The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.
1) Which option is a Windows power management mode that draws a small amount of power on resume by saving system state in RAM?
The Sleep power management option saves the computer state in RAM and powering off uneeded components until the computer awakes. Hibernate is similar but saves system state to the hard disk, which saves more power but is slower to resume when waking.
This question is filed under objective 1, Windows Operating Systems
Sleep mode (or suspend to RAM) is a low power mode for electronic devices such as computers, televisions, and remote controlled devices These modes save significantly on electrical consumption compared to leaving a device fully on and, upon resume, allow the user to avoid having to reissue instructions or to wait for a machine to reboot Many devices signify this power mode with a pulsed or red colored LED power light … Read More
2) You are trying to identify which running application is causing a Ubuntu Linux server to run slowly. Which tool will identify running applications and their allocated resources?
The System Monitor in Ubuntu Linux is similar to Task Manager in Windows operating systems. System Monitor will show allocated resources and running applications.
This question is filed under objective 4, Software Troubleshooting
3) You work for an IT Help Desk call center and a customer has contacted you complaining that their text and icons seem very big leaving little space for anything else on the screen. What setting can you instruct the user to change?
The user is complaining that their screen resolution is too low. To increase this you should select Display Settings then resolution.
This question is filed under objective 1, Windows Operating Systems
4) You are ordering external HDDs for use in your office, they are likely to be used for storing sensitive information such as PII and intellectual property. What is a good way to ensure the confidentiality of these external HDDs?
Only full disk encryption will ensure the data is not readable by malicious users. The file system will not matter as their security features can be easily bypassed by using an operating system that ignores them. For example Linux operating systems can be configured to ignore NTFS permissions which would allow access to any data on the disk.
This question is filed under objective 3, Security
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume It is used to prevent unauthorized access to data storage The expression full disk encryption (FDE) (or whole disk encryption) signifies that everything on the disk is encrypted, but the master boot record (MBR), or similar area of a bootable disk, with code that starts the operating system loading sequence, is not encrypted Some hardware-based full disk encryption systems can truly encrypt an entire boot disk, including the MBR… Read More
5) What should be done first prior to replacing an IDE hard disk drive in a workstation?
IDE hard drives are internal components and are not hot swap-able (removable when powered on). You should power off the workstation before making any changes.
This question is filed under objective 5, Operational Procedures
6) Which component should be properly recycled rather than thrown away?
Toner cartridges are especially important to recycle as they can be reused with almost no effort and are generally consumed in very large numbers.
This question is filed under objective 5, Operational Procedures
7) Employee workstations are configured to only boot from the internal disk. You are tasked with verifying that this security configuration cannot be changed. What option will help ensure the default boot device cannot be changed?
Setting up a BIOS/UEFI password is the only option that would mitigate the threat from a user booting from another device (though it can often be reset by removing the CMOS battery). Data encryption, disabling admin accounts and only allowing trusted sources are all operating system level configurations and would not apply prior to booting to an OS.
This question is filed under objective 3, Security
In computing, BIOS (, BY-oss, -ohss) an acronym for Basic Input/Output System and also known as the System BIOS, ROM BIOS or PC BIOS) is firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs The BIOS firmware comes pre-installed on a personal computer's system board, and it is the first software to run when powered on The name originates from the Basic Input/Output System used in the CP/M operating system in 1975 The BIOS originally proprietary to the IBM PC has been reverse engineered by some companies (such as Phoenix Technologies) looking to create compatible systems… Read More
8) Which subject can be found in an MSDS?
A Material Safety Data Sheet (MSDS) contains health & hazard information.
This question is filed under objective 5, Operational Procedures
A safety data sheet (SDS), material safety data sheet (MSDS), or product safety data sheet (PSDS) is a document that lists information relating to occupational safety and health for the use of various substances and products SDSs are a widely used system for cataloguing information on chemicals, chemical compounds, and chemical mixtures SDS information may include instructions for the safe use and potential hazards associated with a particular material or product, along with spill-handling procedures The older MSDS formats could vary from source to source within a country depending on national requirements however, the newer SDS format is internationally standardized… Read More
9) What tool can be used to check if anyone else is logged into a Windows-based computer?
