Pass4sure 220-902 Questions are updated and all 220-902 answers are verified by experts. Once you have completely prepared with our 220-902 exam prep kits you will be ready for the real 220-902 exam without a problem. We have Up to the immediate present CompTIA 220-902 dumps study guide. PASSED 220-902 First attempt! Here What I Did.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for CompTIA 220-902 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/220-902-exam-dumps.html
Q151. A customer’s Windows 7 Home Premium computer displays a stop error and automatically reboots. Which of the following system utilities can a support technician use to find more information about the cause of the error?
A. Action Center
B. Event Viewer
C. File Explorer
D. Disk Management
Answer: B
Q152. A user notices the social media apps are constantly updated with the user’s precise location. The user is worried about privacy and would like to keep this information from being broadcast online. Which of the following features should the user adjust in order to accomplish this?
A. Geotracking
B. Filtering
C. WiFi
D. Tethering
Answer: A
Q153. CORRECT TEXT
You need to configure your mobile device to send and receive electronic messages from your company. Your mobile device must be able to truly synchronize the message state with your desktop so that when a message is read on your desktop it is marked as read on your mobile device These are the proper parameters:
Email address tech@techies com
Password P@SSwOrd
Pop techies com Port 110 Security. None
IMAP techies com Port 993 Security SSL
Smtp.techies.com Port 465 Security: TLS
Company SSID Techies
Security WPA2
Passphrase P@SSwOrd
SSID is not broadcasted
Instructions You are not authorized to use the Company's WLAN The outgoing server does not require login credentials When you have completed the simulation, please select the done button to submit your answer.
Answer: Please review explanation for detailed answer.
Q154. Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST action to troubleshoot this problem?
A. Check running apps
B. Reset to factory default
C. Disable cloud syncing
D. Replace the device’s battery
Answer: A
Q155. A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC. Which of the following would the technician use to accomplish this?
A. IMAP
B. SMTP
C. SMNP
D. POP3
Answer: A
Q156. A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detections have been removed. After running Disk Cleanup, the system still seems to be slow, especially with multiple programs running. Which of the following should the technician do NEXT?
A. Run CHKDSK
B. Manually erase all cookies
C. Go back to the latest restore point
D. Run defrag
Answer: D
Q157. Which of the following tools is used to type or paste recovery commands directly into a Linux box?
A. Shell/terminal
B. Backup/time machine
C. Command/cmd
D. Restore/snapshot
Answer: A
Q158. An IT manager needs to reimage 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST?
A. Boot from PXE.
B. Install Windows using DVD.
C. Reboot computers with USB drive.
D. Press F8 while rebooting.
Answer: A
Q159. A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
Answer: C
Q160. A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Answer: A