Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 802 Test 1

This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

  • DEL
  • SHUTDOWN
  • ERASE
  • TASKKILL

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

  • Hit the refresh button to force a re-detect
  • Enable PATA in the BIOS
  • Select load driver
  • Press F8 when prompted

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?

  • Change the SSID to reflect the business name instead of a public access point
  • Enable MAC filtering and restrict access to other company
  • Adjust the radio power so that coverage is restricted to the business
  • Configure the access point encryption from unsecured access to WEP

A network administrator does not want their wireless network to be easily identified. Which option will allow the administrator to hide the network's common name?

  • Turn off SSID Bcst
  • Encrypt the WiFi with WPA2
  • Static IP scheme
  • MAC Filitering

Which of the following is a command line tool that will translate between a domain name and an IP Address?

  • IPCONFIG
  • VERIFY
  • NSLOOKUP
  • TRACERT

When is it acceptable to a IT business to make copies of customer's confidential data?

  • With the customer's permission, for back up purposes
  • If the content is public information
  • If the on-site tech determines it necessary
  • It is never acceptable to copy customer data

A new firewall has been installed, and network users are not able to SEND email, but can receive. What port should be checked?

  • 443
  • 25
  • 143
  • 110

An unauthorized user observing system security procedures is known as:

  • Phishing
  • A Worm
  • Spyware
  • Shoulder Surfing

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • Users and Groups
  • Performance Monitor
  • Local Security Policy
  • MSCONFIG

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

  • Block the outbound port
  • Change the default SSID
  • Enable MAC filtering
  • Enable static IPs

A business needs its sales team to have laptop computers on the sales floor, but is afraid they can be easily stolen. Which choice will best secure a companies laptop from theft?

  • finger print scanner
  • Badge Reader
  • CCTV System
  • Cable lock

You are installing Windows 7 Home Premium onto a laptop and you want to scan the laptop's disk for bad sectors. Which option will format the disk and scan the disk for bad sectors?

  • New partition
  • Full format
  • Quick format
  • Virtual RAID Configuration

A technician recently installed a new video card in a PC. The PC already has an integrated video on the motherboard. When the technician turns on the PC there is no video during POST and after booting. Which of the following is MOST likely the cause?

  • The motherboard BIOS version is out of date
  • The power connector for the video card is unplugged
  • The incorrect video card drivers are installed
  • The video card is unsupported by the motherboard

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?

  • Establish a plan of action to resolve the problem
  • Implement preventative measures
  • Re-establish a new theory or escalate
  • Document findings, actions, and outcomes

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Tailgaiting
  • Shredding
  • Spamming
  • Phishing

A user has reported that their laptop is not charging and often turns off, even when the charger is plugged in. Which of the following is most likely the problem?

  • Bad HDD sector
  • Overheating battery
  • Bad DC Jack
  • Battery needs to be reseated

A user wants to share their parallel printer, which device will allow this?

  • A port replicator
  • Parallel to WiFi adapter
  • Print server
  • A wireless router

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

  • "Can you get to the Internet?"
  • "What type of computer is it?"
  • "What exactly does not work?"
  • "Are you able to sign on?"

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NET
  • NSLOOKUP
  • NBTSTAT
  • NETSTAT

What encryption is the most secure for a WiFi network?

  • WPA
  • WEP
  • MAC filtering
  • WPA2