CompTIA A+ Exam 220-902 Post-Assessment

Your page rank:

Total word count: 3410
Pages: 12

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

System Restore is useful for most repairs but NOT for _______________.
A. improperly installed applications
B. drivers
C. corrupted system files
D. memory errors

D. memory errors

In which Control Panel applet would you validate your Windows activation?
A. System
B. System protection
C. Device Manager
D. Administrative tools

A. System

How do you navigate the Windows file structure in Windows 8?
A. Disk Management
B. File Manager
C. Windows Explorer
D. File Explorer

D. File Explorer

Which of the choices given best describes a group of networked computers that share a centralized directory database of user account information and security?
A. Workgroup
B. Subnet
C. Cell
D. Domain

D. Domain

Which email protocol uses port 143 for unsecured communication?
A. POP3
B. SMTP
C. IMAP
D. S/MIME

C. IMAP

You have a user who is having problems saving their work. What must you be careful NOT to overlook?
A. User issues
B. Computer issues
C. Application issues
D. Network issues

A. User issues

Which boot file applies Group Policy settings?
A. Iass.exe
B. Ntoskernel.exe
C. Smss.exe
D. Userinit.exe

D. Userinit.exe

This hypervisor is available as a free download from Microsoft for PCs running Windows 7 or 8.
A. VMWare Workstation
B. VirtualBox
C. Hyper-V
D. Virtual PC

D. Virtual PC

Beginning with iOS 7 iPhones and iPads, these devices can transfer files between devices belonging to you or someone else. Bluetooth and W-Fi are both used to support this activity. What is the name of the program?
A. Handoff
B. AirShare
C. AirDrop
D. iShare

C. AirDrop

Sometimes the solution to a problem is either outside your scope of authority, or just plain over your head. In such a case you need help. Doing this is best described by which term shown?
A. Mediate
B. None of these choices apply
C. Mitigate
D. Divert

B. None of these choices apply

Which of the following keys is the most important one and contains hardware, software, and security data? The data in this key is taken from four hives: the SAM hive, the Security hive, the Software hive, and the System hive. In addition, the HARDWARE subkey of HKLM is built when the registry is first loaded, based on data collected about the current hardware configuration.
A. HKEY_CURRENT_USER
B. HKEY_CLASSES_ROOT
C. HKEY_USERS
D. HKEY_CURRENT_CONFIG
E. HKEY_LOCAL_MACHINE

E. HKEY_LOCAL_MACHINE

When adding an email account to a Windows Phone which choices are available?
A. Microsoft Account
B. All of these will work.
C. Google
D. Yahoo! Mail
E. Exchange
F. iCloud

B. All of these will work.

Disk optimization can be scheduled to take place on a regular schedule. How often should an SSD be defragmented?
A. Monthly
B. Weekly
C. Relative to usage
D. Never

D. Never

Microsoft recommends four deployment strategies for installations on large numbers of computers. Which of the strategies would you use to deploy Windows to 175 computers?
A. High-touch with retail media
B. Lite-touch, high volume deployment
C. Zero-touch, high volume deployment
D. High-touch with standard image

D. High-touch with standard image

When servicing a customer’s computer which choice should be the highest motivating factor?
A. Fix the problem quickly and let customer get back to work.
B. Meet the customer’s expectations.
C. Make sure the bill is unquestionably detailed.
D. Maintain a good rapport with the customer.

B. Meet the customer’s expectations.

This feature allows specific network activity to power up the PC.
A. LANBIOS 3.0
B. Power management
C. WoL
D. QoS

C. WoL

Which protocol can be used to encrypt transmissions like FTP?
A. SMB
B. SNMB
C. SSH
D. LDAP

C. SSH

To open the Task Scheduler from the Run box which command would you use?
A. Tasksched.msc
B. Mssched.msc
C. Taskman.msc
D. Tasksced.msc

A. Tasksched.msc

In plain terms a Process is defined as which choice?
A. A request to the Win32 subsystem.
B. A request to create a thread.
C. A request for resources.
D. All choices apply
E. A running program and its associated resources.

D. All choices apply

Which command will launch System Restore at the command prompt?
A. Rstrui
B. None of these are correct
C. Restsys
E. Systemrstr

A. Rstrui

Which of the choices is NOT listed on the Processes tab of Task Manager in Windows 8?
A. Programs
B. Apps
C. Background processes
D. Windows processes

A. Programs

A system froze and you can’t restart it. Task Manager will not open. Which of the following should be your first troubleshooting measure?
A. Windows update might solve the problem.
B. Try a reboot of the system.
C. Try restoring default settings.
D. Download updates or patches for the application.
E. Uninstall and reinstall the application.

