[Free] 2018(June) Dumps4cert CompTIA 220-902 Dumps with VCE and PDF Download 161-170

By | June 13, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released 220-902
100% Free Download! 100% Pass Guaranteed!

CompTIA A Certification Exam (902)

Question No: 161

Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively?

  1. Microsoft Virtual PC

  2. Compatibility mode

  3. Hyper-V

  4. Virtual XP mode

Answer: B

Question No: 162 CORRECT TEXT

You need to configure your mobile device to send and receive electronic messages from your company. Your mobile device must be able to truly synchronize the message state with your desktop so that when a message is read on your desktop it is marked as read on your mobile device These are the proper parameters:

->Email address tech@techies com

->Password P@SSwOrd

->Pop techies com Port 110 Security. None

->IMAP techies com Port 993 Security SSL

->Smtp.techies.com Port 465 Security: TLS

->Company SSID Techies

->Security WPA2

->Passphrase P@SSwOrd

->SSID is not broadcasted

Instructions You are not authorized to use the Company#39;s WLAN The outgoing server does not require login credentials When you have completed the simulation, please select the done button to submit your answer.

Dumps4Cert 2018 PDF and VCE

Answer: Please review explanation for detailed answer.

Explanation: Settings are configured exactly as solution below:

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Question No: 163

Which of the following is TRUE about the difference between a worm and a virus?

  1. Worms are written in assembly while viruses are written with scripting languages.

  2. Viruses hide in the boot record while worms hide within the file system.

  3. Worms self propagate while viruses need human intervention to replicate.

  4. Viruses disable the antivirus update service while worms kill the antivirus process.

Answer: C

Question No: 164

A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however, when the laptop lid is closed, it goes into sleep mode. Which of the following Control Panel items can be used to disable this feature?

  1. Action Center

  2. System

  3. Display Settings

  4. Power Options

Answer: D

Question No: 165

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).

  1. User training

  2. Anti-malware

  3. Paper shredding

  4. Time of day restrictions

  5. Employee badges

  6. Mantraps

Answer: A,C

Question No: 166

Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO).

  1. Increase the amount of RAM to improve disk checks

  2. Backup all data on the drive

  3. Upgrade to a home server

  4. Purchase a new hard drive

  5. Change the drive configuration to RAID 0

  6. Upgrade to Windows 7 Professional

Answer: B,D

Question No: 167

Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?

  1. Trojan horse

  2. Spyware

  3. Social engineering

  4. Worms

Answer: A

Question No: 168

Which of the following security threats requires the attacker to be physically located near the target machine?

  1. Shoulder surfing

  2. Social engineering

  3. Phishing

  4. Rootkit

Answer: A

Question No: 169

A customer reports very slow wireless connection speeds in the new office. Which of the following tools should a technician use to troubleshoot the issue?

  1. WiFi analyzer

  2. Loopback plug

  3. Signal booster

  4. Packet sniffer

Answer: A

Question No: 170

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?

  1. Disable DHCP and assign a static IP address to each network device physically connected to the network.

  2. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.

  3. Disable all switch ports when they are not utilized and enable them on an as needed basis.

  4. Place guest network jacks in public areas and all other jacks in secure areas as needed.

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:220-902 Demo PDF
100% Dumps4cert Pass Guaranteed!
220-902 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.