Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 902 Test 4

The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which component should be properly recycled rather than thrown away?

  • Toner Cartridges
  • RAM
  • Thermal paste
  • Surge Compressor

A user calls and explains that they were visiting a website and received a pop-up on their computer alerting about a virus infection. The pop-up included a alarm sound and flashing colors. The alert prompted them to download an anti-virus tool to clean their computer. What should you recommend?

  • Boot to Safe Mode and remove the virus
  • Carefully close the browser and do your own anti-malware scan
  • Check the system recovery options
  • Download and scan the computer with the anti-virus tool

You are ordering external HDDs for use in your office, they are likely to be used for storing sensitive information such as PII and intellectual property. What is a good way to ensure the confidentiality of these external HDDs?

  • Full disk encryption
  • BIOS/UEFI Password
  • Ensure NTFS is used
  • Ensure EXT3 is used

What is the name of a GUI-based file and folder manager application in Mac OSX operating systems?

  • Gnome
  • Explorer
  • Finder
  • Nautilus

An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web pages other than the internal intranet site. Which option is the least likely to cause this issue?

  • Wireless connectivity
  • Firewall
  • DNS
  • Proxy server

Which subject can be found in an MSDS?

  • Health & Hazard Information
  • Security best practices
  • DRM & Licensing
  • Patching & OS Updates

You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?

  • NTFS
  • Sudo
  • UAC
  • Windows Defender

You work in the IT Department for a medium sized company. A non-technical user consistently has their credentials compromised. You have investigated and found no evidence of viruses or other malicious software. What is the best option to prevent this from happening again?

  • Change his file permissions
  • Enforce a short password expiration
  • Setup safe mode on his computer
  • Provide relevant user training

While working as a desktop administrator you frequently install the same image of Windows 7 on employee workstations and are careful to always select the same options. Which tool can help automate this process?

  • Unattended install
  • MSCONFIG Startup
  • General Folder options
  • Clean install

What tool can be used to check if anyone else is logged into a Windows-based computer?

  • MSINFO32
  • Task Manager
  • Local Users and Group
  • Type "who" into the CLI/command prompt

Which Windows 7 tool will allow a system administrator to change the default install folder for applications?

  • MSCONFIG
  • REGEX
  • REGEDIT
  • REGSRV32

What should be done first prior to replacing an IDE hard disk drive in a workstation?

  • Check the BIOS settings
  • Power off the computer
  • Open the case
  • Change the jumpers on the old and new HDD

Which tool is best suited to run a script every Sunday at 3 am on a CentOS Linux operating system?

  • Daemon
  • cron
  • Service
  • Task scheduler

Which of these tools provides a a solution that allows a user to have their calendar on both their smart phone, desktop, and be accessible through a web portal (such as outlook web access) all in real time?

  • Tethering
  • POP3
  • VPN
  • Cloud synchronization

Which option is a Windows power management mode that draws a small amount of power on resume by saving system state in RAM?

  • Power saver
  • Sleep
  • Green
  • Hibernation

Employee workstations are configured to only boot from the internal disk. You are tasked with verifying that this security configuration cannot be changed. What option will help ensure the default boot device cannot be changed?

  • Utilize data encryption
  • Setup a BIOS/UEFI password
  • Only allow software from trusted sources
  • Disable admin accounts

You are trying to identify which running application is causing a Ubuntu Linux server to run slowly. Which tool will identify running applications and their allocated resources?

  • System Monitor
  • Task manager
  • Services
  • MSCONFIG

You work for an IT Help Desk call center and a customer has contacted you complaining that their text and icons seem very big leaving little space for anything else on the screen. What setting can you instruct the user to change?

  • Display Settings > Color depth
  • Display Settings > Resolution
  • Folder Options > View options
  • System > Display Size

When diagnosing a network issue on a Linux machine (without a GUI) you find that the network settings in /etc/network/interfaces (a text-based config file) are not correct. What is an appropriate tool for editing this file?

  • cat
  • notepad
  • vi
  • ifconfig

What is the best method for ensuring the destruction of sensitive data on a HDD that is issued to employees on an as-needed basis?

  • Standard format
  • Disk recovery
  • Overwrite
  • DEFRAG