CompTIA A+ Exam 220-902 Post-
Assessment Questions and Answers
(Latest Update 2025)
UFEI includes a security system that prevents malware from
loading pre-boot. What is it called? - Correct Answer
✅Secure Boot
It is a good practice to delete your browsing history
frequently. When doing so what happens to cookies related to
web sites in your Favorites? - Correct Answer ✅They are
retained.
When Internet security is set to Medium-high ActiveX controls
that are not signed by Microsoft are _________. - Correct
Answer ✅Blocked
Which of these choices is NOT critical to keep a PC protected
from malware and hackers? - Correct Answer ✅Backup
schedule
There are many Cloud computing configurations available.
You will see varying levels of responsibility for hardware and
software. At its core, however, you will see five key elements.
Sometimes described as uptime or on demand this term
,CompTIA A+ Exam 220-902 Post-
Assessment Questions and Answers
(Latest Update 2025)
shown refers to the percentage of time during a given year
that services were available without disruption. - Correct
Answer ✅Service at any time
Whatever the Windows startup problem is your objective is to
make as few changes to the system as possible in order to
solve the problem without wasting a lot of time to return the
system to normal. You therefore have to decide which tool will
be the least ___________ to use, yet still will fix the problem. -
Correct Answer ✅Invasive
Before recycling a PC you should do this to ensure your data
is gone and a fresh copy of Windows is installed. - Correct
Answer ✅Reset the PC.
Microsoft recommends four deployment strategies for
installations on large numbers of computers. Which of the
strategies would you use to deploy Windows to 175
computers? - Correct Answer ✅High-touch with standard
image
, CompTIA A+ Exam 220-902 Post-
Assessment Questions and Answers
(Latest Update 2025)
Which of the UAC settings is the LEAST restrictive? - Correct
Answer ✅Never notify
In Windows the Guest account ________________. - Correct
Answer ✅All choices apply:
is disabled by default
should remain disabled
is verified as disabled in User Accounts
A unicast IPv6 message is used to send a messages to which
of the following? - Correct Answer ✅All choices apply
Which boot file applies Group Policy settings? - Correct
Answer ✅Userinit.exe
Which of the following keys is the most important one and
contains hardware, software, and security data? The data in
this key is taken from four hives: the SAM hive, the Security
hive, the Software hive, and the System hive. In addition, the
HARDWARE subkey of HKLM is built when the registry is first
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Allivia. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.