CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 802 Test 1

Free CompTIA A+ 220-802 practice test, CompTIA A Plus 220 802 Test 1. This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

You are installing Windows 7 Home Premium onto a laptop and you want to scan the laptop's disk for bad sectors. Which option will format the disk and scan the disk for bad sectors?

  • New partition

  • Full format

  • Quick format

  • Virtual RAID Configuration

A user has reported that their laptop is not charging and often turns off, even when the charger is plugged in. Which of the following is most likely the problem?

  • Battery needs to be reseated

  • Overheating battery

  • Bad DC Jack

  • Bad HDD sector

Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

  • DEL

  • SHUTDOWN

  • TASKKILL

  • ERASE

A user wants to share their parallel printer, which device will allow this?

  • Parallel to WiFi adapter

  • A port replicator

  • A wireless router

  • Print server

When is it acceptable to a IT business to make copies of customer's confidential data?

  • If the on-site tech determines it necessary

  • If the content is public information

  • It is never acceptable to copy customer data

  • With the customer's permission, for back up purposes

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?

  • Document findings, actions, and outcomes

  • Establish a plan of action to resolve the problem

  • Re-establish a new theory or escalate

  • Implement preventative measures

A new firewall has been installed, and network users are not able to SEND email, but can receive. What port should be checked?

  • 25

  • 143

  • 110

  • 443

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

  • Hit the refresh button to force a re-detect

  • Press F8 when prompted

  • Select load driver

  • Enable PATA in the BIOS

What encryption is the most secure for a WiFi network?

  • MAC filtering

  • WEP

  • WPA

  • WPA2

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

  • "Can you get to the Internet?"

  • "What type of computer is it?"

  • "What exactly does not work?"

  • "Are you able to sign on?"

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

  • Enable static IPs

  • Change the default SSID

  • Block the outbound port

  • Enable MAC filtering

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Tailgaiting

  • Phishing

  • Shredding

  • Spamming

A technician recently installed a new video card in a PC. The PC already has an integrated video on the motherboard. When the technician turns on the PC there is no video during POST and after booting. Which of the following is MOST likely the cause?

  • The video card is unsupported by the motherboard

  • The incorrect video card drivers are installed

  • The power connector for the video card is unplugged

  • The motherboard BIOS version is out of date

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NET

  • NETSTAT

  • NBTSTAT

  • NSLOOKUP

An unauthorized user observing system security procedures is known as:

  • Phishing

  • Spyware

  • A Worm

  • Shoulder Surfing

A business needs its sales team to have laptop computers on the sales floor, but is afraid they can be easily stolen. Which choice will best secure a companies laptop from theft?

  • Cable lock

  • finger print scanner

  • Badge Reader

  • CCTV System

Which of the following is a command line tool that will translate between a domain name and an IP Address?

  • VERIFY

  • NSLOOKUP

  • IPCONFIG

  • TRACERT

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • Users and Groups

  • Local Security Policy

  • MSCONFIG

  • Performance Monitor

A network administrator does not want their wireless network to be easily identified. Which option will allow the administrator to hide the network's common name?

  • MAC Filitering

  • Turn off SSID Bcst

  • Encrypt the WiFi with WPA2

  • Static IP scheme

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?

  • Enable MAC filtering and restrict access to other company

  • Adjust the radio power so that coverage is restricted to the business

  • Change the SSID to reflect the business name instead of a public access point

  • Configure the access point encryption from unsecured access to WEP


Remaining Time 00:15:00