220-902 Premium Bundle

220-902 Premium Bundle

CompTIA A+ Certification Exam (902) Certification Exam

4.5 
(30795 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA 220-902 Free Practice Questions

Q1. A technician gets a call from a customer stating that their computer will not boot. They are getting the following error “invalid system disk”. Which of the following should the technician check FIRST? 

A. Verify the operating system is installed correctly. 

B. Verify that all removable drives are empty. 

C. Verify Boot.ini is on the hard drive. 

D. Verify the computer will boot into safe mode. 

Answer:

Q2. An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue? 

A. Antivirus software 

B. Internet connectivity issues 

C. Ransomware infection 

D. Content-filtering 

Answer:

Q3. When moving files from a Microsoft gaming console, which of the following command line utilities is recommended to transfer files? 

A. IMAP 

B. XCOPY 

C. DISKPART 

D. FDISK 

Answer:

Q4. Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively? 

A. Microsoft Virtual PC 

B. Compatibility mode 

C. Hyper-V 

D. Virtual XP mode 

Answer:

Q5. Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe? 

A. Social engineering 

B. Spoofing 

C. Zero-day 

D. Man-in-the-middle 

Answer:

Q6. An unauthorized user observing system security procedures is known as: 

A. a worm. 

B. shoulder surfing. 

C. phishing. 

D. spyware. 

Answer:

Q7. CORRECT TEXT 

The network administrator has changed the IP address of ComputerA from 192.168.1.20 to 

10.10.10.20 and now Jane, a user, is unable to connect to file shares on ComputerA from ComputerB using the computer name. 

Instructions: 

Using the available tools, resolve the connectivity issues. When you have completed the simulation, please select the done button to submit your answer. 

Answer: Review the explanation for all details: 

Q8. After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem? 

A. Replace the RAID controller and boot. 

B. Reinsert the drive and boot. 

C. Plug the drive back in, the system will resume automatically. 

D. Remove all drives and rebuild the array. 

Answer:

Q9. A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST? 

A. Verify data connectivity 

B. Reformat the MicroSD card 

C. Replace the SIM card 

D. Perform a soft restore 

Answer:

Q10. Which of the following tools is used to type or paste recovery commands directly into a Linux box? 

A. Shell/terminal 

B. Backup/time machine 

C. Command/cmd 

D. Restore/snapshot 

Answer:

Q11. Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up? 

A. defrag 

B. chkdsk 

C. cleanmgr 

D. diskpart 

Answer:

Q12. Which of the following would a technician use to search for a specific string within a file name? 

A. grep 

B. chmod 

C. wget 

D. sudo 

Answer:

Q13. A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform? 

A. Secure the workstation in a limited access facility. 

B. Document the incident, purge all policy violating materials. 

C. Immediately delete all unauthorized materials. 

D. Reprimand the user and apply a content filter to their profile. 

Answer:

Q14. Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies? 

A. USB authentication token 

B. Filesystem access controls 

C. Trusted platform module 

D. Fingerprint reader 

Answer:

Q15. A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur? 

A. Dead pixels 

B. Flickering image 

C. No image on screen 

D. Distorted image 

Answer:

START 220-902 EXAM