Practical of 220-802 exams materials and samples for CompTIA certification for IT learners, Real Success Guaranteed with Updated 220-802 pdf dumps vce Materials. 100% PASS CompTIA A+ Certification Exam (220-802) exam Today!
2021 May 220-802 Study Guide Questions:
Q171. - (Topic 2)
Which of the following security threats does NOT use software to extract sensitive information or credentials?
B. Shoulder surfing
D. Man-in-the-Middle exploits
Q172. - (Topic 5)
Which of the following is the BEST example of social engineering?
B. Key logger
D. Malicious cookie
Q173. - (Topic 2)
A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?
A. Run Windows Update
B. Disable system restore
C. Run the chkdsk /r command
D. Disable network cards
Down to date what is comptia a+ 220-802:
Q174. - (Topic 2)
Which of the following user accounts should be disabled to adhere to security best practices?
A. Standard user
D. Power user
Q175. - (Topic 2)
A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?
A. Lock the workstation
B. Shutdown the computer
C. Logon using the unprivileged guest account
D. Set the screensaver password
Q176. - (Topic 5)
A user reports they have no display on their laptop. Which of the following would be checked FIRST in order to narrow down the issue?
A. Swap displays with an extra laptop.
B. Plug an external monitor into the laptop, press the appropriate function keys, and look for an output display.
C. If the power indicator lights are lit assume the motherboard is good and order a replacement display.
D. Remove the display bezel and ensure the display connector is in place.
Real 220-802 cheat sheet:
Q177. - (Topic 5)
A SOHO location is being remodeled and the users are concerned about unauthorized traffic on their network during the remodel. The WLAN needs to be able to allow various types of devices to securely connect 24 hours a day while requiring the least amount of overhead to manage. Which of the following security implementations would MOST likely be implemented?
A. Setting encryption
B. Resetting all user-names and passwords
C. Assign static IP addresses
D. Enable MAC filtering
Q178. - (Topic 5)
Which of the following is the common term for software designed to steal information, disrupt files and an operating system's integrity, and spy on a user's activity?
Q179. - (Topic 5)
Ann, a user, has a computer running Windows XP Professional. She would like the computer to run Windows 7 Professional. She does not wish to save any information on the current system.
Which of the following types of installations should the technician perform?
Q180. - (Topic 4)
A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann’s computer shows the following ipconfig information:
IP address: 192.168.10.45 Subnetmask: 255.255.255.0 Gateway: 192.168.11.1 DNS server 1: 192.168.10.2
DNS server 2: 220.127.116.11
Which of the following is the cause of the problem?
A. DNS server 2 is set incorrectly.
B. DNS server 1 is set incorrectly.
C. IP address is set incorrectly.
D. Gateway is set incorrectly.