Professional Documents
Culture Documents
220-902 Performance Test
220-902 Performance Test
Although most people think of certification exams as a series of multiple-choice questions, many of CompTIA's
exams also include a number of performance-based questions. The format of these performance-based
questions vary between fill-in-the-blank, matching, scenario-based, or even simulated command-line
environments.
These performance-based questions usually appear first in the exam, but I've included them as the last part of
this book. This matches one of my most common test-taking strategies, where I recommend that you skip over
the performance-based questions, finish all of the multiple-choice questions, and then jump back to the
beginning to tackle the performance-based questions as the last thing on the exam.
PB-1. Place the following patch management processes in order, from start to finish.
Testing
Fallback
Scheduling
Implementing
PB-2. You've just removed one of the operating system from your computer's dual-boot configuration, but now
your boot manager can't find the remaining Windows operating system. What command should you use in the
Windows Recovery Environment to search your storage devices for Windows installations?
PB-3. Match the Linux command to its description:
PB-4. You're updating the operating systems listed below. Can you perform an in-place upgrade, or does the
change require a clean install?
You use two devices on your SOHO wireless network. Your mobile phone has a MAC address of
AA:BB:CC:DD:EE:FF and your laptop has a MAC address of AA:BB:CC:11:22:33.
1) Prevent everything from connecting to your wireless network except your own personal devices
2) Hide your wireless network name from appearing in a list of available wireless networks
3) Configure the most secure encryption type with a shared passphrase of "unA2Hy4K"
Establish a theory
Establish a plan of action
Implement the plan
Identify the problem
Document findings
Evaluate the results: Is it working?
Test the theory
Verify full system functionality
PB-10. List the Windows versions that support the following features. Some features may be supported on more
than one version of Windows. Possible answers are Windows Vista, Windows 7, and/or Windows 8.1.
Aero
Windows Gadgets
Readyboost
Windows XP Mode
BitLocker
PB-11. Put the following malware removal steps in order from start to finish:
Scheduling
Implementing
Testing
Fallback
The patch management process is an important one for most organizations. The process begins when the change
is scheduled. Once the scheduled date and time arrives, the change is then implemented. After implementation,
it's important to test the change to make sure the modification was successful. If the testing fails, there should
always be a fallback plan to get everything back to the original state.
The BOOTREC command is often used to fix a master boot record (MBR) or a partition's boot sector, but it can
also be used to search your storage device for Windows operating systems. The /ScanOS flag is the option to
use when you're not exactly sure where the Windows installation is installed.
A firewall ACL (access control list) is a list of the traffic sessions that are allowed or blocked as they pass
through the firewall. A Microsoft RDP (Remote Desktop Protocol) uses TCP port 3389, so you would add an
additional rule to allow all remote devices to access the local port of TCP/3389.
You use two devices on your SOHO wireless network. Your mobile phone has a MAC address of
AA:BB:CC:DD:EE:FF and your laptop has a MAC address of AA:BB:CC:11:22:33.
1) Prevent everything from connecting to your wireless network except your own personal devices
2) Hide your wireless network name from appearing in a list of available wireless networks
3) Configure the most secure encryption type with a shared passphrase of "unA2Hy4K"
1) Prevent everything from connecting to your wireless network except your own personal devices -
A MAC address filter allows you to restrict access to the network, even if the remote devices have the
proper encryption keys. On this device, you check the box to "Turn Access Control On," and then add the
MAC addresses to the list of allowed devices. You do not need to add the MAC address of the wireless
router.
2) Hide your wireless network name from appearing in a list of available wireless networks - The SSID
broadcast is the mechanism that populates the name of your wireless network into the list of avaialble
networks. To disable this functionality, simply uncheck the "Enable SSID Broadcast" option.
3) Configure the most secure encryption type with a shared passphrase of "unA2Hy4K" - There are few
steps required to properly enable your wireless encryption. The most secure encryption type is WPA2 and
you're using a pre-shared key (PSK), so choose the option for "WPA2-PSK [AES]." The passphrase should
be added to the "Passphrase" option.
4) Configure the name of the wireless network to be "SOHO" - The name of the wireless network can
be defined in the option for "Name (SSID)."
The answer: The taskkill command is used to terminate processes or applications, and the /pid option
allows you to specific the appropriate process ID.
The answer: Teyla's permissions when accessing the file share across the network is Read permission.
NTFS permissions apply to both local and network connections, and the share permissions apply only to
connections over the network. When determining the effective permissions, the most restrictive settings will
apply.
Since Teyla's NTFS permissions are set to Read and her Share permissions are set to Change and Read, the
most restrictive setting of Read would apply.
http://professormesser.com/objectives/
You’ll also find that different media provides you with different methods of learning. Vary your studies
between videos, books, Q&A guides, hands-on training, and use as many different resources as you can.
Take notes
When you walk into the exam room, you’ll be given a laminated piece of paper and an erasable marker. Before
the 90-minute clock starts on your exam, you must first read and agree to the CompTIA Candidate Agreement.
You’re allocated a block of time to read through this agreement, which also makes it a good time to write
down some notes before the 90-minute exam clock begins.
Pro tip: For some reason, the test centers feel that the best writing instrument for your exam is an eraseable
marker with a large tip that would be better used for decorating posters. I always bring my own fine-tip erasable
marker and clear it with the testing center before I go into the exam room.
Take the performance-based questions last
When you start your exam, the first questions will be a series of performance-based questions. These are usually
involved questions that cover a number of different topics, so these may not be the best choice when the exam-
adrenalin is still clouding your brain.
Since the CompTIA exams use a linear exam format, you can jump forward or backward to any question in the
exam at any time. If you take the multiple-choice questions first and then jump back to the performance-based
questions afterwards, you’ll find that the first part of the exam may help you remember topics that may be
useful for the performance-based questions.
I’ve struggled with this problem during my own certification exam experiences. In one instance, I completed the
exam and had enough time to read through every question again. I found at least two questions that I had
completely mis-read, and fortunately I realized my mistake and corrected the answers.
My personal strategy is to flag everything that I’m not 100% sure about. Even if I’m 99% sure of my answer,
I’ll still flag the question. After my first pass through the exam, I’ll start my review with the flagged questions
and check all of those responses first. This might be a large number of questions, but that's all part of my
personal strategy (or my lack of preparation).