B. Try a reboot of the system.

When in Sleep mode a laptop has which of these capabilities?
A. Wake in about 2 seconds
B. All choices apply
C. Perform background updates
D. Perform scheduled tasks

B. All choices apply

What type of network connection would you NOT expect to find on a cellphone?
A. RJ-45
B. 3G/4G cellular
C. Bluetooth
D. Wi-Fi

A. RJ-45

Your network adapter operates at this layer of the TCP/IP model.
A. Hardware
B. Application
C. OS
D. All choices apply

A. Hardware

Which of the Mobile Operating Systems prohibits third party software from being used?
A. Windows Phone
B. Android
C. iOS
D. BlackBerry

C. iOS

To disable the Sharing Wizard you access Folder Options and do which of the following?
A. None of these choices apply
B. Check disable Sharing Wizard
C. Check Don’t use Sharing Wizard (recommended)
D. Uncheck Use Sharing Wizard

D. Uncheck Use Sharing Wizard

1 GB of RAM is required for a 32-bit Windows installation. How is this changed for 64-bit installs?
A. 1.5 GB
B. 4 GB
C. 2 GB
D. It is not

C. 2 GB

Which of the UAC settings is the LEAST restrictive?
A. Never notify
B. Always notify
C. Notify when programs try to make changes
D. Dim the display as part of the notification

A. Never notify

A program that will function in a Management Console as a snap-in is easily recognized by its file extension. Which choice is correct?
A. Mmc
B. Snp
C. None of these choices apply
D. Exe
E. Min

C. None of these choices apply

You have a new 4 GB GPT disk installed in your UFEI 32 bit Windows system. Which of the choices can you NOT perform?
A. Read
B. Boot
C. Write
D. You can do all of these

B. Boot

When you get a new iOS device if you press and hold the Home button you will launch Siri. Siri is your ________________.
A. All choices apply
B. Virtual assistant service
C. Personal assistant app
D. Virtual assistant app

A. All choices apply

You are troubleshooting a service in the Services console. What is the best startup type to eliminate a service as a problem?
A. Manual
B. Disabled
C. Automatic (Delayed Start)
D. Automatic

B. Disabled

You have an application that has failed to start because a supporting service isn’t running. How would you start it?
A. All choices apply
B. Msconfig
C. Action Center
D. Services console

D. Services console

You are working the help desk and have to put a customer on hold. Which is best choice?
A. Tell them their expected wait time.
B. Pick them up every 5 minutes or so and apologize.
C. Wait them out until they hang up.
D. Accidentally hang up.

A. Tell them their expected wait time.

Which wireless standards does NOT operate at the 5.0GHz frequency?
A. 802.11g
B. 802.11a
C. 802.11ac
D. 802.11n

A. 802.11g

You are troubleshooting a machine that at startup displays the error message "Invalid Boot Disk". A step to find out more in this situation would be to check _____________.
A. BCD
B. UFEI/BIOS
C. MBR
D. RE

B. UFEI/BIOS

Which of the following is a program that replicates by attaching itself to other programs?
A. Spam
B. Trojan
C. Worm
D. Virus
E. Spyware

D. Virus

If the web services on the server are down where in the path between the sender and recipient will the communication fail?
A. Hardware level on sender unable to pass traffic
B. Hardware level on recipient unable to pass traffic
C. OS level on sender unable to pass traffic
D. OS level on recipient unable to pass traffic

D. OS level on recipient unable to pass traffic

If you are using only NTFS permissions and there is a conflict which permission is used?
A. The most liberal one is applied.
B. The most restrictive one is applied.
C. They are balanced.
D. The first one encountered.

A. The most liberal one is applied.

In the broad sense of terms software can be classified as either "open source" meaning free, if you observer the terms of use, or proprietary (closed source) requiring some type of compensation to the author(s). Which mobile OS is open source?
A. Blackberry
B. iOS
C. Windows Phone
D. Android

D. Android

Select the strongest form of user validation.
A. Smart card and strong password
B. Biometric
C. Strong password
D. Smart card

A. Smart card and strong password

Software used to manage virtual machines is known as this:
A. None of these
B. Multi visor
C. Hyper machine manager
D. Hypervisor

D. Hypervisor

Your phone’s applications appear to be running slowly. What is the quickest way to free up resources for the OS?
A. Run a cleanup app
B. None of these choices apply
C. Reboot device
D. Close open apps one by one

C. Reboot device

Side-by-side apps enable two apps to display at the same time, however more than two can be running. How are the other apps viewed?
A. Place pointer at lower right of display
B. Place pointer at upper right of display
C. Place pointer at upper left of display
D. Place pointer at lower left of display

