CompTIA A+ 902 Certification Exam Sample Test

30 Questions | Total Attempts: 201

SettingsSettingsSettings
CompTIA A+ 902 Certification Exam Sample Test - Quiz

.


Questions and Answers
  • 1. 
    A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change? 
    • A. 

      Enable MAC filtering

    • B. 

      Disable SSID broadcast

    • C. 

      Reduce radio power level

    • D. 

      Update router firmware

  • 2. 
    A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend? 
    • A. 

      Enable MAC filtering

    • B. 

      Disable SSID broadcast

    • C. 

      Assign static IP addresses

    • D. 

      Turn on content filtering

  • 3. 
    A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT? 
    • A. 

      Change the router firewall settings

    • B. 

      Check for and apply a firmware update

    • C. 

      Reconfigure the QoS settings

    • D. 

      Change router user-names and passwords

  • 4. 
    A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?
    • A. 

      Physical destruction

    • B. 

      Quick format

    • C. 

      Low level format

    • D. 

      Overwrite

  • 5. 
    Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO). 
    • A. 

      Use multi-factor authentication

    • B. 

      Require strong passwords

    • C. 

      Enable file encryption

    • D. 

      Educate end users

    • E. 

      Restrict user permissions

  • 6. 
    A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives? 
    • A. 

      Recycling

    • B. 

      Shredding

    • C. 

      Overwriting

    • D. 

      Reformatting

  • 7. 
    Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe? 
    • A. 

      Social engineering

    • B. 

      Spoofing

    • C. 

      Zero-day

    • D. 

      Man-in-the-middle

  • 8. 
    A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select TWO). 
    • A. 

      Rename default accounts

    • B. 

      Disable Windows Update

    • C. 

      Configure single sign-on

    • D. 

      Run gpupdate tool

    • E. 

      Disable guest account

    • F. 

      Disable Action Center pop-ups

  • 9. 
    Which of the following prevention methods is considered to be digital security?
    • A. 

      RFID badge

    • B. 

      Mantrap

    • C. 

      Biometrics

    • D. 

      Firewalls

    • E. 

      ID badge

  • 10. 
    Which of the following Windows features would be used to encrypt a single file or folder?
    • A. 

      EFS

    • B. 

      NTFS

    • C. 

      BitLocker

    • D. 

      Security

  • 11. 
    A turnstile is an example of which of the following forms of physical security? 
    • A. 

      Entry control roster

    • B. 

      Biometrics

    • C. 

      Mantrap

    • D. 

      Cipher lock

  • 12. 
    A user wants to save a file into another user’s directory, but the file save is denied. Which of the following is the MOST likely reason the file save cannot be completed?
    • A. 

      The user must be a member of the Users group

    • B. 

      The user requires write permissions to the folder

    • C. 

      The user requires read permission to the folder

    • D. 

      The user must be a member of the Administrators group

  • 13. 
    A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation? 
    • A. 

      Set a strong password that requires a renewal every 30 days

    • B. 

      Run a screensaver after one minute of nonuse and fingerprint lock for afterhours

    • C. 

      Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours

    • D. 

      Require a password and fingerprint lock afterhours

  • 14. 
    A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?
    • A. 

      143

    • B. 

      23

    • C. 

      443

    • D. 

      3269

    • E. 

      3389

  • 15. 
    An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue? 
    • A. 

      Antivirus software

    • B. 

      Internet connectivity issues

    • C. 

      Ransomware infection

    • D. 

      Content-filtering

  • 16. 
    Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue?
    • A. 

      Time of day restrictions are enabled on the machine

    • B. 

      Scheduled antivirus scans and updates are enabled on the machine

    • C. 

      Remote desktop is enabled and an administrator has logged into the machine

    • D. 

      Automatic Windows Update is enabled on the machine

  • 17. 
    A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem? 
    • A. 

      Run msconfig to clean boot the computer

    • B. 

      Run Event Viewer to identify the cause

    • C. 

      Run System Restore to revert to previous state

    • D. 

      Run Recovery Console to kill the processes

  • 18. 
    A user reports that any URL entered redirects to the same web page. A technician concludes that the user’s computer has been compromised. Which of the following tools would the technician use to resolve the issue? 
    • A. 

      Last known good configuration

    • B. 

      Anti-malware

    • C. 

      System restore

    • D. 

      Rogue antivirus

  • 19. 
    A user’s email inbox is suddenly receiving dozens of rejection messages from various mail servers. Which of the following would the technician perform to BEST solve the issue? 
    • A. 

      Change the user’s email password

    • B. 

      Enable spam filtering on the email account

    • C. 

      Change the email account from POP to IMAP

    • D. 

      Disable the user’s email account

  • 20. 
    A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST?
    • A. 

      Verify data connectivity

    • B. 

      Reformat the MicroSD card

    • C. 

      Replace the SIM card

    • D. 

      Perform a soft restore

  • 21. 
    A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?
    • A. 

      Disable System Restore

    • B. 

      Schedule scans and run updates in safe mode

    • C. 

      Quarantine the system

    • D. 

      Create a System Restore point

  • 22. 
    Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use? 
    • A. 

      Initiate a factory reset

    • B. 

      Perform a hard reset

    • C. 

      Remove the MicroSD card

    • D. 

      Rollback the OS update

  • 23. 
    A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue?
    • A. 

      Slow data speeds

    • B. 

      Defective SD card

    • C. 

      Unauthorized root access

    • D. 

      Signal drop or weak signal

  • 24. 
    A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss? 
    • A. 

      Factory restore

    • B. 

      SecureBoot

    • C. 

      Msconfig

    • D. 

      Diskpart

  • 25. 
    A user’s smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue?
    • A. 

      Reset to the smartphone to factory default.

    • B. 

      Uninstall any unused apps.

    • C. 

      Close all running apps.

    • D. 

      Charge the smartphone.

Related Topics
Back to Top Back to top