The Secret of 220-902 free draindumps

Your success in CompTIA 220-902 is our sole target and we develop all our 220-902 braindumps in a way that facilitates the attainment of this target. Not only is our 220-902 study material the best you can find, it is also the most detailed and the most updated. 220-902 Practice Exams for CompTIA A+ 220-902 are written to the highest standards of technical accuracy.

2017 NEW RECOMMEND

Free VCE & PDF File for CompTIA 220-902 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:
http://www.certleader.com/220-902-dumps.html

Q121. Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO). 

A. Use multi-factor authentication 

B. Require strong passwords 

C. Enable file encryption 

D. Educate end users 

E. Restrict user permissions 

Answer: A,D 

Q122. Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open? 

A. Backup 

B. Recovery Image 

C. chkdsk 

D. System Restore 

Answer:

Q123. Which of the following is the BEST option to prevent data breaches on lost mobile devices? 

A. Install a locator application on the mobile device so that it can be traced. 

B. Apply a restriction to lock the device after a certain number of failed login attempts. 

C. Configure the device to remote wipe as soon as it is reported lost. 

D. Utilize the fingerprint scanner and passcode for multifactor authentication. 

Answer:

Q124. A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair? 

A. The technician should replace the power supply 

B. The technician should review disposal regulations 

C. The technician should check the environment 

D. The technician should remove jewelry 

Answer:

Q125. A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part? 

A. Ground the computer and remove jewelry. 

B. Self ground and handle the new card by the edges. 

C. Place the computer on an ESD mat. 

D. Attach an ESD strap to the new card during handling. 

Answer:

Q126. A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand? 

A. The parent folder has explicit Allow rights set for this user. 

B. The parent folder has explicit Deny rights set for this user. 

C. The user forgot to share the parent folder and only shared the specific file. 

D. The parent folder likely has the “archive” attribute enabled. 

Answer:

Q127. An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation’s domain. Which of the following utilities will the administrator access to configure this setting? 

A. System Properties 

B. System Information 

C. System Protection 

D. System Management 

Answer:

Q128. A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of? 

A. Shoulder surfing 

B. Phishing attack 

C. Social engineering 

D. Malware infection 

Answer:

Q129. A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT? 

A. Reload the OS using FAT32 instead of NTFS. 

B. Change the disk from basic to dynamic. 

C. Run chkdsk with the /r switch and reboot the PC. 

D. Open the defrag utility and run a drive analysis. 

Answer:

Q130. A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO). 

A. Configure the workstation for a static IP 

B. Disable all wireless network connections 

C. Remove shortcuts to the application 

D. Block the application in Windows Firewall 

E. Change network location to Work 

F. Reroute the web address in HOSTS file 

Answer: D,F 

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.