The Users tab in Task Manager will show you the logged in users. The "who" command is for Linux, not Windows. MSINFO32 provides system information, Local Users and Groups shows user accounts on the system - not ones in use.
This question is filed under objective 1, Windows Operating Systems
Task Manager, previously known as Windows Task Manager, is a task manager, system monitor, and startup manager included with Microsoft Windows systems It provides information about computer performance and running software, including name of running processes, CPU load, commit charge, I/O details, logged-in users, and Windows services Task Manager can also be used to set process priorities, processor affinity, start and stop services, and forcibly terminate processes The program can be started in recent versions of Windows by pressing ⊞ Win+R and then typing in taskmgrexe, by pressing Ctrl+Alt+Delete and clicking Start Task Manager, by pressing Ctrl+⇧ Shift+Esc, by right-clicking on the Windows taskbar and selecting "Task Manager", or by… Read More
10) While working as a desktop administrator you frequently install the same image of Windows 7 on employee workstations and are careful to always select the same options. Which tool can help automate this process?
Unattended install is the correct option, you can minimize user interaction with an install by pre-selecting configuration options in a script. Clean install overwrites other content on the disk, MSCONFIG Startup is for configuring applications that launch at startup, and General Folder options is for changing folder viewing options (double click to open, open folders in new window, etc.).
This question is filed under objective 1, Windows Operating Systems
11) What is the best method for ensuring the destruction of sensitive data on a HDD that is issued to employees on an as-needed basis?
When data is deleted or a disk is formatted the location of the data is tagged as empty and available for use but is not actually physically removed from the disk. This means after deleting it is still possible to read the data. Overwriting is a method that deletes the data and overwrites the physical location with random information to ensure it can never be recovered.
This question is filed under objective 3, Security
Data erasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by using zeros and ones to overwrite data onto all sectors of the device By overwriting the data on the storage device, the data is rendered unrecoverable and achieves data sanitization Ideally, software designed for data erasure should: Allow for selection of a specific standard, based on unique needs, and Verify the overwriting method has been successful and removed data across the entire device… Read More
12) You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?
User Account Control (UAC) is a feature in Windows 7, 8 and 10 that prompts users to confirm changes initiated by software. Until the changes are confirmed by UAC the change will not be made. This helps users understand when they are making system level changes like installing a new application. Sudo is a similar feature in Linux operating systems. NTFS is a file system and Windows Defender is an anti-malware application.
This question is filed under objective 3, Security
User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012 and Windows 10 It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit… Read More
13) What is the name of a GUI-based file and folder manager application in Mac OSX operating systems?
Finder is the GUI based file and folder manager in Mac OSX. Nautilus is a file and folder management application in Linux. Explorer is for Windows.
This question is filed under objective 2, Other Operating Systems & Technologies
The Finder is the default file manager and graphical user interface shell used on all Macintosh operating systems Described in its "About" window as "The Macintosh Desktop Experience", it is responsible for the launching of other applications, and for the overall user management of files, disks, and network volumes It was introduced with the first Macintosh computer, and also exists as part of GS/OS on the Apple IIGS It was rewritten completely with the release of Mac OS X in 2001 In a tradition dating back to the Classic Mac OS of the 1980s and 1990s, the Finder icon is the smiling screen of a computer, known as the Happy Mac logo… Read More
14) Which of these tools provides a a solution that allows a user to have their calendar on both their smart phone, desktop, and be accessible through a web portal (such as outlook web access) all in real time?
Cloud synchronization is the correct answer, it allows a user to share information (contacts, calendars, photos, etc.) between devices with an internet connection. POP3 is a protocol for email, tethering is for sharing an internet connection from your mobile device to another device and VPN is for a way to remotely connect to a network.
This question is filed under objective 2, Other Operating Systems & Technologies
15) Which tool is best suited to run a script every Sunday at 3 am on a CentOS Linux operating system?
Cron is a time-based scheduling service on Linux operating systems. The Windows equivalent is task scheduler. A service and a daemon could also achieve this but will require an entire application to be developed, compiled and installed onto the host OS.
