These study materials are for an old exam version. Click here for the up to date study materials!
Free CompTIA A+ 220-901 practice test, CompTIA A Plus 220 901 Test 2. The CompTIA 220-901 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover topics like networking, mobile devices and hardware and network troubleshooting.
What type of device most commonly uses a static IP address?
User workstations
Servers
Any device that supports using CIDR addressing
Thin clients
Servers should always be given a static IP Address to ensure it can be quickly resolved and any applications using the IP address do not need to be reconfigured.
An Internet Protocol address (IP address) is a numerical label such as 192.0.2.1 that is connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: network interface identification, and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the mid-2000s. IP addresses are written and displayed in human-readable notations, such as 192.0.2.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated in CIDR notation by suffixing the address with the number of significant bits, e.g., 192.0.2.1/24, which is equivalent to the historically used subnet mask 255.255.255.0. The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by five regional Internet registries (RIRs) responsible in their designated territories for assignment to local Internet registries, such as Internet service providers (ISPs), and other end users. IPv4 addresses were distributed by IANA to the RIRs in blocks of approximately 16.8 million addresses each, but have been exhausted at the IANA level since 2011. Only one of the RIRs still has a supply for local assignments in Africa. Some IPv4 addresses are reserved for private networks and are not globally unique. Network administrators assign an IP address to each device connected to a
IP_address - Wikipedia, the free encyclopediaYou are an IT Support Specialist for a medium sized company. An executive is traveling overseas and does not want his company phone to cause any data or service related fees. Which of the following solutions will ensure this does not occur?
Disable the WiFi antenna
Disable mobile data
Place the phone in ad-hoc mode
Toggle the phone's GPS off
The best option is to instruct the user how to disable mobile data for the duration of the trip. While this is disabled they cannot access the internet using their cellular connection but could still use WiFi, Bluetooth, etc. This is supported by all major smart phone operating systems. Mobile data may also be referred to as cellular data.
Airplane mode (also known as aeroplane mode, flight mode, offline mode, or standalone mode) is a setting available on smartphones and other portable devices. When activated, this mode suspends the device's radio-frequency (RF) signal transmission technologies (i.e., Bluetooth, telephony and Wi-Fi), effectively disabling all analog voice, and digital data services, when implemented correctly by the electronic device software author. The mode is so named because most airlines prohibit the use of equipment that transmit RF signals while in flight. Typically, it is not possible to make phone calls or send messages in airplane mode, but some smartphones allow calls to emergency services. Most devices allow continued use of email clients and other mobile apps to write text or email messages. Messages are stored in memory to transmit later, once airplane mode is disabled. Wi-Fi and Bluetooth can be enabled separately while the device is in a pseudo-airplane mode, as allowed by the operator of the aircraft. Receiving RF signals (as by radio receivers and satellite navigation services) may not be inhibited by airplane mode; however, both transmitters and receivers are needed to receive calls and messages, even when not responding to them. Since a device's transmitters are shut down when in airplane mode, the mode reduces power consumption and increases battery life.
Airplane_mode - Wikipedia, the free encyclopediaYou have recently started as a network technician for a small finance company. The company has been experiencing network outages and very slow transmission speeds. The network has 6 hubs and 1 router, what is most likely causing the poor network performance?
Cross talk
Hubs conduct deep packet inspections by default
None of the above
Hubs can only broadcast packets
Hubs are not intelligent enough to route packets to their destination. Instead they broadcast any data they receive out of every port (except the port they receive it on). Hubs cause large amounts of unnecessary packets that will clog a network.
An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. It has multiple input/output (I/O) ports, in which a signal introduced at the input of any port appears at the output of every port except the original incoming. A hub works at the physical layer (layer 1) of the OSI model. A repeater hub also participates in collision detection, forwarding a jam signal to all ports if it detects a collision. In addition to standard 8P8C ("RJ45") ports, some hubs may also come with a BNC or an Attachment Unit Interface (AUI) connector to allow connection to legacy 10BASE2 or 10BASE5 network segments. Hubs are now largely obsolete, having been replaced by network switches except in very old installations or specialized applications. As of 2011, connecting network segments by repeaters or hubs is deprecated by IEEE 802.3.
Ethernet_hub - Wikipedia, the free encyclopediaYou are planning the installation of several wireless access points in a large warehouse. The access points are typically located on the ceiling far away from power sources. Which technology could be used to power the device?
