★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-802 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/220-802-dumps.html
Want to know Actualtests 220-802 Exam practice test features? Want to lear more about CompTIA CompTIA A+ Certification Exam (220-802) certification experience? Study 100% Guarantee CompTIA 220-802 answers to Renovate 220-802 questions at Actualtests. Gat a success with an absolute guarantee to pass CompTIA 220-802 (CompTIA A+ Certification Exam (220-802)) test on your first attempt.
2021 Oct comptia a+ exam 220-802:
Q541. - (Topic 3)
A user realizes they left their mobile phone in a taxi minutes after the car departs. Which of the following should be done to BEST ensure none of the private data on the phone is accessed?
A. Passcode Lock
B. GPS Tracking
C. Remote Backup
D. Remote Wipe
Answer: D
Explanation: https://espace.cern.ch/mmmservices-help/ManagingYourMailbox/QuotaArchivingAndRecovery/Pages/WipingMobilePhones.aspx
Q542. - (Topic 1)
When running Windows XP, which of the following would give a list of switches for the CHKDSK command?
A. chkdsk ~?
B. chkdsk :?
C. chkdsk /?
D. chkdsk \?
Answer: C
Explanation: http://www.computerhope.com/chkdskh.htm
Q543. - (Topic 5)
A client wants a wireless network set up in the office, but does not want unauthorized users to be able to access the network. Which of the following provides the BEST protection?
A. Change the default channel
B. Disable the SSID
C. AP placement
D. Strong encryption
Answer: D
Q544. - (Topic 5)
A technician, Anne, observes that a laser printer prints pages with toner scattered on the page that easily rubs off of the paper. Which of the following components has failed in the printer?
A. Duplexing assembly
B. Imaging drum
C. Fusing assembly
D. Transfer roller
Answer: C
Q545. - (Topic 2)
Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
Answer: C
Regenerate a+ 220-802 questions:
Q546. - (Topic 5)
By default, a file or folder will receive its NTFS permissions from the parent folder. Which of the following does this describe?
A. Permission propagation
B. Single sign-on
C. Client-side virtualization
D. Proxy settings
E. Recovery image
F. Inheritance
Answer: F
Q547. - (Topic 5)
The payroll department works with company financial data and had an incident that involved employee’s salary being shared across the network. Which of the following would enforce least privilege?
A. Paper shredding
B. Firewalls
C. RFID employee badges
D. Directory permissions
Answer: D
Q548. - (Topic 1)
A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?
A. Windows 7 or Windows Vista
B. Windows Vista only
C. Windows XP Professional x64 Edition
D. Windows 7 only
Answer: D
Explanation: http://windows.microsoft.com/en-us/windows7/products/features/homegroup
Q549. - (Topic 4)
A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?
A. Press F8 when prompted
B. Hit the refresh button to force a re-detect
C. Enable PATA in the BIOS
D. Select load driver
Answer: D
Explanation: http://www.togaware.com/linux/survivor/Load_RAID.html
Q550. - (Topic 5)
For which of the following instances is System Restore MOST likely to be used?
A. Deleting temporary files that are not needed.
B. Replacing a failed hard drive with a new drive.
C. Placing the system configuration into a prior state.
D. Downgrading an operating system to another version.
Answer: C