CompTIA A+ 220-1002 (Practice Test)

The CompTIA A+ certification is for IT professionals that can support modern technologies like security, cloud, data management and more. CompTIA A+ is the industry standard for starting a career in the Information Technology sector. The 220-1002 exam is the second in the CompTIA A+ 1000 series (preceded by 220-1001). The 220-1002 exam will cover the following objectives: Operating Systems, Security, Software Troubleshooting and Operational Procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Operating Systems
    • Security
    • Software Troubleshooting
    • Operational Procedures

A user complains that an application used for their daily tasks often fails. It will lock up for several seconds, then eventually close out. There is no error message shown to the user. What Windows OS application can be used to try and view a history of the application crashes?

  • Resource Monitor
  • Task Manager
  • Reliability Monitor
  • cmd.exe

What technology provides a secure tunnel over an untrusted network?

  • ACL
  • Firewall
  • DLP
  • VPN

Which boot method requires a network interface?

  • Fixed drive
  • PXE
  • FTP
  • eSATA

Where can you find most applications installed on OSX and macOS?

  • /usr/bin
  • C:\Program Files (x86)
  • C:\Program Files
  • /Applications

In a Linux operating system environment, what command will display the current directory to the user?

  • shell
  • pwd
  • ls
  • dir

Which of the following is a command line tool that will translate between a domain name and an IP Address?


Which option can be used to speed up a fresh installation of Windows 10 onto many computers?

  • Refresh and Restore
  • Dynamic
  • In-place upgrade
  • Unattended installation

Which option is a proprietary operating system made by Google for mobile devices like laptops and tablets?

  • Chrome OS
  • Android
  • Windows
  • iOS

There have been reports of a Windows server system running slowly and a member of the application support team has suggested adding more CPU and memory resources to the virtual machine. Before doing this you should check the _________ utility.

  • Windows memory diagnostics
  • Device manager
  • Performance monitor
  • Component services

An application is opening itself on multiple server and desktop PCs on your employer's network. The application is named Antispyware Remover 2020™ and offers to remove infected malware for a price of $99 per infected operating system. The application is very persistent and pop-ups frequently with flashing colors. What term best describes this scenario?

  • Hijacked Spyware Network Attack (HSNA)
  • Antivirus license escalation
  • Antiviral Spoofing Attack
  • Rogue antivirus

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Shredding
  • Spamming
  • Tailgating
  • Phishing

What technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?

  • LDAP
  • Windows Defender
  • Global Policy Server
  • Active Directory

You have received several emails that appear to be responses from emails originally sent by you. You did not send these emails. The responders are friends of yours and do not seem malicious. What term best describes this situation?

  • Privilege escalation
  • Spam
  • Hijacked email
  • MAC Spoofing

Which of the following operating systems are Linux based?

  • Windows
  • iOS
  • Android
  • OSX

What operating system uses a web browser for most user facing functionality?

  • Chrome OS
  • macOS
  • Edge OS
  • Linux M

The 4 GB maximum file size limit and 2 TB maximum partition size limit are the characteristic features of:

  • NTFS
  • NFS
  • FAT32
  • exFAT

You receive an email from an outside party stating that clients on your network have been encrypted and the only way to decrypt them is to send Bitcoins to a hacker named Zero Cool. Your company has fallen victim to a/an:

  • Man-in-the-Middle attack.
  • Rootkit attack.
  • Phishing attack.
  • Ransomware attack.

In terms of IT security, a mantrap is best described by one of the following statements.

  • A mantrap is a floor with a sticky material meant to trap would-be intruders by restricting the ability of movement, allowing for IT security staff to remove intruders at a later time and humanely dispose of or release them into the wild
  • A mantrap is a set of doors separated by a hallway and access control devices that precludes individuals from accessing one door without access control requirements being met
  • A mantrap is a spring-loaded device that it sometimes baited with fine cheeses or savory snacks, meant to ensnare and sever the spinal cord of hungry Blackhat hackers
  • A mantrap is a fall-away floor with large, sharpened spikes at the bottom of a pit to prevent unauthorized access to secure rooms by both humans and bears

Which term refers to a logically separate portion of a single physical hard drive?

  • Partition
  • Stateful Drive
  • Virtual Volume
  • Virtual Drive

You work for a small company with 8 Windows computers. You recently got a great deal on a new anti-malware software suite and are in the process of installing it onto the PCs. When you go to the anti-malware vendor's website to download the installer you receive a message "Website does not exist." You did not have this issue on any other PCs in the office. What is the most likely explanation?

  • Malware is present on the PC and is blocking connections to common anti-malware websites
  • The PC has a strict firewall configuration
  • The PCs NIC card is bad
  • ie.edge.msc is corrupted