Exam Code: 220-802 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA A+ Certification Exam (220-802)
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass 220-802 Exam.

2021 May 220-802 Study Guide Questions:

Q451. - (Topic 1) 

A user has too many applications starting when they log into windows. From the command line, which of the following tools is the FASTEST option to prevent these applications from running on startup? 





Answer: A 

Explanation: http://lifehacker.com/5718799/know-which-apps-to-remove-from-msconfig-with-this-startup-applications-list 

Q452. - (Topic 2) 

An employee at a company lost their mobile device that contains proprietary information. 

Which of the following methods is the BEST to be implemented to prevent unauthorized 

users from obtaining this information? 

A. Lock screen pattern 

B. Cancel mobile service 

C. Remote wipe 

D. Six character password 

Answer: C 

Explanation: http://www.mobiledevicemanager.com/mobile-device-security/remote-wipe/ 

Q453. - (Topic 2) 

A technician wants to ensure that only authorized administrators can make configuration changes to the company’s wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration? 

A. MAC address filters 

B. Manufacturer password 

C. Default SSID 

D. Configure encryption 

Answer: B 

Explanation: http://pcsupport.about.com/od/windows7/f/default-password-windows-7.htm 

220-802 practice question

Renovate comptia a+ exam 220-802:

Q454. - (Topic 2) 

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO). 

A. Configure the workstation for a static IP 

B. Disable all wireless network connections 

C. Remove shortcuts to the application 

D. Block the application in Windows Firewall 

E. Change network location to Work 

F. Reroute the web address in HOSTS file 

Answer: D,F 


Use Windows firewall to restrict an application from reaching the web. Alternatively you can also reroute the web address in the HOST file. 

Q455. - (Topic 4) 

A user will be installing a switch in a public location and will allow the six users in the office to connect to it with CAT6 Ethernet. Which of the following actions would BEST ensure that there is no unauthorized access to the switch? 

A. Assign static IP addresses 

B. Disable new VLANS 

C. Disable unused ports 

D. Disable PoE 

Answer: C 

Explanation: http://www.orbit-computer-solutions.com/How-To-Configure-Switch-Security.php 

Q456. - (Topic 3) 

Which of the following features allows for easier navigation of long lists on a tablet device? 

A. Pinch-zoom 

B. Multitouch 

C. Scrollbars 

D. Touch flow 

Answer: D 

Explanation: http://gigaom.com/2010/03/08/touchscreen-tablets/ 

220-802 test engine

Verified comptia a+ 220-802 exam questions:

Q457. - (Topic 5) 

A newly installed application runs every time the operating system boots causing a delay during startup. Which of the following tools will allow a technician to resolve the problem? 





Answer: D 

Q458. - (Topic 5) 

A user has reported their computer boots into Windows install each time they power up their computer. Which of the following is the MOST likely cause of this problem? 

A. An install disk was left in the multimedia drive. 

B. The system is booting from the utility partition. 

C. The system is booting PXE from the server. 

D. The boot sector needs to be repaired. 

Answer: A 

Q459. - (Topic 5) 

In iOS, which of the following settings would need to be configured for ActiveSync? 

A. Mail, Contacts, & Calendars 

B. Music & Videos 

C. Phone & Messages 

D. Notifications & Location Services 

Answer: A 

Q460. - (Topic 5) 

An administrative assistant receives a phone call from the IT department asking for personal information to update their records. One of the questions asked is the password to the company’s administrative portal. Which of the following is occurring? 

A. Shoulder surfing 

B. Configuration management 

C. Helpdesk troubleshooting methodology 

D. Social engineering 

Answer: D