A Review Of Highest Quality 220-902 Prep

Proper study guides for Improved CompTIA CompTIA A+ Certification Exam (902) certified begins with CompTIA 220-902 preparation products which designed to deliver the Download 220-902 questions by making you pass the 220-902 test at your first time. Try the free 220-902 demo right now.

Check 220-902 free dumps before getting the full version:

NEW QUESTION 1
A user has become a victim of data harvesting. The user wants to know more about the potential for mobile device application security issues. Which of the following settings should a technician advise the user to change on the user’s mobile device? (Select three.)

  • A. Location tracking
  • B. Camera activation
  • C. Data transmission limit
  • D. System lockouts
  • E. Developer options
  • F. Accessibility
  • G. Synchronization
  • H. Storage

Answer: AFH

NEW QUESTION 2
A technician needs to repurpose a hard drive that has confidential information on it. Which of the following methods is MOST appropriate?

  • A. Incineration
  • B. Overwrite
  • C. Degauss
  • D. Quick format

Answer: D

NEW QUESTION 3
Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use?

  • A. Initiate a factory reset
  • B. Perform a hard reset
  • C. Remove the MicroSD card
  • D. Rollback the OS update

Answer: B

NEW QUESTION 4
An analyst needs to identify the volumes configured for a workstation being deployed for a new user. Which of the following OS tools provides a graphical representation of volumes configured on a system?

  • A. Performance Monitor
  • B. Windows Explorer
  • C. Disk Management
  • D. Task Manager
  • E. Device Manager

Answer: A

NEW QUESTION 5
Which of the following user groups had default administrative permissions in previous versions of Windows, but now has no default user rights m Windows 7 and above?

  • A. Power Users
  • B. Performance Monitor Users
  • C. Administrators
  • D. Guests
  • E. Users

Answer: C

NEW QUESTION 6
A technician is troubleshooting a PC that has been running slow. The technician looks at the resource utilization and notices the user has many programs open. When attempting to open another program, the technician receives a message indicating there are insufficient resources. Which of the following should the technician do to troubleshoot the issue?

  • A. Terminate the running processes
  • B. Increase the page file size
  • C. Renew the network connection
  • D. Run chkdsk

Answer: A

NEW QUESTION 7
The system administrator is tasked with installing Windows to 100 computers over the network. The systems administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this?

  • A. Windows Deployment Services
  • B. Remote Installation Services
  • C. System Preparation Tool
  • D. Unattended installation

Answer: C

NEW QUESTION 8
A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?

  • A. Enter all passwords they have used in the past
  • B. Verify a smart card has been issued
  • C. Check the network cable
  • D. Reboot the computer

Answer: B

NEW QUESTION 9
When working on a system, Joe, a technician, needs to prevent computer component failure by following a few simple rules. Joe is handling internal components but is not using an ESD strap. After opening the
computer, which of the following should Joe do NEXT?

  • A. Remove dust from the system
  • B. Ground himself to the chassis
  • C. Unplug the power cable
  • D. Use an antistatic bag

Answer: B

NEW QUESTION 10
A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC. Which of the following would the technician use to accomplish this?

  • A. IMAP
  • B. SMTP
  • C. SMNP
  • D. POP3

Answer: A

NEW QUESTION 11
A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?

  • A. Identify the problem
  • B. Document findings, actions and outcome
  • C. Verify full system functionality
  • D. Establish a theory of probable cause
  • E. Test the theory to determine cause

Answer: E

NEW QUESTION 12
A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO).

  • A. Install more physical memory.
  • B. Increase the size of the virtual hard drive.
  • C. Install a different hypervisor.
  • D. Reduce physical memory allocated to the VM.
  • E. Clear temporary files in the VM.
  • F. Install additional physical hard drive

Answer: AD

NEW QUESTION 13
By default which of the following permissions will take precedence over any other assigned permission on a mapped network drive?

  • A. Deny
  • B. Modify
  • C. Share
  • D. Allow

Answer: A

NEW QUESTION 14
Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?

  • A. Shoulder surfing
  • B. Man-in-the-middle
  • C. Social engineering
  • D. Ransomware

Answer: C

NEW QUESTION 15
A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers. Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

  • A. Degaussing
  • B. Standard format
  • C. Overwrite
  • D. Low-level format

Answer: D

NEW QUESTION 16
A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?

  • A. The workstation is victim of a denial of service attack.
  • B. The username is not authenticating on the network.
  • C. The username is not part of the local administrator group.
  • D. The administrator has not applied appropriate security patche

Answer: C

NEW QUESTION 17
An engineer working with large detailed CAD files notices over time that the workstation is taking
significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem?

  • A. Run defrag on the hard drive
  • B. Restore the CAD files from backup
  • C. Replace the hard drive
  • D. Remove and reinstall the CAD software

Answer: A

NEW QUESTION 18
A technician wants to set up a virtual machine in a public cloud environment. Which of the following cloud models should the technician use?

  • A. IaaS
  • B. SaaS
  • C. PaaS
  • D. DBaaS

Answer: A

NEW QUESTION 19
A technician is implementing multifactor authentication for a high-security organization Which of the following physical security technologies should the technician propose for implementation? (Select TWO).

  • A. Strong passwords
  • B. Fingerprint reader
  • C. Mantraps
  • D. Smart cards
  • E. Cablelocks
  • F. Privacy filters

Answer: AD

NEW QUESTION 20
A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?

  • A. Reload the OS using FAT32 instead of NTFS.
  • B. Change the disk from basic to dynamic.
  • C. Run chkdsk with the /r switch and reboot the PC.
  • D. Open the defrag utility and run a drive analysi

Answer: C

NEW QUESTION 21
A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation?

  • A. Set a strong password that requires a renewal every 30 days.
  • B. Run a screensaver after one minute of nonuse and fingerprint lock for afterhours.
  • C. Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.
  • D. Require a password and fingerprint lock afterhour

Answer: C

NEW QUESTION 22
......

100% Valid and Newest Version 220-902 Questions & Answers shared by Dumps-hub.com, Get Full Dumps HERE: https://www.dumps-hub.com/220-902-dumps.html (New 475 Q&As)