1 Actual Test Questions A902
1 Actual Test Questions A902
QUESTION NO: 1
A technician is instructed to configure a new workstation to boot the OS from the network. The
technician must enable which of the following FIRST?
A.
PXE
B.
WOL
C.
WiFi
D.
UPNP
Answer: A
Explanation:
QUESTION NO: 2
A technician is troubleshooting a PC with multiple volumes. To verify which are active and
assigned drive letters, the technician should use the LIST function of which of the following
commands?
A.
extract
B.
diskpart
C.
bootrec
D.
chkdsk
Answer: B
Explanation:
When using Microsoft Windows 8.1 Operating System, which of the following features allows
scripts and snippets to run?
A.
One Drive
B.
XP Mode
C.
Power Shell
D.
Windows Firewall
Answer: C
Explanation:
QUESTION NO: 4
A PC technician notices that the printers deployed via a new Group Policy are not showing up on
the workstation. Which of the following commands should be run on the PC?
A.
extract
B.
robocopy
C.
gpupdate
D.
tasklist
Answer: C
Explanation:
QUESTION NO: 5
"Pass Any Exam. Any Time." - www.actualtests.com 3
Comptia 220-902 Exam
A technician is tasked with installing Windows on numerous network PCs. Which of the following is
the QUICKEST method for getting a standard configuration to the PCs?
A.
Prebuilt image using PXE
B.
Single solid state/flash drive with answer file
C.
Hot swappable image drive
D.
Internal hard drive partition with the image
Answer: A
Explanation:
QUESTION NO: 6
A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to
use the built-in screen; however, when the laptop lid is closed, it goes into sleep mode. Which of
the following Control Panel items can be used to disable this feature?
A.
Action Center
B.
System
C.
Display Settings
D.
Power Options
Answer: D
Explanation:
QUESTION NO: 7
A.
dir
B.
rd
C.
cd
D.
md
Answer: D
Explanation:
QUESTION NO: 8
A small office experiences frequent power outages. Upon rebooting the Windows workstations
after each power outage, users report the inability to open shared files. Which of the following
MUST a technician configure to resolve this issue in the future?
A.
Check the “Reconnect at logon” checkbox for the mapped network drive
B.
Connect all computers in the office to UPS devices
C.
Re-map the mapped network drive with the domain administrator account
D.
Replace the hard drives on the file server hosting the shared files
Answer: A
Explanation:
QUESTION NO: 9
"Pass Any Exam. Any Time." - www.actualtests.com 5
Comptia 220-902 Exam
Which of the following updates should be performed on a regular basis to ensure the OS has the
latest security patches?
A.
Anti-malware updates
B.
Driver updates
C.
Windows updates
D.
Firmware updates
Answer: C
Explanation:
QUESTION NO: 10
A technician is trying to install Windows on a computer. The install process reports there are no
storage devices available, but the BIOS shows a hard drive is installed. Which of the following
does the technician need to do?
A.
Create a primary partition
B.
Use NTFS
C.
Enable PXE
D.
Install third-party drivers
Answer: D
Explanation:
QUESTION NO: 11
A.
Privacy
B.
Advanced
C.
Security
D.
Content
Answer: D
Explanation:
QUESTION NO: 12
A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but
the computer does not recognize the optical disc. A “non-system disk or disk error” is observed.
Which of the following should the technician do FIRST?
A.
Update the motherboard firmware
B.
Check the cables
C.
Replace the optical drive
D.
Check the BIOS setting
Answer: D
Explanation:
An administrator has a new workstation that has been loaded with the Windows OS and
configured with the proper IP settings. The workstation needs to be added to the corporation’s
domain. Which of the following utilities will the administrator access to configure this setting?
A.
System Properties
B.
System Information
C.
System Protection
D.
System Management
Answer: A
Explanation:
QUESTION NO: 14
A.
Folder Options > View hidden files
B.
System > Performance
C.
Display Settings > Refresh rate
D.
Internet Options > Privacy
Answer: A
Explanation:
Which of the following should be used to ensure that a Windows OS is functioning optimally?
A.
Driver updates
B.
Scheduled backups
C.
Application updates
D.
Restore points
Answer: A
Explanation:
QUESTION NO: 16
A technician needs to log into a user's computer to fix the user's corrupt local profile. Which of the
following connectivity tools will allow the technician to connect to the user’s computer?
A.
Remote Assistance
B.
Virtual Private Network
C.
Computer Management
D.
Remote Desktop
Answer: D
Explanation:
QUESTION NO: 17
A.
Recovery partition
B.
Primary partition
C.
System restore
D.
System refresh
Answer: A
Explanation:
QUESTION NO: 18
A user is unable to find the preferred default network printer in the printers list in the user profile.
Which of the following is the FIRST step that should be taken?
A.
Map printer
B.
Reboot computer
C.
Check to see if printer is turned on
D.
Log in as a different user and see if printer is mapped
Answer: A
Explanation:
QUESTION NO: 19
A technician needs to perform a backup while a system is running. Which of the following services
A.
Robocopy
B.
Shadow copy
C.
Xcopy
D.
System restore
Answer: B
Explanation:
QUESTION NO: 20
A technician has been tasked with loading the operating system on every PC with a blank hard
drive on a network. The technician wishes to install the operating system with minimal physical
interaction with the PCs. Which of the following is the BEST way to accomplish this?
A.
Clone the operating system from an image onto optical media.
B.
Use the original software media to load the operation system on every PC.
C.
Set up a central image that the PCs can load from a PXE boot.
D.
Create an image and copy it from a USB drive using an unattended answer file.
Answer: C
Explanation:
QUESTION NO: 21
A technician is navigating through a Windows OS via command prompt. The technician needs to
A.
dir
B.
ls
C.
rd
D.
cmd
Answer: A
Explanation:
QUESTION NO: 22
A network administrator needs to connect to resources from an offsite location while ensuring the
traffic is protected. Which of the following should the administrator use to gain access to the
secure network?
A.
SSH
B.
VPN
C.
SFTP
D.
RDP
Answer: B
Explanation:
QUESTION NO: 23
A.
Compatibility view
B.
Manage add-ons
C.
Clear browser cache
D.
Pop-up blocker
Answer: A
Explanation:
QUESTION NO: 24
A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready
to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO).
A.
View the CMD process in Task Manager
B.
Type EXIT at the command prompt and press Enter
C.
Minimize the CMD box to the taskbar
D.
Click the “x” in the top right of the CMD window
E.
Select Switch User on the PC
Answer: B,D
Explanation:
An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map
a shared network drive for the user, an “access denied” error is encountered while using the user’s
credentials. Which of the following should be the administrator’s NEXT step?
A.
Ensure the user’s account is not locked out
B.
Use the fully qualified domain name of the share
C.
Open the location with administrator privileges
D.
Try mapping with a different drive letter
Answer: C
Explanation:
QUESTION NO: 26
Ann, a user, discovers that all of her documents will not open. The documents open properly on
another computer. Which of the following tools will be the FASTEST for a technician to use to
allow the documents to open?
A.
Backup
B.
Recovery Image
C.
chkdsk
D.
System Restore
Answer: D
Explanation:
A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer
browser. Which of the following Internet Options Tabs should the technician look to enable the
aforementioned TLS settings?
A.
Advanced
B.
Security
C.
Privacy
D.
Connections
Answer: A
Explanation:
QUESTION NO: 28
Which of the following network hosts would MOST likely provide the services needed to allow
client access to Internet web pages?
A.
File server
B.
Web server
C.
WINS server
D.
Proxy server
Answer: D
Explanation:
Which of the following best practices is used to fix a zero-day vulnerability on Linux?
A.
Scheduled backup
B.
Scheduled disk maintenance
C.
Patch management
D.
Antivirus update
Answer: C
Explanation:
QUESTION NO: 30
Which of the following tools is used to type or paste recovery commands directly into a Linux box?
A.
Shell/terminal
B.
Backup/time machine
C.
Command/cmd
D.
Restore/snapshot
Answer: A
Explanation:
QUESTION NO: 31
A technician is installing Bluetooth speakers in a conference room. Which of the following will be
A.
10 feet (3 meters)
B.
15 feet (5 meters)
C.
30 feet (9 meters)
D.
45 feet (14 meters)
Answer: C
Explanation:
QUESTION NO: 32
A user has a Windows 8.1 RT operating system and wants to add additional programs to the
computer. Which of the following is available for installing more applications?
A.
Microsoft Store
B.
DVD
C.
Google Play
D.
iTunes
Answer: A
Explanation:
QUESTION NO: 33
A company that manages its own cloud, while utilizing a third-party vendor to help manage
storage, is implementing which of the following infrastructure types?
B.
Community
C.
Private
D.
Public
Answer: A
Explanation:
QUESTION NO: 34
An administrator has a virtual client running but cannot receive network connectivity. The host
workstation is able to access the network. Which of the following would the administrator check on
the host to repair the problem?
A.
The cable connected to the network
B.
Virtual host network adapter
C.
USB host adapter
D.
The domain of the virtual machine
Answer: B
Explanation:
QUESTION NO: 35
A Google account on an Android device by default will synchronize to which of the following
locations?
B.
SSD
C.
PC desktop
D.
MicroSD
Answer: A
Explanation:
QUESTION NO: 36
How would a technician install Windows OS on a MAC OS computer without using third-party
software?
A.
Terminal
B.
Boot Disk
C.
Disk Utility
D.
Boot Camp
Answer: D
Explanation:
QUESTION NO: 37
A user wants to configure a smartphone to save all attachments from an Outlook.com email to a
cloud-based service. Which of the following would be BEST to use to accomplish this?
A.
B.
iCloud
C.
One Drive
D.
FTP
Answer: C
Explanation:
QUESTION NO: 38
Virtual machines provide users with the ability to do which of the following?
A.
Extend 32-bit machines to 64-bits
B.
Share hardware resources
C.
Increase the network download speed
D.
Use less memory in the machine
Answer: B
Explanation:
QUESTION NO: 39
Which of the following features of a mobile device operates the touch screen?
A.
Gyroscope
B.
C.
Accelerometer
D.
Geotracking
Answer: B
Explanation:
QUESTION NO: 40
A technician contacts the network administrator to request a list of all static IP addresses in the
building. Which of the following server roles would the technician MOST likely review to find that
information?
A.
DHCP server
B.
DNS server
C.
File server
D.
Proxy server
Answer: A
Explanation:
QUESTION NO: 41
A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user
would like the data synced to all three devices. Which of the following items can be synced to the
devices via webmail? (Select THREE).
A.
Free/busy
C.
Documents
D.
Calendar
E.
Favorites
F.
Social media
G.
Contacts
Answer: A,D,G
Explanation:
Topic 3, Security
QUESTION NO: 42
A.
The workstation is victim of a denial of service attack.
B.
The username is not authenticating on the network.
C.
The username is not part of the local administrator group.
D.
The administrator has not applied appropriate security patches.
Answer: C
Explanation:
A technician has been tasked with limiting the users who can connect to a network printer located
centrally within an office environment. Which of the following tools would be the BEST to utilize to
achieve this goal?
A.
VPN
B.
ACL
C.
RDP
D.
DLP
Answer: B
Explanation:
QUESTION NO: 44
An end user has reported not receiving emails sent by a specific customer. Which of the following
is the MOST likely cause of this issue?
A.
The HIPS device is blocking the messages
B.
The access control list is blocking the messages
C.
The email filter has quarantined the messages
D.
The firewall is blocking the sender’s email address
Answer: C
Explanation:
A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are
asked for a PIN. Which of the following should be done NEXT?
A.
Enter all passwords they have used in the past
B.
Verify a smart card has been issued
C.
Check the network cable
D.
Reboot the computer
Answer: B
Explanation:
QUESTION NO: 46
A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on
it that has been published on the Internet. Which of the following is the FIRST step in
implementing a best practice security policy?
A.
Require biometric identification to log into the laptop.
B.
Require multifactor authentication to log into laptop.
C.
Require laptop hard drives to be encrypted.
D.
Require users to change their password at frequent intervals.
E.
Require users to have strong passwords.
Answer: C
Explanation:
QUESTION NO: 47
The type of security threat that uses computers or other networks to accept and pass on viruses is
called:
A.
phishing.
B.
botnets.
C.
logic bomb.
D.
man-in-the-middle.
Answer: B
Explanation:
QUESTION NO: 48
Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it
unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which
of the following?
A.
Trojan horse
B.
Spyware
C.
Social engineering
D.
Worms
Answer: A
Explanation:
QUESTION NO: 49
A technician is attempting to manually migrate a user’s profile from one Windows PC to another.
Files in the user’s My Documents folder cannot be copied. Some files in question have green
letters in the filenames. Which of the following file systems is causing this to occur?
A.
exFAT
B.
COMPRESSED
C.
EFS
D.
NTFS
Answer: C
Explanation:
QUESTION NO: 50
When securing a mobile device, which of the following types of screen locks is the MOST secure?
A.
Fingerprint lock
B.
Swipe lock
C.
Passcode lock
D.
Face lock
Answer: A
Explanation:
A technician has upgraded four computers and would like to securely repurpose the hard drives
for later use. Which of the following should the technician do to the drives to prepare them for later
use?
A.
chkdsk
B.
Degauss
C.
Quick format
D.
Drive wipe
Answer: D
Explanation:
QUESTION NO: 52
A technician is configuring a SOHO wireless router for a small business with three employees.
After the three employees’ laptops have successfully connected to the wireless network, the
company would like to prevent additional access to the wireless network. The technician enables
WPA2 on the wireless router. Which of the following additional settings should the technician
change?
A.
Enable MAC filtering
B.
Disable SSID broadcast
C.
Reduce radio power level
D.
Update router firmware
Answer: A
Explanation:
QUESTION NO: 53
A technician is configuring wireless for a home office. The customer wants to prevent others from
accessing the wireless network. The customer has a small number of devices on the network and
does not want to have to remember a complicated password. Which of the following should the
technician recommend?
A.
Enable MAC filtering
B.
Disable SSID broadcast
C.
Assign static IP addresses
D.
Turn on content filtering
Answer: A
Explanation:
QUESTION NO: 54
A technician has been notified that recent vulnerabilities have been discovered related to a type of
SOHO router. The technician has verified that all connections and settings are appropriate. Which
of the following actions should the technician take NEXT?
