⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

11 hours, 12 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA A Plus 220 902 Test 2

Free CompTIA A+ 220-902 practice test, CompTIA A Plus 220 902 Test 2. The CompTIA 220-901 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?

  • All of the file permissions are lost

  • All file permissions must be reassigned

  • The file owner is preserved

  • The file name becomes case insensitive

Which Windows tool can prevent programs from automatically opening upon start up on the Windows 7 Operating System?

  • DEVMGMT.MSC

  • DXDIAG

  • CHKDSK

  • MSCONFIG

After installing Windows 10 on a Laptop PC alongside an existing Red Hat Linux installation you receive a message stating that the GRUB file is missing when you try to boot the PC. Which of the following is the best option?

  • Ignore the error and boot into Windows 10 for the first time

  • Reinstall Windows 10, selecting allow multiboot under advanced installation options

  • Upgrade to GRUB for Windows to allow both Windows and Linux to operate

  • Rebuild the GRUB using a Red Hat Disc

What is step 3 in the trouble shooting theory?

  • Document findings

  • Consider corporate policies

  • Test the theory to determine the cause

  • Verify full functionality

You are a network administrator for a large company. Several network users have complained that they are receiving odd emails from another user, who claims they have not sent any emails today. Which of the following will most likely stop the issue?

  • Reinstall the user's email client

  • Check the networks firewall for unauthorized entries

  • Change the user's account password

  • Install a more expensive spam filter

Which of the following security threats is BEST mitigated through proper user training?

  • Social Engineering

  • Browser Adware

  • A Worm

  • Rootkits

A technician is accessing a Windows PC via SSH. Which command can the technician use to create a new directory on the PC?

  • PUSHD

  • New

  • MD

  • CD

Amanda, a user, has a laptop running Windows 7 Ultimate. She has asked the IT Department to update her laptop to run Windows 10 Pro. Which of the following should be done first?

  • Purchase a valid Windows 10 Pro License

  • Reformat the laptop with NTFS10

  • Verify the laptop can support Windows 10 Pro requirements

  • Run the Windows 10 Update Software

Which of the following terms describes a folder's permissions defaulting to match the permissions of it's parent's folder?

  • SSO

  • Inheritance

  • Provisioning

  • Permission Propagation

Which of the following Windows command line tools will provide a computer's network configuration information?

  • ping

  • tracert

  • ipconfig

  • netstat

Which of the following is the best definition for open source software?

  • Software whose code is certified by a third party reviewer

  • None of the above

  • Software whose code is not available

  • Software whose code is available to the public

You are a desktop technician for a public school district. Your supervisor has asked you to write a script that will configure the wireless adapters on student's Linux based laptops to connect only to authorized access point. Assuming the access point's MAC Address is 00:0D:9D:C6:38:2D, which command will help you achieve this?

  • iptables /netfilter auth-only 00:0D:9D:C6:38:2D

  • ifconfig eth0:0 00:0D:9D:C6:38:2D

  • ethtools -lock 00:0D:9D:C6:38:2D

  • iwconfig ap 00:0D:9D:C6:38:2D

Your employer has recently began investigating an employee for using a computer to host and share illegal materials. You have been asked to keep track of the computer's hard drive until it is turned over to the proper authorities. What term best defines this situation?

  • Data Possession Control (DPC)

  • Digital Provenance

  • Chain of Custody

  • Material Supervision

You have been instructed to configure a database server running Windows Server 2008 to alert technicians when the server's processor or memory is running above 75% capacity. Which of the following technologies will help you achieve this?

  • System Configuration

  • Task Scheduler

  • Performance Monitor

  • Task Manager

Which of the following Windows commands can identify and repair corrupted information and other hard drive issues?

  • DSKREP

  • None of the above

  • CHKDSK

  • FIXDSK

You need to download and install a package using the apt-get command on an Ubuntu environment. After running the command you receive an error stating you do not have permissions to perform this action. What should you do next?

  • Fast swap to root

  • Right click the terminal and select Run as Administrator

  • Prepend sudo to your command

  • Switch to the administrative user account

Which of the following will allow a Windows OS to boot with only the essentials like basic drivers, required programs and default settings?

  • Standby Mode

  • Guest Mode

  • System Restore Mode

  • Safe Mode

You are installing Windows Server 2008 R2 onto a new company file server that uses a RAID card. You have verified that all cabling is correctly seated, but Windows is not recognizing any storage mediums for installation. Which of the following will most likely correct the issue?

  • Wait a few moments, then press refresh to force Windows to detect drives

  • Enable PATA in the BIOS

  • Use the correct RAID driver

  • Ensure the Windows server supports PXE Boot/Installation

A malicious user has gained access to several user accounts by guessing their password. The malicious user was able to guess passwords using a list of commonly used phrases and words. Which of the following terms best describes this type of attack?

  • Dictionary Attack

  • Brute Force Attack

  • Zero Day Attack

  • Spoofing

You have just configured permissions for a set of folders on an NTFS disk, the folders also have another set of share permissions. When a user connects to one of these folders through a network share, which of the following is true?

  • The most restrictive permissions from both NTFS and Share will apply

  • Only Share permissions will apply when accessing through a share folder

  • The least restrictive permissions from both NTFS and Share will apply

  • Only NTFS permissions will apply when accessing through a shared NTFS folder



Remaining Time 00:15:00