Exam Code: 220-902 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA A+ Certification Exam (902)
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass 220-902 Exam.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA 220-902 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/220-902-exam-dumps.html

Q71. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use? 

A. Disable DHCP and assign a static IP address to each network device physically connected to the network. 

B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices. 

C. Disable all switch ports when they are not utilized and enable them on an as needed basis. 

D. Place guest network jacks in public areas and all other jacks in secure areas as needed. 

Answer:


Q72. A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection? 

A. TRACERT 

B. NETSTAT 

C. IPCONFIG 

D. NSLOOKUP 

Answer:


Q73. A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be: 

A. a detriment to employer/employee relations. 

B. personally identifiable information. 

C. a violation of information access policies. 

D. proof of employee corporate affiliation. 

Answer:


Q74. A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements? 

A. GPT 

B. Logical 

C. MBR 

D. Extended 

Answer:


Q75. A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next? 

A. Hosts files 

B. IPv6 settings 

C. Proxy settings 

D. Lmhosts files 

Answer:


Q76. CORRECT TEXT 

You need to configure your mobile device to send and receive electronic messages from your company. Your mobile device must be able to truly synchronize the message state with your desktop, so that when a message is read on your desktop, it is marked as read on your mobile device. These are the proper parameters: 

. Email address: tech@techies.com 

. Password: P@$$w0rd 

. Pop.techies.com Port: 110 Security: None 

. IMAP.techies.com Port: 993 Security: SSL 

. smtp.techies.com Port: 465 Security: TLS 

. Company SSID: Techies 

. Security: WPA2 

. Passphrase: P@$$w0rd 

. SSID is not broadcasted 

Instructions: You are not authorized to use the Company's WLAN. The outgoing server does not require login credentials. When you have completed the simulation, please select the done button to submit your answer. 

Answer: Review the explanation for all details: 


Q77. A customer reports very slow wireless connection speeds in the new office. Which of the following tools should a technician use to troubleshoot the issue? 

A. WiFi analyzer 

B. Loopback plug 

C. Signal booster 

D. Packet sniffer 

Answer:


Q78. A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use? 

A. NLX 

B. IDS 

C. UTM 

D. ATX 

Answer:


Q79. An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies? 

A. DRM 

B. EULA 

C. IRP 

D. PII 

Answer:


Q80. An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue? 

A. Antivirus software 

B. Internet connectivity issues 

C. Ransomware infection 

D. Content-filtering 

Answer: