The CompTIA 220-902 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover operating systems like Windows, Macintosh OSX and Linux as well as topics like security, software troubleshooting and operational procedures.
1) Which of the following Windows options will use the least amount of power?
Hibernation mode will save the contents of the RAM to non-volatile memory for the duration of the powered down state. Sleep mode however, draws minimal power to keep the RAM from clearing.
This question is filed under objective 1, Windows Operating Systems
Hibernation (also known as suspend to disk, or Safe Sleep on Macintosh computers) in computing is powering down a computer while retaining its state When hibernation begins, the computer saves the contents of its random access memory (RAM) to a hard disk or other non-volatile storage When the computer is turned on the RAM is restored and the computer is exactly as it was before entering hibernation Hibernation was first implemented in 1992 and patented by Compaq Computer Corporation in Houston, Texas As of 2020, Microsoft's Windows 10 employs a type of hibernation by default when shutting down … Read More
2) Where can you find a shortcut icon to the Windows Memory Diagnostic Tool while using Microsoft Windows 7?
In the control panel, navigate to Administrative Tools. Inside that option, you can find the Windows Memory Diagnostic Tool.
This question is filed under objective 5, Operational Procedures
The Control Panel is a component of Microsoft Windows that provides the ability to view and change system settings It consists of a set of applets that include adding or removing hardware and software, controlling user accounts, changing accessibility options, and accessing networking settings Additional applets are provided by third parties, such as audio and video drivers, VPN tools, input devices, and networking tools The Control Panel has been part of Microsoft Windows since Windows 10, with each successive version introducing new applets Beginning with Windows 95, the Control Panel is implemented as a special folder, ie the folder does not physically exist, but only contains shortcuts to various applets such as Add or Remove Programs… Read More
3) If you had a Windows system, what command prompt would you use to decompress update files?
To decompress update and other files, you would use the EXPAND command prompt.
This question is filed under objective 1, Windows Operating Systems
4) What does the /R switch of the CHKDSK utility do on Disk Operating System (DOS), OS/2, or windows systems?
The /r switch will locate bad sectors and recover the information it can from the drive.
This question is filed under objective 2, Other Operating Systems & Technologies
In computing, CHKDSK (short for "check disk") is a system tool and command in DOS, Digital Research FlexOS, IBM/Toshiba 4690 OS, IBM OS/2, Microsoft Windows and related operating systems It verifies the file system integrity of a volume and attempts to fix logical file system errors It is similar to the fsck command in Unix and similar to Microsoft ScanDisk which co-existed with CHKDSK in Windows 9x and MS-DOS 6x … Read More
5) Which of the command-line commands in Microsoft Windows launches the Device Manager tool?
This command will run the Device Manager, which allows the administrator to view and manage hardware on the system
This question is filed under objective 4, Software Troubleshooting
Device Manager is a Control Panel applet in Microsoft Windows operating systems It allows users to view and control the hardware attached to the computer When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with The list of hardware can be sorted by various criteriaFor each device, users can: Supply device drivers in accordance with the Windows Driver Model Enable or disable devices Tell Windows to ignore malfunctioning devices View other technical propertiesDevice Manager was introduced with Windows 95 and later added to Windows 2000 In NT-based versions, it is included as a Microsoft Management Console snap-in… Read More
6) The Microsoft Windows command-line commands used for creating a directory or subdirectory include:
7) When you use the COPY command, what switch would you use to verify that new files are written correctly?
The copy command can be used across many Operating Systems (OS). The switch /V will verify the new files are written correctly.
This question is filed under objective 2, Other Operating Systems & Technologies
In computing, copy is a command in various operating systems The command copies computer files from one directory to another … Read More
8) You can use the Windows Task Scheduler to schedule updates while everyone is out of the office, or during the weekend. Where would you navigate to find the Windows Task Scheduler?
You would navigate to start > control panel > administrative tools > Task Scheduler, or simply search for task scheduler in the search bar.
This question is filed under objective 5, Operational Procedures
In computing, scheduling is the method by which work is assigned to resources that complete the work The work may be virtual computation elements such as threads, processes or data flows, which are in turn scheduled onto hardware resources such as processors, network links or expansion cards A scheduler is what carries out the scheduling activity Schedulers are often implemented so they keep all computer resources busy (as in load balancing), allow multiple users to share system resources effectively, or to achieve a target quality of service Scheduling is fundamental to computation itself, and an intrinsic part of the execution model of a computer system… Read More
9) Which parameter of the Change Directory (CD) command in Windows moves the command-line prompt one folder up in the directory tree?
10) The 4 GB maximum file size limit and 2 TB maximum partition size limit are the characteristic features of:
11) What is the Windows built-in software that monitors network traffic requests, and will determine whether to block or allow it depending on the settings?
Windows Firewall is a software firewall, that you can use to block or allow different requests. In Windows 10 it is called Windows Defender Firewall.
This question is filed under objective 3, Security
Windows Firewall (officially called Windows Defender Firewall in Windows 10), is a firewall component of Microsoft Windows It was first included in Windows XP and Windows Server 2003 Prior to the release of Windows XP Service Pack 2 in 2004, it was known as Internet Connection Firewall With the release of Windows 10 version 1709 in September 2017, it was renamed Windows Defender Firewall … Read More
12) When using Internet Explorer, what is the tab where you can manage pop-ups?
In the Internet Options, the privacy tab has the check box to turn on/off the pop-up blocker.
