Testking offers free demo for 220-902 exam. "CompTIA A+ Certification Exam (902)", also known as 220-902 exam, is a CompTIA Certification. This set of posts, Passing the CompTIA 220-902 exam, will help you answer those questions. The 220-902 Questions & Answers covers all the knowledge points of the real exam. 100% real CompTIA 220-902 exams and revised by experts!

Q131. After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause? 

A. Power surges 

B. Overheating 

C. APIPA addressing 

D. RF interference 

Answer:


Q132. For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity? 

A. Annual cyber security education 

B. Update antivirus signatures more often 

C. Block all email attachments 

D. Install an IPS on each workstation 

Answer:


Q133. Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk? 

A. NFC 

B. Virtual assistant 

C. SDK 

D. Bluetooth 

Answer:


Q134. Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use? 

A. Initiate a factory reset 

B. Perform a hard reset 

C. Remove the MicroSD card 

D. Rollback the OS update 

Answer:


Q135. The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of: 

A. overheating. 

B. incompatible RAM. 

C. a faulty hard drive. 

D. a bad internal USB hub. 

Answer:


Q136. Which of the following is the BEST option to prevent data breaches on lost mobile devices? 

A. Install a locator application on the mobile device so that it can be traced. 

B. Apply a restriction to lock the device after a certain number of failed login attempts. 

C. Configure the device to remote wipe as soon as it is reported lost. 

D. Utilize the fingerprint scanner and passcode for multifactor authentication. 

Answer:


Q137. A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network? 

A. Disable the router’s remote management feature. 

B. Enable WPA2 wireless encryption. 

C. Change the router’s default admin name and password. 

D. Place the router in a locked room. 

Answer:


Q138. In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken? 

A. Set NTFS permissions to read only 

B. Set the folder to index files for search 

C. Set the local administrator as the owner of the folder 

D. Set network share permissions to read only 

Answer:


Q139. Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO). 

A. Change the SSID to a different broadcast name 

B. Add the intruding device to a blocked access list 

C. Access the intruder’s device and shut it down 

D. Shut down the device until the intruder is no longer in the area 

E. Set up a WiFi analyzer to identify the intruding device 

Answer: A,B 


Q140. A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access? 

A. Check the phone for unauthorized root access 

B. Disable the phone’s Bluetooth chip 

C. Erase all personal data from the phone 

D. Check the phone for location tracking 

Answer: