Customers Passed CompTIA 220-902 Exam
Average Score In Real 220-902 Exam
Questions came from our 220-902 dumps.
Welcome to PassExamHub's comprehensive study guide for the CompTIA A+ Certification Exam: Core 2 exam. Our 220-902 dumps is designed to equip you with the knowledge and resources you need to confidently prepare for and succeed in the 220-902 certification exam.
PassExamHub's 220-902 dumps PDF is carefully crafted to provide you with a comprehensive and effective learning experience. Our study material includes:
In-depth Content: Our study guide covers all the key concepts, topics, and skills you need to master for the 220-902 exam. Each topic is explained in a clear and concise manner, making it easy to understand even the most complex concepts.
Online Test Engine: Test your knowledge and build your confidence with a wide range of practice questions that simulate the actual exam format. Our test engine cover every exam objective and provide detailed explanations for both correct and incorrect answers.
Exam Strategies: Get valuable insights into exam-taking strategies, time management, and how to approach different types of questions.
Real-world Scenarios: Gain practical insights into applying your knowledge in real-world scenarios, ensuring you're well-prepared to tackle challenges in your professional career.
Expertise: Our 220-902 exam questions answers are developed by experienced CompTIA certified professionals who have a deep understanding of the exam objectives and industry best practices.
Comprehensive Coverage: We leave no stone unturned in covering every topic and skill that could appear on the 220-902 exam, ensuring you're fully prepared.
Engaging Learning: Our content is presented in a user-friendly and engaging format, making your study sessions enjoyable and effective.
Proven Success: Countless students have used our study materials to achieve their 220-902 certifications and advance their careers.
Start Your Journey Today!
Embark on your journey to CompTIA A+ Certification Exam: Core 2 success with PassExamHub. Our study material is your trusted companion in preparing for the 220-902 exam and unlocking exciting career opportunities.
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?
A. An IP conflict is present.
B. A corporate VPN is enabled.
C. A firewall exception must be set.
D. HomeGroup must be enabled.
A novice user is trying to change the password on a Linux system. The user is attempting to use command line functions. Which of the following commands should be used?
A. passwd
B. pwd
C. chown
D. chmod
A new virus has been spreading via USB flash drives when they are plugged in. An administrator has been tasked with securing the workstations. Which of the following should be done FIRST?
A. Disable Autorun features
B. Update security software definitions
C. Force encryption on all removable drives
D. Force users to change their passwords
A technician wants to decrease the risk of unauthorized users being able to use an unattended computer.Which of the following actions should the technician take to accomplish this goal?
A. Restrict user permissions.
B. Configure failed attempts lockout.
C. Require screensaver password.
D. Use data encryption.
An administrator has verified that a PC has no Internet connectivity. Using ipconfig shows that the IP address for the machine is completely different than the assigned network address. After using ipconfig /release and ipconfig /renew, the computer is still assigned the same address. Which of the following is MOST likely the cause of the issue?
A. The NIC drivers are not properly installed
B. HomeGroup is misconfigured
C. DHCP server is unavailable
D. A static IP address is configured
A client has requested a workspace environment configuration that will allow employees to work in a virtual space for specific projects, but when working on other projects, allow them to work locally. Which of the following is the BEST solution for this virtual configuration?
A. Multiheaded client
B. Thin client
C. Zero client
D. Thick client
A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition?
A. Credential Manager
B. Computer Management
C. Device Manager
D. TPM Manager
Which of the following is the FASTEST way for a user to synchronize data between an iPhone and a workPC?
A. Transfer data via WiFi Direct to the user’s laptop.
B. Use Bluetooth to share data from the phone.
C. Connect the iPhone’s USB cable and use iTunes.
D. Copy the data from the phone to a MicroSD card.
A user has become a victim of data harvesting. The user wants to know more about the potential for mobile device application security issues. Which of the following settings should a technician advise the user to change on the user’s mobile device? (Select three.)
A. Location tracking
B. Camera activation
C. Data transmission limit
D. System lockouts
E. Developer options
F. Accessibility
G. Synchronization
H. Storage
A technician has received a call from a user who opened an application and was presented with an error message stating the application has failed to load properly and will now close. The user has rebooted the PC several times and keeps getting the same message. The user has administrative rights on the local machine. Which of the following tools should be used to resolve this issue QUICKLY?
A. REGEDIT
B. System File Checker
C. Command prompt
D. Uninstall/reinstall/repair
E. MSCONFIG
A technician at a corporation receives an instant message from a user who states the new department shared drive that was given through managed settings is missing from the user’s PC. Which of the following tools should the technician use to BEST troubleshoot the missing shared drive?
