Exam Code: 220-802 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA A+ Certification Exam (220-802)
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass 220-802 Exam.
2021 May 220-802 Study Guide Questions:
Q271. - (Topic 5)
Anne, an end-user, reports to Joe, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Joe runs a malware scan and finds that her computer is infected with malware. Joe uses the anti-malware program to remove the infection but Anne reports that the problem resurfaced the next day. Joe runs the malware scan again and finds the same malware is still infecting Anne’s computer. Joe runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection?
A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files.
B. Disable Windows firewall as it may be conflicting with the malware scan.
C. Run the malware scan in Windows safe mode.
D. Change the desktop’s IP address to a different subnet.
Q272. - (Topic 4)
A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
A. The parent folder has explicit Allow rights set for this user.
B. The parent folder has explicit Deny rights set for this user.
C. The user forgot to share the parent folder and only shared the specific file.
D. The parent folder likely has the “archive” attribute enabled.
Q273. - (Topic 4)
A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue?
A. Turn on windows firewall
B. Click the unsubscribe link in the spam
C. Run an anti-spyware scan
D. Install privacy filter
Up to the minute comptia a+ exam 220-802:
Q274. - (Topic 5)
A customer is reporting that since switching from an XP to a Windows 7 computer, the main application they use no longer starts. The vendor of the application no longer exists and the customer does not want to find an alternative replacement at the moment. Which of the following can a technician do to try to get the application running?
A. Uninstall the application and re-install it as user so that it would have the standard rights and privileges.
B. Right-click on the application and under “Troubleshoot Compatibility,” select the correct mode.
C. Re-install the application, but install it onto the user’s Desktop in their account profile.
D. Right-click on the application, select Properties and make sure that the Hidden attribute checkbox is unchecked.
Q275. - (Topic 5)
A user has reported a file permissions issue to the network administrator. The administrator tries to recreate the problem on their computer but has no trouble accessing the file. Which of the following BEST describes what is occurring?
A. The user did not taken ownership of the file from the server.
B. The user is logged in using the wrong local profile.
C. The user is not in the appropriate group to have access to the file.
D. The user has been granted “read only” access to the file.
Q276. - (Topic 4)
The technician is dispatched to a user’s home to secure a wireless network. The SOHO user has only one system to connect wirelessly, yet wishes to protect their Wi-Fi from unauthorized use. Which of the following will BEST meet the user’s requirements?
A. Configure the router to allow access by MAC address.
B. Configure the use of DHCP.
C. Configure the use of static IP addresses.
D. Configure the network to utilize a proxy.
Verified a+ 220-802 questions:
Q277. - (Topic 1)
A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?
A. Client hardware requirements
B. Server software security requirements
C. Server hardware resources
D. Network resources
Q278. - (Topic 2)
A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
A. Simple 1-pass zero overwrite
B. Low level 3-pass random wipe
C. Low level 7-pass random wipe
D. High level format 10 times
Q279. - (Topic 1)
Which of the following terms BEST describes the software or hardware used to manage virtual machines?
B. Cloud Server Manager
D. Virtual Disk Manager
Q280. - (Topic 5)
A user attempts to remote into their machine at night but cannot connect. The user believes that someone is unplugging their computer from the network at night and plugging in a personal machine. Which of the following security measures would BEST prevent this behavior from continuing?
A. Limit the port to a specific MAC address.
B. Set the port to only activate during business hours.
C. Disable DHCP on the network router.
D. Deactivate the port that is being used from the switch.