COMPTIA OFFICIAL: New Updated 220-802 Exam Questions from Braindump2go 220-802 pdf dumps and 220-802 vce dumps! Welcome to download the newest Braindump2go 220-802 vce&pdf dumps: http://www.braindump2go.com/220-802.html (1034 Q&As)

Real Latest 220-802 Exam Questions Updated By Official CompTIA Exam Center! Braindump2go Offers 220-802 Dumps sample questions for free download now! You also can visit our website, download our premium CompTIA 220-802 Exam Real Answers, 100% Exam Pass Guaranteed!

Exam Code: 220-802
Exam Name CompTIA A+ 800 series
Certification Provider: CompTIA
Corresponding Certification: CompTIA A+

Keywords: 220-802 Dumps,220-802 Practice Tests,220-802 Practice Exams,220-802 Questions,220-802 PDF,220-802 VCE,220-802 Study Guide,220-802 Simulations Questions

QUESTION 51
Which of the following security threats requires the attacker to be physically located near the target machine?

A.    Shoulder surfing
B.    Social engineering
C.    Phishing
D.    Rootkit

Answer: A
Explanation:
http://www.lifelock.com/education/id-theft-types/shoulder-surfing/

QUESTION 52
A technician recently replaced a user’s monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue?

A.    Lower refresh rate
B.    Lower the resolution
C.    Raise the resolution
D.    Increase refresh rate

Answer: A
Explanation:
http://en.wikipedia.org/wiki/Refresh_rate

QUESTION 53
A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue?

A.    Automated system recovery
B.    Emergency repair disks
C.    FIXBOOT
D.    Safe mode

Answer: D
Explanation:
http://www.computerhope.com/issues/chsafe.htm

QUESTION 54
An unauthorized user observing system security procedures is known as:

A.    a worm.
B.    shoulder surfing.
C.    phishing.
D.    spyware.

Answer: B
Explanation:
http://www.lifelock.com/education/id-theft-types/shoulder-surfing/

QUESTION 55
Privacy filters applied to users computer screens are used to combat which of the following security risks?

A.    Rootkits
B.    Spear phishing
C.    Shoulder surfing
D.    Social Engineering

Answer: C
Explanation:
http://blog.securityactive.co.uk/tag/stop-shoulder-surfing/

QUESTION 56
A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity:
IP Address: 192.168.1.101
Netmask: 255.255.255.0
DHCP Server:192.168.1.1
DNS Server:192.168.1.2
Default Gateway:192.168.1.1
Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?

A.    The workstation has an APIPA address.
B.    The DHCP server is unavailable.
C.    The default gateway router is misconfigured.
D.    The DHCP server is misconfigured.

Answer: D
Explanation:
http://knowurtech.netfirms.com/networking/how_dhcp_works.html

QUESTION 57
Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?

A.    Rootkit
B.    Virus
C.    Trojan
D.    Worm

Answer: A
Explanation:
http://www.webopedia.com/TERM/R/rootkit.html

QUESTION 58
Joe, a technician, receives an error message on his tower PC just after POST which reads:
“WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics.”
Which of the following is generating this error message?

A.    CHKDSK
B.    S.M.A.R.T.
C.    eSATA
D.    QoS

Answer: B
Explanation:
http://www.howtogeek.com/134735/how-to-see-if-your-hard-drive-is-dying/

QUESTION 59
Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayeD. “Access Denied. Please Enter Encryption Password.” Which of the following is the reason that this error is displayed?

A.    The hard drive is experiencing S.M.A.R.T. failure errors
B.    The TPM security chip inside the bench system is not enabled
C.    The BIOS of the bench system is out of date
D.    BitLocker is being used

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/ee449438(v=ws.10).aspx

QUESTION 60
A technician is tasked with repairing a Windows 7 system including the removal of recently installed files and software. Which of the following system restoration methods would be the LEAST destructive way to achieve this?

A.    System Restore
B.    System Image Recovery
C.    CHKDSK
D.    Windows Memory Diagnostic

Answer: A
Explanation:
http://windows.microsoft.com/en-us/windows-vista/what-is-system-restore


100% 220-802 Complete Success & Money Back Guarantee!
By utilizing Braindump2go high quality CompTIA 220-802 Exam Dumps Products, You can surely pass 220-802 certification 100%! Braindump2go also offers 100% money back guarantee to individuals in case they fail to pass CompTIA 220-802 in one attempt.

Instant Download 220-802 PDF Dumps & VCE Dumps from Braindump2go! 100% Pass Guaranteed!

220-802 PDF Dumps & 220-802 VCE Dumps Full Version Download(1034q):http://www.braindump2go.com/220-802.html