CompTIA A+ 220-802 (Practice Test)

The CompTIA A+ certification is for aspiring or entry level Information Systems Technicians. The A+ certification covers basic installation and configuration of computer hardware and software. The exams will include topics involving PC's, laptops, various operating systems, mobile devices, tablets, basic computer networking, and troubleshooting. The certification requires passing the 220-801 and 220-802 exams, both consisting of multiple choice and performance-based questions.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Operating Systems
    • Security
    • Mobile Devices
    • Troubleshooting

A technician would like to restart a computer from a command line tool. Which of the following tools should the technician use?

  • Shutdown /i
  • Shutdown /f
  • Shutdown /r
  • Shutdown /s

A technician has just installed additional RAM onto an employee's laptop. The laptop now has 6GB of RAM, but Windows 7 shows "4GB Usable Memory" What is most likely the issue?

  • The Laptop is running a 32 bit version of Windows 7
  • Some of the RAM is not properly seated
  • The RAM is in the wrong configuration
  • The RAM needs to be repartitioned

Which connector type is most commonly found in the newest iOS devices?

  • Mini USB
  • Firewire
  • 30 Pin Apple Connector
  • Lightning Cable

Which of the following is TRUE about the difference between a worm and a virus?

  • Viruses disable the antivirus update service while worms kill the antivirus process.
  • Worms can self propagate without attaching themselves to a host program while a virus cannot.
  • Worms are written into assembly while viruses are written with scripting languages.
  • Viruses hide in the boot record while worms hide within the file system.

Which of the following allows an Android device to track movements, such as a tilt or shake?

  • Micro USB port
  • A trackball
  • Multi-touch
  • Accelerometer

Which of the following is a command line tool that will translate between a domain name and an IP Address?

  • IPCONFIG
  • NSLOOKUP
  • VERIFY
  • TRACERT

Which of the following passwords is the MOST secure according to industry best practices?

Which the following Windows System Executables is used to view folders and files?

  • Internet Explorer
  • Explorer
  • File Manager
  • Directory Viewer

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Tailgaiting
  • Spamming
  • Phishing
  • Shredding

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

  • "Can you get to the Internet?"
  • "What exactly does not work?"
  • "What type of computer is it?"
  • "Are you able to sign on?"

Which of the following is an example of a physical security device?

  • Intrusion Protection System
  • Firewall
  • Antivirus
  • RFID Badge

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NBTSTAT
  • NETSTAT
  • NET
  • NSLOOKUP

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • Local Security Policy
  • Users and Groups
  • Performance Monitor
  • MSCONFIG

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?

  • Adjust the radio power so that coverage is restricted to the business
  • Configure the access point encryption from unsecured access to WEP
  • Change the SSID to reflect the business name instead of a public access point
  • Enable MAC filtering and restrict access to other company

Which of the following connector types is most commonly found on non-iOS smartphones?

  • Lightning
  • Micro USB
  • USB (Full size)
  • Firewire mini

Which of the following Windows command line tools will provide a computer's network configuration information?

  • ping
  • ipconfig
  • tracert
  • netstat

Which of the following boot methods receives the bootstrap files from a network server?

  • IDS
  • PXE
  • NAT
  • PAN

Which of the following is the default location of user files in Windows Vista and Windows 7?

  • C:\Documents and Settings\users\USERNAME\
  • c:\home\USERNAME\
  • c:\users\USERNAME\
  • C:\Documents and Settings\USERNAME\

A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity: IP Address: 192.168.1.101, Netmask: 255.255.255.0, DHCP Server:192.168.1.1, DNS Server:192.168.1.2, Default Gateway:192.168.1.1, Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?

  • The workstation has an APIPA address
  • The DHCP server is misconfigured
  • The DHCP server is unavailable
  • The default gateway router is misconfigured

Which Windows tool can prevent programs from automatically opening upon start up?

  • MSCONFIG
  • CHKDSK
  • DEVMGMT.MSC
  • DXDIAG