Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 902 Test 1

The CompTIA 220-901 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Recently the company you work for began investigating the possibility of replacing their payroll system with a cloud based service provided by a third party company. Which type of service is this?

  • PaaS
  • SaaS
  • IaaS
  • RaaS

A user has called the help desk where you work stating they cannot find a file on their PC. After asking a few basic questions you have determined they are using Mac OSX. Which standard OSX application can help them locate their file?

  • Searcher
  • Alfred
  • Find my Mac
  • Spotlight

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • Users and Groups
  • MSCONFIG
  • Performance Monitor
  • Local Security Policy

Which of the following is a command line tool that will translate between a domain name and an IP Address?

  • TRACERT
  • IPCONFIG
  • NSLOOKUP
  • VERIFY

Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers?

  • Worm transmission
  • Malware installation
  • Grayware installation
  • Human interaction

Of which of the following Windows System Power States saves the contents of memory to a file on the PC's hard drive?

  • Stand By
  • Hibernation
  • Wake on Lan
  • Sleep

Which of the following is true about the difference between a worm and a virus?

  • Viruses disable the antivirus update service while worms kill the antivirus process.
  • Worms are written into assembly while viruses are written with scripting languages.
  • Worms can self propagate without attaching themselves to a host program while a virus cannot.
  • Viruses hide in the boot record while worms hide within the file system.

In a Linux operating system environment, what command will display the current directory to the user?

  • pwd
  • ls
  • dir
  • shell

Which of the following passwords is the MOST secure according to industry best practices?

You are a desktop technician for a graphic design company. The company issues Apple computers running OSX 10.9 to all employees. Recently you have been asked to find a solution that will allow employees to use Windows applications on their computers. Which of the following is a potential solution?

  • iBoot
  • Disk Util
  • vSphere
  • Boot Camp

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NSLOOKUP
  • NBTSTAT
  • NET
  • NETSTAT

You are creating a support ticket for a customer. While they are explaining their PC's symptoms you believe you already know the solution. What should you do?

  • Politely interrupt them and tell them your solution
  • Ask the customer to repeat the problem and all the symptoms several times, for clarity.
  • Continue listening to the customer's explanation, when they are done refer them to a website to find a solution
  • Finish listening to their explanation and then explain the solution

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform next?

  • Re-establish a new theory or escalate
  • Document findings, actions, and outcomes
  • Implement preventative measures
  • Establish a plan of action to resolve the problem

An unauthorized user observing system security procedure such as typing in a password or pin code is known as:

  • Shoulder Surfing
  • A Worm
  • Spyware
  • Phishing

Which of the following is the default package manager for the Ubuntu Linux distribution?

  • Apt
  • Wget
  • Gzip
  • Yum

Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

  • ERASE
  • TASKKILL
  • DEL
  • SHUTDOWN

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

  • "Do you have a laptop or desktop?"
  • "Are you able to sign on?"
  • "Can you get to the Internet?"
  • "Does the PC turn on?"

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

  • Enable PATA in the BIOS
  • Press F8 when prompted
  • Select load driver
  • Hit the refresh button to force a re-detect

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Phishing
  • Shredding
  • Tailgating
  • Spamming

When is it acceptable to a IT business to make copies of customer's confidential data?

  • With the customer's permission, for back up purposes
  • If the on-site tech determines it necessary
  • It is never acceptable to copy customer data
  • If the content is public information