28 04 2016
[April-Updated-2016]CompTIA A+ 220-902 Exam Tips for Passing the 220-902 Certification Exam[NQ31-NQ40]
2016 April CompTIA Official NEWS – CompTIA A+ 220-902 Exam Questions and Answers New Released Today in Braindump2g.com Online IT Study Website!
CompTIA A+ 220-902 covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures.
Number of Questions:Maximum of 90 questions
Type of Questions: Multiple choice questions (single and multiple response), drag and drops and performance-based
Length of Test: 90 Minutes
Passing Score: 700 (on a scale of 900)
After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?
A. Run the malware removal program while disconnected from the Internet
B. Run the malware removal program in Windows Safe Mode
C. Reinstall the malware removal program from a trusted source
D. Set the malware removal program to run each time the computer is rebooted
A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?
A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).
A. Configure the workstation for a static IP
B. Disable all wireless network connections
C. Remove shortcuts to the application
D. Block the application in Windows Firewall
E. Change network location to Work
F. Reroute the web address in HOSTS file
Use Windows firewall to restrict an application from reaching the web. Alternatively you can also reroute the web address in the HOST file.
For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?
A. Annual cyber security education
B. Update antivirus signatures more often
C. Block all email attachments
D. Install an IPS on each workstation
A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?
A. Message of the Day
B. Email lists
C. Company forums
D. Regular user education
Educating user is the best way to combat security threats. After all security threats occur when a human carries it across unknowingly.
Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO).
A. Windows 7 Home Premium
B. Windows Vista Business
C. Windows XP Home
D. Windows XP Professional 64-bit
E. Windows XP Media Center
A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT?
A. Document findings, actions, and outcomes
B. Escalate problem to a senior technician
C. Re-establish new theory of probable cause
D. Perform a full system backup
A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?
A. Turning down the radio power level
B. Enabling MAC filtering
C. Setting a high encryption level
D. Disabling the SSID broadcast
A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone’s knowledge. Which of the following would prevent this from occurring?
A. Change to user MAC filtering
B. Change default usernames and passwords
C. Disable the SSID from broadcasting
D. Enable static IP addresses
A technician has configured the ability to connect to a small office server using remote desktop
from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?
A. Configure the server to use a static IP
B. Logically move the server to the DMZ
C. Reallocate the server to a different networking closet
D. Disable the remote desktop port
2016 Latest CompTIA A+ 220-902 Exam Preparation Materials:
1.2016 New CompTIA A+ 220-902 Exam VCE and PDF Dumps 1219q&as from Braindump2go:http://www.braindump2go.com/220-902.html
2.Google Drive Files – 2016 New 220-902 Exam Questions PDF:https://drive.google.com/folderview?id=0BwwEErkugSaLb1VyZWtBSDlqWEU&usp=sharing