⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

13 hours, 27 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA A Plus 220 902 Test 8

Free CompTIA A+ 220-902 practice test, CompTIA A Plus 220 902 Test 8. The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

A kernel panic is an error that can take place in Unix based systems that most closely resembles a similar fatal error in a Windows environment. Select the most similar fatal error.

  • Getting a piece of a popcorn kernel stuck between your teeth and failing to get it out by picking at your teeth and experiencing the ensuing panic attack

  • Red Screen of Death

  • Operating System Not Found

  • Blue Screen of Death

A client has received a DLL not found error and has reported the issue to you. The client has also informed you that they have downloaded the the missing DLL file from the internet and believes they have resolved the issue. What is the first action should you take to regarding this situation?

  • No action needed, the missing DLL has been restored

  • Quarantine the computer

  • Verify that the correct DLL was downloaded

  • Re-image the PC to ensure no other DLL files are missing

A hypervisor is most commonly associated with which of the following technologies?

  • Routing

  • Virtualization

  • Hyper-threading

  • Load balancing

True or false: The best tool for cleaning a dusty desktop PC case is a vacuum.

  • False

  • True

You have been tasked with deploying full device encryption on Windows 10 devices in your office. Choose the Microsoft provided utility to achieve this task.

  • Sophos

  • Endpoint Encryption

  • CertainSafe

  • BitLocker

In terms of IT security, a mantrap is best described by one of the following statements.

  • A mantrap is a floor with a sticky material meant to trap would-be intruders by restricting the ability of movement, allowing for IT security staff to remove intruders at a later time and humanely dispose of or release them into the wild

  • A mantrap is a set of doors separated by a hallway and access control devices that precludes individuals from accessing one door without access control requirements being met

  • A mantrap is a fall-away floor with large, sharpened spikes at the bottom of a pit to prevent unauthorized access to secure rooms by both humans and bears

  • A mantrap is a spring-loaded device that it sometimes baited with fine cheeses or savory snacks, meant to ensnare and sever the spinal cord of hungry Blackhat hackers

A user has described an issue to you that requires your attention. While you think you grasp the concept of what they are asking for, the best course of action would be:

  • Restate the issue in a manner that will lead to the user clarifying the issue.

  • Slowly and silently extend your finger to their lips and make quiet shushing sounds. Experiencing computer issues can be frightening and this helps comfort the user.

  • Wrap the user in a heavy blanket. The weight and coverage of a large, warm blanket can help stave off shock.

  • Quickly leave the room and warm up some milk from the fridge. This classic comfort food will remind the user of home, taking their thoughts away from the chilling reality of needing technical support

You are tasked with creating scripts that will run on a schedule, checking the status of various Windows system resources and services. Your boss has stated that they would prefer you to utilize a scripting language that is best suited for the task at hand and does not require you code basic resource and service-checking functionality for the task. You choose to utilize:

  • PowerShell

  • VBScript

  • C#

  • Bash

You are deploying a web server in a Windows environment and are tasked with ensuring that internal clients can access the resources hosted on the server via an internet browser. Firewall ports have been opened for 80, 443, 20, 21 and 23. Your server is running Windows Server 2012 R2 and it is configured with teamed NICs. Which service is most likely needed on this server?

  • NPS

  • IIS

  • VDI

  • NLB

Which of the following statements is true regarding the difference between 32-bit and 64-bit version of the Windows OS?

  • All processors can utilize 32-bit and 64-bit Windows interchangeably

  • There are no fundamental differences between 32-bit and 64-bit Windows

  • 64-bit Windows can utilize more than 4 GB of RAM

  • 32-bit is the more modern of the two architectures

The Linux operating system has many command line base functions. For instance the command "sudo" is utilized to:

  • Select a directory

  • Supersede domain requirements

  • Run a program in the security context of another user

  • Search text via regular expression

Personally Identifiable Information (PII) should be safeguarded from unauthorized access. Which of the following would be considered PII?

  • Medical diagnosis

  • Driver's license number

  • Height

  • Favorite color

You have been tasked with determining why a service fails to start in a server test environment. There are numerous services required for the application to function, but a single service is failing to start upon boot. This service also happens to be the last service that is supposed to start. A delayed start is not required, nor is a manual start and the service is enabled. You can manually start the service and it will function normally until the next system reboot. The service is run under "System". Knowing these things you open up the "Services" application and check:

  • Recovery options

  • Service restart timer

  • Dependencies

  • Start parameters

There have been reports of a Windows server system running slowly and a member of the application support team has suggested adding more CPU and memory resources to the virtual machine. Before doing this you should check the _________ utility.

  • Windows memory diagnostics

  • Performance monitor

  • Device manager

  • Component services

You are copying several very large files to a remote server that experiences intermittent connectivity issues. Choose the tool that would be best used for this task.

  • Xcopy

  • Copy

  • Robocopy

  • CD

The Microsoft utility commonly known as SFC is an abbreviation for the words _____________.

  • System Fault Criteria

  • Suggested File Closure

  • System File Checker

  • Southern Fried Chicken

When issues are reported, what is the best method or technology to track them?

  • Ticketing system

  • E-mail

  • Phone calls

  • Post-it notes

During your daily technical support duties you accidentally view a user's password as they enter it. You inadvertently committed a _______ attack.

  • Tailgating

  • Social engineering

  • Man-in-the-middle

  • Shoulder surfing

True or false: It is best practice to allow system administrators to have administrator privileges associated with their normal user account.

  • False

  • True

Which of the following best describes a statement that reflects the nature of a virtual machine?

  • There is a limit of one virtual machine per host

  • Virtual machines can have resources added or removed from them at any time, without requiring a reboot

  • A physical machine can be virtualized, but a virtual machine cannot be converted to physical

  • Virtual machines can only be created in Windows environments



Remaining Time 00:15:00