This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.
1) Which of the following computer components would not be found in a tablet device?
Tablets and other mobile devices do not use Hard Disk Drives (HDD). HDD's use magnetic storage and constantly moving parts, which makes them poor candidates when durability is necessary. Most mobile devices will use flash memory based storage mediums like Solid State Drives (SSD).
This question is filed under objective 3, Mobile Devices
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage and one or more rigid rapidly rotating platters coated with magnetic material The platters are paired with magnetic heads, usually arranged on a moving actuator arm, which read and write data to the platter surfaces Data is accessed in a random-access manner, meaning that individual blocks of data can be stored and retrieved in any order HDDs are a type of non-volatile storage, retaining stored data even when powered offIntroduced by IBM in 1956, HDDs were the dominant secondary storage device for general-purpose computers beginning in the early 1960s… Read More
2) Which of the following options is a Microsoft Windows API for creating graphic and multimedia effects in Windows Programs?
Microsoft DirectX is a application program interface (API) used by software developers to create images, animations, and other multimedia effects for video animations and games for Windows Operating Systems. Open Graphics Library (OpenGL) is a similar open source API that is usable on most Apple/Macintosh, Linux, Unix, and Microsoft Operating Systems.
This question is filed under objective 1, Operating Systems
Microsoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms Originally, the names of these APIs all began with "Direct", such as Direct3D, DirectDraw, DirectMusic, DirectPlay, DirectSound, and so forth The name DirectX was coined as a shorthand term for all of these APIs (the X standing in for the particular API names) and soon became the name of the collection When Microsoft later set out to develop a gaming console, the X was used as the basis of the name Xbox to indicate that the console was based on DirectX technology… Read More
3) When using the ping command line tool in a Windows environment, which of the following switches will resolve an IP Addresses hostname before pinging?
Using "Ping -a" will tell the ping tool to resolve an IP Address to a hostname before beginning to ping the IP Address. If a hostname is not resolved, ping will not provide a hostname and instead show the IP address. For example, if a PC has a hostname of SERVER1 and an IP of 192.168.1.101, using Ping -a 192.168.1.101 will produce "Pinging SERVER1 [192.168.1.101] with 32 bytes of data:" at the start of output.
This question is filed under objective 4, Troubleshooting
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network It is available for virtually all operating systems that have networking capability, including most embedded network administration software Ping measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source The name comes from active sonar terminology that sends a pulse of sound and listens for the echo to detect objects under waterPing operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply… Read More
4) Which of the following directories would contain user profiles in the Windows 7 operating system?
User Profiles are located in C:\Users\ in Windows Vista and Windows 7
This question is filed under objective 1, Operating Systems
5) Which of the following commands would instruct a device running Windows 7 to verify disk integrity?
Check Disk (CHKDSK) verifies the file system integrity of a volume and fixes logical errors. FSCK is the Unix/Linux equivalent of CHKDSK.
This question is filed under objective 4, Troubleshooting
In computing, CHKDSK (short for "check disk") is a system tool and command in DOS, Digital Research FlexOS, IBM/Toshiba 4690 OS, IBM OS/2, Microsoft Windows and related operating systems It verifies the file system integrity of a volume and attempts to fix logical file system errors It is similar to the fsck command in Unix and similar to Microsoft ScanDisk which co-existed with CHKDSK in Windows 9x and MS-DOS 6x … Read More
6) You work as an IT Consultant for a small business. The business uses several Windows based servers to store data used between company employees. After a power outage and UPS failure, one of the servers has rebooted and users are unable to communicate with the server. After running the IPCONFIG command line tool, you find the server has an IP Address of 169.254.20.1. Which of the following is likely the issue?
Dynamic Host Configuration Protocol (DHCP) provides network devices with IP configurations. When a Windows based PC or Server does not have a statically assigned IP and cannot connect to a DHCP server it will assign an Automatic Private IP Address (APIPA) and attempt to use it to communicate on the network. The APIPA address range is 169.254.0.0 to 169.254.255.255.
This question is filed under objective 4, Troubleshooting
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks, whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on the network, so they can communicate with other IP networks A DHCP server enables computers to request IP addresses and networking parameters automatically from the Internet service provider (ISP), reducing the need for a network administrator or a user to manually assign IP addresses to all network devices In the absence of a DHCP server, a computer or other device on the network needs to be manually assigned an IP address, or to assign itself an APIPA address, the latter of which will not enable it to… Read More
7) Which command will force a PC to contact a DHCP server to request a new IP Address or extend the lease on it's current IP Address?
IPCONFIG /renew will attempt to get an IP Address if it has none, or will renew the lease on the PC's current IP Address.
This question is filed under objective 4, Troubleshooting
ipconfig (standing for "Internet Protocol configuration") is a console application program of some computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings … Read More
8) Which of the following is the default location of user files in Windows Vista and Windows 7?
In both Windows Vista and Windows 7, user files are located in the C:\users\ directory by default. The Documents and Settings directory does not exist In windows Vista or Windows 7.
This question is filed under objective 1, Operating Systems
User Account Control (UAC) is a mandatory access control enforcement facility introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012 and Windows 10 It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit… Read More
9) Which of the following is an example of a physical security device?
Radio Frequency Identification (RFID) devices are physical devices used to identify and track objects. Typically, each user is given a unique RFID (in the form of a key fob or badge) which is used to obtain access to restricted areas. Firewalls, Antiviruses and Network/Host Intrusion Protection Systems (NIPS/HIPS) are used to protect software, operating system and computer networks.
This question is filed under objective 2, Security
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects An RFID system consists of a tiny radio transponder, a radio receiver and transmitter When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader This number can be used to track inventory goods There are two types of RFID tags: Passive tags are powered by energy from the RFID reader's interrogating radio waves Active tags are powered by a battery and thus can be read at a greater range from the RFID reader, up to hundreds of meters… Read More
10) A user has contacted the IT department stating their company Android device will not rotate it's screen orientation, even when auto-rotate is enabled. Which of the following sensors is likely malfunctioning?
In mobile devices, the Gyroscope is a sensor that uses gravity to detect a devices orientation. The gyroscope provides the mobile operating system with data to determine how the screen should be displayed.
This question is filed under objective 3, Mobile Devices
A gyroscope (from Ancient Greek γῦρος gûros, "circle" and σκοπέω skopéō, "to look") is a device used for measuring or maintaining orientation and angular velocity It is a spinning wheel or disc in which the axis of rotation (spin axis) is free to assume any orientation by itself When rotating, the orientation of this axis is unaffected by tilting or rotation of the mounting, according to the conservation of angular momentum Gyroscopes based on other operating principles also exist, such as the microchip-packaged MEMS gyroscopes found in electronic devices (sometimes called gyrometers), solid-state ring lasers, fibre optic gyroscopes, and the extremely sensitive quantum gyroscope… Read More
11) Which of the following file systems is the default in most Linux environments?
EXT2 (Extended File System 2 or Second Extended File System) is the default file system for most Linux distributions. FAT32 (File Allocation Table - 32 bit) and NTFS (New Technology File System) are used in Windows environments, and HFS+ (Hierarchical File System Plus) is used by Mac OSX.
This question is filed under objective 1, Operating Systems
The ext2 or second extended file system is a file system for the Linux kernel It was initially designed by French software developer Rémy Card as a replacement for the extended file system (ext) Having been designed according to the same principles as the Berkeley Fast File System from BSD, it was the first commercial-grade filesystem for LinuxThe canonical implementation of ext2 is the "ext2fs" filesystem driver in the Linux kernel Other implementations (of varying quality and completeness) exist in GNU Hurd, MINIX 3, some BSD kernels, in MiNT, and as third-party Microsoft Windows and macOS drivers ext2 was the default filesystem in several Linux distributions, including Debian and Red Hat Linux, until supplanted more recently by ext3,… Read More
12) Which connector type is most commonly found in the newest iOS devices?
This question could be tricky if you're not an avid iOS user. Firewire, 30 Pin, and Lightning cables are all Apple cable/connector types. However, new iOS devices use Lightning cables which replaced the 30 Pin connector type.
This question is filed under objective 3, Mobile Devices
Lightning is a proprietary computer bus and power connector created and designed by Apple Inc Introduced on September 12, 2012 (2012-09-12), to replace its predecessor, the 30-pin dock connector, the Lightning connector is used to connect Apple mobile devices like iPhones, iPads, and iPods to host computers, external monitors, cameras, USB battery chargers, and other peripherals Using 8 pins instead of 30, Lightning is more dense than its predecessor, which was integrated with devices like the iPhone 4 and the iPad 2 The male Lightning connector is symmetrical (same pins on either side), so it can be inserted into a female Lightning port in either orientation… Read More
13) Which of the following processor types would NOT be found in a smartphone?
The Intel Core i7 processors are simply too powerful and too resource intensive to be used in most mobile devices, especially phones. ARM 7 and Snapdragon processors use specific mobile friendly architectures, which makes them more common in mobile phones. You may however find Intel Core products in larger tablets and laptops.
This question is filed under objective 3, Mobile Devices
Intel Core are streamlined midrange consumer, workstation and enthusiast computers central processing units (CPU) marketed by Intel Corporation These processors displaced the existing mid- to high-end Pentium processors at the time of their introduction, moving the Pentium to the entry level, and bumping the Celeron series of processors to the low end Identical or more capable versions of Core processors are also sold as Xeon processors for the server and workstation markets As of June 2017, the lineup of Core processors includes the Intel Core i3, Intel Core i5, Intel Core i7, and Intel Core i9, along with the X-series Intel Core CPUs… Read More
14) Which the following Windows System Executables is used to view folders and files?
Explorer (located in C:\Windows\Explorer.exe by default) is the Windows System program used to view files and folders. Internet Explorer (IE) is used to view website, it is possible to use IE to view folders but this is not common and must be manually implemented.
This question is filed under objective 1, Operating Systems
File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards It provides a graphical user interface for accessing the file systems It is also the component of the operating system that presents many user interface items on the screen such as the taskbar and desktop Controlling the computer is possible without Windows Explorer running (for example, the File | Run command in Task Manager on NT-derived versions of Windows will function without it, as will commands typed in a command prompt window) … Read More
15) Which of the following encryption software provides the HIGHEST level of security for PCs running Windows 7?
Of the choices, the only true encryption softwares are EFS and Bitlocker. EFS is a file level encryption that works in coordination with NTFS, while Bitlocker is a much stronger encryption that encrypts the entire hard drive, not just single files.
This question is filed under objective 2, Security
BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista It is designed to protect data by providing encryption for entire volumes By default, it uses the AES encryption algorithm in cipher block chaining (CBC) or XTS mode with a 128-bit or 256-bit key CBC is not used over the whole disk it is applied to each individual sector … Read More
16) Which of the following technologies is used by a mobile device to track the devices location?
Global Positioning System (GPS) is a satellite based tracking system used to determine a device's physical location. Code Division Multiple Access (CDMA) and Global System for Mobile communication (GSM) are wireless technologies used by access points and devices to communicate. Both are used widely between cell phones and cell phone towers. A Geotag is a digital tag that identifies a files location at the time it was created - typically used in photos and videos.
This question is filed under objective 3, Mobile Devices
The Global Positioning System (GPS), originally Navstar GPS (stylized in capital letters in its logo), is a satellite-based radionavigation system owned by the United States government and operated by the United States Space Force It is one of the global navigation satellite systems (GNSS) that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites Obstacles such as mountains and buildings block the relatively weak GPS signals The GPS does not require the user to transmit any data, and it operates independently of any telephonic or internet reception, though these technologies can enhance the usefulness of the GPS positioning… Read More
17) Your supervisor has asked you to provide a list of IP addresses assigned to a server. The server is running Windows Server 2008 R2 and has 3 NICs, one physical and two virtual. What command can you use to obtain this information?
IPCONFIG (IP Configuration) is the Windows Command Line Tool used to list IP addresses, MAC Addresses, Subnet Masks and lots of more IP related configuration data. IPCONFIG --virtual will fail, there is no virtual switch. IFCONFIG is the Linux/Unix equivalent of IPCONFIG. IPCONFIG will show both virtual and physical Network Access Cards (NIC) by default.
This question is filed under objective 1, Operating Systems
ipconfig (standing for "Internet Protocol configuration") is a console application program of some computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings … Read More
18) Which of the following is step 4 in the troubleshooting theory?
The Troubleshooting Theory is as follows: 1. Identify the problem, 2. Establish a theory of probable cause, 3. Test the theory, 4. Establish a plan of action to resolve the problem, 5. Verify full system functionality and implement preventative measures (if necessary), and 6. Document findings, actions, and outcomes.
This question is filed under objective 4, Troubleshooting
19) Which of the following meets the minimum memory requirements for Windows 7 64 bit?
Microsoft Windows 7 64 bit requires a minimum of 2 Gigabytes of RAM. Windows 7 32 bit requires 1 Gigabyte of RAM.
This question is filed under objective 1, Operating Systems
20) After installing a popular Windows security suite, a PC can no longer access the internet. Which component is likely causing the issue?
It is most likely the new security suite's firewall settings that has caused the sudden issue. The firewall will need to be reconfigured to allow for internet access.
This question is filed under objective 2, Security
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet… Read More
You can go back and review your answers or grade your test.