★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/220-902-dumps.html
Its very hard to pick a suitable CompTIA CompTIA 220-902 exam dump. Pass4sure is often a primary source to your CompTIA certification exam. All the 220-902 review materials will probably be presented in 2 forms, Pdf and also test powerplant. You can download or perhaps print your 220-902 Pdf files and learn them from any period. The CompTIA certification test engine creates an individual a genuine atmosphere in the CompTIA actual test. The answers on the CompTIA CompTIA exam questions are verified through our CompTIA CompTIA certification professionals. If you find any questions, please get in touch with us timely.
2021 Mar 220-902 exam question
Q1. A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?
A. Google Drive
B. iCloud
C. One Drive
D. FTP
Answer: C
Q2. A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?
A. Physical destruction
B. Quick format
C. Low level format
D. Overwrite
Answer: A
Q3. A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be:
A. a detriment to employer/employee relations.
B. personally identifiable information.
C. a violation of information access policies.
D. proof of employee corporate affiliation.
Answer: B
Q4. An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies?
A. DRM
B. EULA
C. IRP
D. PII
Answer: D
Q5. CORRECT TEXT
Two components of Genericwafe2.0 are causing performance issues on a Windows 7 PC One Genencware2.0 component is currently not responding and needs to be disabled upon reboot. To prevent further performance issues ensure both components are no longer running upon reboot without making any other changes to the current system or without deleting registry keys or shortcuts.
Instructions: When you have completed the simulation, please select the done button to submit your answer.
Answer: Please review explanation for detailed answer.
Down to date 220-902 exam topics:
Q6. When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly? (Select TWO).
A. A multimeter and a toner probe.
B. A large cloth to spread the screws and disassembled parts on.
C. A writing pad for documentation and a marker to label cables.
D. A manufacturer’s technical manual for the model of the laptop.
E. A container with separated areas to store different size screws.
Answer: D,E
Q7. The type of security threat that uses computers or other networks to accept and pass on viruses is called:
A. phishing.
B. botnets.
C. logic bomb.
D. man-in-the-middle.
Answer: B
Q8. A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the NEXT step?
A. Allow the user to speak with a supervisor.
B. Identify the problem.
C. Establish a theory.
D. Immediately go to the user’s office.
Answer: B
Q9. A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms malware exists and starts the process of removing the malware. Which of the
following is the FIRST step he should take in removing the malware?
A. Disable antivirus
B. Disable system restore
C. Enable hard drive encryption
D. Format the hard drive
Answer: B
Q10. After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The malware disables the computer’s antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without risking loss of the user’s data?
A. Run System Restore
B. Reinstall Windows with the Repair Option
C. Reinstall Windows on top of itself
D. Run System File Checker
Answer: A