Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits
The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.
Windows System Configuration (Msconfig) general tab has the Diagnostic startup option, used for booting only the basic services.
MSConfig (officially called System Configuration in Windows Vista, Windows 7, Windows 8 or Windows 10, or Windows 11 and Microsoft System Configuration Utility in previous operating systems) is a system utility to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software, device drivers and Windows services that run at startup, or change boot parameters. It is bundled with all versions of Microsoft Windows operating systems since Windows 98 except Windows 2000. Windows 95 and Windows 2000 users can download the utility as well, although it was not designed for them.MSConfig - Wikipedia, the free encyclopedia
BitLocker uses AES encryption with 128 or 256-bit keys, and encrypts entire volumes.
BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining (CBC) or XTS mode with a 128-bit or 256-bit key. CBC is not used over the whole disk; it is applied to each individual sector.BitLocker - Wikipedia, the free encyclopedia
Which of the Windows Task Manager tabs in Windows 8 includes the information about the network resources usage under Networking tab in previous releases of the Microsoft OS?
The "performance" tab will show your network resources and a live update of your system usage.
Task Manager, previously known as Windows Task Manager, is a task manager, system monitor, and startup manager included with Microsoft Windows systems. It provides information about computer performance and running software, including name of running processes, CPU and GPU load, commit charge, I/O details, logged-in users, and Windows services. Task Manager can also be used to set process priorities, processor affinity, start and stop services, and forcibly terminate processes. The program can be started in recent versions of Windows by pressing ⊞ Win+R and then typing in taskmgr.exe, by pressing Ctrl+Alt+Delete and clicking Start Task Manager, by pressing Ctrl+⇧ Shift+Esc, by right-clicking on the Windows taskbar and selecting "Task Manager", or by typing taskmgr in the File Explorer address bar. Task Manager was introduced in its current form with Windows NT 4.0. Prior versions of Windows NT, as well as Windows 3.x, include the Task List application, are capable of listing currently running processes and killing them, or creating new processes. Windows 9x has a program known as Close Program which lists the programs currently running and offers options to close programs as well shut down the computer.Task_Manager_(Windows) - Wikipedia, the free encyclopedia
Windows Memory Diagnostic Tool cannot be run inside Windows and requires computer restart (the utility is launched during reboot before loading the operating system).
Windows Memory Diagnostic Tool helps identify and fix memory problems on your PC.
Memory testers are specialized test equipment used to test and verify memory modules.Memory_tester - Wikipedia, the free encyclopedia
Previously known as Windows Marketplace, the app and software store for Microsoft is now known as Windows Store. Update (Dec. 2017): Microsoft has renamed the Windows Store to the Microsoft Store. This question has been updated accordingly.
Microsoft Store (formerly known as Windows Store) is a digital distribution platform owned by Microsoft It started as an app store for Windows 8 and Windows Server 2012 as the primary means of distributing Universal Windows Platform apps With Windows 10, Microsoft merged its other distribution platforms (Windows Marketplace, Windows Phone Store, Xbox Music, Xbox Video, Xbox Store, and a web storefront also known as "Microsoft Store") into Microsoft Store, making it a unified distribution point for apps, console games, and digital videos Digital music was included until the end of 2017, and E-books were included until 2019In 2015, over 669,000 apps were available in the storeMicrosoft_Store_(digital) - Wikipedia, the free encyclopedia
What is the maximum amount of partitions for a basic disk using GUID Partition Table (GPT) partition style with a Windows operating system?
GUID Partition Table allows for a maximum of 128 partitions with a minimum of 16,384 bytes in the array.
The GUID Partition Table (GPT) is a standard for the layout of partition tables of a physical computer storage device, such as a hard disk drive or solid-state drive, using universally unique identifiers, which are also known as globally unique identifiers (GUIDs). Forming a part of the Unified Extensible Firmware Interface (UEFI) standard (Unified EFI Forum-proposed replacement for the PC BIOS), it is nevertheless also used for some BIOS systems, because of the limitations of master boot record (MBR) partition tables, which use 32 bits for logical block addressing (LBA) of traditional 512-byte disk sectors. All modern personal computer operating systems support GPT. Some, including macOS and Microsoft Windows on the x86 architecture, support booting from GPT partitions only on systems with EFI firmware, but FreeBSD and most Linux distributions can boot from GPT partitions on systems with either the BIOS or the EFI firmware interface.GUID_Partition_Table - Wikipedia, the free encyclopedia
CHKDSK will search for errors on the disk. With /F switch, the errors found will be fixed.
