Download CompTIA.PracticeTest.220-902.1e.135q.vcex

CompTIA.PracticeTest.220-902.1e.135q.vcexCompTIA.PracticeTest.220-902.1e.135q.vcexCompTIA.PracticeTest.220-902.1e.135q.vcexCompTIA.PracticeTest.220-902.1e.135q.vcexCompTIA.PracticeTest.220-902.1e.135q.vcexCompTIA.PracticeTest.220-902.1e.135q.vcex
Exam CompTIA A+
Number 220-902
File Name CompTIA.PracticeTest.220-902.1e.135q.vcex
Size 4.59 Mb
Posted August 01, 2018

Download




How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%






Demo Questions

Question 1

A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer?


  • A: Use compressed air to free the dust from the components and remove it with an ESD vacuum.
  • B: Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away.
  • C: Use a shop vacuum with enough power to ensure all dust has been removed.
  • D: Remove as much dust as possible by hand and use compressed air to blow the rest out.
Question 2

A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair?


  • A: The technician should replace the power supply
  • B: The technician should review disposal regulations
  • C: The technician should check the environment
  • D: The technician should remove jewelry
Question 3

A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?


  • A: Secure the workstation in a limited access facility.
  • B: Document the incident, purge all policy violating materials.
  • C: Immediately delete all unauthorized materials.
  • D: Reprimand the user and apply a content filter to their profile.
Question 4

A customer is experiencing issues with email and calls the help desk. The technician determines it would help clarify the issue if the customer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to:


  • A: close any items of a personal nature.
  • B: reboot the computer and log back in.
  • C: capture a screen-shot of the error message.
  • D: take steps to reproduce the error.
Question 5

A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the “Prior Versions” tab. According to the theory of troubleshooting, which of the following is the technician’s NEXT step?


  • A: Establish a theory of probable cause
  • B: Establish a plan of action and implement the solution
  • C: Document findings, actions and outcomes
  • D: Verify full system functionality and implement preventive measures
Question 6

A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?


  • A: The PC’s Windows firewall is misconfigured
  • B: The PC has an incorrect IP address configured
  • C: The PC is on the wrong wireless network
  • D: The PC does not have remote assistance turned on
Question 7

Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?


  • A: Shoulder surfing
  • B: Man-in-the-middle
  • C: Social engineering
  • D: Ransomware
Question 8

Which of the following is the BEST option to prevent data breaches on lost mobile devices?


  • A: Install a locator application on the mobile device so that it can be traced.
  • B: Apply a restriction to lock the device after a certain number of failed login attempts.
  • C: Configure the device to remote wipe as soon as it is reported lost.
  • D: Utilize the fingerprint scanner and passcode for multifactor authentication.
Question 9

A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation?


  • A: extract
  • B: tasklist
  • C: gpupdate
  • D: gpresult
  • E: chkdsk
Question 10

A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices?


  • A: IMAP
  • B: S/MIME
  • C: POP3
  • D: SMTP



Comments