Cause all that matters here is passing the CompTIA 220-902 exam. Cause all that you need is a high score of 220-902 CompTIA A+ Certification Exam (902) exam. The only one thing you need to do is downloading Pass4sure 220-902 exam study guides now. We will not let you down with our money-back guarantee.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA 220-902 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/220-902-exam-dumps.html

Q151. Which of the following Windows features would be used to encrypt a single file or folder? 

A. EFS 

B. NTFS 

C. BitLocker 

D. Security 

Answer:


Q152. A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the “Prior Versions” tab. According to the theory of troubleshooting, which of the following is the technician’s NEXT step? 

A. Establish a theory of probable cause 

B. Establish a plan of action and implement the solution 

C. Document findings, actions and outcomes 

D. Verify full system functionality and implement preventive measures 

Answer:


Q153. A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity: 

IP Address: 192.168.1.101 

Netmask: 255.255.255.0 

DHCP Server:192.168.1.1 

DNS Server:192.168.1.2 

Default Gateway:192.168.1.1 

Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet? 

A. The workstation has an APIPA address. 

B. The DHCP server is unavailable. 

C. The default gateway router is misconfigured. 

D. The DHCP server is misconfigured. 

Answer:


Q154. A user reports paper jams at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue? 

A. Fuser 

B. Duplexer 

C. Pickup roller 

D. Imaging drum 

Answer:


Q155. A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue? 

A. Unsupported operating system 

B. Unacceptable CPU type and speed 

C. Insufficient airflow and cooling 

D. Inadequate video RAM amount 

Answer:


Q156. A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be: 

A. a detriment to employer/employee relations. 

B. personally identifiable information. 

C. a violation of information access policies. 

D. proof of employee corporate affiliation. 

Answer:


Q157. A technician needs to perform a backup while a system is running. Which of the following services allows this task to be accomplished? 

A. Robocopy 

B. Shadow copy 

C. Xcopy 

D. System restore 

Answer:


Q158. A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client’s machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory? 

A. Identify the problem 

B. Establish a plan of action to resolve the problem 

C. Test the theory to determine cause 

D. Document findings, actions, and outcomes 

Answer:


Q159. Which of the following is a security threat that disguises itself as legitimate software? 

A. Trojan 

B. Worm 

C. Virus 

D. Spyware 

Answer:


Q160. A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer? 

A. Use compressed air to free the dust from the components and remove it with an ESD vacuum. 

B. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away. 

C. Use a shop vacuum with enough power to ensure all dust has been removed. 

D. Remove as much dust as possible by hand and use compressed air to blow the rest out. 

Answer: