This page was exported from Exam PDF Free Instant Download From Lead2pass [ ] Export date:Fri May 29 4:53:35 2020 / +0000 GMT ___________________________________________________ Title: [Lead2pass Official] Free Lead2pass 220-902 PDF Download 100% Pass Exam 220-902 (351-375) --------------------------------------------------- Lead2pass 2017 September New CompTIA 220-902 Exam Dumps! 100% Free Download! 100% Pass Guaranteed! 220-902 dumps free share: Lead2pass presents the highest quality of 220-902 exam dump which helps candidates to pass the 220-902 exams in the first attempt. Following questions and answers are all new published by CompTIA Official Exam Center: QUESTION 351A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of? A.    Shoulder surfingB.    Phishing attackC.    Social engineeringD.    Malware infectionAnswer: CExplanation: QUESTION 352A user's PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image? A.    BRDB.    DVDC.    USBD.    PXEE.    CD Answer: DExplanation: QUESTION 353Which of the following identifies traffic based upon its physical network address? A.    PhishingB.    HashingC.    MAC filteringD.    Geotracking Answer: CExplanation: QUESTION 354A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO). A.    User trainingB.    Anti-malwareC.    Paper shreddingD.    Time of day restrictionsE.    Employee badgesF.    Mantraps Answer: ACExplanation: QUESTION 355Which of the following is TRUE about the difference between a worm and a virus? A.    Worms are written in assembly while viruses are written with scripting languages.B.    Viruses hide in the boot record while worms hide within the file system.C.    Worms self propagate while viruses need human intervention to replicate.D.    Viruses disable the antivirus update service while worms kill the antivirus process. Answer: CExplanation: QUESTION 356A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network? A.    Disable the router's remote management feature.B.    Enable WPA2 wireless encryption.C.    Change the router's default admin name and password.D.    Place the router in a locked room. Answer: DExplanation: QUESTION 357A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which of the following administrative tools would accomplish this? A.    User AccountsB.    Network and Sharing CenterC.    Task ManagerD.    System Configuration Answer: AExplanation: QUESTION 358A user calls the help desk to report about their smartphone not being able to make any phone calls. The user admits that the smartphone can still send/receive email, browse all websites, and utilize all Internet-capable applications. Which of the following issues is MOST likely affecting the smartphone? A.    Wi-Fi is turned off; the cellular antenna is turned on.B.    The cellular antenna is turned off; Wi-Fi is still on.C.    The user forgot to turn off Bluetooth before trying to make a call.D.    The user has 4G capability turned off, and is only on 2G. Answer: BExplanation: antenna catches and transmits cellular signals and data. Wi-fi is another technology that is used to access internet using a wireless router. So if the cellular antenna is turned off, you can still use Wi-Fi to browse internet and use host of applications. QUESTION 359A technician is troubleshooting a customer's computer that will not turn on. The user stated that the computer was working fine until there was a thunderstorm the other night. Which of the following tools would the technician use to determine what is wrong with the computer? A.    Factory diagnostic CDB.    POST cardC.    Toner probeD.    Power supply tester Answer: DExplanation: QUESTION 360A senior technician requests a diagnostic tool for checking external ports and connectors on computers and laptops. Which of the following tools would BEST accomplish this task? A.    Wireless locatorB.    Corona wireC.    Toner probeD.    Loopback plugs Answer: DExplanation: QUESTION 361A technician needs to build a PC to act as a home virtual server. Which of the following would be the BEST choice? A.    Dual Core CPU, 6GB DDR3 RAM, 320GB of hard drive spaceB.    Dual Core CPU, 8GB DDR RAM, 1TB of hard drive spaceC.    QUAD Core CPU, 6GB DDR3 RAM, 320GB of hard drive spaceD.    QUAD Core CPU, 4GB DDR2 RAM, 1TB of hard drive space Answer: CExplanation:Virtual server hosts a lot of virtual machines that host various operating systems and applications. Therefore, you need maximum cores and memory to keep all the virtual machines humming properly. More cores and more memory means you can have more physical resources to create virtual resources that will be used to host virtual machines. QUESTION 362Windows XP Mode is available in which of the following Microsoft Windows environments? A.    Windows Vista UltimateB.    Windows 7 Business EditionC.    Windows XP ProfessionalD.    Windows Server 2008 R2 Answer: BExplanation: QUESTION 363A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this? A.    