Certification Practice Test Sample Questions For CompTIA A+ (220-1202)

QuickStart is now offering sample questions for CompTIA A+ (220-1202). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the CompTIA A+ (220-1202) exam.


 
 
Arrow

CompTIA A+ Certification

CompTIA A+ Certification

 
 
proceed to the next question. Correct answers will be displayed when you complete exam.

CompTIA A+ (220-1202) Sample Exam Questions

1

A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?

A. .py
Incorrect.
B. .bat
Incorrect.
C. .vbs
Incorrect.
D. .sh
Correct!
2

You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company's workstations had their files encrypted. You are worried about the rest of the network's workstations. What should you do FIRST?

3

Which of the following backup rotation schemes requires at least one monthly full backup to be stored safely off-site?

A. FIFO Backup
Incorrect.
B. 3-2-1 backup
Incorrect.
C. Grandfather-father-son
Correct!
D. Tower of Hanoi
Incorrect.
4

Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to "click here" to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?

A. Spear phishing
Incorrect.
B. Whaling
Incorrect.
C. Phishing
Correct!
D. Brute force
Incorrect.
5

Which of the following would leave a user's programs running on their Windows 10 laptop while preventing other users from accessing them without entering the correct password?

A. Sleep
Incorrect.
B. Hibernate
Incorrect.
C. Lock
Correct!
D. Shutdown
Incorrect.
6

Which of the following tools in Windows 10 allows a technician to add different utilities, such as disk management, computer management, performance monitor, print management, and others to create a modular and customized tool kit for the technician to utilize?

A. UAC
Incorrect.
B. MMC
Correct!
C. PerfMon
Incorrect.
D. RDS
Incorrect.
7

Austin is working in Microsoft Word, but the application appears to have become frozen and unresponsive. Which of the following features in the Task Manager should he use to terminate the unresponsive program?

A. Services
Incorrect.
B. Startup
Incorrect.
C. Performance
Incorrect.
D. Processes
Correct!
8

Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?

A. Ransomware
Incorrect.
B. Keylogger
Correct!
C. Wirus
Incorrect.
D. Worm
Incorrect.
9

Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?

A. sfc /now
Incorrect.
B. chkdsk /f
Incorrect.
C. format /fs:NTFS
Correct!
D. diskpart list disk
Incorrect.
10

You are troubleshooting a user's computer. As part of your efforts, you want to install a new login with administrative privileges. Which of the following utilities should you use?

A. System Information
Incorrect.
B. System Configuration
Incorrect.
C. Local Users and Groups
Correct!
D. Group Policy
Incorrect.
11

Which of the following MacOS features is used to manage passwords cached by the OS and is the equivalent of the Credential Manager in Windows?

A. Spotlight
Incorrect.
B. Apple ID
Incorrect.
C. Keychain
Correct!
D. Mission Control
Incorrect.
12

A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation?

A. Security log
Correct!
B. System log
Incorrect.
C. Setup
Incorrect.
D. Application log
Incorrect.
13

You are configuring a SOHO network for a small coffee shop. They have found that certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. The owner has asked you to block this customer's laptop from connecting by placing it on a blocklist. Which of the following configurations would you use to blocklist this customer's device based on its unique hardware identifier?

A. Port forwarding
Incorrect.
B. Port filtering
Incorrect.
C. MAC Filtering
Correct!
D. Enforce a WPA2 Password
Incorrect.
14

You are trying to copy a 4.7 GB file from your Windows laptop to an external hard drive using USB 3. The external hard drive is formatted with FAT32. Every time you attempt this copy, you receive an error. What is MOST likely the issue?

15

Which of the following accounts should you set up to use Apple's online cloud storage and file synchronization service for macOS and iOS devices?

A. Microsoft 365
Incorrect.
B. iCloud
Correct!
C. Google Workspace
Incorrect.
D. iTunes
Incorrect.
16

Your boss is looking for a recommendation for a backup solution that can backup non-sensitive data in the most cost-efficient way. The company already has an Office 365 subscription for each employee. The employees should be able to backup and access their data from anywhere using their laptops, smartphones, or tablets. Which of the following solutions should you recommend?