A.
Change the router firewall settings
B.
Check for and apply a firmware update
C.
Reconfigure the QoS settings
D.
Change router user-names and passwords
Answer: B
QUESTION NO: 55
A technician needs to quickly destroy data on several hard drives that are no longer wanted.
Which of the following methods is MOST effective?
A.
Physical destruction
B.
Quick format
C.
Low level format
D.
Overwrite
Answer: A
Explanation:
QUESTION NO: 56
Which of the following will help to protect an organization from further data exposure AFTER a list
of user passwords has already been leaked due to policy breach? (Select TWO).
A.
Use multi-factor authentication
B.
Require strong passwords
C.
Enable file encryption
D.
Educate end users
E.
Restrict user permissions
QUESTION NO: 57
A technician has been tasked with disposing of hard drives that contain sensitive employee data.
Which of the following would be the BEST method to use for disposing of these drives?
A.
Recycling
B.
Shredding
C.
Overwriting
D.
Reformatting
Answer: B
Explanation:
QUESTION NO: 58
Ann, an executive, reports that she received a call from someone asking for information about her
email account. Which of the following type of potential security threats does this scenario
describe?
A.
Social engineering
B.
Spoofing
C.
Zero-day
D.
Man-in-the-middle
QUESTION NO: 59
A technician is configuring a new Windows computer for a home office. Which of the following
steps should the technician take to secure the workstation? (Select TWO).
A.
Rename default accounts
B.
Disable Windows Update
C.
Configure single sign-on
D.
Run gpupdate tool
E.
Disable guest account
F.
Disable Action Center pop-ups
Answer: A,E
Explanation:
QUESTION NO: 60
A.
RFID badge
B.
Mantrap
C.
Biometrics
E.
ID badge
Answer: D
Explanation:
QUESTION NO: 61
Which of the following Windows features would be used to encrypt a single file or folder?
A.
EFS
B.
NTFS
C.
BitLocker
D.
Security
Answer: A
Explanation:
QUESTION NO: 62
A.
Entry control roster
B.
Biometrics
C.
Mantrap
Answer: C
Explanation:
QUESTION NO: 63
A user wants to save a file into another user’s directory, but the file save is denied. Which of the
following is the MOST likely reason the file save cannot be completed?
A.
The user must be a member of the Users group
B.
The user requires write permissions to the folder
C.
The user requires read permission to the folder
D.
The user must be a member of the Administrators group
Answer: B
Explanation:
QUESTION NO: 64
A user leaves the workstation frequently and does not want sensitive material to be accessed. In
addition, the user does not want to turn off the computer every time in the evening. Which of the
following is the BEST solution for securing the workstation?
A.
Set a strong password that requires a renewal every 30 days.
B.
Run a screensaver after one minute of nonuse and fingerprint lock for afterhours.
C.
Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.
Answer: C
Explanation:
QUESTION NO: 65
A technician is configuring a SOHO router to ensure network computers can only use secured
protocols on the Internet. Which of the following ports should be allowed?
A.
143
B.
23
C.
443
D.
3269
E.
3389
Answer: C
Explanation:
QUESTION NO: 66
An end-user is attempting to access a file-sharing site to download files shared by a customer, but
is receiving a message stating the site has been blocked. Which of the following is the MOST
likely cause of this issue?
A.
Antivirus software
B.
"Pass Any Exam. Any Time." - www.actualtests.com 34
Comptia 220-902 Exam
Internet connectivity issues
C.
Ransomware infection
D.
Content-filtering
Answer: D
Explanation:
QUESTION NO: 67
Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a
message that updates are being installed. Which of the following is the MOST likely cause of this
issue?
A.
Time of day restrictions are enabled on the machine
B.
Scheduled antivirus scans and updates are enabled on the machine
C.
Remote desktop is enabled and an administrator has logged into the machine
D.
Automatic Windows Update is enabled on the machine
Answer: D
Explanation:
QUESTION NO: 68
A user advises that a computer is displaying pop-ups when connected to the Internet. After
updating and running anti-malware software, the problem persists and the technician finds that two
rogue processes cannot be killed. Which of the following should be done NEXT to continue
troubleshooting the problem?
A.
Run msconfig to clean boot the computer
"Pass Any Exam. Any Time." - www.actualtests.com 35
Comptia 220-902 Exam
B.
Run Event Viewer to identify the cause
C.
Run System Restore to revert to previous state
D.
Run Recovery Console to kill the processes
Answer: A
Explanation:
QUESTION NO: 69
A user reports that any URL entered redirects to the same web page. A technician concludes that
the user’s computer has been compromised. Which of the following tools would the technician use
to resolve the issue?
A.
Last known good configuration
B.
Anti-malware
C.
System restore
D.
Rogue antivirus
Answer: B
Explanation:
QUESTION NO: 70
A user’s email inbox is suddenly receiving dozens of rejection messages from various mail
servers. Which of the following would the technician perform to BEST solve the issue?
A.
Change the user’s email password.
C.
Change the email account from POP to IMAP.
D.
Disable the user’s email account.
Answer: A
Explanation:
QUESTION NO: 71
A technician receives a helpdesk ticket about an employee having a problem sending text
messages with a company Android smartphone. It has been determined that it is not a carrier
issue. Which of the following should the technician perform FIRST?
A.
Verify data connectivity
B.
Reformat the MicroSD card
C.
Replace the SIM card
D.
Perform a soft restore
Answer: A
Explanation:
QUESTION NO: 72
A networked PC has started to display adware pop-ups when the user opens the browser. Which
of the following best practices should the technician employ FIRST when responding to the
problem?
A.
Disable System Restore
"Pass Any Exam. Any Time." - www.actualtests.com 37
Comptia 220-902 Exam
B.
Schedule scans and run updates in safe mode
C.
Quarantine the system
D.
Create a System Restore point
Answer: C
Explanation:
QUESTION NO: 73
Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry
and would like a quick solution that would most likely fix the issue. Which of the following methods
can the technician use?
A.
Initiate a factory reset
B.
Perform a hard reset
C.
Remove the MicroSD card
D.
Rollback the OS update
Answer: B
Explanation:
QUESTION NO: 74
A customer reports that a smartphone is experiencing a very short battery life. The user has been
using this phone for a short time and has installed several apps recently. Which of the following
might be the cause of the issue?
A.
Slow data speeds
"Pass Any Exam. Any Time." - www.actualtests.com 38
Comptia 220-902 Exam
B.
Defective SD card
C.
Unauthorized root access
D.
Signal drop or weak signal
Answer: C
Explanation:
QUESTION NO: 75
A customer has recently installed several applications on a Windows 7 workstation and is now
experiencing slow system performance and spontaneous restarts. After removing some of the
recently installed applications, the issue persists. Which of the following tools could the technician
use to troubleshoot the problem while preventing data loss?
A.
Factory restore
B.
SecureBoot
C.
msconfig
D.
diskpart
Answer: C
Explanation:
QUESTION NO: 76
A user’s smartphone runs very slow at the end of the day. When the user restarts the phone in the
morning, it runs at its normal speed. Which of the following should be done throughout the day to
BEST resolve this issue?
