★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 220-902 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/220-902-dumps.html


Examcollection keeps official CompTIA 220-902 exam products obtainable because many of us recognize that will CompTIA certifications may carry their value in the IT marketplace as long as there is certainly a desire from the industry. We promote you to preview and review the particular available Examcollection CompTIA CompTIA practice materials for the 220-902 exam preparation. The CompTIA 220-902 exam questions with verified answers can guarantee the success using confidence and ease. You can find a passing score right after take help from Examcollections CompTIA exam demos.

2021 Mar 220-902 question

Q81. Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayeD. “Access Denied. Please Enter Encryption Password.” Which of the following is the reason that this error is displayed? 

A. The hard drive is experiencing S.M.A.R.T. failure errors 

B. The TPM security chip inside the bench system is not enabled 

C. The BIOS of the bench system is out of date 

D. BitLocker is being used 

Answer:


Q82. An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation’s domain. Which of the following utilities will the administrator access to configure this setting? 

A. System Properties 

B. System Information 

C. System Protection 

D. System Management 

Answer:


Q83. A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this? 

A. Place directional antennas 

B. Use omni-directional antennas 

C. Enable MAC filtering 

D. Disable SSID broadcast 

Answer:


Q84. A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform? 

A. Secure the workstation in a limited access facility. 

B. Document the incident, purge all policy violating materials. 

C. Immediately delete all unauthorized materials. 

D. Reprimand the user and apply a content filter to their profile. 

Answer:


Q85. A user’s CRT display is not displaying colors correctly. Turning the display to the right or left sometimes temporarily corrects the problem. Which of the following should the technician check? 

A. The video card display driver 

B. The CRT power cable 

C. The video cable 

D. The CRT On Screen Display (OSD) 

Answer:


Latest 220-902 answers:

Q86. A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives? 

A. Recycling 

B. Shredding 

C. Overwriting 

D. Reformatting 

Answer:


Q87. A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed? 

A. 143 

B. 23 

C. 443 

D. 3269 

E. 3389 

Answer:


Q88. An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user? 

A. Power user 

B. Administrator 

C. Standard 

D. Guest 

Answer:


Q89. A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this? 

A. Configure the access point encryption from unsecured access to WEP. 

B. Adjust the radio power so that coverage is restricted to the business. 

C. Change the SSID to reflect the business name instead of a public access point. 

D. Enable MAC filtering and restrict access to other company’s devices. 

Answer:


Q90. DRAG DROP 

A technician has verified that Joe, a user, has a malware infection on his desktop. Drag and drop the following malware remediation techniques in the correct order Joe should follow to alleviate this issue. 

Answer: