220-802 Practice Exam

75 Questions

Settings
Please wait...
Internet Quizzes & Trivia

CompTia Practice


Questions and Answers
  • 1. 
    A user is having trouble connecting to the Internet. Which of the following commands should a technician use, from the user’s workstation, to ensure that the workstation has a valid IP address?
    • A. 

      NETSTAT

    • B. 

      PING

    • C. 

      IPCONFIG

    • D. 

      TRACERT

  • 2. 
    • A. 

      Windows XP

    • B. 

      Windows 7 Professional

    • C. 

      Windows Vista Home

    • D. 

      Windows 7 Enterprise

  • 3. 
    • A. 

      SMTP

    • B. 

      POP3

    • C. 

      HTTP

    • D. 

      SNTP

    • E. 

      ICMP

  • 4. 
    • A. 

      Assign a passcode

    • B. 

      Download updates Download updates Download updates Download updates Download updates

    • C. 

      Disable GPS

    • D. 

      Install antivirus

  • 5. 
    When running Windows XP, which of the following would give a list of switches for the CHKDSK command?
    • A. 

      Chkdsk ~?

    • B. 

      Chkdsk :?

    • C. 

      Chkdsk /?

    • D. 

      Chkdsk \?

  • 6. 
    • A. 

      DIR

    • B. 

      RD

    • C. 

      CD

    • D. 

      MD

  • 7. 
    A virtual machine running locally would be BEST utilized in which of the following situations?
    • A. 

      On a PC with minimal RAM

    • B. 

      Patch testing before rollout

    • C. 

      Thick client configuration

    • D. 

      Gaming workstation configuration

  • 8. 
    A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem?
    • A. 

      Disk Management

    • B. 

      FIXMBR

    • C. 

      MSCONFIG MSCONFIG MSCONFIG

    • D. 

      SFC

  • 9. 
    • A. 

      Man-in-the-Middle

    • B. 

      Social engineering

    • C. 

      Trojan virus

    • D. 

      Spyware

  • 10. 
    • A. 

      Windows 7 Professional x86

    • B. 

      Windows 7 Home Premium x64

    • C. 

      Windows XP Professional

    • D. 

      Windows Vista Home Premium x86

  • 11. 
    A technician would like to ensure all previous data is erased before reloading Windows 7 Home Premium onto a laptop. Which of the following procedures would accomplish this?
    • A. 

      Virtual RAID configuration

    • B. 

      Quick format

    • C. 

      New partition New partition New partition

    • D. 

      Full format

  • 12. 
    • A. 

      CHKDSK

    • B. 

      ROBOCOPY

    • C. 

      SCANDISK

    • D. 

      FDISK

  • 13. 
    • A. 

      Startup

    • B. 

      Services

    • C. 

      Tools

    • D. 

      Boot

  • 14. 
    A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?
    • A. 

      SFC /SCANNOW

    • B. 

      CHKDSK /R /F

    • C. 

      FORMAT C:

    • D. 

      DISKPART

  • 15. 
    A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?
    • A. 

      Windows 7 or Windows Vista

    • B. 

      Windows Vista only

    • C. 

      Windows XP Professional x64 Edition

    • D. 

      Windows 7 only

  • 16. 
    • A. 

      Grayware

    • B. 

      Shoulder surfing

    • C. 

      Malware

    • D. 

      Man-in-the-Middle exploits

  • 17. 
    A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue?
    • A. 

      Display -> Settings -> Advanced -> General -> DPI

    • B. 

      Display -> Settings -> Resolution

    • C. 

      Display -> Settings -> Advanced -> Adapter -> Refresh

    • D. 

      Display -> Appearance -> Effects -> Transition

  • 18. 
    A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?
    • A. 

      System -> Hardware

    • B. 

      Power Options -> Power Schemes

    • C. 

      System -> Advanced -> Performance System -> Advanced -> Performance System -> Advanced -> Performance System -> Advanced -> Performance

    • D. 

      Power Options -> Hibernate

  • 19. 
    • A. 

      Copying the file to a different location on the same volume

    • B. 

      B. Copying the file to a different location on a different volume Copying the file to a different location on a different volume

    • C. 

      Moving the file to a different location on a different volume

    • D. 

      Moving the file to a different location on the same volume

  • 20. 
    A user’s computer keeps producing a “low virtual memory” alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?
    • A. 

      System > Remote

    • B. 

      System > Hardware

    • C. 

      System > System Restore

    • D. 

      System > Advanced

  • 21. 
    A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?
    • A. 

      FIXMBR

    • B. 

      BOOTCFG

    • C. 

      FIXBOOT

    • D. 

      DISKPART

  • 22. 
    • A. 

      Native resolution

    • B. 

      Auto adjust

    • C. 

      Degaussing

    • D. 

      Privacy screen

  • 23. 
    A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?
    • A. 

      Display

    • B. 

      Power Options

    • C. 

      Personalization

    • D. 

      Device Management

  • 24. 
    • A. 

      Ease of Access Center

    • B. 

      AutoPlay

    • C. 

      Sync Center

    • D. 

      HomeGroup

  • 25. 
    The folder "Documents" is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted?
    • A. 

      Read Only Attribute

    • B. 

      Share Permissions

    • C. 

      Firewall Settings

    • D. 

      NTFS Permissions

  • 26. 
    • A. 

      Install antispyware on the PC.

    • B. 

      Create a standard user account for kids.

    • C. 

      Store all financial data in a separate folder.

    • D. 

      Disable the firewall for online gaming.

  • 27. 
    A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?
    • A. 

      Lock the workstation

    • B. 

      Shutdown the computer

    • C. 

      Logon using the unprivileged guest account

    • D. 

      Set the screensaver password

  • 28. 
    A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting?
    • A. 

      Geometry

    • B. 

      Contrast

    • C. 

      Brightness Brightness Brightness

    • D. 

      Degauss

  • 29. 
    A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?
    • A. 

      Press F8 when prompted

    • B. 

      Hit the refresh button to force a re-detect

    • C. 

      Enable PATA in the BIOS

    • D. 

      Select load driver

  • 30. 
    • A. 

      Administrator

    • B. 

      Standard User

    • C. 

      Guest

    • D. 

      Power User

  • 31. 
    A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?
    • A. 

      Install the application in safe mode

    • B. 

      Install the application with compatibility mode

    • C. 

      Install the latest Windows service packs and updates

    • D. 

      Install Windows Security updates on the system

  • 32. 
    A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST?
    • A. 

      Restart the smartphone

    • B. 

      Reconfigure the smartphone email account

    • C. 

      Resynchronize the smart phone

    • D. 

      Update the operating system

  • 33. 
    A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?
    • A. 

      NTFS

    • B. 

      FAT16

    • C. 

      CDFS

    • D. 

      FAT32

  • 34. 
    For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?
    • A. 

      MAC address filtering

    • B. 

      Windows password

    • C. 

      Proper SSID

    • D. 

      SSL certificate

  • 35. 
    A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
    • A. 

      The parent folder has explicit Allow rights set for this user.

    • B. 

      The parent folder has explicit Deny rights set for this user.

    • C. 

      The user forgot to share the parent folder and only shared the specific file.

    • D. 

      The parent folder likely has the “archive” attribute enabled.

  • 36. 
    A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?
    • A. 

      Retinal scanners

    • B. 

      Mantraps

    • C. 

      Door locks

    • D. 

      Smart card badges

  • 37. 
    A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?
    • A. 

      Client hardware requirements

    • B. 

      Server software security requirements

    • C. 

      Server hardware resources

    • D. 

      Network resources

  • 38. 
    • A. 

      Deny all

    • B. 

      Allow all

    • C. 

      Most privilege

    • D. 

      Least privilege

  • 39. 
    A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO).
    • A. 

      Integrated system video chip is failing and/or near death.

    • B. 

      Video drivers were not installed directly from Microsoft update.

    • C. 

      Incompatible or untested video drivers have been installed.

    • D. 

      The BIOS is not set for the proper operation temperature of the video chipset.

    • E. 

      The BIOS is underclocking the video card’s operating speed.

  • 40. 
    A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company’s content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?
    • A. 

      Anti-malware software

    • B. 

      Factory pre-installation

    • C. 

      System restore

    • D. 

      Recovery console

  • 41. 
    After being infected with a virus, a user’s computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user’s backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?
    • A. 

      Recovery Console

    • B. 

      Factory restore CD

    • C. 

      Anti-malware software

    • D. 

      System Restore

  • 42. 
    A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. “primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST?
    • A. 

      That NTLDR and boot.ini are not missing

    • B. 

      Proper drive installation (e.g. cables/jumpers)

    • C. 

      If computer can boot into safe mode

    • D. 

      If the BIOS boot settings are correct

  • 43. 
    The shared folder named C$ is an example of which of the following?
    • A. 

      Local share

    • B. 

      Permission propagation

    • C. 

      Inheritance

    • D. 

      Administrative share

  • 44. 
    • A. 

      Anti-virus software

    • B. 

      Key fob

    • C. 

      Biometric device

    • D. 

      Privacy filter

  • 45. 
    A pest exterminator tries to gain access to a company’s computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
    • A. 

      War driving

    • B. 

      Social engineering

    • C. 

      Shoulder surfing

    • D. 

      Phishing

  • 46. 
    • A. 

      USB drive

    • B. 

      HDMI

    • C. 

      OEM recovery media

    • D. 

      FDISK

  • 47. 
    A user tries to connect to the Internet using a dial-up modem and receives a “No dial tone detected” message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?
    • A. 

      Check if the cable is connected on the modem’s phone RJ-45 port.

    • B. 

      Check if the cable is connected on the modem’s line RJ-11 port.

    • C. 

      Check if the cable is connected on the modem’s line RJ-45 port.

    • D. 

      Check if the cable is connected on the modem’s phone RJ-11 port.

  • 48. 
    • A. 

      Remote wipe

    • B. 

      Antivirus

    • C. 

      GPS locator

    • D. 

      Remote backup application

  • 49. 
    • A. 

      Cable certifier

    • B. 

      Punch down

    • C. 

      Toner probe

    • D. 

      Cable tester

  • 50. 
    • A. 

      Crimper

    • B. 

      Small flat screwdriver

    • C. 

      Wire strippers

    • D. 

      Punch down

  • 51. 
    • A. 

      Cable tester

    • B. 

      Crimper

    • C. 

      Small flat screwdriver

    • D. 

      Punch down

  • 52. 
    A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client’s machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory?
    • A. 

      Identify the problem

    • B. 

      Establish a plan of action to resolve the problem

    • C. 

      Test the theory to determine cause

    • D. 

      Document findings, actions, and outcomes

  • 53. 
    A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem?
    • A. 

      Change MAC address settings

    • B. 

      Call the vendor

    • C. 

      Try another LAN connection

    • D. 

      Reboot the phone

  • 54. 
    After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?
    • A. 

      Component Management

    • B. 

      Startup Repair

    • C. 

      Device Manager

    • D. 

      Task Manager

  • 55. 
    A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?
    • A. 

      Re-join the computer to the domain

    • B. 

      Reboot the PC as the domain will automatically rebuild the relationship

    • C. 

      Update the BIOS using the latest version

    • D. 

      Run CHKDSK

  • 56. 
    • A. 

      Network speed

    • B. 

      CPU speed

    • C. 

      High speed memory

    • D. 

      Drive space

  • 57. 
    A computer program that functions normally while quietly installing malicious software on a machine is known as a:
    • A. 

      DDoS attack.

    • B. 

      Worm.

    • C. 

      Phishing attack.

