we provide Vivid CompTIA 220-902 exam which are the best for clearing 220-902 test, and to get certified by CompTIA CompTIA A+ Certification Exam (902). The 220-902 Questions & Answers covers all the knowledge points of the real 220-902 exam. Crack your CompTIA 220-902 Exam with latest dumps, guaranteed!
Q111. A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, “The file is in use by another program.” Which of the following tools would be the BEST to use to correct the issue?
C. Event Viewer
D. Services Console
E. Recovery Console
Q112. Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?
A. File server
B. Web server
C. WINS server
D. Proxy server
Q113. A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue?
A. Turn on windows firewall
B. Click the unsubscribe link in the spam
C. Run an anti-spyware scan
D. Install privacy filter
Q114. A customer is reporting a burning smell coming from a CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customer’s issue?
A. Disconnect power before inspecting the CRT power supply
B. CRT monitors should be serviced by qualified personnel
C. Have compressed air available to clear out the debris
D. Wear safely goggles to protect from the cathodes
Q115. Which of the following is the command line entry to start an archive or restore a process on a Windows XP computer?
Q116. A technician is attempting to remove malware from a customer’s workstation. Which of the
following Control Panel utilities should the technician use?
A. Folder Options > View hidden files
B. System > Performance
C. Display Settings > Refresh rate
D. Internet Options > Privacy
Q117. Which of the following is a security threat that disguises itself as legitimate software?
Q118. A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information?
A. DHCP server
B. DNS server
C. File server
D. Proxy server
Q119. A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?
A. Change the router firewall settings
B. Check for and apply a firmware update
C. Reconfigure the QoS settings
D. Change router user-names and passwords
Q120. A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?
A. Reload the OS using FAT32 instead of NTFS.
B. Change the disk from basic to dynamic.
C. Run chkdsk with the /r switch and reboot the PC.
D. Open the defrag utility and run a drive analysis.