★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 220-802 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/220-802-dumps.html


Cause all that matters here is passing the CompTIA 220-802 exam. Cause all that you need is a high score of 220-802 CompTIA A+ Certification Exam (220-802) exam. The only one thing you need to do is downloading Examcollection 220-802 exam study guides now. We will not let you down with our money-back guarantee.

2021 Nov comptia a+ 220-801 and 220-802 practice exams:

Q451. CORRECT TEXT - (Topic 5) 

You need to configure your mobile device to send and receive electronic messages from your company. Your mobile device must be able to truly synchronize the message state with your desktop so that when a message is read on your desktop it is marked as read on your mobile device These are the proper parameters: 

Email address tech@techies com 

Password P@SSwOrd 

Pop techies com Port 110 Security. None 

IMAP techies com Port 993 Security SSL 

Smtp.techies.com Port 465 Security: TLS 

Company SSID Techies 

Security WPA2 

Passphrase P@SSwOrd 

SSID is not broadcasted 

......... 

Instructions You are not authorized to use the Company's WLAN The outgoing server does not require login credentials When you have completed the simulation, please select the done button to submit your answer. 

Answer: 

Please review explanation for detailed answer. 


Q452. - (Topic 5) 

Which of the following is the MAIN difference between a rootkit and a virus? 

A. Rootkits encrypt the operating system while viruses encrypt documents 

B. Rootkits execute as super user while viruses execute as regular users 

C. Rootkits modify the BIOS while viruses cannot access the BIOS 

D. Rootkits infiltrate the kernel while viruses infiltrate files 

Answer:


Q453. - (Topic 5) 

Which of the following BEST describes geotracking? A. An enabled cookie that sends user location data to vendors 

B. Location software to locate a user’s missing cellular device 

C. SMS information that is sent to people in their contacts 

D. Location data embedded into pictures that have been taken 

Answer:


Q454. - (Topic 2) 

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data? 

A. Reduce broadcast power 

B. Change SSID name 

C. Set encryption 

D. Enable MAC filtering 

Answer:

Explanation: http://www.dirksen.nl/assets/Uploads/Downloads/Top10ChecklistSOHOSecurity.pdf 


Q455. - (Topic 5) 

iOS version 5.0 allows for all data to be synchronized and backed up to a computer with iTunes via which of the following methods? (Select TWO). 

A. 4G LTE 

B. USB cable 

C. FireWire 

D. Bluetooth 

E. Local Wi-Fi 

Answer: B,E 


Renewal 220-802 cheat sheet:

Q456. - (Topic 2) 

Which of the following passwords is the MOST secure according to industry best practices? 

A. VeryStrongPassword 

B. SimpleAnswer1234 

C. E@sy2Remember 

D. thisisthecorrectanswer1 

Answer:

Explanation: http://netforbeginners.about.com/od/antivirusantispyware/a/example_strong_passwords.ht m 


Q457. - (Topic 2) 

Which of the following scenarios BEST defines phishing? 

A. A user receives an email from a friend to download a picture but the file format ends in .exe. 

B. A user receives a pop-up message about a virus from a company that states that if they buy this product it will remove the virus. 

C. A user receives a message about unwanted activity from their antivirus asking to remove the suspect file. 

D. A user receives an email from a person in another country with a story as to why they need help with a financial arrangement. 

Answer:

Explanation: http://www.scamwatch.gov.au/content/index.phtml/tag/requestsforyouraccountinformation 


Q458. - (Topic 5) 

A technician receives a call late in the evening that employees of a small business cannot access the company’s remote access server. The technician cannot get a response from the server or the router at the site. Upon gaining access to the physical site, the technician discovers the router unplugged from the power source. Which of the following should be implemented to reduce the chance of this happening again? 

A. Plug the router into an uninterruptable power supply. 

B. Move the router to a physically secure location. 

C. Install security cameras to monitor the router. 

D. Outsource the remote access service to a third party. 

Answer:


Q459. - (Topic 2) 

A user receives a phone call from a person claiming to be from technical support. This person knows the user’s name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats? 

A. Social engineering 

B. Phishing 

C. Malware 

D. Virus 

Answer:

Explanation: http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html 


Q460. - (Topic 5) 

A technician notices that everything appears too large on the computer’s screen and the display resolution cannot be changed. The machine is running in which of the following modes? 

A. Recovery 

B. Virtualization 

C. VGA 

D. Administrator 

Answer: