Replace 220-902 Free Practice Test For CompTIA A+ Certification Exam (902) Certification

we provide Real CompTIA 220-902 free practice questions which are the best for clearing 220-902 test, and to get certified by CompTIA CompTIA A+ Certification Exam (902). The 220-902 Questions & Answers covers all the knowledge points of the real 220-902 exam. Crack your CompTIA 220-902 Exam with latest dumps, guaranteed!

Check 220-902 free dumps before getting the full version:

NEW QUESTION 1
A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access?

  • A. Check the phone for unauthorized root access
  • B. Disable the phone’s Bluetooth chip
  • C. Erase all personal data from the phone
  • D. Check the phone for location tracking

Answer: A

NEW QUESTION 2
Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).

  • A. Use multi-factor authentication
  • B. Require strong passwords
  • C. Enable file encryption
  • D. Educate end users
  • E. Restrict user permissions

Answer: AD

NEW QUESTION 3
A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part?

  • A. Ground the computer and remove jewelry.
  • B. Self ground and handle the new card by the edges.
  • C. Place the computer on an ESD mat.
  • D. Attach an ESD strap to the new card during handlin

Answer: B

NEW QUESTION 4
A home user receives a call from a technician who claims to be with a virus control company. The technician explains that the user’s PC is infected with harmful viruses. The technician instructs the user how to get to the Event Viewer where all errors can be seen. The technician claims this problem can be fixed for money. Which of the following threats has the user been a victim of?

  • A. Phishing
  • B. Social engineering
  • C. Man-in-the-middle
  • D. Spoofing

Answer: B

NEW QUESTION 5
A systems administrator wants to test a tool to enhance productivity but does not want to run it in the live production environment. The systems administrator has a powerful PC running Windows 8.1. Which of the following should the systems administrator set up to test the tool on the PC without changing the base configuration?

  • A. Native Windows
  • B. Virtualization
  • C. Emulation
  • D. Safe mode

Answer: C

NEW QUESTION 6
A technician is troubleshooting a Windows machine that is unable to boot Attempts to boot into safe mode result in the system continuously rebooting. To repair the computer without losing data the technician should boot:

  • A. using factory recovery partition
  • B. using preinstallation environment
  • C. with POST on verbose mode
  • D. with BIOS default settings

Answer: C

NEW QUESTION 7
A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO).

  • A. Mask
  • B. ESD mat
  • C. ESD strap
  • D. Antistatic bag
  • E. Safety goggles
  • F. Rubber gloves

Answer: AE

NEW QUESTION 8
A technician installs Windows 7 on a 4TB hard drive. Which of the following should the technician choose when initializing the drive for the machine to access all the disk space?

  • A. GPT
  • B. FAT32
  • C. MBR
  • D. exFAT

Answer: B

NEW QUESTION 9
A network technician is setting up a secure WAP for a small office. The owner insists on using the best security available. Which of the following techniques would BEST protect this WiFi setup?

  • A. WPA2 TKIP
  • B. WEP
  • C. WPA2 AES
  • D. WPS

Answer: C

NEW QUESTION 10
A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this?

  • A. Place directional antennas
  • B. Use omni-directional antennas
  • C. Enable MAC filtering
  • D. Disable SSID broadcast

Answer: A

NEW QUESTION 11
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

  • A. Remove the guest from the administrators group
  • B. Disable single sign-on
  • C. Issue a default strong password for all users
  • D. Require authentication on wake-up

Answer: A

NEW QUESTION 12
A technician has received new computers to upgrade the marketing department on a large company. The old computers are to be refreshed and donated as part of company policy. Data contained on the drives needs to be inaccessible prior to donation. Which of the following methods BEST achieves this goal?

  • A. Single drive wipe
  • B. Degaussing
  • C. Low-level format
  • D. Multipass overwrite

Answer: D

NEW QUESTION 13
As part of a BYOD program, the organization requires BYOD users to register devices prior to using them on the organization’s network. The registration process logs a unique identifier assigned to every mobile phone produced. Which of the following must be collected during the registration process?

  • A. IMEI
  • B. MIMO
  • C. IMSI
  • D. MAPI

Answer: A

NEW QUESTION 14
A user has been receiving reply emails from many contacts but the content of the emails is not familiar and the user did not send the original messages. The user calls the help desk for assistance. Which of the following is the BEST way the technician can fix this problem?

  • A. Perform an antivirus scan
  • B. Perform a refresh/restore
  • C. Perform an IDS upgrade
  • D. Perform a reinstall of the email client

Answer: A

NEW QUESTION 15
A technician has been informed by the IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device. Which of the following should the technician perform to address the issue?

  • A. Power off the device
  • B. Install an add-on card
  • C. Update the WiFi antenna
  • D. Update firmware

Answer: D

NEW QUESTION 16
A home user reports the PC is running slow, and pop-up advertisements are appearing on screen. The user can access the Internet and performs an antivirus scan. A technician is now troubleshooting the problem and cannot update the antivirus to the latest definitions or navigate to the vendor’s support website. Which of the following is the BEST next step to resolve this issue?

  • A. Uninstall the antivirus program and apply operating system patches
  • B. Utilize a different antivirus program and scan method
  • C. Format and reinstall
  • D. Reinstall the antivirus program from a shared executable

Answer: B

NEW QUESTION 17
A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT?

  • A. Copy the DLL file from a working PC and use the regsvr32 command to load the file
  • B. Run the Windows Update utility to manually reinstall the DLL file
  • C. Run the defrag utility to correct any fragmentation that may have damaged the file
  • D. Research the DLL file to identify the application it corresponds to before continuing

Answer: D

NEW QUESTION 18
A client has requested a workspace environment configuration that will allow employees to work in a virtual space for specific projects, but when working on other projects, allow them to work locally. Which of the following is the BEST solution for this virtual configuration?

  • A. Multiheaded client
  • B. Thin client
  • C. Zero client
  • D. Thick client

Answer: A

NEW QUESTION 19
A technician needs to disable System Restore prior to a virus cleaning. Which of the following system settings has the System Restore options?

  • A. MSINF032
  • B. Device Manager
  • C. Control Panel
  • D. Microsoft Management Console

Answer: A

NEW QUESTION 20
After successfully removing malware from a user’s Windows OS PC, a technician confirms the machine had been infected for many months. Two weeks after removing the malware, the malware inadvertently returns. The technician MOST likely forgot to:

  • A. install antivirus updates
  • B. disable and enable System Restore
  • C. update the firewall rules
  • D. quarantine the system for 30 days

Answer: A

NEW QUESTION 21
A user needs to replace an open-source software package with a commercially licensed package. The user has requested support to complete this task. Which of the following tools would BEST assist with this task?

  • A. Programs
  • B. Regedit
  • C. Task Manager
  • D. MSConfig

Answer: A

NEW QUESTION 22
......

Thanks for reading the newest 220-902 exam dumps! We recommend you to try the PREMIUM Dumpscollection.com 220-902 dumps in VCE and PDF here: https://www.dumpscollection.net/dumps/220-902/ (475 Q&As Dumps)