Prepare for the CompTIA A+ 220-801 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.
During boot up a PC shows an error stating that the System Date and Time is not set. Which of the following will solve this issue?
Replace CMOS battery
Reset BIOS settings
Restart the computer
Verify network connectivity to the local NTP server
The CMOS (complementary metal-oxide semiconductor) provides power to a motherboard in order to track the time while a computer is powered off. If the CMOS battery dies or malfunctions the PC will not be able to track the system time.
Nonvolatile BIOS memory refers to a small memory on PC motherboards that is used to store BIOS settings. It is traditionally called CMOS RAM because it uses a volatile, low-power complementary metal–oxide–semiconductor (CMOS) SRAM (such as the Motorola MC146818 or similar) powered by a small "CMOS" battery when system and standby power is off. It is referred to as non-volatile memory or NVRAM because, after the system loses power, it does retain state by virtue of the CMOS battery. The typical NVRAM capacity is 256 bytes.The CMOS RAM and the real-time clock have been integrated as a part of the southbridge chipset and it may not be a standalone chip on modern motherboards. In turn, the southbridge have been integrated into a single Platform Controller Hub. Today's UEFI motherboards use NVRAM to store configuration data (NVRAM is a part of the UEFI flash ROM), but by many OEMs' design, the UEFI settings are still lost if the CMOS battery fails.
Nonvolatile_BIOS_memory - Wikipedia, the free encyclopediaWhich of the following allows devices to operate without requiring a separate power source?
PoE
VPN
WPA
QoS
Power over Ethernet (PoE) allows devices to use an ethernet connection as a power source, most commonly found in IP phones. The ethernet cable provides the power for the device to operate as well as network connectivity.
Power over Ethernet, or PoE, describes any of several standards or ad hoc systems that pass electric power along with data on twisted-pair Ethernet cabling. This allows a single cable to provide both a data connection and enough electricity to power networked devices such as wireless access points (WAPs), IP cameras and VoIP phones.
Power_over_Ethernet - Wikipedia, the free encyclopediaWhich of the following properly describes the use of the DHCP protocol as it relates to a TCP/IP network?
Provides a unique layer 3 address to network devices
Negotiates network access using a knocking algorithm
Translates between user friendly network names and network addresses
Provides mapping between layer 2 and layer 3 addresses
Dynamic Host Configuration Protocol (DHCP) provides a unique layer 3 (IP Address) to network devices. The address is typically leased for a set amount of time and will expire if a renewal is not requested.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.The technology eliminates the need for individually configuring network devices manually, and consists of two network components, a centrally installed network DHCP server and client instances of the protocol stack on each computer or device. When connected to the network, and periodically thereafter, a client requests a set of parameters from the server using DHCP. DHCP can be implemented on networks ranging in size from residential networks to large campus networks and regional ISP networks. Many routers and residential gateways have DHCP server capability. Most residential network routers receive a unique IP address within the ISP network. Within a local network, a DHCP server assigns a local IP address to each device. DHCP services exist for networks running Internet Protocol version 4 (IPv4), as well as version 6 (IPv6). The IPv6 version of the DHCP protocol is commonly called DHCPv6.
Dynamic_Host_Configuration_Protocol - Wikipedia, the free encyclopediaA 802.11g wireless network has a max speed of?
1Gbps
11Mbps
54Mbps
72Mbps
802.11g is capable of communicating at speeds up to 54 Megabits per second.
IEEE 802.11g-2003 or 802.11g is an amendment to the IEEE 802.11 specification that operates in the 2.4 GHz microwave band. The standard has extended link rate to up to 54 Mbit/s using the same 20 MHz bandwidth as 802.11b uses to achieve 11 Mbit/s. This specification under the marketing name of Wi-Fi has been implemented all over the world. The 802.11g protocol is now Clause 19 of the published IEEE 802.11-2007 standard, and Clause 19 of the published IEEE 802.11-2012 standard. 802.11 is a set of IEEE standards that govern wireless networking transmission methods. They are commonly used today in their 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac and 802.11ax versions to provide wireless connectivity in the home, office and some commercial establishments. 802.11g is fully backward compatible with 802.11b, but coexistence of the two methods sustain a significant performance penalty.
IEEE_802.11g-2003 - Wikipedia, the free encyclopediaWhat type of expansion card can record security footage from a CCTV system?
PCI TV Tuner
NIC
PCIe16 Video Adapter card
Video recording software
A TV Tuner allows you to input various inputs such as coax, HDMI, and RGB video.
A TV tuner card is a kind of television tuner that allows television signals to be received by a computer. Most TV tuners also function as video capture cards, allowing them to record television programs onto a hard disk much like the digital video recorder (DVR) does. The interfaces for TV tuner cards are most commonly either PCI bus expansion card or the newer PCI Express (PCIe) bus for many modern cards, but PCMCIA, ExpressCard, or USB devices also exist. In addition, some video cards double as TV tuners, notably the ATI All-In-Wonder series. The card contains a tuner and an analog-to-digital converter (collectively known as the analog front end) along with demodulation and interface logic. Some lower-end cards lack an onboard processor and, like a Winmodem, rely on the system's CPU for demodulation.
TV_tuner_card - Wikipedia, the free encyclopediaYou are a IT consultant, a client company wants to mass produce a PC for a gaming lounge. What should you recommend?
Powerful processor, graphics card, and max RAM
Hardware RAID controllers for each PC
Compact form factor, HDMI output and a fiber NIC
Processor and RAM that meets Window 7 requirements.
Gaming computers MUST have a powerful processor, graphics card, and as much RAM as possible. All other components are not as important in this situation.
Which of the following devices requires a laptop to be fully power off when installed?
RJ45 Patch cable
USB wireless device
PCMCIA Device
SODIMM Ram
Ram requires the system to be completely turned off, and unplugged from any power source.
A SO-DIMM (pronounced "so-dimm" , also spelled "SODIMM") or small outline DIMM, is a type of computer memory built using integrated circuits. A SO-DIMM is a smaller alternative to a DIMM, being roughly half the physical size of a regular DIMM. SO-DIMMs are often used in systems that have limited space, which include laptops, notebooks, small-footprint personal computers such as those based on Nano-ITX motherboards, high-end upgradable office printers, and networking hardware such as routers and NAS devices. They are usually available with the same size data path and speed ratings of the regular DIMMs though normally with smaller capacities.
SO-DIMM - Wikipedia, the free encyclopediaWhich of the following should have a heat sink?
RAID contoller
SATA HDD
Audio Card
CPU
CPU's generate the most heat in a very short amount of time, you should always have a heat sink on your CPU. A fan can also be installed to blow the hot air off of the heat sink.
A heat sink (also commonly spelled heatsink) is a passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid medium, often air or a liquid coolant, where it is dissipated away from the device, thereby allowing regulation of the device's temperature. In computers, heat sinks are used to cool CPUs, GPUs, and some chipsets and RAM modules. Heat sinks are used with high-power semiconductor devices such as power transistors and optoelectronics such as lasers and light-emitting diodes (LEDs), where the heat dissipation ability of the component itself is insufficient to moderate its temperature. A heat sink is designed to maximize its surface area in contact with the cooling medium surrounding it, such as the air. Air velocity, choice of material, protrusion design and surface treatment are factors that affect the performance of a heat sink. Heat sink attachment methods and thermal interface materials also affect the die temperature of the integrated circuit. Thermal adhesive or thermal paste improve the heat sink's performance by filling air gaps between the heat sink and the heat spreader on the device. A heat sink is usually made out of aluminium or copper.
Heat_sink - Wikipedia, the free encyclopediaWhich of the following stores data from frequently used main memory locations?
ECC Memory
Tertiary Memory
RAM
CPU Cache
The CPU Cache is a small pool of memory that stores data frequently needed by a processor. If the data is NOT in the CPU Cache, the processor will request the data from the motherboard's memory (RAM).
A CPU cache is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory. A cache is a smaller, faster memory, located closer to a processor core, which stores copies of the data from frequently used main memory locations. Most CPUs have a hierarchy of multiple cache levels (L1, L2, often L3, and rarely even L4), with different instruction-specific and data-specific caches at level 1. The cache memory is typically implemented with static random-access memory (SRAM), in modern CPUs by far the largest part of them by chip area, but SRAM is not always used for all levels (of I- or D-cache), or even any level, sometimes some latter or all levels are implemented with eDRAM. Other types of caches exist (that are not counted towards the "cache size" of the most important caches mentioned above), such as the translation lookaside buffer (TLB) which is part of the memory management unit (MMU) which most CPUs have.
CPU_cache - Wikipedia, the free encyclopediaWhich term refers a logically separate portion of a single physical hard drive?
Stateful Drive
Virtual Drive
Virtual Volume
Partition
Partitioning is the act of logically separating a single physical disk. Allowing an Operating System to perceive a hard drive as multiple hard drives.
Disk partitioning or disk slicing is the creation of one or more regions on secondary storage, so that each region can be managed separately. These regions are called partitions. It is typically the first step of preparing a newly installed disk, before any file system is created. The disk stores the information about the partitions' locations and sizes in an area known as the partition table that the operating system reads before any other part of the disk. Each partition then appears to the operating system as a distinct "logical" disk that uses part of the actual disk. System administrators use a program called a partition editor to create, resize, delete, and manipulate the partitions. Partitioning allows the use of different filesystems to be installed for different kinds of files. Separating user data from system data can prevent the system partition from becoming full and rendering the system unusable. Partitioning can also make backing up easier. A disadvantage is that it can be difficult to properly size partitions, resulting in having one partition with too much free space and another nearly totally allocated.
Disk_partitioning - Wikipedia, the free encyclopediaWhich LCD component is responsible for illuminating the display?
Backlight
Front panel
Plasma lamp
Inverter
LCD screens use a backlight to illuminate the screen's display. A plasma lamp is the coolest toy at the Discovery Center. Seriously, Google it.
A liquid-crystal display (LCD) is a flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers. Liquid crystals do not emit light directly but instead use a backlight or reflector to produce images in color or monochrome. LCDs are available to display arbitrary images (as in a general-purpose computer display) or fixed images with low information content, which can be displayed or hidden: preset words, digits, and seven-segment displays (as in a digital clock) are all examples of devices with these displays. They use the same basic technology, except that arbitrary images are made from a matrix of small pixels, while other displays have larger elements. LCDs can either be normally on (positive) or off (negative), depending on the polarizer arrangement. For example, a character positive LCD with a backlight will have black lettering on a background that is the color of the backlight, and a character negative LCD will have a black background with the letters being of the same color as the backlight. Optical filters are added to white on blue LCDs to give them their characteristic appearance. LCDs are used in a wide range of applications, including LCD televisions, computer monitors, instrument panels, aircraft cockpit displays, and indoor and outdoor signage. Small LCD screens are common in LCD projectors and portable consumer devices such as digital cameras, watches, calculators, and mobile telephones, including smartphones. LCD screens have replaced heavy, bulky and less energy-efficient cathode-ray tube (CRT) displays in nearly
Liquid-crystal_display - Wikipedia, the free encyclopediaYou need to build or select a PC that will be mass produced for your corporate network. What should you consider most?
HDD read/write speeds
Requirements for applications
HDD capacity
Amount of RAM
You should establish the requirements for the applications these PC's will be running, from there you can easily find the system hardware requirements.
In systems engineering and software engineering, requirements analysis focuses on the tasks that determine the needs or conditions to meet the new or altered product or project, taking account of the possibly conflicting requirements of the various stakeholders, analyzing, documenting, validating and managing software or system requirements.Requirements analysis is critical to the success or failure of a systems or software project. The requirements should be documented, actionable, measurable, testable, traceable, related to identified business needs or opportunities, and defined to a level of detail sufficient for system design.
Requirements_analysis - Wikipedia, the free encyclopediaWhich of the following allows network prioritization based on packet contents?
SSID
QoS
Firewall
VLAN
Quality of Service is a networking technique where certain types of traffic are given higher priority than less important traffic. Just like emergency vehicles are given priority on roads, business critical traffic is given higher priority than non-critical traffic.
Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network, or a cloud computing service, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc. In the field of computer networking and other packet-switched telecommunication networks, quality of service refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priorities to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. Quality of service is particularly important for the transport of traffic with special requirements. In particular, developers have introduced Voice over IP technology to allow computer networks to become as useful as telephone networks for audio conversations, as well as supporting new applications with even stricter network performance requirements.
Quality_of_service - Wikipedia, the free encyclopediaA user wants to limit access to their SOHO network by only allowing certain devices to access it. Which of the following will provide the MOST restrictive access?
Disable SSID Broadcast
Disable DHCP
Turn off DMZ capabilities
Enable MAC Filtering
Enabling MAC Filter will only allow explicitly stated devices to access the network. This is the most secure option.
In computer networking, MAC address filtering is a security access control method whereby the MAC address assigned to each network interface controller is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that they would like to access the network. While giving a network some additional protection, MAC filtering can be circumvented by using a packet analyzer to find a valid MAC and then using MAC spoofing to access the network using that address. MAC address filtering can be considered as security through obscurity because the effectiveness is based on "the secrecy of the implementation or its components".
MAC_filtering - Wikipedia, the free encyclopediaYou are a Server Administrator at a small company. Company policy dictates that all remote connections must be encrypted and accessed using some form of authentication. Which of the following will allow a user to upload a large file from home, while adhering to company policy?
SMTP
SFTP
SSH
FTP
Secure-FTP (or SSH-FTP) uses Secure Shell (SSH) to encrypt a File Transfer Protocol (FTP) connection. This allows you to upload files to a SFTP server on a secure connection. FTP servers can also be configured to require a username/password as authentication.
In computing, the SSH File Transfer Protocol (also known as Secure File Transfer Protocol or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities, and is seen as a replacement of File Transfer Protocol (FTP) due to superior security. The IETF Internet Draft states that, even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications. This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol.
SSH_File_Transfer_Protocol - Wikipedia, the free encyclopediaLooks like thats it! You can go back and review your answers or click the button below to grade your test.
Join premium for unlimited access and more features