    • D. 

      Trojan.

  • 58. 
    • A. 

      A Worm

    • B. 

      Rootkits

    • C. 

      Social Engineering

    • D. 

      Browser Adware

  • 59. 
    A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer?
    • A. 

      NSLOOKUP

    • B. 

      NETSTAT

    • C. 

      PING

    • D. 

      IPCONFIG

  • 60. 
    A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?
    • A. 

      Repair Disk

    • B. 

      SFC

    • C. 

      FIXMBR

    • D. 

      ASR

  • 61. 
    A technician gets a call from a customer stating that their computer will not boot. They are getting the following error “invalid system disk”. Which of the following should the technician check FIRST?
    • A. 

      Verify the operating system is installed correctly.

    • B. 

      Verify that all removable drives are empty.

    • C. 

      Verify Boot.ini is on the hard drive.

    • D. 

      Verify the computer will boot into safe mode.

  • 62. 
    The practice of following an authorized person through an entrance without using a badge to defeat security is called:
    • A. 

      Tailgating.

    • B. 

      Spamming

    • C. 

      Shredding.

    • D. 

      Phishing.

  • 63. 
    Turnstiles and other mantraps will prevent which of the following security threats?
    • A. 

      Shoulder surfing

    • B. 

      Tailgating

    • C. 

      Rootkits

    • D. 

      Viruses

  • 64. 
    • A. 

      WPA

    • B. 

      WPA2

    • C. 

      WEP

    • D. 

      AES

  • 65. 
    An IR printer stops working for half of an office while the other half is able to print. Which of the following should be checked FIRST?
    • A. 

      Proper lighting

    • B. 

      Paper levels

    • C. 

      Physical obstructions

    • D. 

      Printer share name

  • 66. 
    If a computer does not have an optical drive, which of the following is the MOST efficient method to install an operating system?
    • A. 

      Emergency Restore CD

    • B. 

      Floppy disk

    • C. 

      USB flash drive

    • D. 

      Bluetooth connection

  • 67. 
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 68. 
    Phishing is:
    • A. 

      An infection that causes a web browser to go to a different site than the one intended from a search result page.

    • B. 

      A technique used to obtain financial information from a user mimicking a legitimate website.

    • C. 

      An infection that causes a computer to behave erratically by playing music and launching browser windows.

    • D. 

      A technique used to obtain financial information from a user by compiling information from social networks and their friends.

  • 69. 
    The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:
    • A. 

      Overheating.

    • B. 

      Incompatible RAM.

    • C. 

      A faulty hard drive.

    • D. 

      A bad internal USB hub.

  • 70. 
    When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:
    • A. 

      CMOS battery

    • B. 

      Video card.

    • C. 

      IDE cable.

    • D. 

      Floppy cable.

  • 71. 
    A technician needs to decrease the time it takes to install an operating system on 100 computers. Which of the following installations would the technician use to reduce hands-on time spent on each computer?
    • A. 

      Upgrade installation

    • B. 

      USB installation

    • C. 

      Unattended installation

    • D. 

      Clean installation

  • 72. 
    A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).
    • A. 

      Disable the guest account

    • B. 

      Install antivirus applications

    • C. 

      Disable DHCP

    • D. 

      Change the SSID

    • E. 

      Change the default username

  • 73. 
    A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?
    • A. 

      Enable Windows automatic updates

    • B. 

      Enable screensaver required passwords

    • C. 

      Enable MAC filtering

    • D. 

      Enable wireless encryption

  • 74. 
    A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?
    • A. 

      The motherboard BIOS version is out of date.

    • B. 

      The incorrect video card drivers are installed.

    • C. 

      The power connector for the video card is unplugged.

    • D. 

      The video card is unsupported by the motherboard.

  • 75. 
    A user receives a phone call from a person claiming to be from technical support. This person knows the user’s name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?
    • A. 

      Social engineering

    • B. 

      Phishing

    • C. 

      Malware

    • D. 

      Virus