CompTIA 220-1002 Core 2 A+ Take Ten Challenge #2Step 1 of 1010%2-1: A user is installing a driver for a new mouse, but the installation fails before the driver is installed. Which of these would be the most likely reason for this issue? The mouse driver is corrupted The user does not have the proper permissions The mouse is not currently connected to the computer The mouse is connected during the driver installation The mouse is incompatible with the user's operating system 2-2: A virtual machine has crashed overnight due to corrupted data and will not restart. The system administrator has recovered the entire system on a new virtual machine using a single process that recovered the entire VM to its previous state. Which of the following would best describe this recovery process? Server patch Hypervisor restore Image level recovery Encrypted restore File level recovery 2-3: A system administrator is copying a large data file to a remote location with a satellite network connection. This connection is a low-bandwidth link and often loses connectivity due to weather. Which of the following tools would be the best choice for copying this data file? robocopy xcopy rcopy copy sync 2-4: The web server of a subsidiary was recently compromised by an attacker. The attacker used a previously unknown exploit to gain access to the system. Which of the following would best describe this attack? Man-in-the-middle Zero-day Brute force Social engineering Denial of service 2-5: A system administrator has identified malware on a workstation and has quarantined the device from the rest of the systems. Which of the following would be the best next step for removing this malware? Educate the end user Disable System Restore Boot to Safe Mode Run a malware scan Update anti-virus and anti-malware signatures 2-6: A system administrator has been tasked with bringing the company up to compliance for PCI DSS. Which of these would be most associated with this compliance task? Patient healthcare information File transfers to all foreign countries The personal data of all users Storage of all web server certificates Credit card transaction information 2-7: The system administrator of a Linux server needs to move from one wireless network to another. Which of these commands would be the best choice for this task? chmod iwconfig pwd netstat ifconfig 2-8: A user on the manufacturing floor is installing a Windows application for a new CNC (Computer Numeric Control) machine. However, the installation program fails during the driver installation. Which of these would be the most likely reason for this issue? The CNC machine is not compatible with Windows The Windows workstation is infected with malware The user needs elevated permissions The Windows computer is not connected to the same network as the CNC machine The CNC firmware needs to be upgraded 2-9: A user in the shipping department uses an external web site to create shipping labels. After each label is created, at least two browser windows appear that contain random advertisements. Which of these would best describe this problem? Man-in-the-middle attack Phishing attack Malware infection Incorrect proxy settings Invalid site certificate 2-10: A system administrator has been asked to install a DRM server on the network. Which of the following would best describe the use of this server? Synchronize the date and time on all devices Securely store encryption certificates Limit the use of certain applications Share files between macOS systems Provide a repository of free software