Power-line communication
Ethernet Repeater
Loopback plug
PoE
Power over Ethernet (PoE) allows a device to use an ethernet cable as a power source and it's data/network connection. Using PoE the wireless access points will not need separate power and data connections.
Power over Ethernet, or PoE, describes any of several standards or ad hoc systems that pass electric power along with data on twisted-pair Ethernet cabling. This allows a single cable to provide both a data connection and enough electricity to power networked devices such as wireless access points (WAPs), IP cameras and VoIP phones.
Power_over_Ethernet - Wikipedia, the free encyclopediaWhich type of motherboard expansion slot has various speeds such as x16 and x32?
CNR
AGP
PCIe
PCI
PCIe, or PCI-Express, comes in x1, x4, x8, x16, x32 speeds. The size of the expansion slot also varies depending on type used. While PCIe x32 is defined in the official standard, x16 is generally the largest you will find on the market.
PCI Express (Peripheral Component Interconnect Express), officially abbreviated as PCIe or PCI-e, is a high-speed serial computer expansion bus standard, designed to replace the older PCI, PCI-X and AGP bus standards. It is the common motherboard interface for personal computers' graphics cards, sound cards, hard disk drive host adapters, SSDs, Wi-Fi and Ethernet hardware connections. PCIe has numerous improvements over the older standards, including higher maximum system bus throughput, lower I/O pin count and smaller physical footprint, better performance scaling for bus devices, a more detailed error detection and reporting mechanism (Advanced Error Reporting, AER), and native hot-swap functionality. More recent revisions of the PCIe standard provide hardware support for I/O virtualization. The PCI Express electrical interface is measured by the number of simultaneous lanes. (A lane is a single send/receive line of data. The analogy is a highway with traffic in both directions.) The interface is also used in a variety of other standards — most notably the laptop expansion card interface called ExpressCard. It is also used in the storage interfaces of SATA Express, U.2 (SFF-8639) and M.2. Format specifications are maintained and developed by the PCI-SIG (PCI Special Interest Group) — a group of more than 900 companies that also maintains the conventional PCI specifications.
PCI_Express - Wikipedia, the free encyclopediaYour supervisor has asked you to bring her a DE-15 connector. Which of the following is she referring to?
DVI-D
VGA
S-Video
DVI-A
VGA uses a 15 pin DE connector
The Video Graphics Array (VGA) connector is a standard connector used for computer video output. Originating with the 1987 IBM PS/2 and its VGA graphics system, the 15-pin connector went on to become ubiquitous on PCs, as well as many monitors, projectors and high-definition television sets. Other connectors have been used to carry VGA-compatible signals, such as mini-VGA or BNC, but "VGA connector" typically refers to this design.Devices continue to be manufactured with VGA connectors, although newer digital interfaces such as DVI, HDMI and DisplayPort are increasingly displacing VGA, and many modern computers and other devices do not include it.
VGA_connector - Wikipedia, the free encyclopediaYou are a server support technician for a data warehouse company. Recently a Windows based server has had several unexpected shut downs. Where should you look first for more information?
Event Viewer
CHKDSK
Boot Recorder
Task Manager
On Windows based systems the Event Viewer will display a detailed log of events such as application crashes, power losses and other debugging information for the operating system, third party applications and hardware.
Event Viewer is a component of Microsoft's Windows NT operating system that lets administrators and users view the event logs on a local or remote machine. Applications and operating-system components can use this centralized log service to report events that have taken place, such as a failure to start a component or to complete an action. In Windows Vista, Microsoft overhauled the event system.Due to the Event Viewer's routine reporting of minor start-up and processing errors (which do not, in fact, harm or damage the computer), the software is frequently used by technical support scammers to trick the victim into thinking that their computer contains critical errors requiring immediate technical support. An example is the "Administrative Events" field under "Custom Views" which can have over a thousand errors or warnings logged over a month's time.
Event_Viewer - Wikipedia, the free encyclopediaYou are a IT Analyst for a large chain of stores. Your department has been asked to evaluate accepting payments through wireless transmission from mobile devices. Which standard technology are they referring to?
NFC
WiFi
Bluetooth
IR
Near Field Communication (NFC) is the standard wireless protocol behind wireless payment options such as Android Pay and Apple Pay.
Near-Field Communication (NFC) is a set of communication protocols for communication between two electronic devices over a distance of 4 cm (11⁄2 in) or less NFC offers a low-speed connection with simple setup that can be used to bootstrap more-capable wireless connectionsNFC devices can act as electronic identity documents and keycards They are used in contactless payment systems and allow mobile payment replacing or supplementing systems such as credit cards and electronic ticket smart cards This is sometimes called NFC/CTLS or CTLS NFC, with contactless abbreviated CTLS NFC can be used for sharing small files such as contacts, and bootstrapping fast connections to share larger media such as photos, videos, and other files
Near_field_communication - Wikipedia, the free encyclopediaYour motherboard has 4 memory slots - 2 blue and 2 black. How should you arrange your memory?
Slower memory in blue, faster in black.
Primary ram in blue, backup ram in black.
NVRAM in blue, RAM in black
Put equal size/speed of RAM in the slots, so that each slot matches its paired slot color.
The exact answer depends on the manufacturer, but regardless the best answer is to put equal size/speed of RAM in each. This is especially important for the speed of the RAM as the lowest speed will be used for all memory slots - even if one has a faster speed available. It is also very common for the motherboard to only support matching sizes (e.g. all 4 GB, all 2 GB, etc.).
Which of the following devices or systems is critical in the event of a power outage?
Surge Distributor
Line conditioner
UPS
Power strip
An Uninterruptible Power Supply (UPS) is a backup power supply that can be used in the event of a power outage. Typically a UPS only has 10-15 minutes of power and is intended to allow systems to continue functioning briefly or be powered off safely as opposed to being a long term backup resource.
An uninterruptible power supply (UPS) or uninterruptible power source is a type of continual power system that provides automated backup electric power to a load when the input power source or mains power fails. A UPS differs from a traditional auxiliary/emergency power system or standby generator in that it will provide near-instantaneous protection from input power interruptions by switching to energy stored in battery packs, supercapacitors or flywheels. The on-battery run-times of most UPSs are relatively short (only a few minutes) but sufficient to "buy time" for initiating a standby power source or properly shutting down the protected equipment. Almost all UPSs also contain integrated surge protection to shield the output appliances from voltage spikes. A UPS is typically used to protect hardware such as computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, fatalities, serious business disruption or data loss. UPS units range in size from ones designed to protect a single computer without a video monitor (around 200 volt-ampere rating) to large units powering entire data centers or buildings. The world's largest UPS, the 46-megawatt Battery Energy Storage System (BESS), in Fairbanks, Alaska, powers the entire city and nearby rural communities during outages.
Uninterruptible_power_supply - Wikipedia, the free encyclopediaWhich of the following options can be used as a storage device to boot an operating system?
USB Drive
DDR2
FDISK
HDMI
A USB Drive is the only device or component that can be used as a boot device. DDR2 is a type of Random Access Memory (RAM). HDMI (High-Definition Multimedia Interface) is audio/video interface. FDISK is a command on some operating systems that provides disk partitioning functions - but it is not a storage device as requested by the question.
USB drive may refer to: A USB flash drive or "thumb drive", a USB-connected computer storage using semiconductor non-volatile random-access memory A USB external drive, a hard drive fitted with a USB interface Secure Digital, a non-volatile memory card format CompactFlash, a flash memory mass storage device Memory Stick, a removable flash memory card format
USB_drive - Wikipedia, the free encyclopediaYour supervisor has asked you to record the IP version 6 addresses of several SUSE Linux systems into a spreadsheet. Which command can you use to obtain this information?
ifconfig
echo || ip -6
netstat
ipconfig
ifconfig (Interface Configuration) is a command line tool on Unix-like systems to display network configuration details. The Windows equivalent is IPCONFIG. Unix-like systems typically refers to Unix, Linux, BSD and OSX operating systems.
ifconfig (short for interface config) is a system administration utility in Unix-like operating systems for network interface configuration. The utility is a command-line interface tool and is also used in the system startup scripts of many operating systems. It has features for configuring, controlling, and querying TCP/IP network interface parameters. Ifconfig originally appeared in 4.2BSD as part of the BSD TCP/IP suite.
ifconfig - Wikipedia, the free encyclopediaWhile troubleshooting a hardware issue on a laptop with a removable battery you have come to the conclusion that there is a physical issue with one of the laptop's components. The laptop is not plugged into an external power source, what is the next step before opening the laptop's case?
