🎖️🏵️ Memorial Weekend Sale — 30% off🏵️🎖️

1 day, 1 hour remaining!
CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
00:15:00

Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 802 Test 2

Free CompTIA A+ 220-802 practice test, CompTIA A Plus 220 802 Test 2. This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

  • Questions: 20
  • Time: 15 minutes (60 seconds per question)
Question 1 of 20

Which of the following passwords is the MOST secure according to industry best practices?

  • SimpleAnswer1234

  • thisisthecorrectanswer1

  • E@sy2Remember

  • VeryStrongPassword

Question 2 of 20

A user is concerned about an issue with iOS. Which technology is the user referring too?

  • iPhone

  • iCloud

  • Galaxy II

  • Android Phone

Question 3 of 20

Which of the following is TRUE about the difference between a worm and a virus?

  • Worms can self propagate without attaching themselves to a host program while a virus cannot.

  • Worms are written into assembly while viruses are written with scripting languages.

  • Viruses hide in the boot record while worms hide within the file system.

  • Viruses disable the antivirus update service while worms kill the antivirus process.

Question 4 of 20

A new company policy requires privacy screens for all computers in publicly accessible spaces. Privacy screens help protect against which of the following?

  • Shoulder surfing

  • Rootkits

  • Social Engineering

  • Spear phishing

Question 5 of 20

A technician would like to restart a computer from a command line tool. Which of the following tools should the technician use?

  • Shutdown /f

  • Shutdown /i

  • Shutdown /r

  • Shutdown /s

Question 6 of 20

Susan, a new user, was recently given a new company laptop. While traveling, Susan reports that her laptop shuts off whenever it is unplugged, even if the battery is 100% charged. Which of the following should the technician do?

  • Change power settings to balanced

  • Enable APM in the BIOS

  • Replace the battery

  • Replace the power adapter

Question 7 of 20

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?

  • MSCONFIG >Startup Tab

  • Rename the Administrator account

  • Disable the Guest account

  • Disable autorun

Question 8 of 20

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?

  • Disable autorun

  • Disable the Guest account

  • MSCONFIG >Startup Tab

  • Rename the Administrator account

Question 9 of 20

Which of the following commands will force the Windows Operating System to power off after one minute?

  • shutdown /l 60

  • shutdown /r /t 60

  • shutdown /s /t 60

  • shutdown /h /t 1m

Question 10 of 20

Which of the following boot methods receives the bootstrap files from a network server?

  • PXE

  • PAN

  • IDS

  • NAT

Question 11 of 20

Which of the following commands will allow a user to discover their IP address, subnet mask and DNS server address?

  • NSLOOKUP

  • NETSTAT -A

  • IPCONFIG

  • IPCONFIG /ALL

Question 12 of 20

A user has called the IT Department and states that their computer does not work. Which of the following would be the BEST question to obtain further information?

  • Can you get to the Internet?

  • Does the PC turn on?

  • What exactly does not work?

  • Are you able to sign on?

Question 13 of 20

Which of the following terms describes a group of devices communicating using Bluetooth?

  • Bluenet

  • WAP

  • Extranet

  • Piconet

Question 14 of 20

Which of the following security threats requires the attacker to be physically located near the target machine?

  • Phishing

  • Rootkit

  • Social engineering

  • Shoulder surfing

Question 15 of 20

The payroll department works with company financial data and had an incident that involved employee’s salary being shared across the network. Which of the following actions would solve this problem?

  • Configure directory permissions for least privilege

  • Implement a new paper shredding policy

  • Purchase Additional Firewalls

  • obtain a new security system with RFID employee badges

Question 16 of 20

Of which of the following Windows System Power States saves the contents of memory to a file on the PC's hard drive?

  • Sleep

  • Hibernation

  • Stand By

  • Wake on Lan

Question 17 of 20

A friend has come to you seeking help with a gaming PC he uses at home. He has replaced his monitor with a very large 1080p TV, but when he runs any games on the PC they appear much smaller and do not fit the entire TV screen. Which answer is most likely the problem?

  • The PC games cannot be run to an external display.

  • The LCD TV response rate is not fast enough for gaming.

  • The games do not support a 1920×1080 resolution.

  • The LCD TV driver is not supported by the Windows operating system.

Question 18 of 20

Which of the following is the MOST secure method of data removal that will still allow a drive to be reused, but will not allow erased data to be easily recovered from a hard drive?

  • Format the drive

  • Use an overwrite program

  • Use a degaussing tool

  • Re-partition the drive

Question 19 of 20

Which of the following should be regularly scheduled to fix hard drive errors?

  • Antivirus Scan

  • Check Disk

  • Defragmentation

  • System Restore

Question 20 of 20

Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers?

  • Human interaction

  • Grayware installation

  • Worm transmission

  • Malware installation