CompTIA A+ 220-1102 (Practice Test)

The CompTIA A+ certification is for IT professionals that can support modern technologies like security, cloud, data management and more. CompTIA A+ is the industry standard for starting a career in the Information Technology sector. The 220-1102 exam is the second in the CompTIA A+ 1100 series (preceded by 220-1101). CompTIA A+ 220-1102 covers operating systems, security, software and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Operating Systems
    • Security
    • Software Troubleshooting
    • Operational Procedures

A user has called the IT help desk where you work stating they clicked a link in an email from their boss and are now receiving a warning in their browser

> This site's certificate could not be verified. Are you sure you want to proceed?

How should you instruct the user to move forward?

  • Restore the user's PC from a known-good backup
  • Close the browser and forward the email to IT Security
  • Click the continue button
  • Report the employee to Security as a possible hacker

Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?

  • All file permissions must be reassigned
  • All of the file permissions are lost
  • The file owner is preserved
  • The file name becomes case insensitive

What data should be recorded and safeguarded to maintain chain of custody during an investigation?

  • Anyone who may act as a witness or can provide details on the chain of events
  • Managers, Directors and other leadership positions of the relevant organization
  • Anyone who spoke with law enforcement
  • Anyone who handled evidence

You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?

  • Sudo
  • NTFS
  • Windows Defender
  • UAC

You volunteer at the local library where you help manage a computer lab. This lab is not always monitored by workers or volunteers but you would like to ensure it is still available for community members at all times. You are concerned people may steal or move the laptops in the computer lab. What type of physical security device could prevent this?

  • Cable locks
  • Remote Wipe
  • Mantrap
  • Biometric locks

Which option is a Windows power management mode that draws a small amount of power on resume by saving system state in RAM?

  • Hibernation
  • Power saver
  • Sleep
  • Green

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NSLOOKUP
  • NETSTAT
  • NBTSTAT
  • NET

You are troubleshooting a service failing to start on a Windows 10 laptop. You have already confirmed the service is configured to start using msconfig. You suspect the application is crashing after being started, where could you look to find a log of errors or crashes?

  • taskmgr.exe
  • eventvwr.msc
  • This info is also in msconfig
  • logc.sys

A malicious user has gained access to several user accounts by guessing their password. The malicious user was able to guess passwords using a list of commonly used phrases and words. Which of the following terms best describes this type of attack?

  • Zero Day Attack
  • Brute Force Attack
  • Spoofing
  • Dictionary Attack

In the context of logical security, what does MDM stand for?

  • Malware Detection Microprocessor
  • Meta Data Management
  • Mobile Device Management
  • Master Data Management

Which of the following is the default package manager for the Ubuntu Linux distribution?

  • Apt
  • Wget
  • Yum
  • Gzip

What security measure uses an individual's physical characteristics for authentication?

  • Pincode lock
  • Biometric lock
  • Access Card
  • Physical Token

An employee is suspected of insider trading and using confidential company information to make trades in the stock market. Your employer has asked you to take possession of the employee's laptop and hold it until the government authorities pick it up. What should you do when transferring the device to the authorities?

  • Backup the device for the companies legal team
  • Place the device in an antistatic bag for safekeeping
  • Maintain the chain of custody
  • Reformat the device

True or false: It is best practice to allow system administrators to have administrator privileges associated with their normal user account.

  • False
  • True

You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?

  • Folders currently backing up.
  • Hidden Folders.
  • Cached folders.
  • Deleted items still utilizing resources.

You are formatting a new USB drive to be used between several systems running different operating systems (Windows, OSX, Linux). What is the best format to use for the USB drive?

  • NTFS
  • AES-128
  • HFS+
  • FAT32

What is the name of a GUI-based file and folder manager application in Mac OSX operating systems?

  • Finder
  • Nautilus
  • Gnome
  • Explorer

You have been asked to help investigate and ongoing security incident. Your manager has asked you to determine if there are any unknown or unexpected network connections on a public facing server that hosts the organization's website. After logging onto the Windows based machine, what command would you use to determine this?

  • ipconfig
  • tracerout
  • ifconfig
  • netstat

A computer at work has become infected with malware. After several attempts to remove the malware using a professional anti-malware tool you find the malicious software is not fully removed. What should you do next?

  • Buy a new anti-malware tool
  • Use Safe Mode from now on
  • Restore the PC using known-good backup
  • Reformat the PC

On Windows 10 what tool can be used to configure automate updates or roll back to a previous version?

  • Ctrl + Alt + Del > Task Manager > Windows Updates
  • msconfig > Startup and Services > Updates
  • Windows Settings > Update & Security > Windows Updates
  • Control panel > Administrative Tools > Update Settings