This question is filed under objective 1, Windows Operating Systems
The software utility cron also known as cron job is a time-based job scheduler in Unix-like computer operating systems Users who set up and maintain software environments use cron to schedule jobs (commands or shell scripts) to run periodically at fixed times, dates, or intervals It typically automates system maintenance or administration—though its general-purpose nature makes it useful for things like downloading files from the Internet and downloading email at regular intervals The origin of the name cron is from the Greek word for time, χρόνος (chronos)Cron is most suitable for scheduling repetitive tasks Scheduling one-time tasks can be accomplished using the associated at utility… Read More
16) You work in the IT Department for a medium sized company. A non-technical user consistently has their credentials compromised. You have investigated and found no evidence of viruses or other malicious software. What is the best option to prevent this from happening again?
No level of security can protect against an inexperienced user. The best option is to provide relevant user training to ensure they are not being socially engineered into providing their network credentials.
This question is filed under objective 3, Security
Internet Security Awareness Training (ISAT) is the training given to members of an organization regarding the protection of various information assets of that organization ISAT is a subset of general security awareness training Even small and medium enterprises are generally recommended to provide such training, but organizations that need to comply with government regulations (ie GLBA, PCI, HIPAA, Sarbox) normally require formal ISAT for annually for all employees Often such training is provided in the form of online courses … Read More
17) An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web pages other than the internal intranet site. Which option is the least likely to cause this issue?
Remember the question says LEAST LIKELY. The questions states that internal web servers work but external ones do not. If wireless were the issue nothing would work at all. The issue is more likely to be related to external DNS, a firewall or an issue with the proxy used to connect outside the local network.
This question is filed under objective 4, Software Troubleshooting
18) When diagnosing a network issue on a Linux machine (without a GUI) you find that the network settings in /etc/network/interfaces (a text-based config file) are not correct. What is an appropriate tool for editing this file?
Vi is the only option available that is a Linux text editor. Other common Linux text editors are Vim and Nano. Cat will display the contents of the file but not allow you to edit it, ifconfig will show you the interface (e.g., wireless lan, ethernet) settings or allow you to temporarily change the settings (but not permanently), and notepad is a Windows-based text editor.
This question is filed under objective 2, Other Operating Systems & Technologies
vi (pronounced as distinct letters, ) is a screen-oriented text editor originally created for the Unix operating system The portable subset of the behavior of vi and programs based on it, and the ex editor language supported within these programs, is described by (and thus standardized by) the Single Unix Specification and POSIXThe original code for vi was written by Bill Joy in 1976, as the visual mode for a line editor called ex that Joy had written with Chuck Haley Bill Joy's ex 11 was released as part of the first Berkeley Software Distribution (BSD) Unix release in March 1978… Read More
19) A user calls and explains that they were visiting a website and received a pop-up on their computer alerting about a virus infection. The pop-up included a alarm sound and flashing colors. The alert prompted them to download an anti-virus tool to clean their computer. What should you recommend?
Closing the browser and running your own anti-malware scan is likely the best option. This is a social engineering trick and the web page is attempting to trick the user into downloading malicious software.
This question is filed under objective 4, Software Troubleshooting
Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer It is a form of scareware that manipulates users through fear, and a form of ransomware Rogue security software has been a serious security threat in desktop computing since 2008 Two of the earliest examples to gain infamy were BraveSentry and SpySheriff … Read More
20) Which Windows 7 tool will allow a system administrator to change the default install folder for applications?
REGEDIT is a Windows tool that allows administrators to change in-depth configuration options found in the Windows Registry. REGSRV32 is used for registering DLLs and ActiveX controls. REGEX is short for regular expressions and MSCONFIG is for configuring startup options in Windows.
This question is filed under objective 4, Software Troubleshooting
The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry The kernel, device drivers, services, Security Accounts Manager, and user interfaces can all use the registry The registry also allows access to counters for profiling system performance In other words, the registry or Windows Registry contains information, settings, options, and other values for programs and hardware installed on all versions of Microsoft Windows operating systems For example, when a program is installed, a new subkey containing settings such as a program's location, its version, and how to start the program, are all added to the Windows Registry… Read More
You can go back and review your answers or grade your test.