Run in Windows XP compatibility modeB.    Run the program in a virtual PC environmentC.    Log out of the system and login under another user's nameD.    Right click select "run as" and select administrator Answer: DExplanation: QUESTION 364A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity? A.    Train users on tailgatingB.    Implement an escort policyC.    Install mantrapsD.    Require all users to have badges Answer: CExplanation: QUESTION 365An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information? A.    Lock screen patternB.    Cancel mobile serviceC.    Remote wipeD.    Six character password Answer: CExplanation: QUESTION 366Which of the following is the command line entry to start an archive or restore a process on a Windows XP computer? A.    RECOVERB.    REPLACEC.    NTBACKUPD.    COPY Answer: CExplanation: Windows-NT-backup QUESTION 367Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data? A.    Standard formatB.    Low level formatC.    Overwrite programD.    Drive wipe Answer: AExplanation: QUESTION 368Which of the following is MOST effective in preventing security breaches on a network? (Select THREE). A.    Bandwidth throttlingB.    Eliminate password historyC.    Enable QoSD.    Antivirus softwareE.    User educationF.    Enforced login/logoff hours Answer: DEFExplanation: QUESTION 369Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO). A.    Temporary Internet FilesB.    My Document FilesC.    Windows System FilesD.    Network FilesE.    Program Files Answer: CEExplanation:Windows program files are important for Windows operating system. If these files are deleted, Windows will corrupt. Similarly program files are related to applications and programs installed on a computer. These are highly sensitive files because they are related to the functioning of the operating system and the applications installed on it. QUESTION 370A user recently purchased a new PC with a 500GB hard drive. However, they are reporting that their C. Drive is only 420GB. Which of the following BEST explains this? A.    The manufacturer blocks off that 80GB so that user cannot exceed the drive space.B.    The file system is using the 80GB for tables.C.    BIOS and systems files are hidden in the 80GB.D.    A Factory Recovery Partition is using the 80GB. Answer: D QUESTION 371Which of the following are true regarding Windows 32-bit versus Windows 64-bit Operating Systems? (Select TWO). A.    CPUs that can run Windows 32-bit can also run Windows 64-bit.B.    Device drivers for Windows 32-bit and Windows 64-bit are the same.C.    Not all CPUs are capable of running Windows 64-bit.D.    Windows 64-bit can address larger amounts of RAM.E.    Windows 64-bit is a more secure OS and less susceptible to viruses. Answer: CDExplanation: QUESTION 372A technician receives a report that the pages coming out of a laser printer are smearing when touched. Which of the following components should the technician check FIRST to resolve this issue? A.    DrumB.    FuserC.    Pickup rollerD.    Corona wire Answer: BExplanation: QUESTION 373A user just bought an Android tablet and wants to connect to their work email. The user's employer has a Microsoft Exchange server for email. Which of the following would the technician configure to allow the user to access email on the Android tablet? A.    DNS, DHCPB.    IMAP, SNTPC.    POP3, SMTPD.    Devices are incompatible Answer: CExplanation: QUESTION 374A technician is working on a user's PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO). A.    Resolve issueB.    Inform userC.    New theory or escalateD.    Document issueE.    Verify system functionality Answer: ACExplanation:When you have tested the theory of cause, resolve the issue using troubleshooting techniques and if the issue is not resolved after the troubleshooting measure, reestablish the theory and escalate the issue to higher authorities. QUESTION 375Which of the following would a technician use to install applications onto an iPad? (Select TWO). A.    App StoreB.    Market PlaceC.    iTunesD.    ExchangeE.    Mobile Market Answer: ACExplanation:App Store is an online service where iPad users can download applications and games for iPad. It is a specific software for iOS ?Apple mobile operating system. iTunes is a flagship Apple software that allows you to play music, watch videos and keep a repository of Apps that are installed on iPad. More free Lead2pass 220-902 exam new questions on Google Drive: Lead2pass is now offering Lead2pass 220-902 PDF dumps with 100% passing guarantee. Use Lead2pass 220-902 PDF and pass your exam easily. Download CompTIA 220-902 exam dumps and prepare for exam. 2017 CompTIA 220-902  (All 1236 Q&As) exam dumps (PDF&VCE) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-09-28 08:27:28 Post date GMT: 2017-09-28 08:27:28 Post modified date: 2017-09-28 08:27:28 Post modified date GMT: 2017-09-28 08:27:28 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from