Your success in CompTIA 220-902 is our sole target and we develop all our 220-902 braindumps in a way that facilitates the attainment of this target. Not only is our 220-902 study material the best you can find, it is also the most detailed and the most updated. 220-902 Practice Exams for CompTIA A+ 220-902 are written to the highest standards of technical accuracy.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for CompTIA 220-902 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/220-902-exam-dumps.html
Q151. Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk?
A. NFC
B. Virtual assistant
C. SDK
D. Bluetooth
Answer: A
Q152. An unauthorized user observing system security procedures is known as:
A. a worm.
B. shoulder surfing.
C. phishing.
D. spyware.
Answer: B
Q153. A user tries to connect to the Internet using a dial-up modem and receives a “No dial tone detected” message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?
A. Check if the cable is connected on the modem’s phone RJ-45 port.
B. Check if the cable is connected on the modem’s line RJ-11 port.
C. Check if the cable is connected on the modem’s line RJ-45 port.
D. Check if the cable is connected on the modem’s phone RJ-11 port.
Answer: B
Q154. Which of the following is TRUE about the difference between a worm and a virus?
A. Worms are written in assembly while viruses are written with scripting languages.
B. Viruses hide in the boot record while worms hide within the file system.
C. Worms self propagate while viruses need human intervention to replicate.
D. Viruses disable the antivirus update service while worms kill the antivirus process.
Answer: C
Q155. Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times.
Which of the following should a technician recommend? (Select TWO).
A. Increase the amount of RAM to improve disk checks
B. Backup all data on the drive
C. Upgrade to a home server
D. Purchase a new hard drive
E. Change the drive configuration to RAID 0
F. Upgrade to Windows 7 Professional
Answer: B,D
Q156. When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly? (Select TWO).
A. A multimeter and a toner probe.
B. A large cloth to spread the screws and disassembled parts on.
C. A writing pad for documentation and a marker to label cables.
D. A manufacturer’s technical manual for the model of the laptop.
E. A container with separated areas to store different size screws.
Answer: D,E
Q157. A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized users from following others, which of the following should be implemented?
A. Biometric locks
B. CCTV
C. Mantraps
D. Badge readers
Answer: C
Q158. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
Answer: C
Q159. A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll?
A. gpresult
B. msconfig
C. regedit
D. gpupdate
E. regsrv32
Answer: E
Q160. Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?
A. Domain-level group policies
B. Antivirus domain-level policies
C. Corrupted registry settings
D. Incorrect local-level user policies
Answer: A
