220-902 Premium Bundle

220-902 Premium Bundle

CompTIA A+ Certification Exam (902) Certification Exam

4.5 
(30030 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA 220-902 Free Practice Questions

Q1. A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO). 

A. Install more physical memory. 

B. Increase the size of the virtual hard drive. 

C. Install a different hypervisor. 

D. Reduce physical memory allocated to the VM. 

E. Clear temporary files in the VM. 

F. Install additional physical hard drives. 

Answer: A,D 

Q2. A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings? 

A. Advanced 

B. Security 

C. Privacy 

D. Connections 

Answer:

Q3. An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem? 

A. The cable connected to the network 

B. Virtual host network adapter 

C. USB host adapter 

D. The domain of the virtual machine 

Answer:

Q4. A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO). 

A. Mask 

B. ESD mat 

C. ESD strap 

D. Antistatic bag 

E. Safety goggles 

F. Rubber gloves 

Answer: A,E 

Q5. A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands? 

A. extract 

B. diskpart 

C. bootrec 

D. chkdsk 

Answer:

Q6. A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, “The file is in use by another program.” Which of the following tools would be the BEST to use to correct the issue? 

A. Terminal 

B. SFC 

C. Event Viewer 

D. Services Console 

E. Recovery Console 

Answer:

Q7. Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue? 

A. Time of day restrictions are enabled on the machine 

B. Scheduled antivirus scans and updates are enabled on the machine 

C. Remote desktop is enabled and an administrator has logged into the machine 

D. Automatic Windows Update is enabled on the machine 

Answer:

Q8. Which of the following is a risk of implementing a BYOD policy? 

A. Introducing malware onto the network 

B. DHCP may fail due to incompatibility 

C. Different encryption technology 

D. Higher risk of phishing attacks 

Answer:

Q9. Which of the following security threats happens when another person enters a secured area with an authorized person? 

A. Tailgating 

B. Shoulder surfing 

C. Spoofing 

D. Phishing 

Answer:

Q10. After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware? 

A. Run the malware removal program while disconnected from the Internet 

B. Run the malware removal program in Windows Safe Mode 

C. Reinstall the malware removal program from a trusted source 

D. Set the malware removal program to run each time the computer is rebooted 

Answer:

Q11. A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access? 

A. Turning down the radio power level 

B. Enabling MAC filtering 

C. Setting a high encryption level 

D. Disabling the SSID broadcast 

Answer:

Q12. On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring? 

A. Content Advisor 

B. Proxy Settings 

C. Network Drive Mapping 

D. Local Security Policy 

Answer:

Q13. DRAG DROP 

Drag and drop the following Windows Versions to the correct feature on which they are found. Windows Versions may be used more than once. 

Answer:  

Q14. A small office experiences frequent power outages. Upon rebooting the Windows workstations after each power outage, users report the inability to open shared files. Which of the following MUST a technician configure to resolve this issue in the future? 

A. Check the “Reconnect at logon” checkbox for the mapped network drive 

B. Connect all computers in the office to UPS devices 

C. Re-map the mapped network drive with the domain administrator account 

D. Replace the hard drives on the file server hosting the shared files 

Answer:

Q15. A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT? 

A. Reload the OS using FAT32 instead of NTFS. 

B. Change the disk from basic to dynamic. 

C. Run chkdsk with the /r switch and reboot the PC. 

D. Open the defrag utility and run a drive analysis. 

Answer:

START 220-902 EXAM