Certification Practice Test Sample Questions For CompTIA A+ (220-1202)
QuickStart is now offering sample questions for CompTIA A+ (220-1202). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the CompTIA A+ (220-1202) exam.
CompTIA A+ (220-1202) Sample Exam Questions
A coworker is creating a file containing a script. You look over their shoulder and see
"#!/bin/bash" as the first line in the file. Based on this, what
type of file extension should this script use?
You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company's workstations had their files encrypted. You are worried about the rest of the network's workstations. What should you do FIRST?
- C. Immediately quarantine the affected workstations
-
Correct!
Which of the following backup rotation schemes requires at least one monthly full backup to be stored safely off-site?
- A. FIFO Backup
-
Incorrect.
- B. 3-2-1 backup
-
Incorrect.
- C. Grandfather-father-son
-
Correct!
- D. Tower of Hanoi
-
Incorrect.
Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to "click here" to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?
Which of the following would leave a user's programs running on their Windows 10 laptop while preventing other users from accessing them without entering the correct password?
Which of the following tools in Windows 10 allows a technician to add different utilities, such as disk management, computer management, performance monitor, print management, and others to create a modular and customized tool kit for the technician to utilize?
Austin is working in Microsoft Word, but the application appears to have become frozen and unresponsive. Which of the following features in the Task Manager should he use to terminate the unresponsive program?
Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?
Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?
- A. sfc /now
-
Incorrect.
- B. chkdsk /f
-
Incorrect.
- C. format /fs:NTFS
-
Correct!
- D. diskpart list disk
-
Incorrect.
You are troubleshooting a user's computer. As part of your efforts, you want to install a new login with administrative privileges. Which of the following utilities should you use?
- A. System Information
-
Incorrect.
- B. System Configuration
-
Incorrect.
- C. Local Users and Groups
-
Correct!
- D. Group Policy
-
Incorrect.
Which of the following MacOS features is used to manage passwords cached by the OS and is the equivalent of the Credential Manager in Windows?
A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation?
You are configuring a SOHO network for a small coffee shop. They have found that certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. The owner has asked you to block this customer's laptop from connecting by placing it on a blocklist. Which of the following configurations would you use to blocklist this customer's device based on its unique hardware identifier?
- A. Port forwarding
-
Incorrect.
- B. Port filtering
-
Incorrect.
- C. MAC Filtering
-
Correct!
- D. Enforce a WPA2 Password
-
Incorrect.
You are trying to copy a 4.7 GB file from your Windows laptop to an external hard drive using USB 3. The external hard drive is formatted with FAT32. Every time you attempt this copy, you receive an error. What is MOST likely the issue?
- A. USB 3 is too slow to transfer a file this large
-
Incorrect.
Which of the following accounts should you set up to use Apple's online cloud storage and file synchronization service for macOS and iOS devices?
Your boss is looking for a recommendation for a backup solution that can backup non-sensitive data in the most cost-efficient way. The company already has an Office 365 subscription for each employee. The employees should be able to backup and access their data from anywhere using their laptops, smartphones, or tablets. Which of the following solutions should you recommend?
Which of the following is NOT an example of another name for a Crash Screen?
What is the sixth step of the CompTIA troubleshooting methodology?
- C. Test the theory to determine the cause
-
Incorrect.
- D. Document findings, actions, and outcomes
-
Incorrect.
One of these biometrics is widely believed to be most accurate. Can you identify which?
- A. Iris scanning
-
Correct!
- B. Palm scanning
-
Incorrect.
- C. Fingerprint scanning
-
Incorrect.
- D. Voice scanning
-
Incorrect.
Which type of security measure is used to control access to an area by using a retina scan?
- A. Two-factor authentication
-
Incorrect.
- B. Optical reader
-
Incorrect.
- C. Biometric
-
Correct!
- D. Cipher locks
-
Incorrect.
Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?
Your network administrator has handed you some documentation showing you which switch ports on a patch panel you need to connect with a CAT 5e patch cable for an upcoming network upgrade. What document are you MOST likely holding?
- A. Inventory management plan
-
Incorrect.
- B. Logical network diagram
-
Incorrect.
- C. Process flow diagram
-
Incorrect.
- D. Physical network diagram
-
Correct!
Which of the following commands is used on a Linux system to delete a file from a directory?
Which of the following Windows tools can a technician use to gather information about a workstation and create a comprehensive list of hardware, system components, and the software environment used by that workstation?
- A. dxdiag.exe
-
Incorrect.
- B. resmon.exe
-
Incorrect.
- C. devmgmt.msc
-
Incorrect.
- D. msinfo32.exe
-
Correct!
Your company's Security Operations Center (SOC) is currently detecting an ongoing DDoS attack against your network's file server. A cybersecurity analyst has identified forty internal workstations on the network conducting the attack against your network's file server. The cybersecurity analyst believes these internal workstations are infected with malware and places them into a quarantined network area. The analyst then submits a service desk ticket to have the workstations scanned and cleaned of the infection. What type of malware were the workstations most likely a victim of based on the scenario provided?
An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?
- A. Security Groups
-
Correct!
- B. Group Policy
-
Incorrect.
- C. Credential Manager
-
Incorrect.
- D. Home Folder
-
Incorrect.
Which Linux command is used to print the full contents of a file to the screen at once?
You are working as a file server administrator. You are backing up the files on the server when you observe numerous inappropriate photos and videos stored on the corporate share drive by the user jsmith. These files are clearly in violation of the company's AUP. What should you do FIRST?
- A. Delete the files immediately
-
Incorrect.
- B. Copy the files to an external hard drive
-
Incorrect.
- C. Notify your immediate supervisor
-
Correct!
- D. Contact the user and ask them to remove the files
-
Incorrect.
Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. Which type of malware might her computer be infected with?
Which file system type is used by default when installing macOS on a modern workstation?
Before We Display the Practice Results,
Tell Us About You:
By submitting this information, I agree to receive phone calls/SMS/email updates from QuickStart.
See our Privacy Policy.
Get Your FREE
Test Results Emailed!
You've completed the test - now get your results delivered instantly via email. Enter a valid email to receive your full score breakdown.
- Home
- Practice Exam - CompTIA A+ (220-1002)
Practice Exam - CompTIA A+ (220-1002)
More Information:
- Learning Style: On Demand
- Learning Style: Practice Exam
- Difficulty: Beginner
- Course Duration: 1 Hour
- Course Info: Download PDF
- Certificate: See Sample
Contact a Learning Consultant
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information
