⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

17 hours, 16 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA A Plus 220 902 Test 7

Free CompTIA A+ 220-902 practice test, CompTIA A Plus 220 902 Test 7. The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

The server room blew up! True or false: You should tell everyone on social media.

  • False

  • True

You have identified that a user's PC has been infected with a virus. Your first step after identifying the issue should be:

  • Quarantine the system.

  • Disable system restore.

  • Re-image the PC.

  • Update virus definitions.

A user has contacted you with a computer problem and cannot provide much information on what happened. The user seems like this may be their first time using a computer. Your first action in responding to the issue should be:

  • Fall apart and cry.

  • Restart the PC in safe mode and tell the user to report if the issue repeats.

  • Check the Event Viewer.

  • Observe the user's actions while using the PC.

All but one of the answers below are true of domain setups. The incorrect answer refers to a workgroup setup. Identify the incorrect answer.

  • A user can use their account credentials on any computer.

  • There can be thousands of computers as members.

  • Security and permissions are managed by an administrator.

  • All computers must be on the same network.

True or false: Laptop batteries can be disposed of along with normal items thrown in the garbage.

  • True

  • False

You receive an email from an outside party stating that clients on your network have been encrypted and the only way to decrypt them is to send Bitcoins to a man named "The Jackal". Your company has fallen victim to a/an:

  • Rootkit attack.

  • Phishing attack.

  • Man-in-the-Middle attack.

  • Ransomware attack.

Local users on a server or desktop computer, in a domain environment, should be:

  • Granted additional rights.

  • Disabled whenever possible.

  • Updated often.

  • Used exclusively.

You have been placed in charge of client patch management for your organization. I am so, so sorry for you. As part of your new responsibility you have been charged with developing a new patching process. Assume that patching has been best effort in the past and that any existing processes will be discarded. Automatic Windows Update patching is enabled in your office. Choose the best first step to developing a patching process:

  • Identify hardware commonalities for all systems.

  • Begin a test round of patching.

  • Disable automatic Windows Update.

  • Select a group of clients that will receive patches before the rest of the organization.

You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?

  • Deleted items still utilizing resources.

  • Folders currently backing up.

  • Cached folders.

  • Hidden Folders.

Utilized in the Windows Command Prompt, the "CD" command executes what process?

  • Changes the domain of the PC.

  • Loads media in the CD drive.

  • Call directory server for group policy updates.

  • Changes the current directory.

In conjunction with a password, all of the below are examples of multifactor authentication except for which?

  • Mobile Phone.

  • Hardware Token.

  • Shared secret.

  • Fingerprint.

A user has contacted you with a computer problem and cannot provide much information on what happened. The user seems like this may be their first time using a computer. Your first action in responding to the issue should be:

  • Observe the user's actions while using the PC.

  • Restart the PC in safe mode and tell the user to report if the issue repeats.

  • Fall apart and cry.

  • Check the Event Viewer.

True or false: Backups and snapshots can be used interchangeably to ensure data redundancy.

  • True

  • False

A user is attempting to access a business resource through Internet Explorer and are unable to load the page correctly. The page is loading oddly with assets in places from previous versions. You have checked with other users of the resource and they are not experiencing an issue. You should:

  • Update the browser.

  • Clear browser cookies.

  • Report it as a bug to the developer.

  • Clear the browser cache.

You are working on a PC that will be deployed in the office. You've forgotten to ground yourself by utilizing an ESD strap, an ESD mat or by touching bare metal on the PC case. While installing a RAM module you feel a static shock and a pop in the case. What is the best course of action to proceed?

  • Replace the motherboard and RAM module before deployment.

  • Utilize a new RAM module.

  • Swap the PC with the one on the new guy's desk.

  • Run a memory testing application to ensure that the module works.

A user is reporting that their phone is not adjusting its screen correctly based on orientation when viewing web pages. What is the most likely cause?

  • Accelerometer failure.

  • Rotation is not supported by web browsers.

  • Complete and total absence of gravity.

  • Screen orientation lock is on.

Your boss has requested that you image a large number of Windows PC's for a new office. The image is standard for all PC's. You know that _________ is the best choice for imaging many clients at once.

  • Floppy Disk

  • PXE

  • DVD

  • USB

True or False: Administrators should have administrative rights granted to their user account.

  • False

  • True

Commonly associated with a domain controller, the following server role allows for you to enter an easily remembered web address, rather than requiring an IP address.

  • DNS

  • Proxy

  • UTM

  • DHCP

True or false: Brownouts are less dangerous to systems and hardware than blackouts.

  • True

  • False



Remaining Time 00:15:00