♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for CompTIA 220-902 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/220-902-exam-dumps.html
Q11. An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem?
A. Run defrag on the hard drive
B. Restore the CAD files from backup
C. Replace the hard drive
D. Remove and reinstall the CAD software
Answer: A
Q12. Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO).
A. Change the SSID to a different broadcast name
B. Add the intruding device to a blocked access list
C. Access the intruder’s device and shut it down
D. Shut down the device until the intruder is no longer in the area
E. Set up a WiFi analyzer to identify the intruding device
Answer: A,B
Q13. After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?
A. Run the malware removal program while disconnected from the Internet
B. Run the malware removal program in Windows Safe Mode
C. Reinstall the malware removal program from a trusted source
D. Set the malware removal program to run each time the computer is rebooted
Answer: B
Q14. A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?
A. Configure the access point encryption from unsecured access to WEP.
B. Adjust the radio power so that coverage is restricted to the business.
C. Change the SSID to reflect the business name instead of a public access point.
D. Enable MAC filtering and restrict access to other company’s devices.
Answer: B
Q15. A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices?
A. Identify symptoms, quarantine infected system, and create restore point.
B. Quarantine infected system, identify symptoms, and create restore point.
C. Identify symptoms, educate end user, and create restore point.
D. Create restore point, identify symptoms, and quarantine infected system.
Answer: A
Q16. A technician is called into the office during a thunderstorm. Users are reporting that machines are intermittently powering off. Which of the following will BEST prevent user data loss?
A. Auto save
B. A surge protector
C. An ESD mat
D. A UPS
Answer: D
Q17. After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?
A. Component Management
B. Startup Repair
C. Device Manager
D. Task Manager
Answer: B
Q18. Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue?
A. Time of day restrictions are enabled on the machine
B. Scheduled antivirus scans and updates are enabled on the machine
C. Remote desktop is enabled and an administrator has logged into the machine
D. Automatic Windows Update is enabled on the machine
Answer: D
Q19. Which of the following security threats happens when another person enters a secured area with an authorized person?
A. Tailgating
B. Shoulder surfing
C. Spoofing
D. Phishing
Answer: A
Q20. A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information?
A. DHCP server
B. DNS server
C. File server
D. Proxy server
Answer: A