This question is filed under objective 3, Security
13) Preboot Execution Environment (PXE) and Apple NetBoot are two examples of technologies that enable booting a computer system with the use of a network interface.
These allow an administrator to remotely load an operating system on a client computer without being physically there.
This question is filed under objective 2, Other Operating Systems & Technologies
In computing, the Preboot eXecution Environment, PXE (most often pronounced as pixie) specification describes a standardized client–server environment that boots a software assembly, retrieved from a network, on PXE-enabled clients On the client side it requires only a PXE-capable network interface controller (NIC), and uses a small set of industry-standard network protocols such as DHCP and TFTP The concept behind the PXE originated in the early days of protocols like BOOTP/DHCP/TFTP, and as of 2015 it forms part of the Unified Extensible Firmware Interface (UEFI) standard In modern data centers, PXE is the most frequent choice for operating system booting, installation and deployment… Read More
14) Which tab of the System Properties Windows applet provides access to the System Restore settings?
System Restore settings are found in the System Protection tab of the System Properties applet window. System Restore can be used to undo system changes by reverting a computer to a previous restore point. This is helpful if a newly installed application is causing issues (e.g. a buggy driver) or unwanted system configuration changes have been made (e.g. incorrect Windows Registry changes).
This question is filed under objective 3, Security
System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems First included in Windows Me, it has been included in all following desktop versions of Windows released since, excluding Windows Server In Windows 10, System Restore is turned off by default and must be enabled by users in order to function This does not affect personal files such as documents, music, pictures, and videos… Read More
15) When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:
Event Viewer shows all the logs and activities on your system. It can be accessed by searching "Event Viewer", or start > control panel > administrative tools > event viewer.
This question is filed under objective 1, Windows Operating Systems
Event Viewer is a component of Microsoft's Windows NT operating system that lets administrators and users view the event logs on a local or remote machine Applications and operating-system components can use this centralized log service to report events that have taken place, such as a failure to start a component or to complete an action In Windows Vista, Microsoft overhauled the event systemDue to the Event Viewer's routine reporting of minor start-up and processing errors (which do not, in fact, harm or damage the computer), the software is frequently used by technical support scammers to trick the victim into thinking that their computer contains critical errors requiring immediate technical support… Read More
16) To troubleshoot applications running on a system by studying the usage of that application, you can use the Task Manager, and navigate to the Processes tab.
You would use the Processes tab to show each individual application's demand on the system's resources, while Performance tab is used to see the overall total usage on your systems resources.
This question is filed under objective 4, Software Troubleshooting
Task Manager, previously known as Windows Task Manager, is a task manager, system monitor, and startup manager included with Microsoft Windows systems It provides information about computer performance and running software, including name of running processes, CPU load, commit charge, I/O details, logged-in users, and Windows services Task Manager can also be used to set process priorities, processor affinity, start and stop services, and forcibly terminate processes The program can be started in recent versions of Windows by pressing ⊞ Win+R and then typing in taskmgrexe, by pressing Ctrl+Alt+Delete and clicking Start Task Manager, by pressing Ctrl+⇧ Shift+Esc, by right-clicking on the Windows taskbar and selecting "Task Manager", or by… Read More
17) What is the name of a Windows account that enables users to have temporary access to a computer without the capability to install software or hardware, or change settings called?
A user account that lacks permissions, and is temporary is typically a guest account. These accounts have minimal access.
This question is filed under objective 3, Security
A user is a person who utilizes a computer or network service Users of computer systems and software products generally lack the technical expertise required to fully understand how they work Power users use advanced features of programs, though they are not necessarily capable of computer programming and system administrationA user often has a user account and is identified to the system by a username (or user name) Other terms for username include login name, screenname (or screen name), account name, nickname (or nick) and handle, which is derived from the identical citizens band radio term Some software products provide services to other systems and have no direct end users… Read More
18) What is the type of installation on a Windows system that will wipe all the contents of that partition?
A clean installation will clean the partition, and provide a fresh installation on the system.
This question is filed under objective 4, Software Troubleshooting
Installation (or setup) of a computer program (including device drivers and plugins), is the act of making the program ready for execution Installation refers to the particular configuration of a software or hardware with a view to making it usable with the computer A soft or digital copy of the piece of software (program) is needed to install it There are different processes of installing a piece of software (program) Because the process varies for each program and each computer, programs (including operating systems) often come with an installer, a specialised program responsible for doing whatever is needed (see below) for the installation… Read More
19) Which Microsoft Windows version supports the use of the task bar on multiple monitors without the use of additional programs?
Windows 8 and later Windows 10 both come with multi-monitor task-bar support in the OS. The task bar in Windows is the GUI component typically at the bottom of the screen that shows the Windows start menu button, shortcuts, open programs & system tray.
This question is filed under objective 1, Windows Operating Systems
A taskbar is an element of a graphical user interface which has various purposes It typically shows which programs are currently running The specific design and layout of the taskbar varies between individual operating systems, but generally assumes the form of a strip located along one edge of the screen On this strip are various icons which correspond to the windows open within a program Clicking these icons allow the user to easily switch between programs or windows, with the currently active program or window usually appearing differently from the rest In more recent versions of operating systems, users can also "pin" programs or files so that they can be accessed quickly, often with a single click… Read More
20) Where would you navigate to revert to a known working driver, after the updated driver has failed?
In the Device Manager, right click on the affected device, and navigate to "roll back driver".
This question is filed under objective 4, Software Troubleshooting
You can go back and review your answers or grade your test.