A.
"Pass Any Exam. Any Time." - www.actualtests.com 39
Comptia 220-902 Exam
Reset to the smartphone to factory default.
B.
Uninstall any unused apps.
C.
Close all running apps.
D.
Charge the smartphone.
Answer: C
Explanation:
QUESTION NO: 77
After installing a critical update from Windows Update, a user accidentally types an incorrect URL
into the browser and malware is automatically installed. The malware disables the computer’s
antivirus software and Internet connection. Which of the following would be the BEST tool to
remove the malware without risking loss of the user’s data?
A.
Run System Restore
B.
Reinstall Windows with the Repair Option
C.
Reinstall Windows on top of itself
D.
Run System File Checker
Answer: A
Explanation:
QUESTION NO: 78
Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently
appears on the screen informing the user additional information is required to log in. Which of the
following is causing this?
B.
Cellular data roaming notifications
C.
Weak cellular signal
D.
Unintended Bluetooth connections
Answer: A
Explanation:
QUESTION NO: 79
An engineer working with large detailed CAD files notices over time that the workstation is taking
significantly longer to open files that used to launch quickly. Other applications work fine, and the
engineer confirms all of the data has been backed up the night before. A technician determines
that the workstation is about two years old. Which of the following would be the technician’s FIRST
step in troubleshooting the problem?
A.
Run defrag on the hard drive
B.
Restore the CAD files from backup
C.
Replace the hard drive
D.
Remove and reinstall the CAD software
Answer: A
Explanation:
QUESTION NO: 80
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his
desk and walks to a printer to retrieve documents. Joe is then required to type in his username
"Pass Any Exam. Any Time." - www.actualtests.com 41
Comptia 220-902 Exam
and password to unlock the computer. The technician looks at the settings on the PC and notices
that the screensaver and screen-lock options are grayed out on the computer and cannot be
changed. Which of the following is the MOST likely cause of this issue?
A.
Domain-level group policies
B.
Antivirus domain-level policies
C.
Corrupted registry settings
D.
Incorrect local-level user policies
Answer: A
Explanation:
QUESTION NO: 81
A Windows workstation is suspected of having malicious software that created an infected start-up
item or service. Which of the following tools would a technician use to test this theory?
A.
chkdsk
B.
msconfig
C.
dxdiag
D.
ipconfig
Answer: B
Explanation:
QUESTION NO: 82
A.
Quarantine infected system
B.
Schedule scans and run updates
C.
Report the issue to the information security officer
D.
Disable System Restore (in Windows)
E.
Educate end user
Answer: A
Explanation:
QUESTION NO: 83
A user updates the video driver on the computer and it requests a restart after installation. The
computer never gets past the loading Windows page without rebooting. Which of the following
should the technician use to resolve this issue without losing any vital files or programs?
A.
Emergency Repair Disk
B.
Restore from OEM image
C.
System Recovery
D.
Restore from backup
Answer: C
Explanation:
A user is having issues with a Windows computer. Upon loading the operating system, several
messages appear referring to a DLL file that cannot be found. Which of the following would be the
BEST course of action for the technician to perform NEXT?
A.
Copy the DLL file from a working PC and use the regsvr32 command to load the file
B.
Run the Windows Update utility to manually reinstall the DLL file
C.
Run the defrag utility to correct any fragmentation that may have damaged the file
D.
Research the DLL file to identify the application it corresponds to before continuing
Answer: D
Explanation:
QUESTION NO: 85
A user, Ann, receives a phone call from the company’s mail administrator who indicates her email
account has been disabled due to high volumes of emails being sent in a very short period of time.
Which of the following types of attack has the user experienced?
A.
Virus infection
B.
Man-in-the-middle attack
C.
Phishing attack
D.
Malware infection
Answer: A
Explanation:
A mobile phone has started to respond slowly and erratically. The user has done a soft reset and
the problem still exists. Which of the following is the BEST step the user can take to fix this
problem?
A.
Perform a force stop
B.
Reset to factory default
C.
Upgrade to a larger battery
D.
Close running apps
Answer: B
Explanation:
QUESTION NO: 87
A user reports browsing the Internet is slow and an icon with a picture of a person with a headset
keeps asking them to “click here for help.” The user has clicked on the icon to try to resolve the
slowness but all that happens is the computer redirects them to a website to purchase software.
Which of the following should be performed FIRST to resolve the issue?
A.
Create a restore point
B.
Run O/S updates
C.
Train the user of malicious software
D.
Identify the type of malware
Answer: D
Explanation:
QUESTION NO: 88
A technician receives a call regarding a PC’s slow performance. The client states that most
applications are slow to respond; boot up and shutdown take much longer than they used to. Hard
drive diagnostics pass, but there are error messages in the event viewer stating that the file
system is corrupt. Which of the following should the technician do NEXT?
A.
Reload the OS using FAT32 instead of NTFS.
B.
Change the disk from basic to dynamic.
C.
Run chkdsk with the /r switch and reboot the PC.
D.
Open the defrag utility and run a drive analysis.
Answer: C
Explanation:
QUESTION NO: 89
A technician has just fixed a user’s PC and successfully removed a virus and malware from the
machine. Which of the following is the LAST thing the technician should do?
A.
Educate the user regarding Internet browsing best practices
B.
Update the anti-malware software on the user’s PC
C.
Schedule scans and run updates
D.
Enable system restore and create restore point
Answer: A
Explanation:
QUESTION NO: 90
Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction.
The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the
following could be the issue?
A.
PRAM needs to be reset
B.
iCloud is corrupted
C.
The router needs to be rebooted
D.
The upgrade needs to be uninstalled
Answer: A
Explanation:
QUESTION NO: 91
Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device.
He now notices the battery is rapidly draining. Which of the following can Joe MOST likely do to
resolve the issue without a loss of data?
A.
Restart the mobile device.
B.
Update the device’s firmware.
C.
Uninstall the GPS-enabled app.
D.
Readjust the location settings.
Answer: D
Explanation:
QUESTION NO: 92
Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for
Internet access. The device display indicates there are two connections instead of just one. Which
of the following actions can he perform to prevent this unauthorized access to the device
immediately? (Select TWO).
A.
Change the SSID to a different broadcast name
B.
Add the intruding device to a blocked access list
C.
Access the intruder’s device and shut it down
D.
Shut down the device until the intruder is no longer in the area
E.
Set up a WiFi analyzer to identify the intruding device
Answer: A,B
Explanation:
QUESTION NO: 93
Ann, a customer, reports that when she occasionally works in the office basement, her
smartphone battery drains faster than normal and she has poor cellular reception. Which of the
following is the reason for the fast battery drain?
A.
Unpaired Bluetooth
B.
Weak signal
C.
Defective SD card
D.
Malware
Topic 5, Op Procedure
QUESTION NO: 94
A technician suspects that a computer issue is caused by a failed NIC. Following the
troubleshooting theory, which of the following is the NEXT step the technician should take?
A.
Identify the problem
B.
Document findings, actions and outcome
C.
Verify full system functionality
D.
Establish a theory of probable cause
E.
Test the theory to determine cause
Answer: E
Explanation:
QUESTION NO: 95
Which of the following is the BEST license type to comply with end user licensing agreement
(EULA) terms for commercial software used by multiple users in a corporate environment?
