Proper study guides for Renew CompTIA CompTIA A+ Certification Exam (902) certified begins with CompTIA 220-902 preparation products which designed to deliver the Validated 220-902 questions by making you pass the 220-902 test at your first time. Try the free 220-902 demo right now.

Q1. An IPS appliance is installed on the network. Which of the following is the purpose of the IPS? 

A. To check the network for unwanted activity 

B. To check and stop unwanted activity 

C. To provide connectivity to the network 

D. To test the resilience of the network 



Drag and drop the following Windows Versions to the correct feature on which they are found. Windows Versions may be used more than once. 


Q3. A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable which of the following FIRST? 



C. WiFi 



Q4. A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician? 

A. Follow the customer’s prescribed course of action. 

B. Convince the customer to take a better course of action to resolve the issue. 

C. Explain why the customer’s prescribed course of action is incorrect. 

D. Acknowledge the customer’s input, but follow another course of action. 


Q5. An IR printer stops working for half of an office while the other half is able to print. Which of the following should be checked FIRST? 

A. Proper lighting 

B. Paper levels 

C. Physical obstructions 

D. Printer share name 


Q6. Which of the following identifies traffic based upon its physical network address? 

A. Phishing 

B. Hashing 

C. MAC filtering 

D. Geotracking 


Q7. A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without 

anyone’s knowledge. Which of the following would prevent this from occurring? 

A. Change to user MAC filtering 

B. Change default usernames and passwords 

C. Disable the SSID from broadcasting 

D. Enable static IP addresses 


Q8. Which of the following security threats happens when another person enters a secured area with an authorized person? 

A. Tailgating 

B. Shoulder surfing 

C. Spoofing 

D. Phishing 



The network administrator has changed the IP address of ComputerA from to and now Jane, a user, is unable to connect to file shares on ComputerA from ComputerB using the computer name. 


Using the available tools, resolve the connectivity issues. When you have completed the simulation, please select the done button to submit your answer. 

Answer: Review the explanation for all details: 

Q10. A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take? 

A. Identify the problem 

B. Document findings, actions and outcome 

C. Verify full system functionality 

D. Establish a theory of probable cause 

E. Test the theory to determine cause