
  • DNS configuration
Compare and contrast social engineering, threats, and vulnerabilities.1. Social engineering
  • Phishing
  • Spear phishing
  • Impersonation
  • Shoulder surfing
  • Tailgating
  • Dumpster diving

2. DDoS
3. DoS
4. Zero-day
5. On-path attack (previously known as man-in-the-middle attack)
6. Brute force
7. Dictionary
8. Rainbow table
9. Spoofing
10. Non-compliant systems
11. Zombie

Compare and contrast the differences of basic Microsoft Windows OS security settings.1. User and groups
  • Administrator
  • Power user
  • Guest
  • Standard user

2. NTFS vs. share permissions

  • Allow vs. deny
  • Moving vs. copying folders and files
  • File attributes

3. Shared files and folders

  • Administrative shares vs. local shares
  • Permission propagation
  • Inheritance

4. System files and folders
5. User authentication

  • Single sign-on

6. Run as administrator vs. standard user
7. BitLocker
8. BitLocker To Go
9. EFS

Given a scenario, implement security best practices to secure a workstation.1. Password best practices
  • Setting strong passwords
  • Password expiration
  • Screensaver required password
  • BIOS/UEFI passwords
  • Requiring passwords

2. Account management

  • Restricting user permissions
  • Logon time restrictions
  • Disabling guest account
  • Failed attempts lockout
  • Timeout/screen lock
  • Change default admin user account/password
  • Basic Active Directory functions
    1. Account creation
    2. Account deletion
    3. Password reset/unlock account
    4. Disable account

3. Disable autorun
4. Data encryption
5. Patch/update management

Given a scenario, implement methods for securing mobile devices.1. Screen locks
  • Fingerprint lock
  • Face lock
  • Swipe lock
  • Passcode lock

2. Remote wipes
3. Locator applications
4. Remote backup applications
5. Failed login attempts restrictions
6. Antivirus/Anti-malware
7. Patching/OS updates
8. Biometric authentication
9. Full device encryption
10. Multifactor authentication
11. Authenticator applications
12. Trusted sources vs. untrusted sources
13. Firewalls
14. Policies and procedures

  • BYOD vs. corporate-owned
  • Profile security requirements
Given a scenario, implement appropriate data destruction and disposal methods.1. Physical destruction
  • Shredder
  • Drill/hammer
  • Electromagnetic (Degaussing)
  • Incineration
  • Certificate of destruction

2. Recycling or repurposing best practices

  • Low-level format vs. standard format
  • Overwrite
  • Drive wipe
Given a scenario, configure security on SOHO wireless and wired networks.1. Wireless-specific
  • Changing default SSID
  • Setting encryption
  • Disabling SSID broadcast
  • Antenna and access point placement
  • Radio power levels
  • WPS

2. Change default usernames and passwords
3. Enable MAC filtering
4. Assign static IP addresses
5. Firewall settings
6. Port forwarding/mapping
7. Disabling ports
8. Content filtering/parental controls
9. Update firmware
10. Physical security

Software Troubleshooting - 26%

Given a scenario, troubleshoot Microsoft Windows OS problems.1. Common symptoms
  • Slow performance
  • Limited connectivity
  • Failure to boot
  • No OS found
  • Application crashes
  • Blue screens
  • Blank screens
  • Printing issues
  • Services fail to start
  • Slow bootup
  • Slow profile load

2. Common solutions

  • Defragment the hard drive
  • Reboot
  • Kill tasks
  • Restart services
  • Update network settings
  • Reimage/reload OS
  • Roll back updates
  • Roll back devices drivers
  • Apply updates
  • Repair application
  • Update boot order
  • Disable Windows services/applications
  • Disable application startup
  • Safe boot
  • Rebuild Windows profiles
Given a scenario, troubleshoot and resolve PC security issues.1. Common symptoms
  • Pop-ups
  • Browser redirection
  • Security alerts
  • Slow performance
  • Internet connectivity issues
  • PC/OS lockup
  • Application crash
  • OS updates failures
  • Rogue antivirus
  • Spam
  • Renamed system files
  • Disappearing files
  • File permission changes
  • Hijacked email
    - Responses from users regarding email
    - Automated replies from unknown sent email
  • Access denied
  • Invalid certificate (trusted root CA)
  • System/application log errors
Given a scenario, use best practice procedures for malware removal.1. Identify and research malware symptoms.
2. Quarantine the infected systems.
3. Disable System Restore (in Windows).
4. Remediate the infected systems.
  • Update the anti-malware software.
  • Scan and use removal techniques (safe mode, pre-installation environment).

5. Schedule scans and run updates.
6. Enable System Restore and create a restore point (in Windows).
7. Educate the end user.

