getcertified4sure.com

CompTIA 220-902 Exam Dumps 2021




We provide 220 902 practice test which are the best for clearing 220-902 test, and to get certified by CompTIA CompTIA A+ Certification Exam (902). The 220 902 practice test covers all the knowledge points of the real 220-902 exam. Crack your CompTIA 220-902 Exam with latest dumps, guaranteed!

Check 220-902 free dumps before getting the full version:

NEW QUESTION 1
The general manager installed a popular archive utility. Antivirus software flagged the software because it was also exhibiting malicious behavior. This is an example of which of the following?

  • A. Rootkit
  • B. Trojan
  • C. Spyware
  • D. Worm

Answer: B

NEW QUESTION 2
Ann, a smartphone user receives an in-app notification that her third party note taking app has an update that requires additional permissions. The update requires access to connected storage, including networked resources, and the ability to enable or disable airplane mode. She has consulted the company's IT department about the situation. Which of the following is the BEST course of action for the IT department to recommend?

  • A. Accept the app update
  • B. Uninstall the app
  • C. Postpone the app update
  • D. Refuse the app update

Answer: A

NEW QUESTION 3
A technician is trying to perform a new installation of an operating system on a computer without an optical drive. Which of the following boot sources can be used?

  • A. Windows easy transfer
  • B. Copy of SYSTEM folder
  • C. USMT
  • D. Flash drive

Answer: D

NEW QUESTION 4
A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?

  • A. Identify the problem
  • B. Document findings, actions and outcome
  • C. Verify full system functionality
  • D. Establish a theory of probable cause
  • E. Test the theory to determine cause

Answer: E

NEW QUESTION 5
A network technician is setting up a secure WAP for a small office. The owner insists on using the best security available. Which of the following techniques would BEST protect this WiFi setup?

  • A. WPA2 TKIP
  • B. WEP
  • C. WPA2 AES
  • D. WPS

Answer: C

NEW QUESTION 6
A user wants to reuse a flash drive and ensure that no one can view the previous data. Which of the following is the BEST way to accomplish this?

  • A. Delete the files
  • B. Perform a full format
  • C. Degauss the drive
  • D. Make the files hidden

Answer: B

NEW QUESTION 7
Joe, a user, reports he is unable to install an OS on a home computer. An investigation reveals Joe is using an enterprise license key. Which of the following is the MOST likely issue?

  • A. The wrong media is being used
  • B. The media is corrupt
  • C. The hardware is unsupported
  • D. The boot order is incorrect

Answer: C

NEW QUESTION 8
A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?

  • A. Follow the customer’s prescribed course of action.
  • B. Convince the customer to take a better course of action to resolve the issue.
  • C. Explain why the customer’s prescribed course of action is incorrect.
  • D. Acknowledge the customer’s input, but follow another course of actio

Answer: D

NEW QUESTION 9
A technician has just upgraded RAM on a user’s workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the “Min” portion of the page file setting if using these best practices?

  • A. 4096MB
  • B. 8192MB
  • C. 12288MB
  • D. 16328MB

Answer: C

NEW QUESTION 10
A user’s smartphone is getting a very weak signal from the service provider. One day the user notices the phone has full
bars and the signal strength has inexplicably increased. Which of the following tools should be used to verify the user is connecting to a legitimate signal from the phone service provider?

  • A. WiFi analyzer
  • B. Cell tower analyzer
  • C. Spectrum analyzer
  • D. Packet analyzer

Answer: B

NEW QUESTION 11
A user has reported that when a document is being edited a pop-up appears and locks the workstation. The pop-up states that federal authorities have detected illegal copyrighted material on the workstation. The technician removes the malware and creates a restore point. Which of the following should the technician perform NEXT before closing the report?

  • A. Contact the local computer emergency response team
  • B. Quarantine the workstation for possible infections
  • C. Train the user on safe Internet browsing
  • D. Restore to an earlier state and disable System Restore

Answer: C

NEW QUESTION 12
An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?

  • A. Antivirus software
  • B. Internet connectivity issues
  • C. Ransomware infection
  • D. Content-filtering

Answer: D

NEW QUESTION 13
A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which
of the following steps would the technician take to resolve this issue using best practices?

  • A. Identify symptoms, quarantine infected system, and create restore point.
  • B. Quarantine infected system, identify symptoms, and create restore point.
  • C. Identify symptoms, educate end user, and create restore point.
  • D. Create restore point, identify symptoms, and quarantine infected syste

Answer: A

NEW QUESTION 14
A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent?

  • A. Measured service
  • B. Rapid elasticity
  • C. On-demand
  • D. Resource pooling

Answer: A

NEW QUESTION 15
While working on a user's computer a technician notices no prompt appears when a process runs with administrative credentials. The technician wants to make sure the user is warned to ensure rogue processes do not run with elevated privileges. Which of the following Control Panel utilities would allow the technician to modify this setting?

  • A. Administrative Tools
  • B. File Explorer Options
  • C. Credential Manager
  • D. User Account Control

Answer: A

NEW QUESTION 16
A computer is displaying a pop-up message demanding payment or the hard drive will be encrypted. Which of the following BEST describes this type of malware?

  • A. Trojan
  • B. Ransomware
  • C. Spyware
  • D. Worm

Answer: B

NEW QUESTION 17
A SOHO user calls a technician and reports that after an on-site technician replaced all of the ink cartridges in a printer, characters are not printing clearly. Which of the following is the BEST course of action for the technician to take NEXT?

  • A. Reinstall the printer drivers
  • B. Train the user on how to calibrate the printer
  • C. Suggest the user replace the ink cartridges
  • D. Recommend replacing the printer

Answer: B

P.S. Easily pass 220-902 Exam with 420 Q&As 2passeasy Dumps & pdf Version, Welcome to Download the Newest 2passeasy 220-902 Dumps: https://www.2passeasy.com/dumps/220-902/ (420 New Questions)