Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 902 Test 7

The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

You receive an email from an outside party stating that clients on your network have been encrypted and the only way to decrypt them is to send Bitcoins to a man named "The Jackal". Your company has fallen victim to a/an:

  • Ransomware attack.
  • Rootkit attack.
  • Phishing attack.
  • Man-in-the-Middle attack.

A user is reporting that their phone is not adjusting its screen correctly based on orientation when viewing web pages. What is the most likely cause?

  • Screen orientation lock is on.
  • Complete and total absence of gravity.
  • Accelerometer failure.
  • Rotation is not supported by web browsers.

In conjunction with a password, all of the below are examples of multifactor authentication except for which?

  • Mobile Phone.
  • Hardware Token.
  • Shared secret.
  • Fingerprint.

Your boss has requested that you image a large number of Windows PC's for a new office. The image is standard for all PC's. You know that _________ is the best choice for imaging many clients at once.

  • DVD
  • Floppy Disk
  • USB
  • PXE

A user has contacted you with a computer problem and cannot provide much information on what happened. The user seems like this may be their first time using a computer. Your first action in responding to the issue should be:

  • Restart the PC in safe mode and tell the user to report if the issue repeats.
  • Fall apart and cry.
  • Observe the user's actions while using the PC.
  • Check the Event Viewer.

The server room blew up! True or false: You should tell everyone on social media.

  • False
  • True

All but one of the answers below are true of domain setups. The incorrect answer refers to a workgroup setup. Identify the incorrect answer.

  • Security and permissions are managed by an administrator.
  • All computers must be on the same network.
  • There can be thousands of computers as members.
  • A user can use their account credentials on any computer.

You are working on a PC that will be deployed in the office. You've forgotten to ground yourself by utilizing an ESD strap, an ESD mat or by touching bare metal on the PC case. While installing a RAM module you feel a static shock and a pop in the case. What is the best course of action to proceed?

  • Replace the motherboard and RAM module before deployment.
  • Swap the PC with the one on the new guy's desk.
  • Run a memory testing application to ensure that the module works.
  • Utilize a new RAM module.

True or False: Administrators should have administrative rights granted to their user account.

  • True
  • False

True or false: Brownouts are less dangerous to systems and hardware than blackouts.

  • True
  • False

True or false: Laptop batteries can be disposed of along with normal items thrown in the garbage.

  • True
  • False

You have identified that a user's PC has been infected with a virus. Your first step after identifying the issue should be:

  • Quarantine the system.
  • Re-image the PC.
  • Update virus definitions.
  • Disable system restore.

You have been placed in charge of client patch management for your organization. I am so, so sorry for you. As part of your new responsibility you have been charged with developing a new patching process. Assume that patching has been best effort in the past and that any existing processes will be discarded. Automatic Windows Update patching is enabled in your office. Choose the best first step to developing a patching process:

  • Select a group of clients that will receive patches before the rest of the organization.
  • Disable automatic Windows Update.
  • Begin a test round of patching.
  • Identify hardware commonalities for all systems.

Local users on a server or desktop computer, in a domain environment, should be:

  • Disabled whenever possible.
  • Updated often.
  • Used exclusively.
  • Granted additional rights.

Commonly associated with a domain controller, the following server role allows for you to enter an easily remembered web address, rather than requiring an IP address.

  • Proxy
  • DNS
  • UTM
  • DHCP

Utilized in the Windows Command Prompt, the "CD" command executes what process?

  • Changes the current directory.
  • Changes the domain of the PC.
  • Loads media in the CD drive.
  • Call directory server for group policy updates.

You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?

  • Hidden Folders.
  • Folders currently backing up.
  • Cached folders.
  • Deleted items still utilizing resources.

A user is attempting to access a business resource through Internet Explorer and are unable to load the page correctly. The page is loading oddly with assets in places from previous versions. You have checked with other users of the resource and they are not experiencing an issue. You should:

  • Clear the browser cache.
  • Clear browser cookies.
  • Report it as a bug to the developer.
  • Update the browser.

A user has contacted you with a computer problem and cannot provide much information on what happened. The user seems like this may be their first time using a computer. Your first action in responding to the issue should be:

  • Fall apart and cry.
  • Observe the user's actions while using the PC.
  • Check the Event Viewer.
  • Restart the PC in safe mode and tell the user to report if the issue repeats.

True or false: Backups and snapshots can be used interchangeably to ensure data redundancy.

  • False
  • True