★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/220-902-dumps.html


Downloadable Exam Engine with regard to 220-902,Whatsoever key details to the exam tend to be included in the 220-902 training materials at Ucertify. You can download the CompTIA simulated tests with regard to free. The professional writers of Ucertify make sure to found the appropriate and precise 220-902 practice questions in the training materials. We all provide the CompTIA questions along with answers in Pdf format. They are reliable and most up-to-date CompTIA tests.

2021 Dec 220-902 book

Q101. Which of the following identifies traffic based upon its physical network address? 

A. Phishing 

B. Hashing 

C. MAC filtering 

D. Geotracking 

Answer:


Q102. A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause? 

A. The motherboard BIOS version is out of date. 

B. The incorrect video card drivers are installed. 

C. The power connector for the video card is unplugged. 

D. The video card is unsupported by the motherboard. 

Answer:


Q103. A technician is noticing extremely slow performance on a computer and would like to see what application is consuming resources. Which of the following tools should the technician use to view the system performance? 

A. msconfig 

B. Task Manager 

C. Event Viewer 

D. netmon 

Answer:


Q104. A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives? 

A. Press F8 when prompted 

B. Hit the refresh button to force a re-detect 

C. Enable PATA in the BIOS 

D. Select load driver 

Answer:


Q105. Which of the following best practices is used to fix a zero-day vulnerability on Linux? 

A. Scheduled backup 

B. Scheduled disk maintenance 

C. Patch management 

D. Antivirus update 

Answer:


Up to the minute 220-902 free exam:

Q106. Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment? 

A. Commercial license 

B. Enterprise license 

C. Seat license 

D. Open source license 

Answer:


Q107. A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT? 

A. Enter all passwords they have used in the past 

B. Verify a smart card has been issued 

C. Check the network cable 

D. Reboot the computer 

Answer:


Q108. A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective? 

A. Physical destruction 

B. Quick format 

C. Low level format 

D. Overwrite 

Answer:


Q109. A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT? 

A. Reload the OS using FAT32 instead of NTFS. 

B. Change the disk from basic to dynamic. 

C. Run chkdsk with the /r switch and reboot the PC. 

D. Open the defrag utility and run a drive analysis. 

Answer:


Q110. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use? 

A. Disable DHCP and assign a static IP address to each network device physically connected to the network. 

B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices. 

C. Disable all switch ports when they are not utilized and enable them on an as needed basis. 

D. Place guest network jacks in public areas and all other jacks in secure areas as needed. 

Answer: