Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 902 Test 4

The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which tool is best suited to run a script every Sunday at 3 am on a CentOS Linux operating system?

  • Task scheduler
  • Service
  • cron
  • Daemon

You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?

  • NTFS
  • Sudo
  • Windows Defender
  • UAC

Which of these tools provides a a solution that allows a user to have their calendar on both their smart phone, desktop, and be accessible through a web portal (such as outlook web access) all in real time?

  • Tethering
  • POP3
  • Cloud synchronization
  • VPN

What should be done first prior to replacing an IDE hard disk drive in a workstation?

  • Check the BIOS settings
  • Open the case
  • Power off the computer
  • Change the jumpers on the old and new HDD

While working as a desktop administrator you frequently install the same image of Windows 7 on employee workstations and are careful to always select the same options. Which tool can help automate this process?

  • Clean install
  • Unattended install
  • General Folder options
  • MSCONFIG Startup

You work for an IT Help Desk call center and a customer has contacted you complaining that their text and icons seem very big leaving little space for anything else on the screen. What setting can you instruct the user to change?

  • Folder Options > View options
  • System > Display Size
  • Display Settings > Color depth
  • Display Settings > Resolution

What tool can be used to check if anyone else is logged into a Windows-based computer?

  • MSINFO32
  • Type "who" into the CLI/command prompt
  • Local Users and Group
  • Task Manager

Which subject can be found in an MSDS?

  • DRM & Licensing
  • Health & Hazard Information
  • Patching & OS Updates
  • Security best practices

You work in the IT Department for a medium sized company. A non-technical user consistently has their credentials compromised. You have investigated and found no evidence of viruses or other malicious software. What is the best option to prevent this from happening again?

  • Change his file permissions
  • Enforce a short password expiration
  • Provide relevant user training
  • Setup safe mode on his computer

You are trying to identify which running application is causing a Ubuntu Linux server to run slowly. Which tool will identify running applications and their allocated resources?

  • System Monitor
  • Services
  • Task manager
  • MSCONFIG

What is the name of a GUI-based file and folder manager application in Mac OSX operating systems?

  • Explorer
  • Nautilus
  • Finder
  • Gnome

Which Windows 7 tool will allow a system administrator to change the default install folder for applications?

  • REGSRV32
  • REGEX
  • MSCONFIG
  • REGEDIT

A user calls and explains that they were visiting a website and received a pop-up on their computer alerting about a virus infection. The pop-up included a alarm sound and flashing colors. The alert prompted them to download an anti-virus tool to clean their computer. What should you recommend?

  • Download and scan the computer with the anti-virus tool
  • Carefully close the browser and do your own anti-malware scan
  • Boot to Safe Mode and remove the virus
  • Check the system recovery options

When diagnosing a network issue on a Linux machine (without a GUI) you find that the network settings in /etc/network/interfaces (a text-based config file) are not correct. What is an appropriate tool for editing this file?

  • cat
  • notepad
  • vi
  • ifconfig

You are ordering external HDDs for use in your office, they are likely to be used for storing sensitive information such as PII and intellectual property. What is a good way to ensure the confidentiality of these external HDDs?

  • Full disk encryption
  • Ensure EXT3 is used
  • BIOS/UEFI Password
  • Ensure NTFS is used

Employee workstations are configured to only boot from the internal disk. You are tasked with verifying that this security configuration cannot be changed. What option will help ensure the default boot device cannot be changed?

  • Utilize data encryption
  • Setup a BIOS/UEFI password
  • Only allow software from trusted sources
  • Disable admin accounts

Which option is a Windows power management mode that draws a small amount of power on resume by saving system state in RAM?

  • Green
  • Power saver
  • Hibernation
  • Sleep

Which component should be properly recycled rather than thrown away?

  • Thermal paste
  • RAM
  • Toner Cartridges
  • Surge Compressor

An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web pages other than the internal intranet site. Which option is the least likely to cause this issue?

  • Wireless connectivity
  • DNS
  • Firewall
  • Proxy server

What is the best method for ensuring the destruction of sensitive data on a HDD that is issued to employees on an as-needed basis?

  • Standard format
  • Overwrite
  • DEFRAG
  • Disk recovery