This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.
1) A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?
Because this is a non-domain (local) user account the Local Security Policy is the cause of the issue. Accessing the policy to determine account requirements will solve the problem.
This question is filed under objective 4, Troubleshooting
Group Policy is a feature of the Microsoft Windows NT family of operating systems (including Windows 7, Windows 81, Windows 10, and Windows Server 2003+) that controls the working environment of user accounts and computer accounts Group Policy provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment A set of Group Policy configurations is called a Group Policy Object (GPO) A version of Group Policy called Local Group Policy (LGPO or LocalGPO) allows Group Policy Object management without Active Directory on standalone computersActive Directory servers disseminate group policies by listing them in their LDAP directory under objects of class… Read More
2) A technician recently installed a new video card in a PC. The PC already has an integrated video on the motherboard. When the technician turns on the PC there is no video during POST and after booting. Which of the following is MOST likely the cause?
Many video cards, especially those used in gaming computers, require a 6-pin power connector from the power supply to operate. Along with this, you should check that the video card is properly seated. Drivers work with the operating system (not the BIOS) and the video is not working prior to boot, meaning it is unlikely to be a driver issue.
This question is filed under objective 4, Troubleshooting
3) You are installing Windows 7 Home Premium onto a laptop and you want to scan the laptop's disk for bad sectors. Which option will format the disk and scan the disk for bad sectors?
A full format will delete all data on a disk, scan the disk for bad sectors, and then install the operating system. The Quick format will delete data, install the operating system, but not scan the disk for bad sectors.
This question is filed under objective 4, Troubleshooting
Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive for initial use In some cases, the formatting operation may also create one or more new file systems The first part of the formatting process that performs basic medium preparation is often referred to as "low-level formatting" Partitioning is the common term for the second part of the process, making the data storage device visible to an operating system The third part of the process, usually termed "high-level formatting" most often refers to the process of generating a new file system… Read More
4) A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?
Although the technician was able to locate and remove a virus, that virus was not the cause of the user's issues. The technician should continue to troubleshoot the computer.
This question is filed under objective 4, Troubleshooting
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process operational again Troubleshooting is needed to identify the symptoms Determining the most likely cause is a process of elimination—eliminating potential causes of a problem Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state In general, troubleshooting is the identification or diagnosis of "trouble" in the management flow of a system caused by a failure of some kind… Read More
5) A new firewall has been installed, and network users are not able to SEND email, but can receive. What port should be checked?
Port 25 is used by SMTP, which is used to send email. While POP3 (110), and IMAP (143) are instead used to receive email.
This question is filed under objective 4, Troubleshooting
The Simple Mail Transfer Protocol (SMTP) is a communication protocol for electronic mail transmission As an Internet standard, SMTP was first defined in 1982 by RFC 821, and updated in 2008 by RFC 5321 to Extended SMTP additions, which is the protocol variety in widespread use today Mail servers and other message transfer agents use SMTP to send and receive mail messages SMTP servers commonly use the Transmission Control Protocol on port number 25 User-level email clients typically use SMTP only for sending messages to a mail server for relaying, and typically submit outgoing email to the mail server on port 587 or 465 per RFC 8314… Read More
6) When is it acceptable to a IT business to make copies of customer's confidential data?
As an IT, you have access to personal data. You should always get customer permission before copying or changing it.
This question is filed under objective 4, Troubleshooting
Client confidentiality is the principle that an institution or individual should not reveal information about their clients to a third party without the consent of the client or a clear legal reason This concept is commonly provided for in law in most countries and can also be referred to as social systems of confidentialityThe access to a client's data as provided by the institution in question is usually limited to law enforcement agencies and requires some legal procedures to be accomplished prior to such action (eg: court order issued, etc) This applies to bank account information or medical record… Read More
7) A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?
Often when installing Windows onto an external RAID array, a driver is required for Windows to detect the hard drives.
This question is filed under objective 4, Troubleshooting
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details about the hardware being used A driver communicates with the device through the computer bus or communications subsystem to which the hardware connects When a calling program invokes a routine in the driver, the driver issues commands to the device Once the device sends data back to the driver, the driver may invoke routines in the original calling program… Read More
8) The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:
Tailgaiting is when an unauthorized person "tails" an authorized person through a secured entryway without the authorized person's knowledge.
This question is filed under objective 2, Security
In security, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint It can be either electronic or physical The act may be legal or illegal, authorized or unauthorized, depending on the circumstances However, the term more often has the connotation of being an illegal or unauthorized actTo describe the act of an unauthorized person who follows someone to a restricted area without the consent of the authorized person, the term tailgating is also used "Tailgating" implies no consent (similar to a car tailgating another vehicle on a road), while "piggybacking" usually implies consent of the authorized person… Read More
9) A user wants to share their parallel printer, which device will allow this?
This printer will not connect to the network, so you will need to use a print server as an intermediary device.
This question is filed under objective 4, Troubleshooting
In computer networking, a print server, or printer server, is a type of server that connects printers to client computers over a network It accepts print jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally to accommodate the fact that work may arrive more quickly than the printer can actually handle Ancillary functions include the ability to inspect the queue of jobs to be processed, the ability to reorder or delete waiting print jobs, or the ability to do various kinds of accounting (such as counting pages, which may involve reading data generated by the printer(s))… Read More
10) A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?
The outbound port should be blocked to ensure no one can connect to the webcam outside of the LAN. This is probably the default setting for the router, but you should still check to be sure.
This question is filed under objective 2, Security
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet… Read More
11) What encryption is the most secure for a WiFi network?
WPA2 is the newest, and most secure WiFi Encryption.
This question is filed under objective 2, Security
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP)WPA (sometimes referred to as the draft IEEE 80211i standard) became available in 2003 The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2, which became available in 2004 and is a common shorthand for the full IEEE 802… Read More
12) A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?
Reducing the radio power to help keep wireless signals from traveling farther than necessary can help hide the network's existence. Keep in mind this isn't a security feature and that there are other steps that should be taken to secure the network that are outside the scope of the question.
This question is filed under objective 2, Security
In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network As a standalone device, the AP may have a wired connection to a router, but, in a wireless router, it can also be an integral component of the router itself An AP is differentiated from a hotspot which is a physical location where Wi-Fi access is available … Read More
13) A network administrator does not want their wireless network to be easily identified. Which option will allow the administrator to hide the network's common name?
A Wireless Access Point's SSID Broadcast is what allows a person or computer to easily identify a wireless network, turning this off will help mask/hide a network's identification.
This question is filed under objective 2, Security
In IEEE 80211 wireless local area networking standards (including Wi-Fi), a service set (also known as extended service set or ESS) is a group of wireless network devices which are identified by the same SSID (service set identifier) SSIDs serve as "network names" and are typically natural language labels A service set forms a logical network—that is operating with the same level 2 networking parameters—they are on the same logical network segment (eg, IP subnet or VLAN) Basic service sets (BSS) are a subgroup of devices within a service set which are additionally also operating with the same physical layer medium access characteristics (i… Read More
14) Which of the following is a command line tool that will translate between a domain name and an IP Address?
NSLOOKUP will return the IP Address of a domain name by querying a computers assigned DNS Servers for the information.
This question is filed under objective 1, Operating Systems
15) An unauthorized user observing system security procedures is known as:
Shoulder surfing is a common tactic to gain information by standing near a person as they talk on the phone, fill out a form, or type in their password.
This question is filed under objective 2, Security
In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder, either from keystrokes on a device or sensitive information being spoken and heard, also known as eavesdropping… Read More
16) A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?
As a support technician you should always assume that a user has no knowledge of how computers and networks function. With this, it is always best to begin troubleshooting with the most basic questions to determine the issue.
This question is filed under objective 4, Troubleshooting
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process operational again Troubleshooting is needed to identify the symptoms Determining the most likely cause is a process of elimination—eliminating potential causes of a problem Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state In general, troubleshooting is the identification or diagnosis of "trouble" in the management flow of a system caused by a failure of some kind… Read More
17) A user has reported that their laptop is not charging and often turns off, even when the charger is plugged in. Which of the following is most likely the problem?
If the battery is not charging and the laptop powers off when plugged in, it is most likely an issue with the power cord or DC jack. Remember: Laptops do not convert AC->DC. The power is converted by the power cord before reaching the laptop's DC jack.
This question is filed under objective 4, Troubleshooting
A DC connector (or DC plug, for one common type of connector) is an electrical connector for supplying direct current (DC) power Compared to domestic AC power plugs and sockets, DC connectors have many more standard types that are not interchangeable The dimensions and arrangement of DC connectors can be chosen to prevent accidental interconnection of incompatible sources and loads Types vary from small coaxial connectors used to power portable electronic devices from AC adapters, to connectors used for automotive accessories and for battery packs in portable equipment … Read More
18) A business needs its sales team to have laptop computers on the sales floor, but is afraid they can be easily stolen. Which choice will best secure a companies laptop from theft?
A cable lock will physically secure the laptop to a desk, counter, or table. This will keep the laptops from being stolen, but still portable when unlocked.
This question is filed under objective 2, Security
A Kensington Security Slot (also called a K-Slot or Kensington lock) is part of an anti-theft system designed in the early 1990s and patented by Kryptonite in 1999–2000, assigned to Schlage in 2002, and since 2005 owned and marketed by Kensington Computer Products Group, a division of ACCO Brands… Read More
19) Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?
The NET command in Windows provides many options, including the NET USE command tool. The NET USE command will show and configure mapped network drives from a shared resource like a NAS or a storage server.
This question is filed under objective 4, Troubleshooting
20) Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?
The TASKKILL command in Windows is used to manually stop a process from running. Example: TASKKILL /IM notepad.exe, will stop the notepad.exe process.
This question is filed under objective 4, Troubleshooting
In computing, kill is a command that is used in several popular operating systems to send signals to running processes … Read More
You can go back and review your answers or grade your test.