Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 902 Test 8

The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

True or false: It is best practice to allow system administrators to have administrator privileges associated with their normal user account.

  • False
  • True

During your daily technical support duties you accidentally view a user's password as they enter it. You inadvertently committed a _______ attack.

  • Man-in-the-middle
  • Social engineering
  • Tailgating
  • Shoulder surfing

A kernel panic is an error that can take place in Unix based systems that most closely resembles a similar fatal error in a Windows environment. Select the most similar fatal error.

  • Getting a piece of a popcorn kernel stuck between your teeth and failing to get it out by picking at your teeth and experiencing the ensuing panic attack
  • Operating System Not Found
  • Red Screen of Death
  • Blue Screen of Death

You are copying several very large files to a remote server that experiences intermittent connectivity issues. Choose the tool that would be best used for this task.

  • Copy
  • Xcopy
  • CD
  • Robocopy

You have been tasked with deploying full device encryption on Windows 10 devices in your office. Choose the Microsoft provided utility to achieve this task.

  • BitLocker
  • Endpoint Encryption
  • Sophos
  • CertainSafe

The Microsoft utility commonly known as SFC is an abbreviation for the words _____________.

  • System Fault Criteria
  • Southern Fried Chicken
  • System File Checker
  • Suggested File Closure

Which of the following best describes a statement that reflects the nature of a virtual machine?

  • Virtual machines can only be created in Windows environments
  • Virtual machines can have resources added or removed from them at any time, without requiring a reboot
  • A physical machine can be virtualized, but a virtual machine cannot be converted to physical
  • There is a limit of one virtual machine per host

There have been reports of a Windows server system running slowly and a member of the application support team has suggested adding more CPU and memory resources to the virtual machine. Before doing this you should check the _________ utility.

  • Device manager
  • Performance monitor
  • Windows memory diagnostics
  • Component services

In terms of IT security, a mantrap is best described by one of the following statements.

  • A mantrap is a floor with a sticky material meant to trap would-be intruders by restricting the ability of movement, allowing for IT security staff to remove intruders at a later time and humanely dispose of or release them into the wild
  • A mantrap is a set of doors separated by a hallway and access control devices that precludes individuals from accessing one door without access control requirements being met
  • A mantrap is a spring-loaded device that it sometimes baited with fine cheeses or savory snacks, meant to ensnare and sever the spinal cord of hungry Blackhat hackers
  • A mantrap is a fall-away floor with large, sharpened spikes at the bottom of a pit to prevent unauthorized access to secure rooms by both humans and bears

When issues are reported, what is the best method or technology to track them?

  • Post-it notes
  • Phone calls
  • E-mail
  • Ticketing system

The Linux operating system has many command line base functions. For instance the command "sudo" is utilized to:

  • Supersede domain requirements
  • Run a program in the security context of another user
  • Search text via regular expression
  • Select a directory

A client has received a DLL not found error and has reported the issue to you. The client has also informed you that they have downloaded the the missing DLL file from the internet and believes they have resolved the issue. What is the first action should you take to regarding this situation?

  • Verify that the correct DLL was downloaded
  • Re-image the PC to ensure no other DLL files are missing
  • Quarantine the computer
  • No action needed, the missing DLL has been restored

A hypervisor is most commonly associated with which of the following technologies?

  • Routing
  • Virtualization
  • Hyper-threading
  • Load balancing

Which of the following statements is true regarding the difference between 32-bit and 64-bit version of the Windows OS?

  • There are no fundamental differences between 32-bit and 64-bit Windows
  • 32-bit is the more modern of the two architectures
  • All processors can utilize 32-bit and 64-bit Windows interchangeably
  • 64-bit Windows can utilize more than 4 GB of RAM

Personally Identifiable Information (PII) should be safeguarded from unauthorized access. Which of the following would be considered PII?

  • Favorite color
  • Height
  • Medical diagnosis
  • Driver's license number

You have been tasked with determining why a service fails to start in a server test environment. There are numerous services required for the application to function, but a single service is failing to start upon boot. This service also happens to be the last service that is supposed to start. A delayed start is not required, nor is a manual start and the service is enabled. You can manually start the service and it will function normally until the next system reboot. The service is run under "System". Knowing these things you open up the "Services" application and check:

  • Service restart timer
  • Dependencies
  • Recovery options
  • Start parameters

True or false: The best tool for cleaning a dusty desktop PC case is a vacuum.

  • False
  • True

You are tasked with creating scripts that will run on a schedule, checking the status of various Windows system resources and services. Your boss has stated that they would prefer you to utilize a scripting language that is best suited for the task at hand and does not require you code basic resource and service-checking functionality for the task. You choose to utilize:

  • PowerShell
  • C#
  • Bash
  • VBScript

You are deploying a web server in a Windows environment and are tasked with ensuring that internal clients can access the resources hosted on the server via an internet browser. Firewall ports have been opened for 80, 443, 20, 21 and 23. Your server is running Windows Server 2012 R2 and it is configured with teamed NICs. Which service is most likely needed on this server?

  • NLB
  • VDI
  • NPS
  • IIS

A user has described an issue to you that requires your attention. While you think you grasp the concept of what they are asking for, the best course of action would be:

  • Quickly leave the room and warm up some milk from the fridge. This classic comfort food will remind the user of home, taking their thoughts away from the chilling reality of needing technical support
  • Restate the issue in a manner that will lead to the user clarifying the issue.
  • Wrap the user in a heavy blanket. The weight and coverage of a large, warm blanket can help stave off shock.
  • Slowly and silently extend your finger to their lips and make quiet shushing sounds. Experiencing computer issues can be frightening and this helps comfort the user.