A.
Commercial license
B.
Enterprise license
C.
Seat license
Answer: B
Explanation:
QUESTION NO: 96
In preparation for an operating system upgrade, a technician is tasked with installing additional
memory modules in a computer. Which of the following safety steps should be performed FIRST?
A.
Use safety goggles
B.
Remove jewelry
C.
Put on an ESD strap
D.
Disconnect power
Answer: D
Explanation:
QUESTION NO: 97
Which of the following explains why it is important to secure Personally Identifiable Information
(PII)?
A.
So phishing attacks are not launched against employees of the organization.
B.
So sensitive information, such as corporate passwords, is not stolen.
C.
So man-in-the-middle attacks are not launched against the organization.
D.
Answer: D
Explanation:
QUESTION NO: 98
A customer calls the help desk to report an issue. The customer suggests that the problem is
hardware related, but the technician knows from the description that this is not the case. Which of
the following is the BEST course of action for the technician?
A.
Follow the customer’s prescribed course of action.
B.
Convince the customer to take a better course of action to resolve the issue.
C.
Explain why the customer’s prescribed course of action is incorrect.
D.
Acknowledge the customer’s input, but follow another course of action.
Answer: D
Explanation:
QUESTION NO: 99
A customer has made several trouble calls to the help desk and is very irate. The technician that
receives the call has learned that the issue has not yet been resolved. The technician politely asks
the customer to explain the issue, and learns that the problem needs to be escalated. Which of the
following should the technician do once the problem has been escalated?
A.
Communicate status with customer and ensure successful call transfer
B.
Remain on the line until the issue is resolved
C.
Inform the customer that the issue cannot be resolved at this level
"Pass Any Exam. Any Time." - www.actualtests.com 51
Comptia 220-902 Exam
D.
Tell customer that patience will be needed
Answer: A
Explanation:
A customer is reporting a burning smell coming from a CRT monitor. Which of the following should
be taken into consideration before attempting to resolve the customer’s issue?
A.
Disconnect power before inspecting the CRT power supply
B.
CRT monitors should be serviced by qualified personnel
C.
Have compressed air available to clear out the debris
D.
Wear safely goggles to protect from the cathodes
Answer: B
Explanation:
A technician has purchased a new surge protector to protect equipment in the production
environment. The surge protector’s features safeguard the connected equipment by directing
surges to the:
A.
path of shortest conductance.
B.
path of lowest inductance.
C.
path of highest voltage.
Answer: D
Explanation:
A new help desk technician receives a trouble call from a user. The issue is something the
technician has never encountered before, and does not know where to begin troubleshooting. The
FIRST course of action is for the technician to:
A.
tell the customer the issue needs to be escalated to a higher tier technician.
B.
ask the customer if they would mind holding for no more than two minutes to check resources.
C.
tell the customer this is the first time encountering the issue and to please be patient.
D.
ask the customer to please hold while a senior technician is consulted regarding the issue.
Answer: B
Explanation:
A technician is working on a home theater PC in a location where the electrical system may not be
properly grounded. As the technician is finishing the installation, which of the following should the
computer technician do before connecting a cable TV line to a TV tuner card?
A.
Perform self-grounding
B.
Unplug the computer power cable
C.
Use an ESD strap
"Pass Any Exam. Any Time." - www.actualtests.com 53
Comptia 220-902 Exam
D.
Require the electrical system be brought up to code
Answer: B
Explanation:
When dealing with a difficult customer, which of the following is the BEST way to handle the
situation?
A.
Do not argue with the customer and/or be defensive
B.
Use technical terms to assure customer confidence
C.
Escalate the customer’s issue to a supervisor
D.
Sympathize with the customer about the issue
Answer: A
Explanation:
A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of
the following safety procedures should be used to prevent damaging the new part?
A.
Ground the computer and remove jewelry.
B.
Self ground and handle the new card by the edges.
C.
Place the computer on an ESD mat.
D.
Answer: B
Explanation:
A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of
the following is the BEST method of removing the dust from the computer?
A.
Use compressed air to free the dust from the components and remove it with an ESD vacuum.
B.
Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away.
C.
Use a shop vacuum with enough power to ensure all dust has been removed.
D.
Remove as much dust as possible by hand and use compressed air to blow the rest out.
Answer: A
Explanation:
A technician has been given a PC that is not powering up. After brief troubleshooting, the
technician comes to the conclusion the power supply needs to be replaced. Which of the following
is the NEXT step in the process of performing the repair?
A.
The technician should replace the power supply
B.
The technician should review disposal regulations
C.
The technician should check the environment
D.
Answer: D
Explanation:
A manager suspects a user has obtained movies protected by copyright using a torrent client. An
incident response technician responds and verifies the user has indeed been violating company
policy. Which of the following would be the next BEST step for this technician to perform?
A.
Secure the workstation in a limited access facility.
B.
Document the incident, purge all policy violating materials.
C.
Immediately delete all unauthorized materials.
D.
Reprimand the user and apply a content filter to their profile.
Answer: A
Explanation:
A customer is experiencing issues with email and calls the help desk. The technician determines it
would help clarify the issue if the customer agrees to share their desktop. Prior to establishing a
Remote Desktop Assistance connection with a customer, a technician should ask the customer to:
A.
close any items of a personal nature.
B.
reboot the computer and log back in.
C.
capture a screen-shot of the error message.
Answer: A
Explanation:
A user calls the help desk because a folder containing critical business files is missing from the
local drive. The user is adamant that the folder was there the previous day, and cannot understand
why it is gone. The technician views the properties of the parent folder and sees a back up listed
on the “Prior Versions” tab. According to the theory of troubleshooting, which of the following is the
technician’s NEXT step?
A.
Establish a theory of probable cause
B.
Establish a plan of action and implement the solution
C.
Document findings, actions and outcomes
D.
Verify full system functionality and implement preventive measures
Answer: A
Explanation:
A newly deployed Windows PC cannot connect to the antivirus server on the local network for
updates, but it can connect to other file servers and printers without issue. Which of the following
is the MOST likely cause of this issue?
A.
The PC’s Windows firewall is misconfigured
C.
The PC is on the wrong wireless network
D.
The PC does not have remote assistance turned on
Answer: A
Explanation:
Ann, an end user, receives a call from someone claiming to be from the help desk and asking for
her username and password to prevent her email box from being deleted immediately. Which of
the following BEST describes this type of attack?
A.
Shoulder surfing
B.
Man-in-the-middle
C.
Social engineering
D.
Ransomware
Answer: C
Explanation:
Which of the following is the BEST option to prevent data breaches on lost mobile devices?
A.
Install a locator application on the mobile device so that it can be traced.
B.
C.
Configure the device to remote wipe as soon as it is reported lost.
D.
Utilize the fingerprint scanner and passcode for multifactor authentication.
Answer: C
Explanation:
A PC technician has been asked to verify certain Group Policies applied on a workstation. Which
of the following commands should be run on the workstation?
A.
extract
B.
tasklist
C.
gpupdate
D.
gpresult
E.
chkdsk
Answer: D
Explanation:
A user is configuring the email settings on a smartphone. Which of the following configurations will
allow the user to synchronize email from multiple devices?