C. Place pointer at upper left of display

Most programs rely on a main program file along with a set of ___________.
A. Dlls
B. Objects
C. All choices apply
D. Components

C. All choices apply

One term is used to identify a collection of activities designed to gain access to personal and corporate information. The activities include Phishing, scams and hoaxes aimed at getting individuals to compromise sensitive data. What is the term for this activity?
A. Hijacking
B. Man in the middle
C. Social Engineering
D. Brute force

C. Social Engineering

This licensing option allows multiple VMs to use the same operating system and activation key.
A. Upgrade
B. All choices apply
C. Ultimate
D. Enterprise

D. Enterprise

A unicast IPv6 message is used to send a messages to which of the following?
A. Global addresses
B. Link-local addresses
C. Unique local addresses
D. All choices apply

D. All choices apply

Which of the following statements is NOT true about the system restore process?
A. Restore points are kept in a hidden folder on the hard drive.
B. Restore points rebuilds a totally corrupted registry.
C. System Restore can create a new problem.
D. The restore process cannot remove a virus or worm infection.

B. Restore points rebuilds a totally corrupted registry.

It is a good practice to delete your browsing history frequently. When doing so what happens to cookies related to web sites in your Favorites?
A. None of these choices apply
B. They are retained.
C. They are encrypted.
D. They are deleted.

B. They are retained.

UFEI includes a security system that prevents malware from loading pre-boot. What is it called?
A. Safe Boot
B. CSM
C. Secure Boot
D. BitLocker

C. Secure Boot

In Windows Firewall Allowed apps which of the choices is NOT possible?
A. Allow Private
B. Allow Port
C. These are all possible
D. Allow Public

B. Allow Port

You suspect a live tile on your Start screen is using too much of your system resources. Which Device Manager tab would you use to investigate?
A. Performance
B. Processes
C. Details
D. App history

D. App history

In Windows the Guest account ________________.
A. is disabled by default
B. should remain disabled
C. All choices apply
D. is verified as disabled in User Accounts

C. All choices apply

System Protection creates restore points at regular intervals and:
A. Every Friday night at 11:55 pm
B. Every end of month by midnight
C. Just before you restore your last backup
D. Just before you install software or hardware

D. Just before you install software or hardware

RDP applications listen on this port.
A. 139
B. 3389
C. 443
D. 138

B. 3389

How many groups can a single user be a member of?
A. 15
B. As many as necessary to do their job
C. 10
D. 5

B. As many as necessary to do their job

A router using this technique is able to allow hosts using private internet addresses to connect to the public internet.
A. NAT
B. None of these choices apply
C. APIPA
D. PAT

A. NAT

Machines that get their IP addresses assigned differently each time they log on get their addresses from this server.
A. ICAS
B. DNS
C. IPHOSTS
D. DHCP

D. DHCP

When Internet security is set to Medium-high ActiveX controls that are not signed by Microsoft are _________.
A. Scanned
B. Deleted
C. Blocked
D. Quarantined

C. Blocked

When working with a customer which is the most desirable outcome?
A. Fix the problem.
B. Fix the problem and take ownership of the problem.
C. Fix the problem and have the customer validate repair.
D. Fix the problem and educate the user.

B. Fix the problem and take ownership of the problem.

You have just opened a command prompt window with administrative privileges. Discounting the title bar, what is an indication that you have been successful?
A. The background color changes.
B. All choices apply
C. Your prompt is in the C:\Windows\system32 folder.
D. Your fonts are italicized.

C. Your prompt is in the C:\Windows\system32 folder.

This text menu appears when F8 is pressed during Windows 7 startup.
A. Start Normally
B. Safe Mode
C. Advanced Boot Options
D. Repair Your Computer

C. Advanced Boot Options

How often does Windows File History scan for file and folder changes by default?
A. Daily
B. It is a manual process
C. Every 12 hours
D. Hourly
E. On shutdown

D. Hourly

You want to make some quick notes. What command would you use to open the text editor from the Run box?
A. Notepad
B. New file
C. Edit
D. Notebook

A. Notepad

MBR partitioning is required under which of the following conditions?
A. All choices apply
B. 64-bit OS
C. 32-bit OS
D. UEFI

C. 32-bit OS

The Windows Phone runs on an OS that is a simplified version of the Operating System designed to run on _____________.
A. Desktops
B. Laptops
C. Tablets
D. All choices apply

D. All choices apply

You have a PC with 8.1 edition installed. What option will give you the added functionality you need without a lot of time and expense?
A. Install Windows Pro Pack
B. Upgrade to Windows 8.1 Pro
C. Clean install Windows 8.1 Pro
D. Clean install Windows RT

