CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 802 Test 1

Free CompTIA A+ 220-802 practice test, CompTIA A Plus 220 802 Test 1. This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

When is it acceptable to a IT business to make copies of customer's confidential data?

  • It is never acceptable to copy customer data

  • If the on-site tech determines it necessary

  • With the customer's permission, for back up purposes

  • If the content is public information

Which of the following is a command line tool that will translate between a domain name and an IP Address?

  • TRACERT

  • NSLOOKUP

  • VERIFY

  • IPCONFIG

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?

  • Enable MAC filtering and restrict access to other company

  • Adjust the radio power so that coverage is restricted to the business

  • Configure the access point encryption from unsecured access to WEP

  • Change the SSID to reflect the business name instead of a public access point

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • MSCONFIG

  • Users and Groups

  • Performance Monitor

  • Local Security Policy

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

  • "What exactly does not work?"

  • "Can you get to the Internet?"

  • "Are you able to sign on?"

  • "What type of computer is it?"

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?

  • Re-establish a new theory or escalate

  • Establish a plan of action to resolve the problem

  • Document findings, actions, and outcomes

  • Implement preventative measures

A network administrator does not want their wireless network to be easily identified. Which option will allow the administrator to hide the network's common name?

  • MAC Filitering

  • Static IP scheme

  • Encrypt the WiFi with WPA2

  • Turn off SSID Bcst

What encryption is the most secure for a WiFi network?

  • WPA

  • WPA2

  • WEP

  • MAC filtering

A technician recently installed a new video card in a PC. The PC already has an integrated video on the motherboard. When the technician turns on the PC there is no video during POST and after booting. Which of the following is MOST likely the cause?

  • The motherboard BIOS version is out of date

  • The video card is unsupported by the motherboard

  • The incorrect video card drivers are installed

  • The power connector for the video card is unplugged

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

  • Change the default SSID

  • Enable MAC filtering

  • Enable static IPs

  • Block the outbound port

A user wants to share their parallel printer, which device will allow this?

  • Parallel to WiFi adapter

  • A wireless router

  • A port replicator

  • Print server

A user has reported that their laptop is not charging and often turns off, even when the charger is plugged in. Which of the following is most likely the problem?

  • Battery needs to be reseated

  • Bad HDD sector

  • Overheating battery

  • Bad DC Jack

A business needs its sales team to have laptop computers on the sales floor, but is afraid they can be easily stolen. Which choice will best secure a companies laptop from theft?

  • Cable lock

  • Badge Reader

  • CCTV System

  • finger print scanner

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

  • Enable PATA in the BIOS

  • Press F8 when prompted

  • Hit the refresh button to force a re-detect

  • Select load driver

A new firewall has been installed, and network users are not able to SEND email, but can receive. What port should be checked?

  • 443

  • 110

  • 143

  • 25

Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

  • DEL

  • TASKKILL

  • ERASE

  • SHUTDOWN

You are installing Windows 7 Home Premium onto a laptop and you want to scan the laptop's disk for bad sectors. Which option will format the disk and scan the disk for bad sectors?

  • Virtual RAID Configuration

  • New partition

  • Quick format

  • Full format

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NETSTAT

  • NET

  • NBTSTAT

  • NSLOOKUP

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Phishing

  • Tailgaiting

  • Shredding

  • Spamming

An unauthorized user observing system security procedures is known as:

  • Phishing

  • Shoulder Surfing

  • Spyware

  • A Worm


Remaining Time 00:15:00