While using Windows Vista, what utility would you use to monitor and change security settings for internet explorer?
Windows Vista uses the Windows Security Center. This is where you adjust your firewall settings, update settings, and internet explorer security settings.
An operating system installation that saves all personal system settings, file locations, and applications from the older OS version is referred to as:
An operating system (OS) upgrade will replace the product with the newer version, leaving files and applications untouched.
Upgrading is the process of replacing a product with a newer version of the same product. In computing and consumer electronics an upgrade is generally a replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date or to improve its characteristics.Upgrade - Wikipedia, the free encyclopedia
In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the local computer is labeled as what?
Windows Disk Management (WDM) will flag the new disk as foreign. This helps to recognize when new disks are added to a system.
CDfs is the file system used to access the data on Compact Discs (CD). Typically the data are audio tracks.
CDfs is a virtual file system for Unix-like operating systems; it provides access to data and audio tracks on Compact Discs. When the CDfs driver mounts a Compact Disc, it represents each track as a file. This is consistent with the Unix convention "everything is a file". CDfs supports the following track types: Red Book Compact Disc Digital Audio (CD-DA): Appears as a WAV file; reading from it initiates DAE ripping. White Book Video CD or Super Video CD video: Appears as a playable MPEG-1 file containing audio and video streams. Yellow Book CD-ROM data: Hierarchical File System: Appears as a mountable HFS file system disk image (sans partition table). ISO 9660: Each session appears as a mountable ISO image file. El Torito boot file: Appears as a single bootable disk image file.CDfs - Wikipedia, the free encyclopedia
What is the name of a system component designed for monitoring security and maintenance related items in Windows 7/8/8.1?
In Windows 7, 8 and 8.1 it is called Action Center. In Windows 10 it was renamed Security and Maintenance
Security and Maintenance (formerly known as Action Center, and Security Center in earlier versions) is a component of the Windows NT family of operating systems that monitors the security and maintenance status of the computer. Its monitoring criteria includes optimal operation of antivirus software, personal firewall, as well as the working status of Backup and Restore, Network Access Protection (NAP), User Account Control (UAC), Windows Error Reporting (WER), and Windows Update. It notifies the user of any problem with the monitored criteria, such as when an antivirus program is not up-to-date or is offline.Security_and_Maintenance - Wikipedia, the free encyclopedia
Choose the option that is a command-line command that can be used to copy one or more files from one location to another.
The "copy" command will copy the indicated file, and make the replica file where you designate.
A command-line interface (CLI) processes commands to a computer program in the form of lines of text. The program which handles the interface is called a command-line interpreter or command-line processor. Operating systems implement a command-line interface in a shell for interactive access to operating system functions or services. Such access was primarily provided to users by computer terminals starting in the mid-1960s, and continued to be used throughout the 1970s and 1980s on VAX/VMS, Unix systems and personal computer systems including DOS, CP/M and Apple DOS. Today, many users rely upon graphical user interfaces and menu-driven interactions. However, some programming and maintenance tasks may not have a graphical user interface and may still use a command line. Alternatives to the command line interface include text-based user interface menus (for example, IBM AIX SMIT), keyboard shortcuts, and various desktop metaphors centered on the pointer (usually controlled with a mouse). Examples of this include the Microsoft Windows, DOS Shell, and Mouse Systems PowerPanel. Command-line interfaces are often implemented in terminal devices that are also capable of screen-oriented text-based user interfaces that use cursor addressing to place symbols on a display screen. Programs with command-line interfaces are generally easier to automate via scripting. Many software systems implement command-line interfaces for control and operation. This includes programming environments and utility programs.Command-line interface - Wikipedia, the free encyclopedia
A system utility available in the Windows operating system that allows to roll back system files and settings to an earlier point in time is known as:
System Restore is a tool that will cycle all files and applications back to the time specified, while task manager allows the administrator to monitor system usage and close applications.