A. Install Windows Pro Pack

Windows _____________ uses a flash drive or secure digital (SD) memory card to boost hard drive performance. The faster flash memory is used as a buffer to speed up hard drive access time.
A. User Account Control
B. PageSwap
C. PageFile.sys
D. ReadyBoost

D. ReadyBoost

Of the ways to free up hard disk space which is NOT a good practice?
A. Move data off drive
B. Uninstall unused programs
C. Move pagefile.sys
D. Compress the C: drive

D. Compress the C: drive

Services that are running are displayed in the lower right section of the desktop. Your choices include one name that Does Not correctly identify this area. Select that name.
A. systray
B. Notification area
C. Tasks
D. System tray

C. Tasks

Which Windows edition provides volume licensing options?
A. Windows 8.1 Pro
B. Windows 8.1
C. Windows 8.1 Enterprise
D. Windows 8.1 RT

C. Windows 8.1 Enterprise

You have a process reporting "Not Responding" on the Details tab of task manager. You need to save the data. Which choice would you use?
A. Set affinity
B. Set priority
C. Create dump file
D. End task

D. End task

Before recycling a PC you should do this to ensure your data is gone and a fresh copy of Windows is installed.
A. Refresh the PC.
B. Reset the PC.
C. Format the drive.
D. All choices apply

B. Reset the PC.

Your Windows 7 PC will not boot. You have the installation media and boot to it. What is your choice on the System Recovery Options screen?
A. Startup Repair
B. Repair your computer
C. System Restore
D. Windows Memory Diagnostic

A. Startup Repair

C:\ is:
A. A subdirectory on a logical drive
B. A logical drive root directory
C. A folder on a logical drive
D.A physical drive

B. A logical drive root directory

Signing into Windows 8 with your email address is known as this:
A. Live login
B. None of these choices apply
C. Sign-on
D. SSO

D. SSO

Which of the following constitutes a domain name?
A. None of these choices apply
B. Mydomain.com
C. My laptop
D. www.mydomain

B. Mydomain.com

Whatever the Windows startup problem is your objective is to make as few changes to the system as possible in order to solve the problem without wasting a lot of time to return the system to normal. You therefore have to decide which tool will be the least ___________ to use, yet still will fix the problem.
A. Costly
B. Invasive
C. Time consuming
D. Error prone

B. Invasive

There are six levels of permissions that allow some type of file and folder access. Which permission level does NOT permit the user access to the files in a folder?
A. Read and execute
B. Full control
C. Write
D. Modify
E. Read
F. List folder contents

F. List folder contents

There is a six step strategy to complete customer service. Which of the choices has the highest priority?
A. Test your theory.
B. Examine the system and make your best guess.
C. Plan the solution and fix the problem.
D. Verify the fix and take preventative action.

B. Examine the system and make your best guess.

You suspect bad memory as the problem with this PC. What command would you use from the command prompt to diagnose the problem?
A. Memschd.exe
B. Task scheduler
C. Mdsched.exe
D. Mssched.exe

C. Mdsched.exe

There are many Cloud computing configurations available. You will see varying levels of responsibility for hardware and software. At its core, however, you will see five key elements. Sometimes described as uptime or on demand this term shown refers to the percentage of time during a given year that services were available without disruption.
A. Service at any time
B. Elastic services and storage
C. Resource pooling and consolidation
D. Measured service

A. Service at any time

In Windows System Configuration the Services tab is a complete and accurate list of every startup program and service.
A. This is true.
B. It must be run as Administrator to be complete.
C. This is untrue.
D. None of these are true.

C. This is untrue.

Which of the choices are available for use with Windows Storage Spaces and used as a storage pool?
A. Serial ATA
B. Serial Attached SCSI
C. USB Drive
D. All choices apply

D. All choices apply

Using the Settings Charm to access Change PC settings then Update and recovery and choosing Recovery does NOT provide which of the options shown?
A. Refresh your PC without affecting your files.
B. Remove everything and reinstall Windows.
C. Reset to original factory settings.
D. Advanced Startup.

C. Reset to original factory settings.

This device manages traffic leaving one network and bound for another.
A. Hub
B. Gateway
C. Wins Server
D. Router

B. Gateway

Which of these choices is NOT critical to keep a PC protected from malware and hackers?
A. Network location setting
B. Windows Updates
C. Antivirus software
D. Backup schedule

D. Backup schedule

For a normal startup Windows Boot Loader loads which of the following into memory?
A. All of these get loaded
B. System registry hive
C. Ntoskernel
D. OS kernel

A. All of these get loaded

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending