Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 802 Test 1

This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Tailgaiting
  • Phishing
  • Shredding
  • Spamming

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

  • "What exactly does not work?"
  • "Can you get to the Internet?"
  • "What type of computer is it?"
  • "Are you able to sign on?"

A user wants to share their parallel printer, which device will allow this?

  • A port replicator
  • Parallel to WiFi adapter
  • A wireless router
  • Print server

An unauthorized user observing system security procedures is known as:

  • Shoulder Surfing
  • Spyware
  • A Worm
  • Phishing

When is it acceptable to a IT business to make copies of customer's confidential data?

  • If the on-site tech determines it necessary
  • It is never acceptable to copy customer data
  • With the customer's permission, for back up purposes
  • If the content is public information

A business needs its sales team to have laptop computers on the sales floor, but is afraid they can be easily stolen. Which choice will best secure a companies laptop from theft?

  • Cable lock
  • finger print scanner
  • CCTV System
  • Badge Reader

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • Users and Groups
  • Local Security Policy
  • Performance Monitor

You are installing Windows 7 Home Premium onto a laptop and you want to scan the laptop's disk for bad sectors. Which option will format the disk and scan the disk for bad sectors?

  • New partition
  • Quick format
  • Virtual RAID Configuration
  • Full format

A user has reported that their laptop is not charging and often turns off, even when the charger is plugged in. Which of the following is most likely the problem?

  • Bad DC Jack
  • Bad HDD sector
  • Overheating battery
  • Battery needs to be reseated

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

  • Press F8 when prompted
  • Hit the refresh button to force a re-detect
  • Select load driver
  • Enable PATA in the BIOS

A network administrator does not want their wireless network to be easily identified. Which option will allow the administrator to hide the network's common name?

  • Encrypt the WiFi with WPA2
  • MAC Filitering
  • Turn off SSID Bcst
  • Static IP scheme

What encryption is the most secure for a WiFi network?

  • MAC filtering
  • WEP
  • WPA
  • WPA2

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NET

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

  • Block the outbound port
  • Enable MAC filtering
  • Change the default SSID
  • Enable static IPs

Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

  • DEL

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?

  • Re-establish a new theory or escalate
  • Implement preventative measures
  • Establish a plan of action to resolve the problem
  • Document findings, actions, and outcomes

A new firewall has been installed, and network users are not able to SEND email, but can receive. What port should be checked?

  • 25
  • 110
  • 443
  • 143

Which of the following is a command line tool that will translate between a domain name and an IP Address?


A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?

  • Configure the access point encryption from unsecured access to WEP
  • Enable MAC filtering and restrict access to other company
  • Adjust the radio power so that coverage is restricted to the business
  • Change the SSID to reflect the business name instead of a public access point

A technician recently installed a new video card in a PC. The PC already has an integrated video on the motherboard. When the technician turns on the PC there is no video during POST and after booting. Which of the following is MOST likely the cause?

  • The video card is unsupported by the motherboard
  • The incorrect video card drivers are installed
  • The motherboard BIOS version is out of date
  • The power connector for the video card is unplugged