Exam Code: 220-902 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA A+ Certification Exam (902)
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass 220-902 Exam.
Q81. A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO).
B. ESD mat
C. ESD strap
D. Antistatic bag
E. Safety goggles
F. Rubber gloves
Q82. In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?
A. Use safety goggles
B. Remove jewelry
C. Put on an ESD strap
D. Disconnect power
Q83. A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
Q84. A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT?
A. Document findings, actions, and outcomes
B. Escalate problem to a senior technician
C. Re-establish new theory of probable cause
D. Perform a full system backup
Q85. A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications?
A. Microsoft Store
C. Google Play
Q86. Which of the following is the command line entry to start an archive or restore a process on a Windows XP computer?
Q87. Which of the following is TRUE about the difference between a worm and a virus?
A. Worms are written in assembly while viruses are written with scripting languages.
B. Viruses hide in the boot record while worms hide within the file system.
C. Worms self propagate while viruses need human intervention to replicate.
D. Viruses disable the antivirus update service while worms kill the antivirus process.
Q88. Which of the following is a security threat that disguises itself as legitimate software?
Q89. A technician responds to a hardware issue with a server. The technician discovers that one of the hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the following steps would the technician perform NEXT?
A. Remove the hard drive and back up the data
B. Run CONVERT on the hard drive
C. Reboot the server
D. Swap hard drive and rebuild array
Q90. An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem?
A. Run defrag on the hard drive
B. Restore the CAD files from backup
C. Replace the hard drive
D. Remove and reinstall the CAD software