Curious about Actual CompTIA A+ (220-1202) Exam Questions?
Here are sample CompTIA A+ Certification : Core 2 (220-1202) Exam questions from real exam. You can get more CompTIA A+ (220-1202) Exam premium practice questions at TestInsights.
Which of the following methods involves requesting a user's approval via a push notification to verify the user's identity?
Correct : B
Modern authenticator apps (such as Microsoft Authenticator or Google Authenticator with push capability) can send a push notification to the user's registered device. The user approves or denies the login request via the notification, providing a quick and secure second factor for authentication.
Start a Discussions
Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?
Correct : B
Facial recognition leverages biometric characteristics unique to each user, offering stronger security than shared passcodes or easily observed pattern locks. It ensures that only the enrolled individual can unlock the device, reducing the risk of unauthorized access from shared codes.
Start a Discussions
A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and also appears to become stuck during connection attempts. Which of the following is most likely causing the disruption?
Correct : C
Large gatherings like music festivals often overwhelm local cellular towers due to the sheer number of devices competing for bandwidth and signal. This congestion can cause mobile applications, such as email clients, to stall or fail when attempting to download messages.
Start a Discussions
Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?
Correct : D
A zero-day vulnerability refers to a security flaw that is actively exploited by attackers before the software vendor has released a patch or remediation - meaning defenders have ''zero days'' to prepare once the exploit becomes known.
Start a Discussions
A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost. Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?
Correct : A
Full-disk (or device) encryption ensures that, even if a lost mobile device is physically accessed by an unauthorized party, its stored data remains inaccessible without the correct decryption credentials. This protection is automatic and continuous, safeguarding data at rest regardless of whether the user realizes the device is missing or not. Remote wipe can remove data if triggered, but it requires the device to be online and the user (or admin) to initiate the wipe---whereas encryption is always in effect.
Start a Discussions
Total 75 questions