Remove battery
Unhinge the LCD Screen
Pop the keyboard off
Unplug the laptop from the power souce
All power sources should be disconnected from the laptop before accessing any internal components. This includes the power supply or charging cable as well as the device's battery.
How many pins are present in SATA data and power cables?
8 for data and 12 for power
15 for power and 7 for data
40 for data and 4 for power
15 for both power and data
SATA (Serial Advanced Technology Attachment) has two main connector types. The power connector is larger with 15 pins, while the data connector is 7 pins. Both are an L shape to avoid inserting a connector incorrectly.
Serial ATA (SATA, abbreviated from Serial AT Attachment) is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives. Serial ATA succeeded the earlier Parallel ATA (PATA) standard to become the predominant interface for storage devices. Serial ATA industry compatibility specifications originate from the Serial ATA International Organization (SATA-IO) which are then promulgated by the INCITS Technical Committee T13, AT Attachment (INCITS T13).
Serial_ATA - Wikipedia, the free encyclopediaWhich TCP port number is used by Post Office Protocol 3?
125
25
110
143
POP3 (Post Office Protocol) uses TCP 110 to communicate.
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. Today, POP version 3 (POP3) is the most commonly used version. Together with IMAP, it is one of the most common protocols for email retrieval.
Post_Office_Protocol - Wikipedia, the free encyclopediaA large company has a nation-wide network, consisting of several smaller networks linked through a VPN and the internet. Which term would best apply to this network?
LAN
WLAN
MAN
WAN
A Wide-Area-Network (WAN) is a series of smaller networks that are linked together to form a single, large network. Metropolitan Area Networks (MAN) are very similar to WANs, but are geographically smaller and typically used by city governments and universities.
A wide area network (WAN) is a telecommunications network that extends over a large geographic area for the primary purpose of computer networking Wide area networks are often established with leased telecommunication circuitsBusinesses, as well as schools and government entities, use wide area networks to relay data to staff, students, clients, buyers and suppliers from various locations across the world In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location The Internet may be considered a WAN
Wide_Area_Network - Wikipedia, the free encyclopediaWhich protocol uses the well known TCP port 443?
SSH
SLP
Telnet
HTTPS
Hyper Text Transfer Protocol Secure (HTTPS), sometimes referred to as HTTP-SSL uses port 443 to communicate.
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL. The principal motivations for HTTPS are authentication of the accessed website and protection of the privacy and integrity of the exchanged data while it is in transit. It protects against man-in-the-middle attacks, and the bidirectional block cipher encryption of communications between a client and server protects the communications against eavesdropping and tampering. The authentication aspect of HTTPS requires a trusted third party to sign server-side digital certificates. This was historically an expensive operation, which meant fully authenticated HTTPS connections were usually found only on secured payment transaction services and other secured corporate information systems on the World Wide Web. In 2016, a campaign by the Electronic Frontier Foundation with the support of web browser developers led to the protocol becoming more prevalent. HTTPS is now used more often by web users than the original, non-secure HTTP, primarily to protect page authenticity on all types of websites, secure accounts, and keep user communications, identity, and web browsing private.
HTTPS - Wikipedia, the free encyclopediaYou are a network technician for a small consulting company. A client has asked you to evaluate options for several SOHO networks to allow employees to work from home. Often the employees modem is in a different area of the house than their home office. The company has a very strict policy that disallows wireless networks. Which of the following is the most cost effective option?
Power-line communication
802.11i
PoE
Wiring each home with ethernet drops
Power-line communication will allow a SOHO network to be built using ethernet power adapters which is much cheaper than running cable. Power-line communication allows the use of the ethernet protocol over electrical power wiring. If the company doesn't want employees working from home to use wireless networks or to pay the expense of running ethernet from the modem to the office then power-line is a cheap alternative.
