Your success in CompTIA 220-902 is our sole target and we develop all our 220-902 braindumps in a way that facilitates the attainment of this target. Not only is our 220-902 study material the best you can find, it is also the most detailed and the most updated. 220-902 Practice Exams for CompTIA A+ 220-902 are written to the highest standards of technical accuracy.
2017 NEW RECOMMEND
Free VCE & PDF File for CompTIA 220-902 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q121. Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).
A. Use multi-factor authentication
B. Require strong passwords
C. Enable file encryption
D. Educate end users
E. Restrict user permissions
Q122. Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?
B. Recovery Image
D. System Restore
Q123. Which of the following is the BEST option to prevent data breaches on lost mobile devices?
A. Install a locator application on the mobile device so that it can be traced.
B. Apply a restriction to lock the device after a certain number of failed login attempts.
C. Configure the device to remote wipe as soon as it is reported lost.
D. Utilize the fingerprint scanner and passcode for multifactor authentication.
Q124. A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair?
A. The technician should replace the power supply
B. The technician should review disposal regulations
C. The technician should check the environment
D. The technician should remove jewelry
Q125. A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part?
A. Ground the computer and remove jewelry.
B. Self ground and handle the new card by the edges.
C. Place the computer on an ESD mat.
D. Attach an ESD strap to the new card during handling.
Q126. A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
A. The parent folder has explicit Allow rights set for this user.
B. The parent folder has explicit Deny rights set for this user.
C. The user forgot to share the parent folder and only shared the specific file.
D. The parent folder likely has the âarchiveâ attribute enabled.
Q127. An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporationâs domain. Which of the following utilities will the administrator access to configure this setting?
A. System Properties
B. System Information
C. System Protection
D. System Management
Q128. A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
Q129. A technician receives a call regarding a PCâs slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?
A. Reload the OS using FAT32 instead of NTFS.
B. Change the disk from basic to dynamic.
C. Run chkdsk with the /r switch and reboot the PC.
D. Open the defrag utility and run a drive analysis.
Q130. A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).
A. Configure the workstation for a static IP
B. Disable all wireless network connections
C. Remove shortcuts to the application
D. Block the application in Windows Firewall
E. Change network location to Work
F. Reroute the web address in HOSTS file