Given a scenario, troubleshoot mobile OS and application issues.1. Common symptoms
  • Dim display
  • Intermittent wireless
  • No wireless connectivity
  • No Bluetooth connectivity
  • Cannot broadcast to external monitor
  • Touchscreen non-responsive
  • Apps not loading
  • Slow performance
  • Unable to decrypt email
  • Extremely short battery life
  • Overheating
  • Frozen system
  • No sound from speakers
  • Inaccurate touch screen response
  • System lockout
  • App log errors
Given a scenario, troubleshoot mobile OS and application security issues.1. Common symptoms
  • Signal drop/weak signal
  • Power drain
  • Slow data speeds
  • Unintended WiFi connection
  • Unintended Bluetooth pairing
  • Leaked personal files/data
  • Data transmission over limit
  • Unauthorized account access
  • Unauthorized location tracking
  • Unauthorized camera/microphone activation
  • High resource utilization

Operational Procedures - 23%

Compare and contrast best practices associated with types of documentation.1. Network topology diagrams
2. Knowledge base/articles
3. Incident documentation
4. Regulatory and compliance policy
5. Acceptable use policy
6. Password policy
7. Inventory management
  • Asset tags
  • Barcodes
Given a scenario, implement basic change management best practices.1. Documented business processes
2. Purpose of the change
3. Scope the change
4. Risk analysis
5. Plan for change
6. End-user acceptance
7. Change board
  • Approvals

8. Backout plan
9. Document changes

Given a scenario, implement basic disaster prevention and recovery methods.1. Backup and recovery
  • Image level
  • File level
  • Critical applications

2. Backup testing
3. UPS
4. Surge protector
5. Cloud storage vs. local storage backups
6. Account recovery options

Explain common safety procedures.1. Equipment grounding
2. Proper component handling and storage
  • Antistatic bags
  • ESD straps
  • ESD mats
  • Self-grounding

3. Toxic waste handling

  • Batteries
  • Toner
  • CRT
  • Cell phones
  • Tablets

4. Personal safety

  • Disconnect power before repairing PC
  • Remove jewelry
  • Lifting techniques
  • Weight limitations
  • Electrical fire safety
  • Cable management
  • Safety goggles
  • Air filter mask

5. Compliance with government regulations

Explain environmental impacts and appropriate controls.1. MSDS documentation for handling and disposal
2. Temperature, humidity level awareness, and proper ventilation
3. Power surges, under-voltage events, and power loss
  • Battery backup
  • Surge suppressor

4. Protection from airborne particles

  • Enclosures
  • Air filters/mask

5. Dust and debris

  • Compressed air
  • Vacuums

6. Compliance to government regulations

Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.1. Incident response
  • First response
    - Identify
    - Report through proper channels
    - Data/device preservation
  • Use of documentation/documentation changes
  • Chain of custody
    Tracking of evidence/documenting process

2. Licensing/DRM/EULA

  1. Open-source vs. commercial license
  2. Personal license vs. enterprise licenses

3. Regulated data

  • PII
  • PCI
  • GDPR
  • PHI

4. Follow all policies and security best practices

Given a scenario, use proper communication techniques and professionalism.1. Use proper language and avoid jargon, acronyms, and slang, when applicable
2. Maintain a positive attitude/project confidence
3. Actively listen (taking notes) and avoid interrupting the customer
4. Be culturally sensitive
  • Use appropriate professional titles, when applicable

5. Be on time (if late, contact the customer)
6. Avoid distractions

  • Personal calls
  • Texting/social media sites
  • Talking to coworkers while interacting with customers
  • Personal interruptions

7. Dealing with difficult customers or situations

  • Do not argue with customers and/or be defensive
  • Avoid dismissing customer problems
  • Avoid being judgmental
  • Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
  • Do not disclose experiences via social media outlets

8. Set and meet expectations/timeline and communicate status with the customer

  • Offer different repair/replacement options, if applicable
  • Provide proper documentation on the services provided
  • Follow up with customer/user at a later date to verify satisfaction

9. Deal appropriately with customers’ confidential and private materials

  • Located on a computer, desktop, printer, etc.
Identify the basics of scripting.1. Script file types
  • .bat
  • .ps1
  • .vbs
  • .sh
  • .py
  • .js

2. Environment variables
3. Comment syntax
4. Basic script constructs

  • Basic loops
  • Variables

5. Basic data types

  • Integers
  • Strings
Given a scenario, use remote access technologies.1. RDP
2. Telnet
3. SSH
4. Third-party tools
  • Screen share feature
  • File share

5. Security considerations of each access method



CompTIA A+ Core 2 220-1002 Exam

Amazon AWS Certified Security Specialty Exam is related to CompTIA A+ Certification. It validates the Candidates knowledge to assemble components based on customer requirements, Install, configure, and maintain PCs, mobile devices, and software for end users. It also tests the Candidates have an understanding of the basics of networking and security forensics, properly and safely diagnose, resolve, and document common hardware and software issues. CompTIA A+ Certified Professional usually hold or pursue this certification and you can expect the same job roles after completion of this certification.

 

New 220-1002 Exam Dumps with High Passing Rate: https://www.actual4exams.com/220-1002-valid-dump.html

CompTIA 220-1002 Actual Questions and Braindumps: https://drive.google.com/open?id=1wBys05w8y1NSOx7WFkYGmXkOKcoPwwc3