A. chmod
B. ipconfig
C. msconfig
D. nslookup
E. gpresult
NO: 266A file is moved from one folder to another within the same disk volume. Which of the following will happen to the permissions on the file?
A. The file will get the permissions of both folders
B. The file will get the permissions of the destination folder
C. The file will keep the original permissions
D. The file will have all permissions removed
An IPS appliance is installed on the network. Which of the following is the purpose of the IPS?
A. To check the network for unwanted activity
B. To check and stop unwanted activity
C. To provide connectivity to the network
D. To test the resilience of the network
A technician is troubleshooting a Windows machine that is unable to boot. Attempts to boot into safe mode result in the system continuously rebooting.To repair the computer without losing data, the technician should boot:
A. using factory recovery partition
B. using preinstallation environment
C. with POST on verbose mode
D. with BIOS default settings
A technician starts hard drive transfers in a SOHO that will take up to 16 hours to complete. Immediately after starting the transfers, the technician gets warning of a hurricane that will occur overnight. Which of the following is the BEST action to complete before leaving the office?
A. Turn off the monitors and printers so they do not overheat
B. Unplug the computers, but keep the hard drive transfer running
C. Call the power company to turn off any power coming to the office
D. Ensure the surge suppressors and devices are unplugged from the power sockets
An administrator is installing a WAP in a fitness center. There will only be five devices that should have access to this, and they are all company owned. Users do not want to put in a password when they connect these devices to the wireless. Given this scenario, which of the following is the MOST secure method of deployment?
A. Disable SSID broadcasting
B. Media access control filtering
C. Disable ports 80 and 443 on the access point
D. Lower radio power levels
A user reports the screen on a mobile device frequently dims even when the device settings are not being changed. Which of the following is MOST likely the cause?
A. Faulty backlight
B. High contrast mode
C. Auto-brightness
D. Power saving mode
NO: 412A technician needs to disable System Restore prior to a virus cleaning. Which of the following system settings has the System Restore options?
A. MSINFO32
B. Device Manager
C. Control Plane
D. Microsoft Management Console
A user is having difficulty with a recently installed application in Windows 7 and needs to make changes to a configuration file. A technician instructs the user to navigate to the application data to make the changes, but the user is unable to locate it. Which of the following should the technician instruct the user to do to find the appropriate folder? (Choose two.)
A. Type %Windir% in the Windows Explorer bar
B. Toggle the hidden system files option
C. Make the user a local admin on the PC
D. Type %Appdata% in the Windows Explorer bar
E. Reinstall the application using the recommended settings
F. Change the password and disable the local guest account
Multiple users have reported latency issues. After troubleshooting the issue, the technician finds that bandwidth is saturated by non-corporate applications. Which of the following should resolve this issue?
A. Assign static IP addresses
B. Enable MAC filtering
C. Enable content filtering
D. Configure an IPS
A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?
A. The PC’s Windows firewall is misconfigured
B. The PC has an incorrect IP address configured
C. The PC is on the wrong wireless network
D. The PC does not have remote assistance turned on
Which of the following is a security best practice?
A. Use multifactor VPN authentication.
B. Use only commercially licensed software.
C. Use only WiFi instead of Ethernet cabling.
D. Use only solid state hard drives in servers.
A technician arrives on site to find that two users who have the same model of smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do NEXT?
A. Reinstall the application
B. Roll back the application to the earlier version
C. Clear the application cache
D. Update the OS of the smartphones
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
A. Access control lists
B. Multifactor authentication
C. Organizational unit
D. Trusted software sources
E. Pre-shared key
An administrator needs to create a new folder on a Windows PC. Which of the following commands should the administrator use?
A. cd
B. md
C. sc
D. ftp
E. mkdir
After completing a fresh Windows 7 installation for a customer, a technician wants to ensure the OS files are hidden and protected from accidental deletion or alteration. Which of the following locations should the technician view to make this change?
A. Control Panel – folder options
B. Insert Windows disc – i386 folder
C. Start menu – run - REGEDIT
D. Right-click desktop - view
The system administrator is tasked with installing Windows to 100 computers over the network. The systems administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this?
A. Windows Deployment Services
B. Remote Installation Services
C. System Preparation Tool
D. Unattended installation
When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT?
A. Change the browser’s home page
B. Check the Windows host file
C. Update the default web browser
D. Restore Windows to a previous date
A user has reported sluggish performance to the help desk. A technician determines the user has been installing applications for entertainment, and one of them might be slowing down the system.Which of the following tools would help the technician track down the troublesome application(s)?
A. msconfig
B. regedit
C. defrag
D. gpupdate
Which of the following is a security threat that disguises itself as legitimate software?
