CompTIA A+ 220-1002 (Practice Test)

The CompTIA A+ certification is for IT professionals that can support modern technologies like security, cloud, data management and more. CompTIA A+ is the industry standard for starting a career in the Information Technology sector. The 220-1002 exam is the second in the CompTIA A+ 1000 series (preceded by 220-1001). The 220-1002 exam will cover the following objectives: Operating Systems, Security, Software Troubleshooting and Operational Procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Security
    • Operating Systems
    • Software Troubleshooting
    • Operational Procedures

You are ordering external HDDs for use in your office, they are likely to be used for storing sensitive information such as PII and intellectual property. What is a good way to ensure the confidentiality of these external HDDs?

  • Ensure NTFS is used
  • Full disk encryption
  • Ensure EXT3 is used
  • BIOS/UEFI Password

Of the given options, which is the least secure wireless encryption protocol?

  • WPA2
  • WPA
  • WSP
  • WEP

Your surpervisor asks you to come up with ideas for increasing the physical security in a computer lab used for sensitive projects, which of the following would NOT be an acceptable suggestion?

  • Installing a cypher lock on the door
  • Using data encryption software such as BitLocker
  • Setting up a video camera to monitor the entrance/exit to the lab
  • Requiring a smart card to access the systems

What technology from Microsoft can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs?

  • LDAP
  • Windows Defender
  • Global Policy Server
  • Active Directory

Of which of the following Windows System Power States saves the contents of memory to a file on the PC's hard drive?

  • Sleep
  • Stand By
  • Wake on Lan
  • Hibernation

A user is complaining they are getting frequent pop-up windows while browsing the web. You have already verified there is a anti-virus software installed and that no viruses were found. How should you proceed?

  • Reset the user's profile in Active Directory
  • Reformat the PC
  • Check installed browser extensions and plugins for the cause of the popups
  • Rerun the anti-virus software in safe mode

What Active Directory feature can be used to apply default user account permissions?

  • None of these options
  • Login scripts
  • Least Privilege
  • Group Policy

What is the maximum memory supported for the base editions of Windows 8 64-bit Windows 8.1 64-bit?

  • There is no memory limit in a 64-bit OS
  • 512GB
  • 128GB
  • 4GB

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • Performance Monitor
  • Local Security Policy
  • Users and Groups

In the context of multi-factor authentication, which option is NOT an example of something a user has?

  • Credit card
  • Software token
  • Password
  • Cell phone with authentication app

You are an email administrator for a large company. Recently a series of emails were sent from a user's email account that the user claims not to have sent. How should you proceed?

  • Tighten firewall restrictions to block the SMTP port (25)
  • Ask the user to please stop sending the emails
  • Disable the user account, reset the password and run an anti-malware scan on the user's PC
  • Disable the email and provide a new account to the user

There have been reports of a Windows server system running slowly and a member of the application support team has suggested adding more CPU and memory resources to the virtual machine. Before doing this you should check the _________ utility.

  • Device manager
  • Windows memory diagnostics
  • Performance monitor
  • Component services

What should you do to local user accounts when setting up Windows workstations on a Active Directory Domain?

  • Granted additional rights
  • Disabled whenever possible
  • Rotated frequently
  • Used exclusively

You are a desktop technician for a graphic design company. The company issues Apple computers running OSX 10.9 to all employees. Recently you have been asked to find a solution that will allow employees to use Windows applications on their computers. Which of the following is a potential solution?

  • iBoot
  • vSphere
  • Boot Camp
  • Disk Util

Which operating system installation type will wipe all existing data and partitions from the disk?

  • In-place upgrade
  • Multiboot enablement
  • Repair installation
  • Clean installation

Stan, the new HR manager, wants everyone in his department to have access to create and delete accounts to streamline the process for getting new hires setup in the system. Why is this not a good idea?

  • This could allow HR employees to by-pass privacy filters, though it isn't that big of a threat since they are HR
  • HR employees are not usually on the Access Control List (ACL)
  • This does not keep with the principle of least privilege
  • This could enable tailgating

What type of script uses a .py file extension?

  • Python
  • PyTorch
  • Powershell
  • Javascript

Which boot method requires a network interface?

  • FTP
  • eSATA
  • Fixed drive
  • PXE

You volunteer at the local library where you help manage a computer lab. This lab is not always monitored by workers or volunteers but you would like to ensure it is still available for community members at all times. You are concerned people may steal or move the laptops in the computer lab. What type of physical security device could prevent this?

  • Cable locks
  • Biometric locks
  • Mantrap
  • Remote Wipe

True or false:

> BranchCache is a feature available to Windows operating systems that allows reading and writing to cached files in the event connectivity is lost to the file server.

  • False
  • True