CompTIA A+ 902 Certification Exam Sample Test

By Erica Corcoran
Erica Corcoran, Communication
Erica Corcoran is a versatile professional working as an All-Rounder at Kilkenny Cheese, contributing her skills across various aspects of the business.
Quizzes Created: 3 | Total Attempts: 802
, Communication
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
Questions: 30 | Attempts: 336

SettingsSettingsSettings
CompTIA A+ 902 Certification Exam Sample Test - Quiz

.


Questions and Answers
  • 1. 

    A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change? 

    • A.

      Enable MAC filtering

    • B.

      Disable SSID broadcast

    • C.

      Reduce radio power level

    • D.

      Update router firmware

    Correct Answer
    A. Enable MAC filtering
    Explanation
    Enabling MAC filtering would be the appropriate additional setting for the technician to change in this scenario. MAC filtering allows the technician to specify which devices are allowed to connect to the wireless network based on their MAC addresses. By enabling MAC filtering, the technician can add the MAC addresses of the three employees' laptops to the allowed devices list, thereby preventing any additional devices from accessing the network. This provides an extra layer of security and helps to ensure that only authorized devices can connect to the wireless network.

    Rate this question:

  • 2. 

    A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend? 

    • A.

      Enable MAC filtering

    • B.

      Disable SSID broadcast

    • C.

      Assign static IP addresses

    • D.

      Turn on content filtering

    Correct Answer
    A. Enable MAC filtering
    Explanation
    Enabling MAC filtering would be the best recommendation in this scenario. MAC filtering allows the network administrator to create a list of approved devices that can connect to the wireless network based on their unique MAC addresses. By enabling MAC filtering, the technician can ensure that only the customer's devices are able to access the network, effectively preventing others from accessing it. This provides an additional layer of security without the need for a complicated password, making it convenient for the customer with a small number of devices on the network.

    Rate this question:

  • 3. 

    A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT? 

    • A.

      Change the router firewall settings

    • B.

      Check for and apply a firmware update

    • C.

      Reconfigure the QoS settings

    • D.

      Change router user-names and passwords

    Correct Answer
    B. Check for and apply a firmware update
    Explanation
    The technician should check for and apply a firmware update next. Firmware updates often include patches and fixes for known vulnerabilities, so applying the latest firmware update can help protect the router from potential exploits. By ensuring that the router has the most up-to-date firmware, the technician can mitigate the risks associated with the recently discovered vulnerabilities.

    Rate this question:

  • 4. 

    A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?

    • A.

      Physical destruction

    • B.

      Quick format

    • C.

      Low level format

    • D.

      Overwrite

    Correct Answer
    A. Physical destruction
    Explanation
    Physical destruction is the most effective method for quickly destroying data on unwanted hard drives. This involves physically damaging the hard drives to the point where the data cannot be recovered. This can be done through methods such as shredding, crushing, or drilling holes into the hard drives. Unlike quick format or low level format, which only erase the file system and can still be recovered with specialized software, physical destruction ensures that the data is completely irretrievable. Overwriting, while effective in most cases, may still leave traces of data that could potentially be recovered, making physical destruction the most secure option.

    Rate this question:

  • 5. 

    Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO). 

    • A.

      Use multi-factor authentication

    • B.

      Require strong passwords

    • C.

      Enable file encryption

    • D.

      Educate end users

    • E.

      Restrict user permissions

    Correct Answer(s)
    A. Use multi-factor authentication
    D. Educate end users
    Explanation
    Using multi-factor authentication and educating end users are two measures that can help protect an organization from further data exposure after a list of user passwords has been leaked due to a policy breach. Multi-factor authentication adds an extra layer of security by requiring users to provide multiple forms of verification, such as a password and a unique code sent to their mobile device. Educating end users on best practices for creating strong passwords and avoiding phishing attempts can also help prevent unauthorized access to sensitive data.

    Rate this question:

  • 6. 

    A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives? 

    • A.

      Recycling

    • B.

      Shredding

    • C.

      Overwriting

    • D.

      Reformatting

    Correct Answer
    B. Shredding
    Explanation
    Shredding would be the best method for disposing of hard drives that contain sensitive employee data. Shredding ensures that the data on the drives is completely destroyed and cannot be recovered. This method physically destroys the hard drives, making it virtually impossible for anyone to access the sensitive information. Recycling, reformatting, and overwriting may not completely remove the data from the drives, leaving it susceptible to being recovered by unauthorized individuals.

    Rate this question:

  • 7. 

    Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe? 

    • A.

      Social engineering

    • B.

      Spoofing

    • C.

      Zero-day

    • D.

      Man-in-the-middle

    Correct Answer
    A. Social engineering
    Explanation
    This scenario describes a potential security threat known as social engineering. Social engineering involves manipulating individuals through psychological tactics to gain unauthorized access to sensitive information or systems. In this case, the caller is attempting to deceive Ann into providing information about her email account, which is a form of social engineering.

    Rate this question:

  • 8. 

    A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select TWO). 

    • A.

      Rename default accounts

    • B.

      Disable Windows Update

    • C.

      Configure single sign-on

    • D.

      Run gpupdate tool

    • E.

      Disable guest account

    • F.

      Disable Action Center pop-ups

    Correct Answer(s)
    A. Rename default accounts
    E. Disable guest account
    Explanation
    To secure the workstation, the technician should rename default accounts and disable the guest account. Renaming default accounts helps to prevent unauthorized access as hackers often target default account names. Disabling the guest account adds an extra layer of security by preventing unauthorized users from accessing the system.

    Rate this question:

  • 9. 

    Which of the following prevention methods is considered to be digital security?

    • A.

      RFID badge

    • B.

      Mantrap

    • C.

      Biometrics

    • D.

      Firewalls

    • E.

      ID badge

    Correct Answer
    D. Firewalls
    Explanation
    Firewalls are considered to be a digital security prevention method. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, controlling and blocking unauthorized access while allowing legitimate communication. By examining and controlling network traffic, firewalls help prevent unauthorized access, protect against malware and other cyber threats, and ensure the confidentiality, integrity, and availability of digital resources.

    Rate this question:

  • 10. 

    Which of the following Windows features would be used to encrypt a single file or folder?

    • A.

      EFS

    • B.

      NTFS

    • C.

      BitLocker

    • D.

      Security

    Correct Answer
    A. EFS
    Explanation
    EFS (Encrypting File System) is the correct answer because it is a Windows feature that allows users to encrypt individual files or folders. By using EFS, the user can protect sensitive data by encrypting it with a unique key, making it accessible only to authorized users who possess the corresponding encryption certificate. This feature provides an additional layer of security for specific files or folders without the need to encrypt the entire hard drive or system.

    Rate this question:

  • 11. 

    A turnstile is an example of which of the following forms of physical security? 

    • A.

      Entry control roster

    • B.

      Biometrics

    • C.

      Mantrap

    • D.

      Cipher lock

    Correct Answer
    C. Mantrap
    Explanation
    A turnstile is an example of a mantrap, which is a form of physical security. A mantrap is a small, enclosed area with two or more doors, where only one door can be opened at a time. It is designed to restrict access to a secure area by allowing only one person to enter or exit at a time. Turnstiles are commonly used in public transportation systems, stadiums, and other high-security areas to control the flow of people and ensure that only authorized individuals can enter or exit.

    Rate this question:

  • 12. 

    A user wants to save a file into another user’s directory, but the file save is denied. Which of the following is the MOST likely reason the file save cannot be completed?

    • A.

      The user must be a member of the Users group

    • B.

      The user requires write permissions to the folder

    • C.

      The user requires read permission to the folder

    • D.

      The user must be a member of the Administrators group

    Correct Answer
    B. The user requires write permissions to the folder
    Explanation
    The most likely reason the file save cannot be completed is that the user requires write permissions to the folder. Without write permissions, the user is not allowed to make any changes or save files in the directory. This restriction prevents unauthorized or accidental modifications to the folder's contents.

    Rate this question:

  • 13. 

    A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation? 

    • A.

      Set a strong password that requires a renewal every 30 days

    • B.

      Run a screensaver after one minute of nonuse and fingerprint lock for afterhours

    • C.

      Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours

    • D.

      Require a password and fingerprint lock afterhours

    Correct Answer
    C. Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours
    Explanation
    The best solution for securing the workstation in this scenario is to apply a screen lock after five minutes of nonuse and implement login time restrictions for afterhours. This ensures that sensitive material cannot be accessed when the user is away from the workstation, and also prevents unauthorized access during afterhours. By setting a screen lock after a short period of nonuse, the user's workstation will be protected from unauthorized access even if the user forgets to manually lock it. Additionally, implementing login time restrictions for afterhours further enhances the security by limiting access to the workstation during specific times.

    Rate this question:

  • 14. 

    A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?

    • A.

      143

    • B.

      23

    • C.

      443

    • D.

      3269

    • E.

      3389

    Correct Answer
    C. 443
    Explanation
    Port 443 should be allowed because it is the default port for HTTPS (Hypertext Transfer Protocol Secure), which is used to establish a secure connection between a web browser and a website. Allowing this port ensures that network computers can only use secured protocols on the Internet, preventing any potential security risks associated with unsecured communication.

    Rate this question:

  • 15. 

    An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue? 

    • A.

      Antivirus software

    • B.

      Internet connectivity issues

    • C.

      Ransomware infection

    • D.

      Content-filtering

    Correct Answer
    D. Content-filtering
    Explanation
    The most likely cause of the issue is content-filtering. Content-filtering is a security measure implemented by organizations to restrict access to certain websites or types of content. In this case, the file-sharing site has been blocked by the content-filtering system, preventing the end-user from accessing it. This could be due to company policies or concerns about security risks associated with file-sharing sites. Antivirus software, internet connectivity issues, and ransomware infection are less likely causes for the specific issue described.

    Rate this question:

  • 16. 

    Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue?

    • A.

      Time of day restrictions are enabled on the machine

    • B.

      Scheduled antivirus scans and updates are enabled on the machine

    • C.

      Remote desktop is enabled and an administrator has logged into the machine

    • D.

      Automatic Windows Update is enabled on the machine

    Correct Answer
    D. Automatic Windows Update is enabled on the machine
    Explanation
    The most likely cause of the issue is that Automatic Windows Update is enabled on the machine. This feature automatically installs updates on the PC, which may require the user to log off temporarily. This behavior is common when updates are being installed, and the message displayed to Joe confirms this. The other options do not directly relate to updates being installed, making them less likely causes of the issue.

    Rate this question:

  • 17. 

    A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem? 

    • A.

      Run msconfig to clean boot the computer

    • B.

      Run Event Viewer to identify the cause

    • C.

      Run System Restore to revert to previous state

    • D.

      Run Recovery Console to kill the processes

    Correct Answer
    A. Run msconfig to clean boot the computer
    Explanation
    Running msconfig to clean boot the computer can help identify if the rogue processes are being launched at startup. By disabling all startup programs and services, the technician can determine if any of them are responsible for the pop-ups. This step will help isolate the issue and narrow down the potential causes.

    Rate this question:

  • 18. 

    A user reports that any URL entered redirects to the same web page. A technician concludes that the user’s computer has been compromised. Which of the following tools would the technician use to resolve the issue? 

    • A.

      Last known good configuration

    • B.

      Anti-malware

    • C.

      System restore

    • D.

      Rogue antivirus

    Correct Answer
    B. Anti-malware
    Explanation
    The technician would use anti-malware software to resolve the issue because the user's computer has been compromised, as indicated by the fact that any URL entered redirects to the same web page. Anti-malware software is designed to detect and remove malicious software, such as viruses, worms, and spyware, which may be causing the redirection. By running an anti-malware scan, the technician can identify and eliminate any malicious programs that are affecting the computer's behavior.

    Rate this question:

  • 19. 

    A user’s email inbox is suddenly receiving dozens of rejection messages from various mail servers. Which of the following would the technician perform to BEST solve the issue? 

    • A.

      Change the user’s email password

    • B.

      Enable spam filtering on the email account

    • C.

      Change the email account from POP to IMAP

    • D.

      Disable the user’s email account

    Correct Answer
    A. Change the user’s email password
    Explanation
    To solve the issue of receiving rejection messages from various mail servers, the technician would change the user's email password. This is because the sudden influx of rejection messages suggests that the user's email account may have been compromised or hacked. By changing the password, the technician can prevent unauthorized access to the account and stop the sending of spam or malicious emails, which are causing the rejection messages.

    Rate this question:

  • 20. 

    A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST?

    • A.

      Verify data connectivity

    • B.

      Reformat the MicroSD card

    • C.

      Replace the SIM card

    • D.

      Perform a soft restore

    Correct Answer
    A. Verify data connectivity
    Explanation
    The technician should perform the task of verifying data connectivity first. This is because the problem mentioned in the helpdesk ticket is related to sending text messages, which requires a stable data connection. By verifying data connectivity, the technician can ensure that the smartphone is properly connected to the network and has access to the internet, which is essential for sending text messages. Once data connectivity is confirmed, the technician can then proceed to troubleshoot other possible causes if the issue persists.

    Rate this question:

  • 21. 

    A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?

    • A.

      Disable System Restore

    • B.

      Schedule scans and run updates in safe mode

    • C.

      Quarantine the system

    • D.

      Create a System Restore point

    Correct Answer
    C. Quarantine the system
    Explanation
    The technician should quarantine the system as the first step when responding to the problem of adware pop-ups. Quarantining the system involves isolating the infected files or software to prevent further spread of the adware. This will help contain the issue and minimize its impact on the networked PC. Once the system is quarantined, further steps can be taken to remove the adware and restore normal browser functionality.

    Rate this question:

  • 22. 

    Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use? 

    • A.

      Initiate a factory reset

    • B.

      Perform a hard reset

    • C.

      Remove the MicroSD card

    • D.

      Rollback the OS update

    Correct Answer
    B. Perform a hard reset
    Explanation
    Performing a hard reset on the Android phone is the most likely solution to fix the issue Joe is facing after updating the OS. A hard reset will force the phone to restart and clear any temporary software glitches or conflicts that might be causing the problem. It is a quick and effective solution that does not require any technical expertise or additional troubleshooting steps.

    Rate this question:

  • 23. 

    A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue?

    • A.

      Slow data speeds

    • B.

      Defective SD card

    • C.

      Unauthorized root access

    • D.

      Signal drop or weak signal

    Correct Answer
    C. Unauthorized root access
    Explanation
    Unauthorized root access may be the cause of the smartphone's very short battery life. When a device is rooted, it allows for unrestricted access to the device's operating system and can lead to various issues, including excessive battery drain. Rooted devices often run background processes that consume more power, resulting in a shorter battery life. Therefore, the unauthorized root access could be the reason behind the reported battery drain problem.

    Rate this question:

  • 24. 

    A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss? 

    • A.

      Factory restore

    • B.

      SecureBoot

    • C.

      Msconfig

    • D.

      Diskpart

    Correct Answer
    C. Msconfig
    Explanation
    Msconfig is a tool that allows the technician to manage the startup process and services on a Windows system. By using msconfig, the technician can disable unnecessary startup programs and services, which can help improve system performance and prevent spontaneous restarts. This tool does not involve any data loss as it only modifies the startup configuration of the system. It is a useful troubleshooting tool in this scenario as it allows the technician to identify and disable any problematic applications or services that may be causing the performance issues.

    Rate this question:

  • 25. 

    A user’s smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue?

    • A.

      Reset to the smartphone to factory default.

    • B.

      Uninstall any unused apps.

    • C.

      Close all running apps.

    • D.

      Charge the smartphone.

    Correct Answer
    C. Close all running apps.
    Explanation
    Closing all running apps throughout the day can help resolve the issue of a slow-running smartphone at the end of the day. When apps are left running in the background, they consume system resources, causing the device to slow down over time. By closing these apps, the smartphone can free up memory and processing power, allowing it to operate at its normal speed. Resetting to factory default or uninstalling unused apps may also help improve performance, but they are not specifically targeted at addressing the issue of a slow-running smartphone at the end of the day. Charging the smartphone is unrelated to the performance issue.

    Rate this question:

  • 26. 

    After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The malware disables the computer’s antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without risking loss of the user’s data? 

    • A.

      Run System Restore

    • B.

      Reinstall Windows with the Repair Option

    • C.

      Reinstall Windows on top of itself

    • D.

      Run System File Checker

    Correct Answer
    A. Run System Restore
    Explanation
    Running System Restore would be the best tool to remove the malware without risking loss of the user's data. System Restore allows the user to revert their computer's state to a previous point in time, before the malware was installed. By restoring the system to a point before the malware, the antivirus software and Internet connection can be restored, effectively removing the malware. This option does not involve reinstalling Windows, which could potentially result in data loss.

    Rate this question:

  • 27. 

    Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information is required to log in. Which of the following is causing this? 

    • A.

      Unintended WiFi connections

    • B.

      Cellular data roaming notifications

    • C.

      Weak cellular signal

    • D.

      Unintended Bluetooth connections

    Correct Answer
    A. Unintended WiFi connections
    Explanation
    The frequent appearance of an icon on the screen informing the user about additional information required to log in suggests that the smartphone is unintentionally connecting to WiFi networks. This could be due to the phone automatically connecting to nearby WiFi networks or the user unknowingly selecting a WiFi network while driving.

    Rate this question:

  • 28. 

    An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem? 

    • A.

      Run defrag on the hard drive

    • B.

      Restore the CAD files from backup

    • C.

      Replace the hard drive

    • D.

      Remove and reinstall the CAD software

    Correct Answer
    A. Run defrag on the hard drive
    Explanation
    The technician's first step in troubleshooting the problem would be to run defrag on the hard drive. Over time, as files are added, deleted, and modified, the hard drive can become fragmented, causing slower performance. Running defrag helps to optimize the placement of files on the hard drive, improving access times and overall performance. Since other applications work fine and the data has been backed up, it is likely that the issue is related to the fragmentation of the CAD files on the hard drive.

    Rate this question:

  • 29. 

    Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screenlock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue? 

    • A.

      Domain-level group policies

    • B.

      Antivirus domain-level policies

    • C.

      Corrupted registry settings

    • D.

      Incorrect local-level user policies

    Correct Answer
    A. Domain-level group policies
    Explanation
    The most likely cause of the issue is domain-level group policies. Domain-level group policies are set by administrators to control the settings and behavior of computers within a network domain. In this case, the grayed out screensaver and screenlock options indicate that these settings have been locked down by a group policy. This is commonly done in organizations to enforce security measures and prevent unauthorized access to computers.

    Rate this question:

  • 30. 

    A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory?

    • A.

      Chkdsk

    • B.

      Msconfig

    • C.

      Dxdiag

    • D.

      Ipconfig

    Correct Answer
    B. Msconfig
    Explanation
    A technician would use msconfig to test the theory of a Windows workstation having malicious software that created an infected start-up item or service. Msconfig is a Windows utility that allows users to manage the system's startup programs and services. By using msconfig, the technician can disable suspicious startup items or services, which can help identify and eliminate any malicious software causing the issue.

    Rate this question:

Erica Corcoran |Communication |
Erica Corcoran is a versatile professional working as an All-Rounder at Kilkenny Cheese, contributing her skills across various aspects of the business.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 07, 2017
    Quiz Created by
    Erica Corcoran
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.