⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

14 hours, 9 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA A Plus 220 902 Test 4

Free CompTIA A+ 220-902 practice test, CompTIA A Plus 220 902 Test 4. The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

When diagnosing a network issue on a Linux machine (without a GUI) you find that the network settings in /etc/network/interfaces (a text-based config file) are not correct. What is an appropriate tool for editing this file?

  • cat

  • vi

  • ifconfig

  • notepad

You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?

  • NTFS

  • Sudo

  • Windows Defender

  • UAC

You are trying to identify which running application is causing a Ubuntu Linux server to run slowly. Which tool will identify running applications and their allocated resources?

  • System Monitor

  • Services

  • Task manager

  • MSCONFIG

Which subject can be found in an MSDS?

  • Security best practices

  • DRM & Licensing

  • Health & Hazard Information

  • Patching & OS Updates

You work in the IT Department for a medium sized company. A non-technical user consistently has their credentials compromised. You have investigated and found no evidence of viruses or other malicious software. What is the best option to prevent this from happening again?

  • Provide relevant user training

  • Change his file permissions

  • Setup safe mode on his computer

  • Enforce a short password expiration

Which component should be properly recycled rather than thrown away?

  • Toner Cartridges

  • Surge Compressor

  • RAM

  • Thermal paste

Employee workstations are configured to only boot from the internal disk. You are tasked with verifying that this security configuration cannot be changed. What option will help ensure the default boot device cannot be changed?

  • Disable admin accounts

  • Utilize data encryption

  • Setup a BIOS/UEFI password

  • Only allow software from trusted sources

A user calls and explains that they were visiting a website and received a pop-up on their computer alerting about a virus infection. The pop-up included a alarm sound and flashing colors. The alert prompted them to download an anti-virus tool to clean their computer. What should you recommend?

  • Download and scan the computer with the anti-virus tool

  • Check the system recovery options

  • Carefully close the browser and do your own anti-malware scan

  • Boot to Safe Mode and remove the virus

What is the best method for ensuring the destruction of sensitive data on a HDD that is issued to employees on an as-needed basis?

  • Disk recovery

  • DEFRAG

  • Overwrite

  • Standard format

What is the name of a GUI-based file and folder manager application in Mac OSX operating systems?

  • Gnome

  • Nautilus

  • Finder

  • Explorer

Which of these tools provides a a solution that allows a user to have their calendar on both their smart phone, desktop, and be accessible through a web portal (such as outlook web access) all in real time?

  • Cloud synchronization

  • Tethering

  • VPN

  • POP3

You work for an IT Help Desk call center and a customer has contacted you complaining that their text and icons seem very big leaving little space for anything else on the screen. What setting can you instruct the user to change?

  • Display Settings > Color depth

  • Display Settings > Resolution

  • Folder Options > View options

  • System > Display Size

An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web pages other than the internal intranet site. Which option is the least likely to cause this issue?

  • Firewall

  • DNS

  • Wireless connectivity

  • Proxy server

What should be done first prior to replacing an IDE hard disk drive in a workstation?

  • Power off the computer

  • Check the BIOS settings

  • Change the jumpers on the old and new HDD

  • Open the case

While working as a desktop administrator you frequently install the same image of Windows 7 on employee workstations and are careful to always select the same options. Which tool can help automate this process?

  • MSCONFIG Startup

  • General Folder options

  • Unattended install

  • Clean install

Which Windows 7 tool will allow a system administrator to change the default install folder for applications?

  • REGSRV32

  • MSCONFIG

  • REGEDIT

  • REGEX

What tool can be used to check if anyone else is logged into a Windows-based computer?

  • Task Manager

  • MSINFO32

  • Type "who" into the CLI/command prompt

  • Local Users and Group

Which tool is best suited to run a script every Sunday at 3 am on a CentOS Linux operating system?

  • Task scheduler

  • Daemon

  • Service

  • cron

You are ordering external HDDs for use in your office, they are likely to be used for storing sensitive information such as PII and intellectual property. What is a good way to ensure the confidentiality of these external HDDs?

  • Full disk encryption

  • Ensure NTFS is used

  • BIOS/UEFI Password

  • Ensure EXT3 is used

Which option is a Windows power management mode that draws a small amount of power on resume by saving system state in RAM?

  • Hibernation

  • Green

  • Power saver

  • Sleep



Remaining Time 00:15:00