220-902 CompTIA A+ Certification Practice Exam Set 2

A user wants to be able to access email from all devices. Which of the following formats should be
used to allow this synchronization?


Options are :

  • iCal
  • POP3
  • IMAP (Correct)
  • SMTP

Answer : IMAP

A computer was recently infected by malware after a flash drive was plugged in. The user, Ann,
indicates she never opened any files or folders from the flash drive. A technician needs to prevent
this from occurring in the future. Which of the following would accomplish this?


Options are :

  • Set strong passwords
  • Disable usermin
  • Disable AutoRun (Correct)
  • BitLocker To Go

Answer : Disable AutoRun

A technician has been given a PC that is not powering up. After brief troubleshooting, the
technician comes to the conclusion the power supply needs to be replaced. Which of the following
is the NEXT step in the process of performing the repair?


Options are :

  • The technician should replace the power supply
  • The technician should check the environment
  • The technician should remove jewelry (Correct)
  • The technician should review disposal regulations

Answer : The technician should remove jewelry

A technician has decided to upgrade all users’ iPhones to the latest model. Which of the following
is the FIRST thing the technician should advise the users to do with the old phones before turning
them in?


Options are :

  • Enable remote wipe to clear all personal and corporate data.
  • Factory reset the old phones to ensure the data is no longer on the device.
  • Go into the device settings to remove personal customizations.
  • Back up the mobile data with a cloud backup service. (Correct)

Answer : Back up the mobile data with a cloud backup service.

A technician is called into the office during a thunderstorm. Users are reporting that machines are
intermittently powering off. Which of the following will BEST prevent user data loss?


Options are :

  • An ESD mat
  • A UPS (Correct)
  • A surge protector
  • Auto save

Answer : A UPS

Which of the following Windows utilities would MOST likely be used to identify system errors?


Options are :

  • Event Viewer (Correct)
  • System Restore
  • Security Center
  • Windows Defender

Answer : Event Viewer

A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the
following is the BEST option to modify the size of the partition?


Options are :

  • Computer Management (Correct)
  • TPM Manager
  • Credential Manager
  • Device Manager

Answer : Computer Management

A PC technician has been asked to verify certain Group Policies applied on a workstation. Which
of the following commands should be run on the workstation?


Options are :

  • extract
  • gpupdate
  • tasklist
  • gpresult (Correct)

Answer : gpresult

A network administrator notices a new WiFi connection has appeared as a wireless network
choice and is always at the top of the list. As a result, users are constantly trying to connect to the
wrong network. Which of the following should the administrator do to correct this issue?


Options are :

  • Adjust the wireless router antennas to 90 degrees clockwise from the current position.
  • Ask the new wireless network owner to adjust the radio power level so it is listed below the company’s network.
  • Change the company’s channel to a lower number than the new network’s channel.
  • Set all of the WiFi users’ wireless profiles to automatically connect to the company network. (Correct)

Answer : Set all of the WiFi users’ wireless profiles to automatically connect to the company network.

A user reports the Internet connection is not working on the corporate network. After running
through the troubleshooting steps, the administrator finds the computer has a valid IP address,
can connect to network shares, and can view local intranet pages in the web browser. The
administrator tries navigating to a public Internet page and it times out. Which of the following
should the technician configure next?


Options are :

  • IPv6 settings
  • Proxy settings (Correct)
  • Lmhosts files
  • Hosts files

Answer : Proxy settings

A technician is installing a wireless network and wants to limit the signal available outside the
building. Which of the following would help accomplish this?


Options are :

  • Use omni-directional antennas
  • Place directional antennas (Correct)
  • Enable MAC filtering
  • Disable SSID broadcast

Answer : Place directional antennas

An administrator wants to give a user limited access rights in Windows Vista so that the user can
install printers and create local user accounts. Which of the following accounts should the
administrator create for the user?


Options are :

  • Administrator
  • Power user (Correct)
  • Standard
  • Guest

Answer : Power user

A technician has purchased a new surge protector to protect equipment in the production
environment. The surge protector’s features safeguard the connected equipment by directing
surges to the:


Options are :

  • path of least resistance. (Correct)
  • path of shortest conductance.
  • None of the above
  • path of highest voltage.
  • path of lowest inductance.

Answer : path of least resistance.

A user notices the social media apps are constantly updated with the user’s precise location. The
user is worried about privacy and would like to keep this information from being broadcast online.
Which of the following features should the user adjust in order to accomplish this?


Options are :

  • WiFi
  • Filtering
  • Geotracking (Correct)
  • Tethering

Answer : Geotracking

A user’s personal laptop was hacked. A technician troubleshooting the issue discovers the user
used the numbers 123456789 as their account password. The user has not changed the password
in two years. Which of the following best practices should the technician recommend the user
implement to prevent future hacking? (Select TWO).
A.
Configure screen saver
B.
Set a strong password
C.
Set login time restrictions
D.
Use a more secure browser
E.
Change the password frequently


Options are :

  • B,D
  • A,D
  • B,E (Correct)
  • A,C

Answer : B,E

Which of the following is a risk of implementing a BYOD policy?