A.
IMAP
C.
POP3
D.
SMTP
Answer: A
Explanation:
An end user receives an unsolicited and unencrypted email containing a co-workers birth date and
social security number. The end user should immediately contact the IT department and report a
violation of which of the following policies?
A.
DRM
B.
EULA
C.
IRP
D.
PII
Answer: D
Explanation:
Which of the following file formats does Android use for application installation?
A.
.ipa
B.
C.
.apk
D.
.exe
E.
.sdk
Answer: C
Explanation:
A technician has decided to upgrade all users’ iPhones to the latest model. Which of the following
is the FIRST thing the technician should advise the users to do with the old phones before turning
them in?
A.
Back up the mobile data with a cloud backup service.
B.
Enable remote wipe to clear all personal and corporate data.
C.
Go into the device settings to remove personal customizations.
D.
Factory reset the old phones to ensure the data is no longer on the device.
Answer: A
Explanation:
A technician has just installed a video card in a PC. The video card is not working, although it was
working fine on the test bench. Which of the following Windows tools should the technician use to
start troubleshooting the problem?
B.
Device Manager
C.
System Configuration
D.
Computer Management
Answer: B
Explanation:
A network administrator notices a new WiFi connection has appeared as a wireless network
choice and is always at the top of the list. As a result, users are constantly trying to connect to the
wrong network. Which of the following should the administrator do to correct this issue?
A.
Adjust the wireless router antennas to 90 degrees clockwise from the current position.
B.
Ask the new wireless network owner to adjust the radio power level so it is listed below the
company’s network.
C.
Set all of the WiFi users’ wireless profiles to automatically connect to the company network.
D.
Change the company’s channel to a lower number than the new network’s channel.
Answer: C
Explanation:
Which of the following is a security threat that disguises itself as legitimate software?
B.
Worm
C.
Virus
D.
Spyware
Answer: A
Explanation:
A technician is called into the office during a thunderstorm. Users are reporting that machines are
intermittently powering off. Which of the following will BEST prevent user data loss?
A.
Auto save
B.
A surge protector
C.
An ESD mat
D.
A UPS
Answer: D
Explanation:
A customer reports very slow wireless connection speeds in the new office. Which of the following
tools should a technician use to troubleshoot the issue?
A.
B.
Loopback plug
C.
Signal booster
D.
Packet sniffer
Answer: A
Explanation:
A user is experiencing a software application error. The user contacts a technician for support.
Which of the following will allow the user to issue an invitation to the technician in this scenario?
A.
Remote desktop
B.
Remote assistance
C.
telnet
D.
FTP
Answer: B
Explanation:
A computer was recently infected by malware after a flash drive was plugged in. The user, Ann,
indicates she never opened any files or folders from the flash drive. A technician needs to prevent
this from occurring in the future. Which of the following would accomplish this?
A.
B.
Set strong passwords
C.
Disable usermin
D.
Disable AutoRun
Answer: D
Explanation:
A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the
following is the BEST option to modify the size of the partition?
A.
Credential Manager
B.
Computer Management
C.
Device Manager
D.
TPM Manager
Answer: B
Explanation:
Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit
slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann
restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of
the following is the BEST action to troubleshoot this problem?
B.
Reset to factory default
C.
Disable cloud syncing
D.
Replace the device’s battery
Answer: A
Explanation:
A user has been granted permission to access the corporate network from a personal smartphone.
Which of the following should a technician perform before configuring the phone for access?
A.
Check the phone for unauthorized root access
B.
Disable the phone’s Bluetooth chip
C.
Erase all personal data from the phone
D.
Check the phone for location tracking
Answer: A
Explanation:
Which of the following features is being used when a smartphone is used to purchase a product at
a retail kiosk?
A.
B.
Virtual assistant
C.
SDK
D.
Bluetooth
Answer: A
Explanation:
Which of the following security threats happens when another person enters a secured area with
an authorized person?
A.
Tailgating
B.
Shoulder surfing
C.
Spoofing
D.
Phishing
Answer: A
Explanation:
A.
Introducing malware onto the network
C.
Different encryption technology
D.
Higher risk of phishing attacks
Answer: A
Explanation:
A company is concerned about users tailgating into restricted areas. In order to prevent
unauthorized users from following others, which of the following should be implemented?
A.
Biometric locks
B.
CCTV
C.
Mantraps
D.
Badge readers
Answer: C
Explanation:
An administrator wants to give a user limited access rights in Windows Vista so that the user can
install printers and create local user accounts. Which of the following accounts should the
administrator create for the user?
A.
Power user
C.
Standard
D.
Guest
Answer: A
Explanation:
A user reports the Internet connection is not working on the corporate network. After running
through the troubleshooting steps, the administrator finds the computer has a valid IP address,
can connect to network shares, and can view local intranet pages in the web browser. The
administrator tries navigating to a public Internet page and it times out. Which of the following
should the technician configure next?
A.
Hosts files
B.
IPv6 settings
C.
Proxy settings
D.
Lmhosts files
Answer: C
Explanation:
A user reports several technicians have been unable to solve a problem and requests that the
technician on the phone comes out to fix the problem because the user is unable to work. After the
technician has effectively communicated a willingness to help, which of the following is the NEXT
step?
B.
Identify the problem.
C.
Establish a theory.
D.
Immediately go to the user’s office.
Answer: B
Explanation:
An IPS appliance is installed on the network. Which of the following is the purpose of the IPS?
A.
To check the network for unwanted activity
B.
To check and stop unwanted activity
C.
To provide connectivity to the network
D.
To test the resilience of the network
Answer: B
Explanation:
A user wants to be able to access email from all devices. Which of the following formats should be
used to allow this synchronization?
A.
SMTP
C.
POP3
D.
IMAP
Answer: D
Explanation:
Which of the following tasks is automatically added to the task scheduler in Windows to keep hard
disk performance up?
A.
defrag
B.
chkdsk
C.
cleanmgr
D.
diskpart
Answer: A
Explanation:
A user notices the social media apps are constantly updated with the user’s precise location. The
user is worried about privacy and would like to keep this information from being broadcast online.
Which of the following features should the user adjust in order to accomplish this?
A.
Geotracking
C.
WiFi
D.
Tethering
Answer: A
Explanation:
A user’s personal laptop was hacked. A technician troubleshooting the issue discovers the user
used the numbers 123456789 as their account password. The user has not changed the password
in two years. Which of the following best practices should the technician recommend the user
implement to prevent future hacking? (Select TWO).
A.
Configure screen saver
B.
Set a strong password
C.
Set login time restrictions
D.
Use a more secure browser
E.
Change the password frequently
Answer: B,E
Explanation:
A technician would like to remove the dust inside of a desktop computer. Which of the following
should the technician use to MINIMIZE exposure to the dust while protecting internal hardware
components? (Select TWO).
"Pass Any Exam. Any Time." - www.actualtests.com 72
Comptia 220-902 Exam
A.
Mask
B.
ESD mat
C.
ESD strap
D.
Antistatic bag
E.
Safety goggles
F.
