Act now and download your CompTIA 220-902 test today! Do not waste time for the worthless CompTIA 220-902 tutorials. Download Abreast of the times CompTIA CompTIA A+ Certification Exam (902) exam with real questions and answers and begin to learn CompTIA 220-902 with a classic professional.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for CompTIA 220-902 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/220-902-exam-dumps.html
Q21. The type of security threat that uses computers or other networks to accept and pass on viruses is called:
A. phishing.
B. botnets.
C. logic bomb.
D. man-in-the-middle.
Answer: B
Q22. A technician needs to install a clean Windows OS on several laptops in the office. The office is running a 100Base-T network. The owner would like the installations completed as soon as possible. Which of the following installation methods should the technician use?
A. FireWire External Hard Drive
B. PXE-based Network Installation
C. USB 3.0 Flash Drive
D. DVD-ROM
Answer: C
Q23. A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?
A. Dead pixels
B. Flickering image
C. No image on screen
D. Distorted image
Answer: D
Q24. A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this?
A. AES
B. VPN
C. UTM
D. WPA2
Answer: B
Q25. A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue?
A. Unsupported operating system
B. Unacceptable CPU type and speed
C. Insufficient airflow and cooling
D. Inadequate video RAM amount
Answer: C
Q26. A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be:
A. a detriment to employer/employee relations.
B. personally identifiable information.
C. a violation of information access policies.
D. proof of employee corporate affiliation.
Answer: B
Q27. A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to:
A. tell the customer the issue needs to be escalated to a higher tier technician.
B. ask the customer if they would mind holding for no more than two minutes to check resources.
C. tell the customer this is the first time encountering the issue and to please be patient.
D. ask the customer to please hold while a senior technician is consulted regarding the issue.
Answer: B
Q28. An IT manager needs to reimage 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST?
A. Boot from PXE.
B. Install Windows using DVD.
C. Reboot computers with USB drive.
D. Press F8 while rebooting.
Answer: A
Q29. A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
A. Simple 1-pass zero overwrite
B. Low level 3-pass random wipe
C. Low level 7-pass random wipe
D. High level format 10 times
Answer: C
Q30. DRAG DROP
A technician has verified that Joe, a user, has a malware infection on his desktop. Drag and drop the following malware remediation techniques in the correct order Joe should follow to alleviate this issue.
Answer:
