CompTIA A+ Practice Test (220-1101)
Use the form below to configure your CompTIA A+ Practice Test (220-1101). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1101 Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1101
The CompTIA A+ 220-1101 (Core 1) exam is a key component of the A+ certification, designed to validate essential IT skills and knowledge. This exam, launched in April 2022, covers a broad range of topics critical for IT professionals, including mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting. Comprising 90 questions, the test includes multiple-choice and performance-based questions, simulating real-world scenarios to assess the candidate's practical abilities. The 220-1101 exam emphasizes the foundational skills necessary for IT support roles, ensuring that certified individuals are equipped to handle a variety of technical issues. With a 90-minute time limit, the exam challenges candidates to demonstrate their proficiency efficiently, providing immediate results upon completion. The certification remains valid for three years, making it a crucial step for those aiming to establish or advance their careers in IT.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1101 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Mobile DevicesNetworkingHardwareVirtualization and Cloud ComputingHardware and Network Troubleshooting
What port does secure web browsing typically use to encrypt web traffic?
- You selected this option
53
- You selected this option
443
- You selected this option
23
- You selected this option
80
Answer Description
Secure web browsing uses Hypertext Transfer Protocol Secure (HTTPS). By default, HTTPS uses TCP port 443 to encrypt communications and ensure secure transmission of data between the client and server. Port 80 is used for standard, unencrypted HTTP traffic. Port 53 is commonly reserved for DNS services and 23 for Telnet, which is not secure and not used for web browsing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is HTTPS and how does it work?
Why is port 80 used for regular web traffic?
What are the roles of ports 53 and 23 in networking?
Staple jams in multifunction printers must often be cleared by manually accessing the stapler component within the finisher unit.
- You selected this option
True
- You selected this option
False
Answer Description
While some printers may provide a specific access panel or guided process to clear staple jams, the answer is generally accurate. Multifunction printers with finishing capabilities such as automatic stapling often require the user to manually remove jammed staples. This typically involves accessing the stapler component, either through a designated access panel or by opening portions of the finisher unit. Always ensure the printer is off when attempting to clear a jam to prevent injury.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific steps should I follow to clear a staple jam in a multifunction printer?
What are the common causes of staple jams in multifunction printers?
How can I prevent staple jams in my multifunction printer?
Your supervisor decides he wants to transition the office from a fiber connection to a satellite connection. The office relies on the connection for VoIP, email and cloud storage. You find that the prices for satellite connections are cheaper. Why would you advise against this change?
- You selected this option
This would likely require re-wiring the whole network, outweighing any cost savings
- You selected this option
The latency from the satellite connection would adversely impact VoIP
- You selected this option
You don't, saving money and no performance change is a great idea
- You selected this option
Encryption is not available over satellite connections this could be a compliance/security issue
Answer Description
Satellite connections often have notable delay/latency issues which would be unacceptable for VoIP and video conferences, they are also negatively impacted by weather. The hand-off for satellite is likely RJ-45 or something similar, you may need a new modem but re-wiring the entire network is an unlikely requirement. Satellite connections can be used with encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is latency, and how does it affect VoIP?
What are the impacts of weather on satellite connections?
What alternatives to satellite connections might be better for VoIP?
A company's executive is using a wearable device that tracks her steps and heart rate during her workday. The device needs to synchronize this data regularly with her smartphone. Which technology would be most appropriate for the wearable device to communicate with her smartphone within a typical office?
- You selected this option
Bluetooth
- You selected this option
RFID
- You selected this option
Infrared
- You selected this option
WiMAX
Answer Description
Bluetooth is the correct answer because it is specifically designed for short-range communication often needed for connecting wearable devices to smartphones, making it a typical technology used for Personal Area Networks (PAN). Infrared requires a direct line of sight and is not commonly used for health wearables due to the necessity of constant connectivity. RFID is primarily used for identification and tracking, offering different functionality compared to the synchronizations of a wearable device. WiMAX, on the other hand, is suited for much larger ranges and wouldn't be the most power-efficient or practical solution for communication between a wearable device and a smartphone.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Bluetooth and how does it work?
