The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.
When data is deleted or a disk is formatted the location of the data is tagged as empty and available for use but is not actually physically removed from the disk. This means after deleting it is still possible to read the data. Overwriting is a method that deletes the data and overwrites the physical location with random information to ensure it can never be recovered.
This question is filed under objective 3, Security
The System Monitor in Ubuntu Linux is similar to Task Manager in Windows operating systems. System Monitor will show allocated resources and running applications.
This question is filed under objective 4, Software Troubleshooting
Cloud synchronization is the correct answer, it allows a user to share information (contacts, calendars, photos, etc.) between devices with an internet connection. POP3 is a protocol for email, tethering is for sharing an internet connection from your mobile device to another device and VPN is for a way to remotely connect to a network.
This question is filed under objective 2, Other Operating Systems & Technologies
Remember the question says LEAST LIKELY. The questions states that internal web servers work but external ones do not. If wireless were the issue nothing would work at all. The issue is more likely to be related to external DNS, a firewall or an issue with the proxy used to connect outside the local network.
This question is filed under objective 4, Software Troubleshooting
The user is complaining that their screen resolution is too low. To increase this you should select Display Settings then resolution.
This question is filed under objective 1, Windows Operating Systems
Only full disk encryption will ensure the data is not readable by malicious users. The file system will not matter as their security features can be easily bypassed by using an operating system that ignores them. For example Linux operating systems can be configured to ignore NTFS permissions which would allow access to any data on the disk.
This question is filed under objective 3, Security
Vi is the only option available that is a Linux text editor. Other common Linux text editors are Vim and Nano. Cat will display the contents of the file but not allow you to edit it, ifconfig will show you the interface (e.g., wireless lan, ethernet) settings or allow you to temporarily change the settings (but not permanently), and notepad is a Windows-based text editor.
This question is filed under objective 2, Other Operating Systems & Technologies
Finder is the GUI based file and folder manager in Mac OSX. Nautilus is a file and folder management application in Linux. Explorer is for Windows.
This question is filed under objective 2, Other Operating Systems & Technologies
A Material Safety Data Sheet (MSDS) contains health & hazard information.
This question is filed under objective 5, Operational Procedures
IDE hard drives are internal components and are not hot swap-able (removable when powered on). You should power off the workstation before making any changes.
This question is filed under objective 5, Operational Procedures
User Account Control (UAC) is a feature in Windows 7, 8 and 10 that prompts users to confirm changes initiated by software. Until the changes are confirmed by UAC the change will not be made. This helps users understand when they are making system level changes like installing a new application. Sudo is a similar feature in Linux operating systems. NTFS is a file system and Windows Defender is an anti-malware application.
This question is filed under objective 3, Security
The Users tab in Task Manager will show you the logged in users. The "who" command is for Linux, not Windows. MSINFO32 provides system information, Local Users and Groups shows user accounts on the system - not ones in use.
This question is filed under objective 1, Windows Operating Systems
Unattended install is the correct option, you can minimize user interaction with an install by pre-selecting configuration options in a script. Clean install overwrites other content on the disk, MSCONFIG Startup is for configuring applications that launch at startup, and General Folder options is for changing folder viewing options (double click to open, open folders in new window, etc.).
This question is filed under objective 1, Windows Operating Systems
Setting up a BIOS/UEFI password is the only option that would mitigate the threat from a user booting from another device (though it can often be reset by removing the CMOS battery). Data encryption, disabling admin accounts and only allowing trusted sources are all operating system level configurations and would not apply prior to booting to an OS.
This question is filed under objective 3, Security
Cron is a time-based scheduling service on Linux operating systems. The Windows equivalent is task scheduler. A service and a daemon could also achieve this but will require an entire application to be developed, compiled and installed onto the host OS.
This question is filed under objective 1, Windows Operating Systems
REGEDIT is a Windows tool that allows administrators to change in-depth configuration options found in the Windows Registry. REGSRV32 is used for registering DLLs and ActiveX controls. REGEX is short for regular expressions and MSCONFIG is for configuring startup options in Windows.
This question is filed under objective 4, Software Troubleshooting
Toner cartridges are especially important to recycle as they can be reused with almost no effort and are generally consumed in very large numbers.
This question is filed under objective 5, Operational Procedures
No level of security can protect against an inexperienced user. The best option is to provide relevant user training to ensure they are not being socially engineered into providing their network credentials.
This question is filed under objective 3, Security
Closing the browser and running your own anti-malware scan is likely the best option. This is a social engineering trick and the web page is attempting to trick the user into downloading malicious software.
This question is filed under objective 4, Software Troubleshooting
The Sleep power management option saves the computer state in RAM and powering off uneeded components until the computer awakes. Hibernate is similar but saves system state to the hard disk, which saves more power but is slower to resume when waking.
This question is filed under objective 1, Windows Operating Systems
You can go back and review your answers or grade your test.