★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-802 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/220-802-dumps.html
Act now and download your CompTIA 220-802 test today! Do not waste time for the worthless CompTIA 220-802 tutorials. Download Up to the immediate present CompTIA CompTIA A+ Certification Exam (220-802) exam with real questions and answers and begin to learn CompTIA 220-802 with a classic professional.
2021 Feb comptia 220-801 and 220-802:
Q461. - (Topic 2)
A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?
A. Lock the workstation
B. Shutdown the computer
C. Logon using the unprivileged guest account
D. Set the screensaver password
Answer: A
Explanation: http://www.dummies.com/how-to/content/how-to-lock-your-pc.navId-323066.html
Q462. - (Topic 1)
Which of the following can be used to remove a virus from a computer?
A. Anti-spyware software
B. Anti-malware software
C. System Restore
D. Event Viewer
Answer: B
Explanation: http://www.techopedia.com/definition/25873/anti-malware
Q463. - (Topic 2)
A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists that they did not download any movies and calls a technician to implement stronger small office home office (SOHO) security. Which of the following will allow only known workstations to connect to the SOHO router?
A. WPA password
B. Static IPs
C. MAC filtering
D. WEP password
Answer: C
Explanation: http://www.wi-fiplanet.com/tutorials/article.php/3924486/MAC-Filtering-for-Your-Wireless-Network.htm
Q464. - (Topic 1)
Which of the following are true regarding Windows 32-bit versus Windows 64-bit Operating Systems? (Select TWO).
A. CPUs that can run Windows 32-bit can also run Windows 64-bit.
B. Device drivers for Windows 32-bit and Windows 64-bit are the same.
C. Not all CPUs are capable of running Windows 64-bit.
D. Windows 64-bit can address larger amounts of RAM.
E. Windows 64-bit is a more secure OS and less susceptible to viruses.
Answer: C,D
Explanation: http://windows.microsoft.com/is-is/windows-vista/32-bit-and-64-bit-windows-frequently-asked-questions
Q465. - (Topic 2)
Which of the following is BEST used to prevent other people from viewing a user’s computer screen?
A. Anti-virus software
B. Key fob
C. Biometric device
D. Privacy filter
Answer: D
Explanation: http://www.privacyscreens.co.uk/howitworks.php
Up to the minute a+ 220-802 cheat sheet:
Q466. - (Topic 1)
If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is MOST important to consider?
A. Using multiple partitions
B. Using multiple hard drives
C. Using a single partition
D. Using a PXE boot scheme
Answer: A
Explanation: http://windows.microsoft.com/en-us/windows-vista/install-more-than-one-operating-system-multiboot
Q467. - (Topic 2)
A pest exterminator tries to gain access to a company’s computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
A. War driving
B. Social engineering
C. Shoulder surfing
D. Phishing
Answer: B
Explanation: http://www.veracode.com/blog/2013/03/hacking-the-mind-how-why-social-
engineering-works/
Q468. - (Topic 5)
Which of the following BEST describes the practice of attempting to gain information through deceptive emails?
A. Hashing
B. Biometrics
C. Phishing
D. Encryption
Answer: C
Q469. - (Topic 5)
In order to establish a VPN to a company firewall, Joe, a technician needed to have an RSA token and provide a user name and password to connect to the main office. This is an example of:
A. Privacy filters.
B. Extensive security.
C. Two-factor authentication.
D. Basic authentication.
Answer: C
Q470. - (Topic 5)
Joe, a user, should be aware of his surroundings when using a portable device to ensure that which of the following does not occur?
A. Shoulder surfing
B. Social engineering
C. Phishing
D. Rootkits
Answer: A