What are the advantages of using Bluetooth for wearables?
What are the differences between Bluetooth and Wi-Fi in terms of data transfer?
Which statement accurately describes a characteristic of LCD TN (Twisted Nematic) technology commonly found in monitors and laptop screens?
- You selected this option
TN panels are known for their slower response times, causing motion blur
- You selected this option
TN panels provide superior color accuracy and wide viewing angles
- You selected this option
TN panels offer fast response times but often have limited viewing angles
- You selected this option
TN technology is not suitable for mainstream applications due to high production costs
Answer Description
LCD TN (Twisted Nematic) panels are known for their fast response times, making them suitable for applications that require quick refresh rates, such as gaming. However, TN panels typically have limited viewing angles, which means that the display quality and color accuracy can degrade when viewed from off-center angles. This characteristic is an important consideration when choosing displays for specific use cases.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are response times in the context of LCD TN technology?
What does limited viewing angles mean for TN panels?
What are the common applications for TN panels?
An end-user needs to configure their email client to retrieve emails securely. Which port should the client be configured to use to securely connect to a server using POP3?
- You selected this option
587
- You selected this option
995
- You selected this option
25
- You selected this option
993
- You selected this option
110
- You selected this option
143
Answer Description
Port 995 is the designated port for secure POP3 communications, also known as POP3S or POP3 over SSL/TLS. When configuring an email client to retrieve emails securely via POP3, it should be set to use this port, which facilitates encrypted communication to prevent eavesdropping. Port 110 is used for non-secure POP3 connections. Port 587 is for submitting emails via SMTP securely using STARTTLS. Ports 143 and 993 are typically used for the IMAP protocol, with the latter being the secure version (IMAPS). Port 25 is used for unencrypted SMTP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is POP3 and how does it work?
What are SSL and TLS in the context of email security?
What is the difference between POP3 and IMAP?
What is the first step of the CompTIA troubleshooting methodology?
- You selected this option
Test the theory to determine the cause
- You selected this option
Document findings, actions and outcomes
- You selected this option
Identify the problem
- You selected this option
Establish a plan of action to resolve the problem and implement the solution
- You selected this option
Establish a theory of probable cause
- You selected this option
Verify full system functionality, and, if applicable, implement preventive measures
Answer Description
The CompTIA troubleshooting methodology:
- Identify the problem
- Establish a theory of probable cause
- Test the theory to determine the cause
- Establish a plan of action to resolve the problem and implement the solution
- Verify full system functionality, and, if applicable, implement preventive measures
- Document findings, actions and outcomes
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to 'identify the problem' in troubleshooting?
Why is it important to follow a methodology in troubleshooting?
What kind of questions should I ask to identify a problem effectively?
What type of connection method can be used for charging mobile devices and is proprietary to Apple products?
- You selected this option
MiniUSB
- You selected this option
USB-C
- You selected this option
MicroUSB
- You selected this option
Lightning
Answer Description
The Lightning connector is a type of proprietary connector used for charging and data transfer developed by Apple used exclusively for their products.
In recent years Apple has begun rolling out USB-C support for devices as well, but this is not a proprietary connector.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the specific benefits of the Lightning connector?
How does the Lightning connector differ from USB-C?
What devices use the Lightning connector?
True or false:
It is not possible to install a server operating system in a hypervisor running on a desktop operating system
- You selected this option
False
- You selected this option
True
Answer Description
This is false. As long as the Hypervisor can provide the resources (CPU, Memory, etc.) needed to run the OS installed onto the virtual machine there are no limitations. Windows 10, Windows Server, Linux, etc. can all be run virtually regardless of the host OS.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a hypervisor?
What are the benefits of using a virtual machine?
Can you run any server operating system on a hypervisor?
A hybrid cloud model integrates both private and public clouds, allowing data and applications to be shared between them.
- You selected this option
True
- You selected this option
False
Answer Description
A hybrid cloud combines private (on-premises) and public cloud infrastructures to form a single, flexible, and scalable solution. This allows an organization to keep sensitive data in a private cloud while leveraging the computing power and resources of public clouds for less-sensitive operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the benefits of using a hybrid cloud model?
What is the difference between a private cloud and a public cloud?
How does data sharing work between private and public clouds in a hybrid model?
A user receives the following message when they log in "Windows has detected an IP address conflict". What is MOST LIKELY the issue?
- You selected this option
Duplicate DNS assignment
- You selected this option
The user is logged in on another workstation
- You selected this option
The workstation has changed Wireless Access Points (WAP)
- You selected this option
The workstation has a static IP address
Answer Description
Windows will show this alert when it detects its assigned IP is being used somewhere else on the network. This can happen when a static IP is assigned and it conflicts with a DHCP server or when two workstations are given the same static IP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a static IP address?
What is a DHCP server and how does it work?
What are the consequences of an IP address conflict?
A company needs a cloud model where it provides its employees with a variety of scalable services like email, applications, and storage while minimizing the need for in-house IT staff. Which cloud model would best fit this scenario?
- You selected this option
Platform as a Service (PaaS)
- You selected this option
Infrastructure as a Service (IaaS)
- You selected this option
Private cloud
- You selected this option
Software as a Service (SaaS)
Answer Description
A Software as a Service (SaaS) model is best suited for a company looking to offer its employees scalable services like email, applications, and storage without significantly investing in the infrastructure or IT staff to manage it. SaaS providers manage the infrastructure, platforms, and software, allowing users to access applications via the internet on a subscription basis.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of SaaS applications?
How does SaaS reduce the need for in-house IT staff?
What is the difference between SaaS and IaaS?
Which of the following choices is used as a standard measurement when referring to printed media?
- You selected this option
DPI
- You selected this option
Contrast Ratio
- You selected this option
PPI
- You selected this option
Aspect Ratio
Answer Description
Dots per Inch (DPI) is the standard measurement used for printers. It refers to the amount of dots that are placed by the printer in a one inch space. This is similar to Pixels Per Inch (PPI), which is used to measure how many pixels are placed in an inch by a monitor or screen. Aspect/Contrast Ratios are used to compare height and width of paper, monitors, etc. For example 4x1 would be 4 height for every 1 width - this could be 400x100 or 800x200.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DPI and why is it important in printing?
How does PPI differ from DPI?
What are aspect ratios, and how are they relevant in printing?
You would like to be able to monitor the traffic on your local network. Which tool would allow you to do this?
- You selected this option
Cable tester
- You selected this option
Network tap
- You selected this option
Loopback plug
- You selected this option
Toner probe
Answer Description
A network tap is a hardware device that allows for the non-intrusive monitoring of network traffic. It is used to capture and analyze the data flowing through a network segment without disrupting the network's normal operation. Network taps are commonly employed for various purposes, including network troubleshooting, security monitoring, and performance analysis.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a network tap, and how does it work?
What are the differences between a network tap and other network monitoring tools?
In what scenarios would using a network tap be more beneficial than other methods?
After moving a desktop PC to a new location, a technician powers it on and hears one long beep followed by three short beeps, but nothing is displayed on the monitor. The desktop was functioning correctly before the move. What is the MOST likely issue?
- You selected this option
A non-essential peripheral device connected to the computer is malfunctioning.
- You selected this option
The video card is not properly seated or has become disconnected.
- You selected this option
There is not enough RAM installed for the computer to post.
- You selected this option
The CPU has failed or is not properly seated.
Answer Description
One long beep followed by three short beeps generally indicates a problem related to the video card or the graphics system. This POST beep code is commonly associated with an error in video card detection or failure. In a situation where the computer was functioning correctly before being moved, it's possible that the video card may have become unseated or disconnected during the process. Reducing the hardware components to minimum requirements, ensuring the video card is properly seated with all necessary power connections attached can help resolve the issue. The other answers are incorrect because the symptoms described by the POST beeps do not typically relate to a faulty CPU (which would produce different beep codes), insufficient RAM (where beeps would indicate a memory issue, but the error specifics would differ), or a peripheral device issue which generally doesn't stop POST.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are POST beep codes and why are they important?
How can I check if my video card is properly seated?
What should I do if reseating the video card doesn't fix the issue?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.