A. Trojan
B. Worm
C. Virus
D. Spyware
Which of the following is a physical device used to prevent tailgating into a facility?
A. Privacy filter
B. ID badge
C. Retinal scanner
D. Mantrap
After successfully removing malware from a user’s Windows OS PC, a technician confirms the machine had been infected for many months. Two weeks after removing the malware, the malware inadvertently returns. The technician MOST likely forgot to:
A. install antivirus updates
B. disable and enable System Restore
C. update the firewall rules
D. quarantine the system for 30 days
Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?
A. Shoulder surfing
B. Man-in-the-middle
C. Social engineering
D. Ransomware
A user in a corporate environment needs to have a laptop device repaired and takes the device to the appropriate technician. Which of the following should the technician offer to the user in order to maintain professionalism?
A. Ask to user to wait in the area while repairs are being made.
B. Offer a temporary loaner laptop for the user to work on.
C. Inform the user that it will be ready “sometime” and to come back later.
D. Ask the user to bring the laptop back when the department is less busy.
A user has been receiving reply emails from many contacts, but the content of the emails is not familiar and the user did not send the original messages. The user calls the help desk for assistance.Which of the following is the BEST way the technician can fix this problem?
A. Perform an antivirus scan
B. Perform a refresh/restore
C. Perform an IDS upgrade
D. Perform a reinstall of the email client
When setting up new Windows PCs in a mixed-network environment with Mac OS.X, which of the following file system types would enable users to read and write data to USB flash drives from either OS without modifications?
A. CDFS
B. ext4
C. exFAT
D. ext3
A technician is configuring settings on a Windows PC and wants to temporarily disable the UAC prompt.Which of the following Control Panel options would allow the technician to accomplish this task?
A. Windows Firewall
B. User Accounts
C. Administrative Tools
D. Parental Controls
An accountant calls the IT administrator for assistance with a suspicious empty folder named “stuff”. The administrator determines the folder needs to be removed via the command-line interface.Which of the following Microsoft tools should be used to eliminate the folder from the accountant’s PC?
A. del stuff
B. kill stuff
C. clean stuff
D. rd stuff
A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task?
A. msconfig
B. perfmon
C. taskmgr
D. dxdiag
A company has a web application that is in the cloud on a multi-tenant server. The web application is connected to a database that is also in the cloud.Which of the following cloud computing concepts does this describe?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
NO: 437A technician installs new software on a customer’s Windows 8.1 computer and is getting a missing DLL error. The technician verifies that the DLL file is located in the proper directory.Which of the following tools could be used to resolve this issue?
A. grub
B. regsvr32
C. defrag
D. tracert
The digitizer on a user’s smartphone intermittently stops working. Which of the following is MOST likely the issue?
A. Screen orientation
B. Software update
C. Screen brightness
D. Calibration
A systems administrator wants to take advantage of the benefits of the major cloud providers while retaining some data and services in the local datacenter. Which of the following types of cloud model should the administrator consider?
A. Public
B. Private
C. Hybrid
D. Community
An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application. Which of the following types of user accounts does the employee MOST likely have?
A. Administrator
B. Guest
C. Super user
D. Standard user
E. Limited user
NO: 174A technician has just installed a video card in a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem?
A. Task Manager
B. Device Manager
C. System Configuration
D. Computer Management
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor.Which of the following Oss should the technician recommend to ensure the BEST performance on this computer?
A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10
A user installed a rogue application on a company phone by mistake, causing the phone to overheat. After uninstalling the application, a technician notices the phone CPU utilization is very high and the battery drain is very rapid.Which of the following is the BEST solution to resolve the issue?
A. Reboot the phone
B. Run System Updates
C. Reset the factory default
D. Run Application Updates
By default, which of the following permissions will take precedence over any other assigned permission on a mapped network drive?
A. Deny
B. Modify
C. Share
D. Allow
A user’s smartphone keeps connecting to WiFi connections. This is a security issue, and the user wants to connect to known wireless networks only. The user does not want the phone to connect to any wireless networks automatically, especially public open networks.Which of the following should the user perform?
A. Disable WiFi when it is not needed.
B. Use the cellular network only for data.
C. Disable the Bluetooth in phone settings.
D. Adjust the settings to prompt for WiFi networks
E. Put the phone in airplane mode
As part of a BYOD program, the organization requires BYOD users to register devices prior to using them on the organization’s network. The registration process logs a unique identifier assigned to every mobile phone produced. Which of the following must be collected during the registration process?
A. IMEI
B. MIMO
C. IMSI
D. MAPI
A technician is attempting to remove all data from a hard drive and make the data unrecoverable.Which of the following is MOST likely to accomplish this?
