Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 902 Test 8

The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

You are deploying a web server in a Windows environment and are tasked with ensuring that internal clients can access the resources hosted on the server via an internet browser. Firewall ports have been opened for 80, 443, 20, 21 and 23. Your server is running Windows Server 2012 R2 and it is configured with teamed NICs. Which service is most likely needed on this server?

  • IIS
  • NLB
  • NPS
  • VDI

You have been tasked with determining why a service fails to start in a server test environment. There are numerous services required for the application to function, but a single service is failing to start upon boot. This service also happens to be the last service that is supposed to start. A delayed start is not required, nor is a manual start and the service is enabled. You can manually start the service and it will function normally until the next system reboot. The service is run under "System". Knowing these things you open up the "Services" application and check:

  • Service restart timer
  • Recovery options
  • Dependencies
  • Start parameters

True or false: The best tool for cleaning a dusty desktop PC case is a vacuum.

  • False
  • True

The Linux operating system has many command line base functions. For instance the command "sudo" is utilized to:

  • Select a directory
  • Run a program in the security context of another user
  • Supersede domain requirements
  • Search text via regular expression

True or false: It is best practice to allow system administrators to have administrator privileges associated with their normal user account.

  • False
  • True

Personally Identifiable Information (PII) should be safeguarded from unauthorized access. Which of the following would be considered PII?

  • Favorite color
  • Height
  • Driver's license number
  • Medical diagnosis

A hypervisor is most commonly associated with which of the following technologies?

  • Virtualization
  • Load balancing
  • Routing
  • Hyper-threading

When issues are reported, what is the best method or technology to track them?

  • E-mail
  • Phone calls
  • Ticketing system
  • Post-it notes

You have been tasked with deploying full device encryption on Windows 10 devices in your office. Choose the Microsoft provided utility to achieve this task.

  • Sophos
  • Endpoint Encryption
  • BitLocker
  • CertainSafe

During your daily technical support duties you accidentally view a user's password as they enter it. You inadvertently committed a _______ attack.

  • Tailgating
  • Social engineering
  • Man-in-the-middle
  • Shoulder surfing

A user has described an issue to you that requires your attention. While you think you grasp the concept of what they are asking for, the best course of action would be:

  • Slowly and silently extend your finger to their lips and make quiet shushing sounds. Experiencing computer issues can be frightening and this helps comfort the user.
  • Quickly leave the room and warm up some milk from the fridge. This classic comfort food will remind the user of home, taking their thoughts away from the chilling reality of needing technical support
  • Wrap the user in a heavy blanket. The weight and coverage of a large, warm blanket can help stave off shock.
  • Restate the issue in a manner that will lead to the user clarifying the issue.

Which of the following statements is true regarding the difference between 32-bit and 64-bit version of the Windows OS?

  • 32-bit is the more modern of the two architectures
  • There are no fundamental differences between 32-bit and 64-bit Windows
  • All processors can utilize 32-bit and 64-bit Windows interchangeably
  • 64-bit Windows can utilize more than 4 GB of RAM

You are tasked with creating scripts that will run on a schedule, checking the status of various Windows system resources and services. Your boss has stated that they would prefer you to utilize a scripting language that is best suited for the task at hand and does not require you code basic resource and service-checking functionality for the task. You choose to utilize:

  • Bash
  • C#
  • PowerShell
  • VBScript

There have been reports of a Windows server system running slowly and a member of the application support team has suggested adding more CPU and memory resources to the virtual machine. Before doing this you should check the _________ utility.

  • Performance monitor
  • Device manager
  • Windows memory diagnostics
  • Component services

In terms of IT security, a mantrap is best described by one of the following statements.

  • A mantrap is a floor with a sticky material meant to trap would-be intruders by restricting the ability of movement, allowing for IT security staff to remove intruders at a later time and humanely dispose of or release them into the wild
  • A mantrap is a set of doors separated by a hallway and access control devices that precludes individuals from accessing one door without access control requirements being met
  • A mantrap is a fall-away floor with large, sharpened spikes at the bottom of a pit to prevent unauthorized access to secure rooms by both humans and bears
  • A mantrap is a spring-loaded device that it sometimes baited with fine cheeses or savory snacks, meant to ensnare and sever the spinal cord of hungry Blackhat hackers

The Microsoft utility commonly known as SFC is an abbreviation for the words _____________.

  • System Fault Criteria
  • Suggested File Closure
  • System File Checker
  • Southern Fried Chicken

A kernel panic is an error that can take place in Unix based systems that most closely resembles a similar fatal error in a Windows environment. Select the most similar fatal error.

  • Red Screen of Death
  • Operating System Not Found
  • Getting a piece of a popcorn kernel stuck between your teeth and failing to get it out by picking at your teeth and experiencing the ensuing panic attack
  • Blue Screen of Death

Which of the following best describes a statement that reflects the nature of a virtual machine?

  • Virtual machines can have resources added or removed from them at any time, without requiring a reboot
  • A physical machine can be virtualized, but a virtual machine cannot be converted to physical
  • There is a limit of one virtual machine per host
  • Virtual machines can only be created in Windows environments

A client has received a DLL not found error and has reported the issue to you. The client has also informed you that they have downloaded the the missing DLL file from the internet and believes they have resolved the issue. What is the first action should you take to regarding this situation?

  • Verify that the correct DLL was downloaded
  • Quarantine the computer
  • Re-image the PC to ensure no other DLL files are missing
  • No action needed, the missing DLL has been restored

You are copying several very large files to a remote server that experiences intermittent connectivity issues. Choose the tool that would be best used for this task.

  • Robocopy
  • CD
  • Copy
  • Xcopy