★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/220-902-dumps.html
Want to know Exambible 220-902 Exam practice test features? Want to lear more about CompTIA CompTIA A+ Certification Exam (902) certification experience? Study Top Quality CompTIA 220-902 answers to Update 220-902 questions at Exambible. Gat a success with an absolute guarantee to pass CompTIA 220-902 (CompTIA A+ Certification Exam (902)) test on your first attempt.
2021 Feb 220-902 download
Q151. An end user calls the company’s IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following BEST represents a possible cause?
A. A valid certificate suitable for S/MIME is not installed.
B. Emails received by the user lack suitable digital signatures.
C. SSL/TLS certificates stored on the device are expired.
D. The sender did not have the addressee’s public certificate.
Answer: A
Q152. Which of the following describes when an application is able to reuse Windows login credentials?
A. Access control list
B. Principle of least privilege
C. Single sign-on
D. Pass-through authentication
Answer: C
Q153. In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken?
A. Set NTFS permissions to read only
B. Set the folder to index files for search
C. Set the local administrator as the owner of the folder
D. Set network share permissions to read only
Answer: A
Q154. A user notices the social media apps are constantly updated with the user’s precise location. The user is worried about privacy and would like to keep this information from being broadcast online. Which of the following features should the user adjust in order to accomplish this?
A. Geotracking
B. Filtering
C. WiFi
D. Tethering
Answer: A
Q155. A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card?
A. Perform self-grounding
B. Unplug the computer power cable
C. Use an ESD strap
D. Require the electrical system be brought up to code
Answer: B
Update 220-902 exam fees:
Q156. Which of the following security threats happens when another person enters a secured area with an authorized person?
A. Tailgating
B. Shoulder surfing
C. Spoofing
D. Phishing
Answer: A
Q157. A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST?
A. Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.
B. Install a USB wireless card to ensure that Windows networking is working properly.
C. Open the laptop and reseat the network card and both antennas.
D. Download and install the latest wireless driver from the manufacturer’s website.
Answer: A
Q158. A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next?
A. Hosts files
B. IPv6 settings
C. Proxy settings
D. Lmhosts files
Answer: C
Q159. An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?
A. Recovery partition
B. Primary partition
C. System restore
D. System refresh
Answer: A
Q160. A user, Ann, receives a phone call from the company’s mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced?
A. Virus infection
B. Man-in-the-middle attack
C. Phishing attack
D. Malware infection
Answer: A