Download of 220-802 free practice test materials and practice exam for CompTIA certification for examinee, Real Success Guaranteed with Updated 220-802 pdf dumps vce Materials. 100% PASS CompTIA A+ Certification Exam (220-802) exam Today!

2021 May 220-802 Study Guide Questions:

Q291. - (Topic 2) 

In order to prevent other users from editing files in ‘C: Files’, which of the following steps should be taken? 

A. Set NTFS permissions to read only 

B. Set the folder to index files for search 

C. Set the local administrator as the owner of the folder 

D. Set network share permissions to read only 

Answer: A 

Explanation: http://technet.microsoft.com/en-us/magazine/2005.11.howitworksntfs.aspx 


Q292. - (Topic 2) 

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use? 

A. Disable DHCP and assign a static IP address to each network device physically connected to the network. 

B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices. 

C. Disable all switch ports when they are not utilized and enable them on an as needed basis. 

D. Place guest network jacks in public areas and all other jacks in secure areas as needed. 

Answer: C 


Q293. - (Topic 5) 

A user receives an email seemingly from the director of the company’s IT department. The user however notices that the content of the email is asking for information specifically forbidden to be shared with anyone. This type of interaction is known as which of the following? 

A. Phishing 

B. Shoulder surfing 

C. Malware 

D. Spyware 

Answer: A 


2passeasy.com

Latest testking 220-802:

Q294. - (Topic 2) 

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use? 

A. Disable DHCP and assign a static IP address to each network device physically connected to the network. 

B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices. 

C. Disable all switch ports when they are not utilized and enable them on an as needed basis. 

D. Place guest network jacks in public areas and all other jacks in secure areas as needed. 

Answer: C 

Explanation: 

The best way is to disable all switch ports when they are not utilized. Switch them on when you need them. This way, you can prevent external contractors from physically plugging devices in to company’s network jacks. 


Q295. - (Topic 5) 

A user reports that they accidentally unplugged their CMOS battery. The unit was reinstalled, but all subsequent boot attempts have resulted in a BSOD. Which of the following should be the FIRST item checked by the technician? 

A. Whether the boot order now has the optical drive in position one 

B. If the BIOS can detect the hard drive at all 

C. Whether the SATA power cable was unplugged 

D. AHCI – IDE setting under SATA options in the BIOS 

Answer: D 


Q296. - (Topic 3) 

A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST? 

A. Restart the smartphone 

B. Reconfigure the smartphone email account 

C. Resynchronize the smart phone 

D. Update the operating system 

Answer: A 

Explanation: 

The first step in troubleshooting a smartphone is to restart it so that the hardware can restart all the primary functions. 


2passeasy.com

Certified 220-802 comptia a+ certification exam:

Q297. - (Topic 5) 

A network printer has quit printing from all connected customers. No error messages are displayed on the printer and the network connection is working. Which of the following is the FIRST troubleshooting step for the technician to try? 

A. Check port on switch 

B. Reboot the printer 

C. Print configuration page 

D. Clear print queue 

Answer: C 


Q298. - (Topic 1) 

Which of the following BEST describes a method for installing an operating system across the network? 

A. USB 3.0 

B. IEEE 1394 

C. PXE 

D. NTFS 

Answer: C 

Explanation: http://technet.microsoft.com/en-us/magazine/2008.07.desktopfiles.aspx 


Q299. - (Topic 5) 

A user reports that they are unable to use their DVD-ROM drive in their Windows 7 desktop PC. Which of the following could be a possible cause to this problem? 

A. Media Player is not installed 

B. DVD drivers need to be updated 

C. DVD drive is not set to boot in BIOS 

D. SATA port is not on in BIOS 

Answer: D 


Q300. - (Topic 4) 

A user reports that people are receiving emails from their account that the user never sent. Which of the following security measures would BEST resolve the problem? 

A. Check the boot.ini on the PC for malicious entries. 

B. Change the account password. 

C. Upgrade the email client to a newer version. 

D. Install a more expensive spam filter. 

Answer: B 

Explanation: 

The best security measure is to rename or change the account password. Hackers sometimes break into email accounts to sent malicious emails to various people.