Rubber gloves
Answer: A,E
Explanation:
A company has subscribed to a cloud service, paying monthly for a block of services and being
billed incrementally when they exceed the monthly fee. Which of the following cloud concepts
does this represent?
A.
Measured service
B.
Rapid elasticity
C.
On-demand
D.
Resource pooling
Answer: A
Explanation:
Which of the following Windows utilities would MOST likely be used to identify system errors?
A.
System Restore
B.
Event Viewer
C.
Security Center
D.
Windows Defender
Answer: B
Explanation:
A user frequently travels with a Windows laptop and connects to several wireless networks. At a
new location, the user reports that the locally shared printers are not available on the wireless
connection. Which of the following would be causing the issue?
A.
The location profile is set to public.
B.
Workgroup is disabled.
C.
The proxy settings are misconfigured.
D.
Remote assistance is not configured.
Answer: A
Explanation:
A.
msconfig
B.
Task Manager
C.
Event Viewer
D.
netmon
Answer: B
Explanation:
A user has a new web email account and asks a technician for help with setting up email on a
tablet. The user would like for the email to only be stored on this tablet. Which of the following
email server setting types would the technician use to accomplish this task?
A.
POP3
B.
IMAP
C.
S/MIME
D.
SMTP
Answer: A
Explanation:
A.
Place directional antennas
B.
Use omni-directional antennas
C.
Enable MAC filtering
D.
Disable SSID broadcast
Answer: A
Explanation:
A technician needs to install a clean Windows OS on several laptops in the office. The office is
running a 100Base-T network. The owner would like the installations completed as soon as
possible. Which of the following installation methods should the technician use?
A.
FireWire External Hard Drive
B.
PXE-based Network Installation
C.
USB 3.0 Flash Drive
D.
DVD-ROM
Answer: C
Explanation:
A.
Transfer data via WiFi Direct to the user’s laptop.
B.
Use Bluetooth to share data from the phone.
C.
Connect the iPhone’s USB cable and use iTunes.
D.
Copy the data from the phone to a MicroSD card.
Answer: C
Explanation:
A customer’s Windows 7 Home Premium computer displays a stop error and automatically
reboots. Which of the following system utilities can a support technician use to find more
information about the cause of the error?
A.
Action Center
B.
Event Viewer
C.
File Explorer
D.
Disk Management
Answer: B
Explanation:
A.
Identify symptoms, quarantine infected system, and create restore point.
B.
Quarantine infected system, identify symptoms, and create restore point.
C.
Identify symptoms, educate end user, and create restore point.
D.
Create restore point, identify symptoms, and quarantine infected system.
Answer: A
Explanation:
Which of the following Windows OS capabilities allows modern Windows versions to run
applications written for older versions natively?
A.
Microsoft Virtual PC
B.
Compatibility mode
C.
Hyper-V
D.
Virtual XP mode
Answer: B
Explanation:
A.
USB flash drive
B.
CD-ROM
C.
PXE
D.
GRUB
Answer: C
Explanation:
Which of the following would a technician use to search for a specific string within a file name?
A.
grep
B.
chmod
C.
wget
D.
sudo
Answer: A
Explanation:
Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with
A.
USB authentication token
B.
Filesystem access controls
C.
Trusted platform module
D.
Fingerprint reader
Answer: C
Explanation:
A user recently purchased a video card for gaming purposes. The user installed the appropriate
drivers and validated they work using vendor-supplied test tools. However, while gaming, the
speed of the case fans increases, the entire system locks up, and the user must hard boot to
restart the computer. Which of the following is the MOST likely cause of this issue?
A.
Unsupported operating system
B.
Unacceptable CPU type and speed
C.
Insufficient airflow and cooling
D.
Inadequate video RAM amount
Answer: C
Explanation:
A.
A valid certificate suitable for S/MIME is not installed.
B.
Emails received by the user lack suitable digital signatures.
C.
SSL/TLS certificates stored on the device are expired.
D.
The sender did not have the addressee’s public certificate.
Answer: A
Explanation:
An office manager mistakenly uninstalled a valuable application. Which of the following utilities
may allow the manager to correct this issue?
A.
System Restore
B.
Computer Management
C.
Disk Management
D.
System Configuration
Answer: A
Explanation:
Which of the following commands are used from a Linux command line interface to elevate a
A.
chmod
B.
passwd
C.
sudo
D.
su
E.
runas
F.
pwd
Answer: C,D
Explanation:
A.
Install more physical memory.
B.
Increase the size of the virtual hard drive.
C.
Install a different hypervisor.
D.
Reduce physical memory allocated to the VM.
E.
Clear temporary files in the VM.
F.
"Pass Any Exam. Any Time." - www.actualtests.com 82
Comptia 220-902 Exam
Install additional physical hard drives.
Answer: A,D
Explanation:
A technician is in need of a device that would give the BEST network protection within a single
device. Which of the following devices would the technician use?
A.
NLX
B.
IDS
C.
UTM
D.
ATX
Answer: C
Explanation:
A user needs their email set up on their iOS device. The email needs to synchronize all changes
made with the server and the PC. Which of the following would the technician use to accomplish
this?
A.
IMAP
B.
SMTP
C.
SMNP
D.
Answer: A
Explanation:
A user needs to connect securely to the company network while working from a hotel room. Which
of the following would the user need available to accomplish this?
A.
AES
B.
VPN
C.
UTM
D.
WPA2
Answer: B
Explanation:
A technician is tasked with analyzing computer settings managed by Microsoft Group Policy
configuration. The technician wants to print a report to an HTML file for offline review. Which of the
following Windows command line tools would allow the technician to accomplish this task?
A.
gpedit.msc
B.
gpupdate
C.
gpresult
D.
Answer: C
Explanation:
A technician has just upgraded RAM on a user’s workstation from 4GB to 8GB. The technician
now wants to adjust the page file size on the system to the recommended Microsoft settings.
Which of the following should be entered for the “Min” portion of the page file setting if using these
best practices?
A.
4096MB
B.
8192MB
C.
12288MB
D.
16328MB
Answer: C
Explanation:
A technician has been informed by the IT security manager that a vulnerability has been
discovered in the wireless router. The vulnerability could allow an attacker to take remote control
of the device. Which of the following should the technician perform to address the issue?
A.
Power off the device
B.
Install an add-on card
C.
Update the WiFi antenna
"Pass Any Exam. Any Time." - www.actualtests.com 85
Comptia 220-902 Exam
D.
Update firmware
Answer: D
Explanation:
While navigating a Windows machine through command prompt, which of the following commands
will a technician use to display the contents of the current folder?
A.
cd
B.
dir
C.
md
D.
rd
Answer: B
Explanation:
A technician is using a domain account to access files located on a server at the path
\\computername\C$. The technician receives an “Access denied” error message. Which of the
following is MOST likely the cause of the error?
A.
The server is no longer accepting connections since reaching its limit of open shares.
B.
The password is incorrect, requiring the user to reset it before authentication will proceed.
C.
The username should be prefixed by the domain, followed by a backslash (e.g.,
domain\username).
"Pass Any Exam. Any Time." - www.actualtests.com 86
Comptia 220-902 Exam
D.
The account does not have local administrative permissions to access the server share.