Options are :

  • Higher risk of phishing attacks
  • Introducing malware onto the network (Correct)
  • DHCP may fail due to incompatibility
  • Different encryption technology

Answer : Introducing malware onto the network

A user calls the help desk because a folder containing critical business files is missing from the
local drive. The user is adamant that the folder was there the previous day, and cannot understand
why it is gone. The technician views the properties of the parent folder and sees a back up listed
on the “Prior Versions” tab. According to the theory of troubleshooting, which of the following is the
technician’s NEXT step?


Options are :

  • Document findings, actions and outcomes
  • Verify full system functionality and implement preventive measures
  • Establish a plan of action and implement the solution
  • Establish a theory of probable cause (Correct)

Answer : Establish a theory of probable cause

A company has subscribed to a cloud service, paying monthly for a block of services and being
billed incrementally when they exceed the monthly fee. Which of the following cloud concepts
does this represent?


Options are :

  • On-demand
  • Rapid elasticity
  • Resource pooling
  • Measured service (Correct)

Answer : Measured service

Which of the following is the BEST option to prevent data breaches on lost mobile devices?


Options are :

  • Configure the device to remote wipe as soon as it is reported lost. (Correct)
  • Install a locator application on the mobile device so that it can be traced.
  • Utilize the fingerprint scanner and passcode for multifactor authentication.
  • Apply a restriction to lock the device after a certain number of failed login attempts.

Answer : Configure the device to remote wipe as soon as it is reported lost.

A newly deployed Windows PC cannot connect to the antivirus server on the local network for
updates, but it can connect to other file servers and printers without issue. Which of the following
is the MOST likely cause of this issue?


Options are :

  • The PC has an incorrect IP address configured
  • The PC is on the wrong wireless network
  • The PC’s Windows firewall is misconfigured (Correct)
  • The PC does not have remote assistance turned on

Answer : The PC’s Windows firewall is misconfigured

A user reports that any URL entered redirects to the same web page. A technician concludes that
the user’s computer has been compromised. Which of the following tools would the technician use
to resolve the issue?



Options are :

  • Anti-malware (Correct)
  • System restore
  • Rogue antivirus
  • Last known good configuration

Answer : Anti-malware

A technician receives a helpdesk ticket about an employee having a problem sending text
messages with a company Android smartphone. It has been determined that it is not a carrier
issue. Which of the following should the technician perform FIRST?


Options are :

  • Reformat the MicroSD card
  • Replace the SIM card
  • Perform a soft restore
  • Verify data connectivity (Correct)

Answer : Verify data connectivity

A technician has been notified that recent vulnerabilities have been discovered related to a type of
SOHO router. The technician has verified that all connections and settings are appropriate. Which
of the following actions should the technician take NEXT?


Options are :

  • Reconfigure the QoS settings
  • Change router user-names and passwords
  • Change the router firewall settings
  • Check for and apply a firmware update (Correct)

Answer : Check for and apply a firmware update

Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a
message that updates are being installed. Which of the following is the MOST likely cause of this
issue?



Options are :

  • Time of day restrictions are enabled on the machine
  • Scheduled antivirus scans and updates are enabled on the machine
  • Remote desktop is enabled and an administrator has logged into the machine
  • Automatic Windows Update is enabled on the machine (Correct)

Answer : Automatic Windows Update is enabled on the machine

Which of the following explains why it is important to secure Personally Identifiable Information
(PII)?


Options are :

  • So phishing attacks are not launched against employees of the organization.
  • So sensitive information, such as corporate passwords, is not stolen.
  • So sensitive information, such as social security numbers, is not stolen. (Correct)
  • So man-in-the-middle attacks are not launched against the organization.

Answer : So sensitive information, such as social security numbers, is not stolen.

A Windows workstation is suspected of having malicious software that created an infected start-up
item or service. Which of the following tools would a technician use to test this theory?


Options are :

  • chkdsk
  • dxdiag
  • ipconfig
  • msconfig (Correct)

Answer : msconfig

A user’s email inbox is suddenly receiving dozens of rejection messages from various mail
servers. Which of the following would the technician perform to BEST solve the issue?



Options are :

  • Change the email account from POP to IMAP.
  • Enable spam filtering on the email account.
  • Change the user’s email password. (Correct)
  • Disable the user’s email account.

Answer : Change the user’s email password.

Ann, an executive, reports that she received a call from someone asking for information about her
email account. Which of the following type of potential security threats does this scenario
describe?


Options are :

  • Zero-day
  • Man-in-the-middle
  • Social engineering (Correct)
  • Spoofing

Answer : Social engineering

A user is having issues with a Windows computer. Upon loading the operating system, several
messages appear referring to a DLL file that cannot be found. Which of the following would be the
BEST course of action for the technician to perform NEXT?


Options are :

  • Run the defrag utility to correct any fragmentation that may have damaged the file
  • Copy the DLL file from a working PC and use the regsvr32 command to load the file
  • Run the Windows Update utility to manually reinstall the DLL file
  • Research the DLL file to identify the application it corresponds to before continuing (Correct)

Answer : Research the DLL file to identify the application it corresponds to before continuing

A user reports browsing the Internet is slow and an icon with a picture of a person with a headset
keeps asking them to “click here for help.” The user has clicked on the icon to try to resolve the
slowness but all that happens is the computer redirects them to a website to purchase software.
Which of the following should be performed FIRST to resolve the issue?



Options are :

  • Train the user of malicious software
  • Create a restore point
  • Run O/S updates
  • Identify the type of malware (Correct)

Answer : Identify the type of malware

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions