Downloadable of 220-802 exam cram materials and discount pack for CompTIA certification for consumer, Real Success Guaranteed with Updated 220-802 pdf dumps vce Materials. 100% PASS CompTIA A+ Certification Exam (220-802) exam Today!

2021 May 220-802 Study Guide Questions:

Q181. - (Topic 5) 

Joe, an employee, has just migrated from the Marketing department to the Accounting department and cannot save files to the Accounting share. He is a member of both the Marketing and Accounting security groups. A technician discovers the following permissions are in effect for the Accounting share: 

Share permissions: Everyone – Full Control 

NTFS permissions: Accounting – Full Control, Marketing – Deny All. 

Which of the following should the technician do to enable Joe to save files to the Accounting share without compromising security? 

A. Remove Joe from the Marketing group 

B. Ask Joe to resave the file, as the permissions are correct 

C. Grant the Accounting group Full Control share permissions 

D. Remove the Deny permission for the Marketing group 

Answer: A 


Q182. - (Topic 2) 

A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this? 

A. Run in Windows XP compatibility mode 

B. Run the program in a virtual PC environment 

C. Log out of the system and login under another user’s name 

D. Right click select “run as” and select administrator 

Answer: D 

Explanation: http://msdn.microsoft.com/en-us/library/dd298823.aspx 


Q183. - (Topic 5) 

A user suspects that everything they type is being captured. Which of the following security threats would this indicate? 

A. Worm 

B. Keylogger 

C. Trojan 

D. Rootkit 

Answer: B 


220-802 book

Most up-to-date a+ 220-801 and 220-802 pdf:

Q184. - (Topic 1) 

Which of the following components would a user MOST need when building a virtual 

server? (Select TWO). 

A. Networking speed 

B. High-end sound card 

C. RAM 

D. High-end video card 

E. HDMI 

F. CPU 

Answer: C,F 

Explanation: http://searchservervirtualization.techtarget.com/tip/Sizing-server-hardware-for-virtual-machines 


Q185. - (Topic 3) 

A user wishes to access their contacts from their Android phone. Which of the following methods will provide the MOST up-to-date contact information on the user’s phone on a daily basis? 

A. Enable contact synchronization by setting up their email account on the phone. 

B. Download all their contacts in a .csv file and import them into the phone via a USB laptop connection. 

C. Enable Bluetooth and transfer the contacts from their laptop to the cell phone. 

D. Enable email synchronization and email the contacts to the user account for download. 

Answer: A 

Explanation: http://www.wikihow.com/Sync-Android-Contacts-With-Gmail 


Q186. - (Topic 2) 

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use? 

A. Quick format 

B. FDISK 

C. Low level format 

D. Standard format 

Answer: C 

Explanation: http://www.dedoimedo.com/computers/low-level-formatting.html 


220-802 free draindumps

Verified comptia a+ practice exam 220-802:

Q187. - (Topic 5) 

A user is running a RAID 0 array and has problems with one of the drives. Which of the following actions will the technician take NEXT? 

A. Replace the failing drive and let the RAID recover. 

B. Add an additional drive to the array and let the RAID recover. 

C. Replace the drive; all the data is lost and cannot be recovered. 

D. Remap the RAID array to another drive letter to recover the data. 

Answer: C 


Q188. - (Topic 5) 

Which of the following are encrypted protocols? (Select TWO). 

A. TELNET 

B. SSH 

C. POP3 

D. FTP 

E. HTTPS 

Answer: B,E 


Q189. - (Topic 1) 

A user on a domain network cannot install software that they need. Which of the following user groups is this user MOST likely associated with? 

A. Standard user 

B. Guest user 

C. Power user 

D. Administrator 

Answer: A 

Explanation: http://www.sevenforums.com/software/135091-standard-user-able-install-software.html 


Q190. - (Topic 2) 

An administrator is concerned about users accessing network shares outside of their job role. 

Which of the following would BEST prevent this? 

A. Set up shares with permissions based upon group membership. 

B. Implement a written policy addressing the issue for all users. 

C. Monitor access to the network shares using SNMP. 

D. Prevent remote logins to all network shares and drives. 

Answer: A 

Explanation: http://technet.microsoft.com/en-us/library/cc768050.aspx