CompTIA A+ 220-1002 (Practice Test)

The CompTIA A+ certification is for IT professionals that can support modern technologies like security, cloud, data management and more. CompTIA A+ is the industry standard for starting a career in the Information Technology sector. The 220-1002 exam is the second in the CompTIA A+ 1000 series (preceded by 220-1001). The 220-1002 exam will cover the following objectives: Operating Systems, Security, Software Troubleshooting and Operational Procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Operating Systems
    • Security
    • Software Troubleshooting
    • Operational Procedures

When you use the COPY command, what switch would you use to verify that new files are written correctly?

  • /V
  • /A
  • /Z
  • /D

Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?

  • ACL
  • Privacy Screen
  • VPN
  • Data Loss Prevention Policy

What operating system uses a web browser for most user facing functionality?

  • macOS
  • Edge OS
  • Chrome OS
  • Linux M

You have been instructed to configure a database server running Windows Server 2022 to alert technicians when the server's processor or memory is running above 75% capacity. Which of the following technologies will help you achieve this?

  • Task Manager
  • Task Scheduler
  • System Configuration
  • Performance Monitor

Your surpervisor asks you to come up with ideas for increasing the physical security in a computer lab used for sensitive projects, which of the following would NOT be an acceptable suggestion?

  • Using data encryption software such as BitLocker
  • Setting up a video camera to monitor the entrance/exit to the lab
  • Installing a cypher lock on the door
  • Requiring a smart card to access the systems

Which of the following is a command line tool that will translate between a domain name and an IP Address?

  • TRACERT
  • VERIFY
  • NSLOOKUP
  • IPCONFIG

Which edition of Microsoft Windows cannot be joined to an Active Directory domain?

  • Windows 8.1 Enterprise
  • Windows 7 Home Premium
  • Windows 10 Pro Education
  • Windows 10 Enterprise

Which of the following should be regularly performed to prevent data loss in the event of data corruption or drive failure?

  • System Restore
  • Factory Reset
  • Memory Diagnostics
  • Scheduled Backups

What technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?

  • Active Directory
  • LDAP
  • Windows Defender
  • Global Policy Server

True or false:

> A 32-bit application can be run by a 64-bit operating system

  • True
  • False

A malicious user has gained access to several user accounts by guessing their password. The malicious user was able to guess passwords using a list of commonly used phrases and words. Which of the following terms best describes this type of attack?

  • Zero Day Attack
  • Dictionary Attack
  • Spoofing
  • Brute Force Attack

True or false:

> BranchCache is a feature available to Windows operating systems that allows reading and writing to cached files in the event connectivity is lost to the file server.

  • True
  • False

Which of the following is NOT an edition of Windows 8?

  • Windows 8 Pro
  • Windows 8 Starter
  • Windows 8 Enterprise
  • Windows 8 (Core)

Which option is a proprietary operating system made by Google for mobile devices like laptops and tablets?

  • Android
  • Windows
  • Chrome OS
  • iOS

You receive an email from an outside party stating that clients on your network have been encrypted and the only way to decrypt them is to send Bitcoins to a hacker named Zero Cool. Your company has fallen victim to a/an:

  • Man-in-the-Middle attack.
  • Ransomware attack.
  • Phishing attack.
  • Rootkit attack.

True or false:

WEP is a strong security protocol that should be used to secure wireless networks

  • False
  • True

Of which of the following Windows System Power States saves the contents of memory to a file on the PC's hard drive?

  • Sleep
  • Hibernation
  • Stand By
  • Wake on Lan

What is the maximum memory supported for the base editions of Windows 8 64-bit Windows 8.1 64-bit?

  • There is no memory limit in a 64-bit OS
  • 512GB
  • 4GB
  • 128GB

An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?

  • Disable SSID broadcast
  • Enable MAC filtering
  • Disable DHCP
  • Change the channel

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • Local Security Policy
  • Performance Monitor
  • MSCONFIG
  • Users and Groups