A. AWS S3
Incorrect.
B. G Suite
Incorrect.
C. OneDrive
Correct!
D. iCloud
Incorrect.
17

Which of the following is NOT an example of another name for a Crash Screen?

A. DoS
Correct!
B. BSOD
Incorrect.
C. Kernel Panic
Incorrect.
D. Pinwheel of Death
Incorrect.
18

What is the sixth step of the CompTIA troubleshooting methodology?

19

One of these biometrics is widely believed to be most accurate. Can you identify which?

A. Iris scanning
Correct!
B. Palm scanning
Incorrect.
C. Fingerprint scanning
Incorrect.
D. Voice scanning
Incorrect.
20

Which type of security measure is used to control access to an area by using a retina scan?

A. Two-factor authentication
Incorrect.
B. Optical reader
Incorrect.
C. Biometric
Correct!
D. Cipher locks
Incorrect.
21

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?

A. VNC
Incorrect.
B. Telnet
Incorrect.
C. SSH
Incorrect.
D. RDP
Correct!
22

Your network administrator has handed you some documentation showing you which switch ports on a patch panel you need to connect with a CAT 5e patch cable for an upcoming network upgrade. What document are you MOST likely holding?

23

Which of the following commands is used on a Linux system to delete a file from a directory?

A. cp
Incorrect.
B. kill
Incorrect.
C. rm
Correct!
D. mv
Incorrect.
24

Which of the following Windows tools can a technician use to gather information about a workstation and create a comprehensive list of hardware, system components, and the software environment used by that workstation?

A. dxdiag.exe
Incorrect.
B. resmon.exe
Incorrect.
C. devmgmt.msc
Incorrect.
D. msinfo32.exe
Correct!
25

Your company's Security Operations Center (SOC) is currently detecting an ongoing DDoS attack against your network's file server. A cybersecurity analyst has identified forty internal workstations on the network conducting the attack against your network's file server. The cybersecurity analyst believes these internal workstations are infected with malware and places them into a quarantined network area. The analyst then submits a service desk ticket to have the workstations scanned and cleaned of the infection. What type of malware were the workstations most likely a victim of based on the scenario provided?

A. Botnet
Correct!
B. Ransomware
Incorrect.
C. Rootkit
Incorrect.
D. Spyware
Incorrect.
26

An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?

A. Security Groups
Correct!
B. Group Policy
Incorrect.
C. Credential Manager
Incorrect.
D. Home Folder
Incorrect.
27

Which Linux command is used to print the full contents of a file to the screen at once?

A. grep
Incorrect.
B. ls
Incorrect.
C. dig
Incorrect.
D. cat
Correct!
28

You are working as a file server administrator. You are backing up the files on the server when you observe numerous inappropriate photos and videos stored on the corporate share drive by the user jsmith. These files are clearly in violation of the company's AUP. What should you do FIRST?

29

Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. Which type of malware might her computer be infected with?

A. Adware
Incorrect.
B. Logic bomb
Incorrect.
C. Worm
Incorrect.
D. Trojan
Correct!
30

Which file system type is used by default when installing macOS on a modern workstation?

A. NTFS
Incorrect.
B. HFS+
Incorrect.
C. FAT32
Incorrect.
D. APFS
Correct!
 

Practice Exam - CompTIA A+ (220-1002)

QuickStart is now offering you assessment questions to better aid in certification. 100% of the questions are real questions from a recent version of the test you will take.
$99.00
QuickStart is now offering you assessment questions to better aid in certification. 100% of the questions are real questions from a recent version of the test you will take.

More Information:

  • Learning Style: On Demand
  • Learning Style: Practice Exam
  • Difficulty: Beginner
  • Course Duration: 1 Hour
  • Course Info: Download PDF
  • Certificate: See Sample

Need Training for 5 or More People?

Customized to your team's need:

  • Annual Subscriptions
  • Private Training
  • Flexible Pricing
  • Enterprise LMS
  • Dedicated Customer Success Manager

Course Information

QuickStartis now offering sample questions for CompTIA A+ (220-1002). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the CompTIA A+ (220-1002) exam.

Outline

Hit button to validate captcha