Cause all that matters here is passing the CompTIA 220-902 exam. Cause all that you need is a high score of 220-902 CompTIA A+ Certification Exam (902) exam. The only one thing you need to do is downloading Exambible 220-902 exam study guides now. We will not let you down with our money-back guarantee.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for CompTIA 220-902 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/220-902-exam-dumps.html
Q131. A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?
A. Install the application in safe mode
B. Install the application with compatibility mode
C. Install the latest Windows service packs and updates
D. Install Windows Security updates on the system
Answer: B
Q132. A technician is attempting to remove malware from a customer’s workstation. Which of the
following Control Panel utilities should the technician use?
A. Folder Options > View hidden files
B. System > Performance
C. Display Settings > Refresh rate
D. Internet Options > Privacy
Answer: A
Q133. A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet Options will allow the
user to create those settings?
A. Privacy
B. Advanced
C. Security
D. Content
Answer: D
Q134. An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?
A. Set up shares with permissions based upon group membership.
B. Implement a written policy addressing the issue for all users.
C. Monitor access to the network shares using SNMP.
D. Prevent remote logins to all network shares and drives.
Answer: A
Q135. A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to:
A. tell the customer the issue needs to be escalated to a higher tier technician.
B. ask the customer if they would mind holding for no more than two minutes to check resources.
C. tell the customer this is the first time encountering the issue and to please be patient.
D. ask the customer to please hold while a senior technician is consulted regarding the issue.
Answer: B
Q136. In order to prevent other users from editing files in ‘C: Files’, which of the following steps should be taken?
A. Set NTFS permissions to read only
B. Set the folder to index files for search
C. Set the local administrator as the owner of the folder
D. Set network share permissions to read only
Answer: A
Q137. The type of security threat that uses computers or other networks to accept and pass on viruses is called:
A. phishing.
B. botnets.
C. logic bomb.
D. man-in-the-middle.
Answer: B
Q138. A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
A. Simple 1-pass zero overwrite
B. Low level 3-pass random wipe
C. Low level 7-pass random wipe
D. High level format 10 times
Answer: C
Q139. A user’s personal laptop was hacked. A technician troubleshooting the issue discovers the user used the numbers 123456789 as their account password. The user has not changed the password in two years. Which of the following best practices should the technician recommend the user implement to prevent future hacking? (Select TWO).
A. Configure screen saver
B. Set a strong password
C. Set login time restrictions
D. Use a more secure browser
E. Change the password frequently
Answer: B,E
Q140. A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation?
A. extract
B. tasklist
C. gpupdate
D. gpresult
E. chkdsk
Answer: D