Power-line communication (also known as power-line carrier), abbreviated as PLC, carries data on a conductor that is also used simultaneously for AC electric power transmission or electric power distribution to consumers. In the past, powerlines were solely used for transmitting electricity. But with the advent of advanced networking technologies, including broadband, there's a push for utility and service providers to find cost-effective and high-performance solutions. It's only recently that businesses have started to seriously consider using powerlines for data networking. The possibility of using powerlines as a universal medium to transmit not just electricity or control signals, but also high-speed data and multimedia, is now under investigation.A wide range of power-line communication technologies are needed for different applications, ranging from home automation to Internet access which is often called broadband over power lines (BPL). Most PLC technologies limit themselves to one type of wires (such as premises wiring within a single building), but some can cross between two levels (for example, both the distribution network and premises wiring). Typically transformers prevent propagating the signal, which requires multiple technologies to form very large networks. Various data rates and frequencies are used in different situations. A number of difficult technical problems are common between wireless and power-line communication, notably those of spread spectrum radio signals operating in a crowded environment. Radio interference, for example, has long been a concern of amateur radio groups.
Power-line_communication - Wikipedia, the free encyclopediaYou are a Desktop and Laptop Technician for a small computer repair shop. A customer on a limited budget has asked you to upgrade their laptop in order to increase performance. Which of the following components can be easily replaced or upgraded?
Motherboard
Video Card
RAM
Processor
Laptop designs often make it difficult to upgrade or change components like video cards, processors and motherboards. RAM and Hard drives are typically easily accessible and cost effective to upgrade in a laptop.
Random-access memory (RAM; ) is a form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory, in contrast with other direct-access data storage media (such as hard disks, CD-RWs, DVD-RWs and the older magnetic tapes and drum memory), where the time required to read and write data items varies significantly depending on their physical locations on the recording medium, due to mechanical limitations such as media rotation speeds and arm movement. RAM contains multiplexing and demultiplexing circuitry, to connect the data lines to the addressed storage for reading or writing the entry. Usually more than one bit of storage is accessed by the same address, and RAM devices often have multiple data lines and are said to be "8-bit" or "16-bit", etc. devices.In today's technology, random-access memory takes the form of integrated circuit (IC) chips with MOS (metal–oxide–semiconductor) memory cells. RAM is normally associated with volatile types of memory where stored information is lost if power is removed. The two main types of volatile random-access semiconductor memory are static random-access memory (SRAM) and dynamic random-access memory (DRAM). Non-volatile RAM has also been developed and other types of non-volatile memories allow random access for read operations, but either do not allow write operations or have other kinds of limitations on them. These
Random-access_memory - Wikipedia, the free encyclopediaYou are a network technician for a consulting company. A small company with several wireless access points has been experiencing intermittent outages for employees near the break room. What is most likely the cause?
Cross talk
Line of Sight
Infrared radiation
Microwave causing interference
Microwave ovens operate on the 2.4 Ghz frequency, same as most WiFi networks. The intermittent outages are likely being caused by people using the microwave oven in the break room.
Microwave is a form of electromagnetic radiation with wavelengths ranging from about 30 centimeters to one millimeter corresponding to frequencies between 1 GHz and 300 GHz respectively. Different sources define different frequency ranges as microwaves; the above broad definition includes UHF, SHF and EHF (millimeter wave) bands. A more common definition in radio-frequency engineering is the range between 1 and 100 GHz (wavelengths between 0.3 m and 3 mm). In all cases, microwaves include the entire SHF band (3 to 30 GHz, or 10 to 1 cm) at minimum. Frequencies in the microwave range are often referred to by their IEEE radar band designations: S, C, X, Ku, K, or Ka band, or by similar NATO or EU designations. The prefix micro- in microwave is not meant to suggest a wavelength in the micrometer range. Rather, it indicates that microwaves are "small" (having shorter wavelengths), compared to the radio waves used prior to microwave technology. The boundaries between far infrared, terahertz radiation, microwaves, and ultra-high-frequency radio waves are fairly arbitrary and are used variously between different fields of study. Microwaves travel by line-of-sight; unlike lower frequency radio waves, they do not diffract around hills, follow the earth's surface as ground waves, or reflect from the ionosphere, so terrestrial microwave communication links are limited by the visual horizon to about 40 miles (64 km). At the high end of the band, they are absorbed by gases in the atmosphere, limiting practical communication distances to around a kilometer. Microwaves are widely used in modern technology, for example in point-to-point communication links,
Microwave - Wikipedia, the free encyclopediaLooks like thats it! You can go back and review your answers or click the button below to grade your test.
Join premium for unlimited access and more features