A. Format C: /q/x
B. BitLocker
C. Parted
D. Disk repartition
E. Low-level format
A user is experiencing a problem with print jobs getting stuck in the queue. The technician attempts to stop the print jobs, but the printer is not responding via GUI from the workstation. The printer was added via the company print server earlier in the day and is the only printer installed.Which of the following command line tools should the technician use on the print server? (Select two.)
A. net stop server
B. taskkill /s
C. net stop spooler
D. tasklist /s
E. net start spooler
F. net start server
A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario?
A. Remote desktop
B. Remote assistance
C. telnet
D. FTP
Which of the following is the MAIN reason that corporate policies protect access to PII?
A. To protect proprietary company data
B. To reduce the likelihood of identity theft
C. To maintain the integrity of knowledge management systems
D. To limit access to those who “need to know”
A user frequently travels with a Windows laptop and connects to several wireless networks. At a new location, the user reports that the locally shared printers are not available on the wireless connection. Which of the following would be causing the issue?
A. The location profile is set to public.
B. Workgroup is disabled.
C. The proxy settings are misconfigured.
D. Remote assistance is not configured.
A technician wants to change the security level for a set of internal websites accessed frequently by a user.Which of the following Control Panel utilities would allow the technician to complete this task?
A. Windows Firewall
B. Credential Manager
C. Network and Sharing Center
D. Internet Options
E. Homegroup
A technician is trying to perform a new installation of an operating system on a computer without an optical drive. Which of the following boot sources can be used?
A. Windows easy transfer
B. Copy of SYSTEM folder
C. USMT
D. Flash drive
A technician is troubleshooting a computer that has been infected with a virus. Upon rebooting, the computer states that NTLDR is missing. The computer cannot boot into safe mode, and reinstalling the OS is not an option. Which of the following is the BEST option to use to restore the machine to a bootable state?
A. Remove the CMOS battery
B. Run Startup Repair
C. Format the C drive
D. Repair the MBR and then reboot
A customer has just experienced a blue screen and the PC will not boot. A technician is dispatched to the customer’s site. Which of the following are the FIRST and LAST steps the technician should take? (Choose two.)
A. Test the theory to determine the cause
B. Document the findings
C. Establish a plan of action to resolve the problem and implement a solution
D. Identify the problem
E. Verify full system functionality and implement applicable preventive measures
F. Establish a theory of probable cause
A technician is removing malware from a computer in safe mode and is having trouble with one of the infected files. The anti-malware suite is unable to remove or quarantine it and the system will not let the technician manually delete it, even though it is not in use. Which of the following can the technician use to remove the file?
A. Open the defrag utility and run a full analysis and defragmentation of the hard drive.
B. Boot from a pre-installation environment CD and delete the file from the hard drive.
C. Run attrib followed by the file name with the –h switch from the command prompt.
D. Install a second full antivirus suite onto the system and run another removal scan.
A customer has started a cloud initiative and would like to make the log-in process to a different application easier for users. The customer has also requested the login process initiate from the same portal. As a technician, which of the following tools will be the BEST solution?
A. MFA
B. SSO
C. RDP
D. LDAP
When synchronizing a cell phone to an Exchange Email Server, which of the following are MOST likely to be synchronized? (Choose two.)
A. Photos
B. Passwords
C. Bookmarks
D. Notes
E. Music
F. Calendar
A user brings a personal laptop to the help desk and states that a clicking sound occurs when the laptop is turned on. After troubleshooting the issue, the technician concludes the hard drive needs to be replaced. The help desk does not replace any hardware on personal devices.Which of the following is the NEXT step the technician should follow?
A. Dismiss the user’s issue and move to the next user
B. Offer a different repair option to the user
C. Replace the hard drive and inform the user
D. Ask concise, close-ended questions
An electrical fire starts in a PC on a crowded sales floor of an office building. Which of the following is the BEST way to extinguish the fire and keep all personnel safe?
A. Use a large container failed with water
B. Use a “C” labeled fire extinguisher
C. Use an “A” labeled fire extinguisher
D. Use a “B” labeled fire extinguisher.
E. Use a halon fire suppression system.
When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen. Which of the following tools would the technician use to resolve this issue?
A. Disk Management
B. Secure Boot
C. System Restore
D. msconfig
E. fixboot
A mobile device user is concerned about security. The user wants to use multifactor authentication on the device. Which of the following would BEST accomplish this?
A. Passcode lock and swipe lock
B. Fingerprint lock and passcode lock
C. Picture passcode and pin lock
D. Face lock and fingerprint lock
A user needs assistance setting up auto-sync on a Windows 8 phone. Which of the following tools is MOST appropriate for this scenario?
A. Google Sync
B. OneNote
C. Dropbox
D. Amazon Cloud Sync