CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA A Plus 220 902 Test 3

Free CompTIA A+ 220-902 practice test, CompTIA A Plus 220 902 Test 3. The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

Which term refers to a logically separate portion of a single physical hard drive?

  • Stateful Drive

  • Virtual Volume

  • Virtual Drive

  • Partition

Which of the following should be regularly performed to prevent data loss in the event of data corruption or drive failure?

  • Factory Reset

  • Memory Diagnostics

  • System Restore

  • Scheduled Backups

Which of the following technologies allows a PC to boot an operating system from a separate network location?

  • POE

  • Serial (Network Cable)

  • PXE

  • SATA

You are having trouble with several drivers on your system and want to uninstall them, but can't do it while Windows 8 is running normally. What tool will allow you to boot into Safe Mode?

  • REGEDIT

  • GRUB

  • MSCONFIG

  • BIOS/UEFI

A user calls you and asks to reset his password, you confirm that it is actually the user on the phone, and he says his username is bobsmith, you are in a Linux environment. What is the appropriate command for resetting his password?

  • sudo pwd bobsmith [password]

  • sudo passwd bobsmith

  • chown bobsmith

  • su bobsmith

Your employer is concerned about zero-day attacks to obtain their intellectual property, what security feature helps mitigate such an attack.

  • Firewalls

  • Windows Update

  • Strong BIOS/UEFI Passwords

  • Anti-virus

Your employer wants you to recommend a cloud service that will allow the IT department to deploy web applications without having to configure physical equipment or operating systems. What type of service is he talking about?

  • Infrastructure as a Service (IaaS)

  • Software as a Service (SaaS)

  • Platform as a Service (PaaS)

  • iCloud

You show up to work and there is a powered-on laptop on your desk, you co-worker instructs you to make a backup of the user files on the system since the system has been having problems booting. During the process you discover child pornography on the machine, what do you immediately do?

  • Notify law enforcement

  • Power down the machine by removing the battery/power source

  • Make a copy of the entire drive for Law Enforcement

  • Alert your manager

What type of policy would allow Stacy to use her iPad during meetings for email, taking notes, and accessing the company's intranet?

  • BYOD

  • iCloud

  • Man-in-the-middle (MITM)

  • Embedded system

You are passed a trouble ticket about an issue involving a Windows 7 system that should allow remote connections. The previous tech said the RDP service is not set to start automatically. How do you fix this?

  • Run "DXDIAG" to enable remote connections through Direct Connect

  • Add the RDP gateway to the proper adapter under Network Connections in the Control Panel

  • Open port 3389 in Windows Firewall

  • Run "SERVICES.MSC" and change the Startup Type for each Remote Desktop service to "Auto"

Your surpervisor asks you to come up with ideas for increasing the physical security in a computer lab used for sensitive projects, which of the following would NOT be an acceptable suggestion?

  • Using data encryption software such as BitLocker

  • Requiring a smart card to access the systems

  • Setting up a video camera to monitor the entrance/exit to the lab

  • Installing a cypher lock on the door

An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?

  • Disable SSID broadcast

  • Disable DHCP

  • Enable MAC filtering

  • Change the channel

You recently connected a new Windows 8 machine to your company's network with Active Directory, but it is not displaying the proper company logon screen, legal banner, or wall paper. What tool is best suited for correcting this problem.

  • regedit

  • gpupdate

  • chkdsk

  • msconfig

You are formatting a new USB drive to be used between several systems running different operating systems (Windows, OSX, Linux). What is the best format to use for the USB drive?

  • HFS+

  • NTFS

  • FAT32

  • AES-128

Determine which of these options is a technology used by CPU's to segregate blocks of memory for exclusive use by an application:

  • Harvard Architecture

  • NXBit

  • PXE

  • Ivy Bridge

In a (Windows) command prompt you type "cd C:\Users\msmith", the output is "Access is denied." How can you overcome this issue.

  • Use the "dir" command instead of cd to force access to the directory

  • Use "chmod a+r C:\Users\msmith" to give all users read rights to the folder

  • Run cmd.exe as an Administrator

  • Run "chkdsk" to see if there are issues with the file system

Mike has brought his personal laptop running Windows 7 from home for use on the office network, which utilizes Active Directory. He is unable to access company resources, to include the sharedrive, intranet (SharePoint), and printer. He states "these are automatic for my work machine and Sarah's personal laptop." What is something you can do that would get Mike access to these resources?

  • Ensure that Mike's computer is in the company Workgroup

  • This is against the company's BYOD policy, notify Mike's manager

  • Run Windows Update on Mike's computer

  • Join Mike's computer to the domain

An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?

  • Ad-hoc

  • Domain

  • Token ring

  • Workgroup

You have just installed several updates for a Windows 7 system, prior to reaching the login screen the system immediately reboots. How would you try to access the system via its installed OS?

  • Check to ensure that the boot priorities are set in the BIOS.

  • Utilize a live-boot CD/USB

  • Press F8 at startup and try booting into Safe Mode

  • Boot into DEFRAG mode to clean up fragments of the outdated OS

Stan, the new HR manager, wants everyone in his department to have access to create and delete accounts to streamline the process for getting new hires setup in the system. Why is this not a good idea?

  • This could enable tailgating

  • HR employees are not usually on the Access Control List (ACL)

  • This does not keep with the principle of least privilege

  • This could allow HR employees to by-pass privacy filters, though it isn't that big of a threat since they are HR



Remaining Time 00:15:00