Answer: D
Explanation:
A user in a corporate environment needs to have a laptop device repaired and takes the device to
the appropriate technician. Which of the following should the technician offer to the user in order to
maintain professionalism?
A.
Ask to user to wait in the area while repairs are being made.
B.
Offer a temporary loaner laptop for the user to work on.
C.
Inform the user that it will be ready “sometime” and to come back later.
D.
Ask the user to bring the laptop back when the department is less busy.
Answer: B
Explanation:
Joe, a technician, arrives onsite at a customer’s home. Upon entering the home, Joe notices an
unpleasant odor. In response to this, Joe pinches his nose and holds his breath. After Joe leaves,
the customer reports the behavior to Joe's supervisor. The supervisor decides the issue must be
addressed. Which of the following topics would the supervisor be MOST likely to cover?
A.
Maintaining good communications with the customer
B.
Maintaining good personal hygiene
C.
"Pass Any Exam. Any Time." - www.actualtests.com 87
Comptia 220-902 Exam
Avoiding being judgmental
D.
Avoid dismissing the customer’s problems
Answer: C
Explanation:
A technician is working a trouble ticket for a user. After addressing the issue, the technician asks
the user to verify functionality. The user confirms the system is functioning, but the computer’s
speakers now emit an irritating noise. The technician states this is a byproduct of the solution, and
the user will eventually get used to the noise. Which of the following professionalism principles is
the technician failing to address?
A.
Avoiding being judgmental
B.
Avoiding dismissal of the customer’s problems
C.
Avoiding an argument with the customer
D.
Maintaining a positive attitude
Answer: B
Explanation:
A recent data breach has revealed that compromised files contained employee photos, names,
and addresses. This information is sensitive because it is considered to be:
A.
a detriment to employer/employee relations.
B.
personally identifiable information.
"Pass Any Exam. Any Time." - www.actualtests.com 88
Comptia 220-902 Exam
C.
a violation of information access policies.
D.
proof of employee corporate affiliation.
Answer: B
Explanation:
An IT manager needs to reimage 30 computers in a lab. The image has already been created and
is ready to be deployed via the network. Which of the following tasks should be completed FIRST?
A.
Boot from PXE.
B.
Install Windows using DVD.
C.
Reboot computers with USB drive.
D.
Press F8 while rebooting.
Answer: A
Explanation:
A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not
run correctly and is reporting that the .dll is missing. Which of the following tools would the
technician use to complete the import of the .dll?
A.
gpresult
B.
msconfig
D.
gpupdate
E.
regsrv32
Answer: E
Explanation:
A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning
technologies should the technician use to satisfy these requirements?
A.
GPT
B.
Logical
C.
MBR
D.
Extended
Answer: A
Explanation:
A technician is tasked to change the number of CPU cores available to the OS to enhance
productivity. Which of the following tools would allow the technician to perform this task?
A.
msconfig
B.
C.
taskmgr
D.
dxdiag
Answer: A
Explanation:
A technician is tasked with removing a virus file that created a custom service. The technician has
located the file to be removed using an antivirus scanner, but the scanner did not successfully
remove the file. When the technician attempts to manually remove the file, an error message
appears that says, “The file is in use by another program.” Which of the following tools would be
the BEST to use to correct the issue?
A.
Terminal
B.
SFC
C.
Event Viewer
D.
Services Console
E.
Recovery Console
Answer: D
Explanation:
The system administrator is tasked with installing Windows to 100 computers over the network.
The systems administrator needs to remove system-specific identifiers. Which of the following
would the system administrator use to accomplish this?
"Pass Any Exam. Any Time." - www.actualtests.com 91
Comptia 220-902 Exam
A.
Windows Deployment Services
B.
Remote Installation Services
C.
System Preparation Tool
D.
Unattended installation
Answer: C
Explanation:
A technician installs a new application and restarts the computer. After signing in to Windows, an
error message appears stating that the application did not start automatically as intended. After
confirming the software has installed correctly, which of the following tools would be used to
troubleshoot this problem?
A.
msconfig
B.
appwiz.cpl
C.
gpedit
D.
regsrv32
Answer: A
Explanation:
A technician is installing Windows 7 on a computer with a previously used hard drive. After
receiving an error, the technician realizes the hard drive does not support this install. Which of the
following tasks should the technician perform?
"Pass Any Exam. Any Time." - www.actualtests.com 92
Comptia 220-902 Exam
A.
Partition the hard drive in Extended format.
B.
Use Windows Update to download the appropriate driver.
C.
Enable Multiboot in the BIOS.
D.
Convert the file system to NTFS.
Answer: D
Explanation:
A technician’s is onsite troubleshooting a user's issue and receives a call from another customer.
Which of the following is the BEST course of action for the technician to take in this situation?
A.
Let the call go to voicemail and respond when time permits.
B.
Leave the current appointment to assist the calling customer.
C.
Ignore the call and continue with the scheduled itinerary.
D.
Apologize to the customer and answer the call.
Answer: A
Explanation:
A user has installed two new drives in one of the computers in the computer lab and has been
unable to format Disk1 from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition
The new partitions must be formatted to ensure that users’ files can be secured from other users
and that disk must be configured to account for future redundancy.
Instructions: Conduct the necessary steps within the Disk Manager to accomplish these tasks.
When you have completed the simulation, please, select the Done button to submit.
Answer:
See explanation
Explanation:
A computer is displaying a pop-up message demanding payment or the hard drive will be
encrypted. Which of the following BEST describes this type of malware?
A.
Trojan
C.
Spyware
D.
Worm
Answer: B
Explanation:
Several users of a shared computer report that Windows often indicates an improper shutdown
was experienced upon power on. Which of the following would be the BEST course of action to
determine which user is responsible for causing the issue?
A.
Review the System Log
B.
Check msconfig utility
C.
Checkboot. ini
D.
Review the ntuser.dat file
Answer: A
Explanation:
After confirming BIOS support, technician has added a second video card and a new sound card
to a computer’s motherboard. The computer continuously restarts. This is an indication of which of
the following.
A.
Incompatible sound card
"Pass Any Exam. Any Time." - www.actualtests.com 99
Comptia 220-902 Exam
B.
Insufficient power supply
C.
Insufficient memory
D.
Defective video card
Answer: B
Explanation:
A computer on a Windows domain has been identified as not having the most current policy.
Which of the following tools would a technician run on the local machine to rectify this?
A.
gpresult
B.
msconfig
C.
ipconfig
D.
gpupdate
Answer: D
Explanation:
A user running Windows 7 has reported that a computer has crashed and a BSOD displayed. The
computer was restarted and now the user reports that it is running slower than usual, especially
when multiple programs are open at the same time. The technician knows the system has 8GB of
memory (2x 4G DIMMS), and suspects that the system has a faulty memory module and has
disabled one of the DIMMs. Which of the following would a technician do to confirm that the OS is
now only detecting 4GB of memory?
B.
In the Control Panel, click System.
C.
In the Control Panel, click Device Manager.
D.
In the Control Panel, click Performance Information and Tools.
Answer: B
Explanation:
A technician needs to repurpose a hard drive that has confidential information on it. Which of the
following methods is MOST appropriate?
A.
Incineration
B.
Overwrite
C.
Degauss
D.
Quick format
Answer: D
Explanation: