CompTIA A+ 220-1102 (Practice Test)

The CompTIA A+ certification is for IT professionals that can support modern technologies like security, cloud, data management and more. CompTIA A+ is the industry standard for starting a career in the Information Technology sector. The 220-1102 exam is the second in the CompTIA A+ 1100 series (preceded by 220-1101). CompTIA A+ 220-1102 covers operating systems, security, software and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Security
    • Operating Systems
    • Software Troubleshooting
    • Operational Procedures

Your surpervisor asks you to come up with ideas for increasing the physical security in a computer lab used for sensitive projects, which of the following would NOT be an acceptable suggestion?

  • Setting up a video camera to monitor the entrance/exit to the lab
  • Requiring a smart card to access the systems
  • Using data encryption software such as BitLocker
  • Installing a cypher lock on the door

Which of the following commands may be used on a computer, running Windows 11, to stop a single process from the command line?

  • stop
  • shutdown
  • taskkill
  • del

At work you have a few Linux servers and are asked to troubleshoot why a webserver on one of them is not responding. You SSH onto the server and want to determine if the webserver process is running. Which command would you use?

  • ls
  • grep
  • ps
  • tasklist

A large enterprise's internal user database was recently hacked and leaked onto the internet. While working for a security consultancy you have found evidence that several user's accounts were accessed using their password. You believe the hackers are using an existing set of common passwords to determine which users hashed passwords match. What type of attach was used to determine the user's hashed passwords?

  • Rainbow table
  • Hash Reversal
  • Dictionary
  • Brute-force

Which edition of Microsoft Windows cannot be joined to an Active Directory domain?

  • Windows 10 Enterprise
  • Windows 10 Pro Education
  • Windows 8.1 Enterprise
  • Windows 7 Home Premium

You have received several emails that appear to be responses from emails originally sent by you. You did not send these emails. The responders are friends of yours and do not seem malicious. What term best describes this situation?

  • Spam
  • Hijacked email
  • Privilege escalation
  • MAC Spoofing

Which of the following is the default package manager for the Ubuntu Linux distribution?

  • Yum
  • Apt
  • Wget
  • Gzip

You are troubleshooting a service failing to start on a Windows 10 laptop. You have already confirmed the service is configured to start using msconfig. You suspect the application is crashing after being started, where could you look to find a log of errors or crashes?

  • logc.sys
  • This info is also in msconfig
  • taskmgr.exe
  • eventvwr.msc

Utilized in the Windows Command Prompt, the "CD" command executes what process?

  • Loads media in the CD drive.
  • Call directory server for group policy updates.
  • Changes the domain of the PC.
  • Changes the current directory.

A user complains that an application used for their daily tasks often fails. It will lock up for several seconds, then eventually close out. There is no error message shown to the user. What Windows OS application can be used to try and view a history of the application crashes?

  • cmd.exe
  • Reliability Monitor
  • Resource Monitor
  • Task Manager

What type of malicious software encrypts files, deletes files or changes permissions on files, then claims to reverse the changes after a fee is paid?

  • Spam
  • Ransomware
  • Virus
  • Worm

Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?

  • Privacy Screen
  • ACL
  • VPN
  • Data Loss Prevention Policy

You volunteer at the local library where you help manage a computer lab. This lab is not always monitored by workers or volunteers but you would like to ensure it is still available for community members at all times. You are concerned people may steal or move the laptops in the computer lab. What type of physical security device could prevent this?

  • Cable locks
  • Remote Wipe
  • Mantrap
  • Biometric locks

There have been reports of a Windows server system running slowly and a member of the application support team has suggested adding more CPU and memory resources to the virtual machine. Before doing this you should check the _________ utility.

  • Performance monitor
  • Component services
  • Device manager
  • Windows memory diagnostics

What operating system uses a web browser for most user facing functionality?

  • Linux M
  • macOS
  • Chrome OS
  • Edge OS

When you use the COPY command, what switch would you use to verify that new files are written correctly?

  • /V
  • /D
  • /Z
  • /A

What acronym is used when a product or feature is no longer supported by the vendor?

  • EFS
  • END
  • GPT
  • EOL

Your boss has requested that you image a large number of Windows PC's for a new office. The image is standard for all PC's. You know that _________ is the best choice for imaging many clients at once.

  • DVD
  • PXE
  • USB
  • Floppy Disk

You are a desktop technician for a graphic design company. The company issues Apple computers running OSX 10.9 to all employees. Recently you have been asked to find a solution that will allow employees to use Windows applications on their computers. Which of the following is a potential solution?

  • iBoot
  • Disk Util
  • Boot Camp
  • vSphere

What Active Directory feature can be used to apply default user account permissions?

  • Least Privilege
  • None of these options
  • Group Policy
  • Login scripts