System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems. First included in Windows Me, it has been included in all following desktop versions of Windows released since, excluding Windows Server. In Windows 10, System Restore is turned off by default and must be enabled by users in order to function. This does not affect personal files such as documents, music, pictures, and videos. In prior Windows versions it was based on a file filter that watched changes for a certain set of file extensions, and then copied files before they were overwritten. An updated version of System Restore introduced by Windows Vista uses the Shadow Copy service as a backend (allowing block-level changes in files located in any directory on the volume to be monitored and backed up regardless of their location) and allows System Restore to be used from the Windows Recovery Environment in case the Windows installation no longer boots at all.System_Restore - Wikipedia, the free encyclopedia
A Microsoft Windows system utility designed to improve file access speed by consolidating data stored on a disk or drive is called
Defragmentation will rearrange the information stored on the disk to increase disk reading speeds.
Microsoft Drive Optimizer (formerly Disk Defragmenter) is a utility in Microsoft Windows designed to increase data access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation Defragmenting a disk minimizes head travel, which reduces the time it takes to read files from and write files to the disk As a result of the decreased read and write times, Microsoft Drive Optimizer decreases system startup times for systems starting from magnetic storage devices such as a hard drive However, defragmentation is not helpful on storage devices such as solid state drives, USB drives or SD cards that use flash memory to increase speeds, as these drives do not use a headDisk Defragmenter (Windows) - Wikipedia, the free encyclopedia
Windows Vista Home Basic does not have Windows Aero. This is the base operating system with the fewest features.
Compared with previous versions of Microsoft Windows, there are numerous features new to Windows Vista, covering most aspects of the operating system, which include additional management features, new aspects of security and safety, new I/O technologies, new networking features, and new technical features. Windows Vista also removed some others.Features new to Windows Vista - Wikipedia, the free encyclopedia
A framework providing access to a collection of tools that can be used by administrators and advanced users to manage networks, computers, services, and other system components in Windows is known as:
Microsoft Management Console (MMC) is where you can manage all aspects of a computer network, including monitoring tools and driver checks.
Microsoft Management Console (MMC) is a component of Windows 2000 and its successors that provides system administrators and advanced users an interface for configuring and monitoring the system.Microsoft_Management_Console - Wikipedia, the free encyclopedia
The Security tab in Microsoft Internet Explorer allows the user to impose restrictions on web content allowed in the IE web browser.
The Security tab in Internet Options allows you to set trusted sites and restricted sites.
The Control Panel is a component of Microsoft Windows that provides the ability to view and change system settings. It consists of a set of applets that include adding or removing hardware and software, controlling user accounts, changing accessibility options, and accessing networking settings. Additional applets are provided by third parties, such as audio and video drivers, VPN tools, input devices, and networking tools.Control_Panel_(Windows) - Wikipedia, the free encyclopedia
The ability to replace computer system components without causing interruption or needing to restart the system is known as:
Hot swapping is typically thought of as Universal Serial Bus (USB) technology, because peripherals using USB can easily be plugged and unplugged without requiring a restart.
Hot swapping is the replacement or addition of components to a computer system without stopping, shutting down, or rebooting the system; hot plugging describes the addition of components only. Components which have such functionality are said to be hot-swappable or hot-pluggable; likewise, components which do not are cold-swappable or cold-pluggable. Most desktop computer hardware, such as CPUs and memory, are only cold-pluggable. However, it is common for mid to high-end servers and mainframes to feature hot-swappable capability for hardware components, such as CPU, memory, PCIe, SATA and SAS drives. An example of hot swapping is the express ability to pull a Universal Serial Bus (USB) peripheral device, such as a thumb drive, external Hard Disk Drive (HDD), mouse, keyboard, or printer out of a computer's USB slot or peripheral hub without ejecting it first. Most smartphones and tablets with tray-loading holders can interchange SIM cards without powering down the system. Dedicated digital cameras and camcorders usually have readily accessible memory card and battery compartments for quick changing with only minimal interruption of operation. Batteries can be cycled through by recharging reserve batteries externally while unused. Many cameras and camcorders feature an internal memory to allow capturing when no memory card is inserted.Hot_swapping - Wikipedia, the free encyclopedia
Looks like thats it! You can go back and review your answers or click the button below to grade your test.