Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 902 Test 4

The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which subject can be found in an MSDS?

  • Security best practices
  • Patching & OS Updates
  • Health & Hazard Information
  • DRM & Licensing

Which component should be properly recycled rather than thrown away?

  • Toner Cartridges
  • RAM
  • Surge Compressor
  • Thermal paste

A user calls and explains that they were visiting a website and received a pop-up on their computer alerting about a virus infection. The pop-up included a alarm sound and flashing colors. The alert prompted them to download an anti-virus tool to clean their computer. What should you recommend?

  • Carefully close the browser and do your own anti-malware scan
  • Download and scan the computer with the anti-virus tool
  • Check the system recovery options
  • Boot to Safe Mode and remove the virus

What is the name of a GUI-based file and folder manager application in Mac OSX operating systems?

  • Nautilus
  • Finder
  • Explorer
  • Gnome

Which of these tools provides a a solution that allows a user to have their calendar on both their smart phone, desktop, and be accessible through a web portal (such as outlook web access) all in real time?

  • Tethering
  • Cloud synchronization
  • POP3
  • VPN

What tool can be used to check if anyone else is logged into a Windows-based computer?

  • Local Users and Group
  • MSINFO32
  • Type "who" into the CLI/command prompt
  • Task Manager

Which tool is best suited to run a script every Sunday at 3 am on a CentOS Linux operating system?

  • Service
  • Task scheduler
  • cron
  • Daemon

An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web pages other than the internal intranet site. Which option is the least likely to cause this issue?

  • DNS
  • Wireless connectivity
  • Firewall
  • Proxy server

While working as a desktop administrator you frequently install the same image of Windows 7 on employee workstations and are careful to always select the same options. Which tool can help automate this process?

  • Unattended install
  • Clean install
  • General Folder options
  • MSCONFIG Startup

What is the best method for ensuring the destruction of sensitive data on a HDD that is issued to employees on an as-needed basis?

  • Standard format
  • Overwrite
  • Disk recovery

Which option is a Windows power management mode that draws a small amount of power on resume by saving system state in RAM?

  • Hibernation
  • Sleep
  • Power saver
  • Green

Employee workstations are configured to only boot from the internal disk. You are tasked with verifying that this security configuration cannot be changed. What option will help ensure the default boot device cannot be changed?

  • Setup a BIOS/UEFI password
  • Only allow software from trusted sources
  • Utilize data encryption
  • Disable admin accounts

You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?

  • UAC
  • NTFS
  • Windows Defender
  • Sudo

You are trying to identify which running application is causing a Ubuntu Linux server to run slowly. Which tool will identify running applications and their allocated resources?

  • Services
  • System Monitor
  • Task manager

Which Windows 7 tool will allow a system administrator to change the default install folder for applications?

  • REGSRV32

When diagnosing a network issue on a Linux machine (without a GUI) you find that the network settings in /etc/network/interfaces (a text-based config file) are not correct. What is an appropriate tool for editing this file?

  • vi
  • ifconfig
  • notepad
  • cat

You work in the IT Department for a medium sized company. A non-technical user consistently has their credentials compromised. You have investigated and found no evidence of viruses or other malicious software. What is the best option to prevent this from happening again?

  • Change his file permissions
  • Setup safe mode on his computer
  • Enforce a short password expiration
  • Provide relevant user training

You are ordering external HDDs for use in your office, they are likely to be used for storing sensitive information such as PII and intellectual property. What is a good way to ensure the confidentiality of these external HDDs?

  • Full disk encryption
  • BIOS/UEFI Password
  • Ensure EXT3 is used
  • Ensure NTFS is used

What should be done first prior to replacing an IDE hard disk drive in a workstation?

  • Check the BIOS settings
  • Open the case
  • Power off the computer
  • Change the jumpers on the old and new HDD

You work for an IT Help Desk call center and a customer has contacted you complaining that their text and icons seem very big leaving little space for anything else on the screen. What setting can you instruct the user to change?

  • System > Display Size
  • Display Settings > Color depth
  • Folder Options > View options
  • Display Settings > Resolution

Remaining Time: