Pass4sure offers free demo for 220-902 exam. "CompTIA A+ Certification Exam (902)", also known as 220-902 exam, is a CompTIA Certification. This set of posts, Passing the CompTIA 220-902 exam, will help you answer those questions. The 220-902 Questions & Answers covers all the knowledge points of the real exam. 100% real CompTIA 220-902 exams and revised by experts!

Q101. A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use? 

A. RAID 0 

B. RAID 1 

C. RAID 5 

D. RAID 10 

Answer:


Q102. A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use? 

A. chkdsk 

B. Degauss 

C. Quick format 

D. Drive wipe 

Answer:


Q103. CORRECT TEXT 

You need to configure your mobile device to send and receive electronic messages from your company. Your mobile device must be able to truly synchronize the message state with your desktop so that when a message is read on your desktop it is marked as read on your mobile device These are the proper parameters: 

Email address tech@techies com 

Password P@SSwOrd 

Pop techies com Port 110 Security. None 

IMAP techies com Port 993 Security SSL 

Smtp.techies.com Port 465 Security: TLS 

Company SSID Techies 

Security WPA2 

Passphrase P@SSwOrd 

SSID is not broadcasted 

Instructions You are not authorized to use the Company's WLAN The outgoing server does not require login credentials When you have completed the simulation, please select the done button to submit your answer. 

Answer: Please review explanation for detailed answer. 


Q104. Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task? 

A. NSLOOKUP 

B. NETSTAT 

C. NBTSTAT 

D. NET 

Answer:


Q105. Which of the following security threats happens when another person enters a secured area with an authorized person? 

A. Tailgating 

B. Shoulder surfing 

C. Spoofing 

D. Phishing 

Answer:


Q106. A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO). 

A. User training 

B. Anti-malware 

C. Paper shredding 

D. Time of day restrictions 

E. Employee badges 

F. Mantraps 

Answer: A,C 


Q107. CORRECT TEXT 

A Windows 7 machine appears to have a failure. Every time it is rebooted, the message "BOOTMGR is missing" appears. You have previously inserted a Windows 7 installation DVD into the DVD-ROM. Please repair this failure without overwriting the customers' local user profiles. 

Instructions: 

. Launch the simulation to repair the failure 

. Type Help in command line to show list of available commands 

. When you have completed the simulation, please select the done button. 

Answer: Review the explanation for all details: 


Q108. A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT? 

A. Change the router firewall settings 

B. Check for and apply a firmware update 

C. Reconfigure the QoS settings 

D. Change router user-names and passwords 

Answer:


Q109. A technician installs a new application and restarts the computer. After signing in to Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following 

tools would be used to troubleshoot this problem? 

A. msconfig 

B. appwiz.cpl 

C. gpedit 

D. regsrv32 

Answer:


Q110. Which of the following prevention methods is considered to be digital security? 

A. RFID badge 

B. Mantrap 

C. Biometrics 

D. Firewalls 

E. ID badge 

Answer: