220-902 Premium Bundle

220-902 Premium Bundle

CompTIA A+ Certification Exam (902) Certification Exam

4.5 
(27105 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA 220-902 Free Practice Questions

Q1. When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad: 

A. CMOS battery. 

B. video card. 

C. IDE cable. 

D. floppy cable. 

Answer:

Q2. CORRECT TEXT 

The network administrator has changed the IP address of Computer A from 192. 168. 120 to 10. 10. 1020 and now Jane a user, is unable to connect to file shares on Computer A from Computers using the computer name. 

Instructions: 

Using the available tools, resolve the connectivity issues. When you have completed the simulation, please select the done button to submit your answer. 

Answer: Please review explanation for detailed answer. 

Q3. An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies? 

A. DRM 

B. EULA 

C. IRP 

D. PII 

Answer:

Q4. Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. 

Which of the following should a technician recommend? (Select TWO). 

A. Increase the amount of RAM to improve disk checks 

B. Backup all data on the drive 

C. Upgrade to a home server 

D. Purchase a new hard drive 

E. Change the drive configuration to RAID 0 

F. Upgrade to Windows 7 Professional 

Answer: B,D 

Q5. Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO). 

A. Change the SSID to a different broadcast name 

B. Add the intruding device to a blocked access list 

C. Access the intruder’s device and shut it down 

D. Shut down the device until the intruder is no longer in the area 

E. Set up a WiFi analyzer to identify the intruding device 

Answer: A,B 

Q6. A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client’s machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory? 

A. Identify the problem 

B. Establish a plan of action to resolve the problem 

C. Test the theory to determine cause 

D. Document findings, actions, and outcomes 

Answer:

Q7. A small office experiences frequent power outages. Upon rebooting the Windows workstations after each power outage, users report the inability to open shared files. Which of the following MUST a technician configure to resolve this issue in the future? 

A. Check the “Reconnect at logon” checkbox for the mapped network drive 

B. Connect all computers in the office to UPS devices 

C. Re-map the mapped network drive with the domain administrator account 

D. Replace the hard drives on the file server hosting the shared files 

Answer:

Q8. An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem? 

A. Run defrag on the hard drive 

B. Restore the CAD files from backup 

C. Replace the hard drive 

D. Remove and reinstall the CAD software 

Answer:

Q9. A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO). 

A. Mask 

B. ESD mat 

C. ESD strap 

D. Antistatic bag 

E. Safety goggles 

F. Rubber gloves 

Answer: A,E 

Q10. A user has plugged in a mobile phone to a PC and received a message that the driver was not successfully installed. Which of the following system tools should be used to troubleshoot this error? 

A. Device Manager 

B. Component Services 

C. Windows Memory Diagnostics 

D. Data Sources 

Answer:

Q11. Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayeD. “Access Denied. Please Enter Encryption Password.” Which of the following is the reason that this error is displayed? 

A. The hard drive is experiencing S.M.A.R.T. failure errors 

B. The TPM security chip inside the bench system is not enabled 

C. The BIOS of the bench system is out of date 

D. BitLocker is being used 

Answer:

Q12. A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next? 

A. Hosts files 

B. IPv6 settings 

C. Proxy settings 

D. Lmhosts files 

Answer:

Q13. A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop? 

A. Re-join the computer to the domain 

B. Reboot the PC as the domain will automatically rebuild the relationship 

C. Update the BIOS using the latest version 

D. Run CHKDSK 

Answer:

Q14. A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition? 

A. Credential Manager 

B. Computer Management 

C. Device Manager 

D. TPM Manager 

Answer:

Q15. A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use? 

A. NLX 

B. IDS 

C. UTM 

D. ATX 

Answer:

START 220-902 EXAM