Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 1002 Test 3 (Software Troubleshooting)

The CompTIA 220-1002 exam is one of two exams requires to obtain the CompTIA A+ (1000 series). This exam will focus on troubelshooing mobile devices, security issues and PCs.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

A user has called the IT help desk where you work stating they clicked a link in an email from their boss and are now receiving a warning in their browser

> This site's certificate could not be verified. Are you sure you want to proceed?

How should you instruct the user to move forward?

  • Close the browser and forward the email to IT Security
  • Report the employee to Security as a possible hacker
  • Restore the user's PC from a known-good backup
  • Click the continue button

A computer at work has become infected with malware. After several attempts to remove the malware using a professional anti-malware tool you find the malicious software is not fully removed. What should you do next?

  • Buy a new anti-malware tool
  • Reformat the PC
  • Restore the PC using known-good backup
  • Use Safe Mode from now on

You are troubleshooting a connectivity issue on a Windows OS and suspect it is DNS related. What command can be used to see if a DNS server has been assigned?

  • ifconfig /d
  • netstat
  • dnsutil /config
  • ipconfig /all

A user complains that an application used for their daily tasks often fails. It will lock up for several seconds, then eventually close out. There is no error message shown to the user. What Windows OS application can be used to try and view a history of the application crashes?

  • cmd.exe
  • Reliability Monitor
  • Resource Monitor
  • Task Manager

Which of the following is NOT a method for stopping a process on a Windows operating system?

  • taskkill /F /IM process.exe
  • ALT+F4
  • Using Task Manager
  • pkill -9 process.exe

When a magnetic hard disk is used, what solution can help improve file read/write speeds?

  • Defragmentation
  • Rolling back device drivers
  • Killing background tasks
  • Reimaging the disk

You are an email administrator for a large company. Recently a series of emails were sent from a user's email account that the user claims not to have sent. How should you proceed?

  • Disable the user account, reset the password and run an anti-malware scan on the user's PC
  • Ask the user to please stop sending the emails
  • Disable the email and provide a new account to the user
  • Tighten firewall restrictions to block the SMTP port (25)

A laptop PC is frequently turning off without warning resulting in a black screen and no error messages. Where can you look inside Windows for a possible reason?

  • syslog.msc
  • Event Viewer
  • ipconfig /all /history
  • Control Panel > Windows Settings > Logs and Failures

An application is opening itself on multiple server and desktop PCs on your employer's network. The application is named Antispyware Remover 2020™ and offers to remove infected malware for a price of $99 per infected operating system. The application is very persistent and pop-ups frequently with flashing colors. What term best describes this scenario?

  • Antiviral Spoofing Attack
  • Hijacked Spyware Network Attack (HSNA)
  • Antivirus license escalation
  • Rogue antivirus

You are a technician working at a Computer Repair Shop. A customer complains that their Windows 8.1 desktop takes a long time to start and is slow for a few minutes after starting. After it has been running for a while the customer does not have any performance issues. What utility can be used to view what processes and applications are configured to start automatically when the PC boots?

  • eventvwr.msc
  • msconfig.exe
  • sysdm.cpl
  • startcfg.msc

A user has called the help desk you work at and said they are getting an "all blue screen that says their computer has an issue" a few times a day. Rebooting the PC temporarily fixes it. What should you do next?

  • Reinstall the corrupted Windows OS
  • Ask for the error message at the bottom of the screen
  • Use Safe Mode from now on
  • Run bootfix.msc on next startup

A user is complaining they are getting frequent pop-up windows while browsing the web. You have already verified there is a anti-virus software installed and that no viruses were found. How should you proceed?

  • Check installed browser extensions and plugins for the cause of the popups
  • Reformat the PC
  • Reset the user's profile in Active Directory
  • Rerun the anti-virus software in safe mode

What technology can be used to reduce the amount of phishing emails received by your companies end users?

  • Spam Filter
  • Antimalware
  • Port Firewall
  • Antivirus

A user with a laptop running Windows 10 Pro N is frequently slowing down when the user leaves their desk. They describe that the machine is fine when they are at their desk, but when in meetings large Excel documents and PowerPoints become sluggish. What is most likely the cause?

  • Loose disk causing read/write failures when the laptop is in motion
  • The laptop is entering a power-saving mode while not charging
  • Network congestion when many employees are sharing a meeting room
  • The laptop is old and needs to be replaced

On Windows 10 what tool can be used to configure automate updates or roll back to a previous version?

  • msconfig > Startup and Services > Updates
  • Ctrl + Alt + Del > Task Manager > Windows Updates
  • Control panel > Administrative Tools > Update Settings
  • Windows Settings > Update & Security > Windows Updates

You have received several emails that appear to be responses from emails originally sent by you. You did not send these emails. The responders are friends of yours and do not seem malicious. What term best describes this situation?

  • Privilege escalation
  • Spam
  • Hijacked email
  • MAC Spoofing

What type of malicious software encrypts files, deletes files or changes permissions on files, then claims to reverse the changes after a fee is paid?

  • Virus
  • Ransomware
  • Worm
  • Spam

You are a technician working at a Computer Repair Shop. A customer complains that while their Windows 10 laptop works, it has grown very slow. Of the following options which can be used to troubleshoot the cause of the slow performance?

  • activitymonitor.exe
  • msconfig.exe
  • taskmgr.exe
  • sysdm.cpl

You work for a small company with 8 Windows computers. You recently got a great deal on a new anti-malware software suite and are in the process of installing it onto the PCs. When you go to the anti-malware vendor's website to download the installer you receive a message "Website does not exist." You did not have this issue on any other PCs in the office. What is the most likely explanation?

  • The PCs NIC card is bad
  • ie.edge.msc is corrupted
  • The PC has a strict firewall configuration
  • Malware is present on the PC and is blocking connections to common anti-malware websites

You are troubleshooting a service failing to start on a Windows 10 laptop. You have already confirmed the service is configured to start using msconfig. You suspect the application is crashing after being started, where could you look to find a log of errors or crashes?

  • eventvwr.msc
  • This info is also in msconfig
  • taskmgr.exe
  • logc.sys