Top CompTIA 220-902 ebook Choices

we provide High value CompTIA 220-902 test which are the best for clearing 220-902 test, and to get certified by CompTIA CompTIA A+ Certification Exam (902). The 220-902 Questions & Answers covers all the knowledge points of the real 220-902 exam. Crack your CompTIA 220-902 Exam with latest dumps, guaranteed!


Free VCE & PDF File for CompTIA 220-902 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:

Q41. A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access? 

A. Check the phone for unauthorized root access 

B. Disable the phone’s Bluetooth chip 

C. Erase all personal data from the phone 

D. Check the phone for location tracking 


Q42. A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the firmware and installed a printer. The user accessed a P2P application and now they are getting a large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups? 

A. Phishing 

B. Malware 

C. Proxy redirect 

D. Firmware 


Q43. A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT? 

A. Document findings, actions, and outcomes 

B. Escalate problem to a senior technician 

C. Re-establish new theory of probable cause 

D. Perform a full system backup 


Q44. When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files? 






Q45. Which of the following is the FASTEST way for a user to synchronize data between an iPhone and a work PC? 

A. Transfer data via WiFi Direct to the user’s laptop. 

B. Use Bluetooth to share data from the phone. 

C. Connect the iPhone’s USB cable and use iTunes. 

D. Copy the data from the phone to a MicroSD card. 


Q46. Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST? 

A. Set the application to run in XP compatibility mode 

B. Reinstall Windows XP 

C. Configure a dual boot with XP and 7 

D. Install the application in XP mode 


Q47. A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation? 

A. Set a strong password that requires a renewal every 30 days. 

B. Run a screensaver after one minute of nonuse and fingerprint lock for afterhours. 

C. Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours. 

D. Require a password and fingerprint lock afterhours. 


Q48. A PC technician notices that the printers deployed via a new Group Policy are not showing up on the workstation. Which of the following commands should be run on the PC? 

A. extract 

B. robocopy 

C. gpupdate 

D. tasklist 


Q49. A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change? 

A. Enable MAC filtering 

B. Disable SSID broadcast 

C. Reduce radio power level 

D. Update router firmware 


Q50. Which of the following security threats requires the attacker to be physically located near the target machine? 

A. Shoulder surfing 

B. Social engineering 

C. Phishing 

D. Rootkit