Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits
Free CompTIA A+ 220-802 practice test, CompTIA A Plus 220 802 Test 1. This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.
A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?
Enable MAC filtering and restrict access to other company
Configure the access point encryption from unsecured access to WEP
Adjust the radio power so that coverage is restricted to the business
Change the SSID to reflect the business name instead of a public access point
Reducing the radio power to help keep wireless signals from traveling farther than necessary can help hide the network's existence. Keep in mind this isn't a security feature and that there are other steps that should be taken to secure the network that are outside the scope of the question.
In computer networking, a wireless access point, or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. As a standalone device, the AP may have a wired connection to a router, but, in a wireless router, it can also be an integral component of the router itself. An AP is differentiated from a hotspot, which is a physical location where Wi-Fi access is available. Although WAP has been used incorrectly to describe an Access Point, the clear definition is Wireless Application Protocol which describes a protocol rather than a physical device.
Wireless_access_point - Wikipedia, the free encyclopediaA technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?
Local Security Policy
MSCONFIG
Users and Groups
Performance Monitor
Because this is a non-domain (local) user account the Local Security Policy is the cause of the issue. Accessing the policy to determine account requirements will solve the problem.
Group Policy is a feature of the Microsoft Windows NT family of operating systems (including Windows 7, Windows 8.1, Windows 10, Windows 11, and Windows Server 2003+) that controls the working environment of user accounts and computer accounts. Group Policy provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. A set of Group Policy configurations is called a Group Policy Object (GPO). A version of Group Policy called Local Group Policy (LGPO or LocalGPO) allows Group Policy Object management without Active Directory on standalone computers.Active Directory servers disseminate group policies by listing them in their LDAP directory under objects of class groupPolicyContainer. These refer to fileserver paths (attribute gPCFileSysPath) that store the actual group policy objects, typically in an SMB share \\domain.com\SYSVOL shared by the Active Directory server. If a group policy has registry settings, the associated file share will have a file registry.pol with the registry settings that the client needs to apply.The Policy Editor (gpedit.msc) is not provided on Home versions of Windows XP/Vista/7/8/8.1/10/11.
Group_Policy - Wikipedia, the free encyclopediaA user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?
Enable PATA in the BIOS
Hit the refresh button to force a re-detect
Press F8 when prompted
Select load driver
Often when installing Windows onto an external RAID array, a driver is required for Windows to detect the hard drives.
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details about the hardware being used. A driver communicates with the device through the computer bus or communications subsystem to which the hardware connects. When a calling program invokes a routine in the driver, the driver issues commands to the device (drives it). Once the device sends data back to the driver, the driver may invoke routines in the original calling program. Drivers are hardware dependent and operating-system-specific. They usually provide the interrupt handling required for any necessary asynchronous time-dependent hardware interface.
Device_driver - Wikipedia, the free encyclopediaYou are installing Windows 7 Home Premium onto a laptop and you want to scan the laptop's disk for bad sectors. Which option will format the disk and scan the disk for bad sectors?
Quick format
New partition
Full format
Virtual RAID Configuration
A full format will delete all data on a disk, scan the disk for bad sectors, and then install the operating system. The Quick format will delete data, install the operating system, but not scan the disk for bad sectors.
Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk, memory card or USB flash drive for initial use. In some cases, the formatting operation may also create one or more new file systems. The first part of the formatting process that performs basic medium preparation is often referred to as "low-level formatting". Partitioning is the common term for the second part of the process, dividing the device into several sub-devices and, in some cases, writing information to the device allowing an operating system to be booted from it. The third part of the process, usually termed "high-level formatting" most often refers to the process of generating a new file system. In some operating systems all or parts of these three processes can be combined or repeated at different levels and the term "format" is understood to mean an operation in which a new disk medium is fully prepared to store files. Some formatting utilities allow distinguishing between a quick format, which does not erase all existing data and a long option that does erase all existing data. As a general rule, formatting a disk by default leaves most if not all existing data on the disk medium; some or most of which might be recoverable with privileged or special tools. Special tools can remove user data by a single overwrite of all files and free space.
Disk_formatting - Wikipedia, the free encyclopediaA user wants to share their parallel printer, which device will allow this?
Print server
A port replicator
Parallel to WiFi adapter
A wireless router
This printer will not connect to the network, so you will need to use a print server as an intermediary device.
In computer networking, a print server, or printer server, is a type of server that connects printers to client computers over a network. It accepts print jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally to accommodate the fact that work may arrive more quickly than the printer can actually handle. Ancillary functions include the ability to inspect the queue of jobs to be processed, the ability to reorder or delete waiting print jobs, or the ability to do various kinds of accounting (such as counting pages, which may involve reading data generated by the printer(s)). Print servers may be used to enforce administration policies, such as color printing quotas, user/department authentication, or watermarking printed documents. Print servers may support a variety of industry-standard or proprietary printing protocols including Internet Printing Protocol, Line Printer Daemon protocol, NetWare, NetBIOS/NetBEUI, or JetDirect. A print server may be a networked computer with one or more shared printers. Alternatively, a print server may be a dedicated device on the network, with connections to the LAN and one or more printers. Dedicated server appliances tend to be fairly simple in both configuration and features. Print server functionality may be integrated with other devices such as a wireless router, a firewall, or both. A printer may have a built-in print server. All printers with the right type of connector are compatible with all print servers; manufacturers of servers make available lists of compatible printers because a server may not implement
Print_server - Wikipedia, the free encyclopediaAlex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?
NETSTAT
NSLOOKUP
NBTSTAT
NET
The NET command in Windows provides many options, including the NET USE command tool. The NET USE command will show and configure mapped network drives from a shared resource like a NAS or a storage server.
NET may refer to:
NET - Wikipedia, the free encyclopediaWhat encryption is the most secure for a WiFi network?
WPA2
WEP
MAC filtering
WPA
WPA2 is the newest, and most secure WiFi Encryption.
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).WPA (sometimes referred to as the TKIP standard) became available in 2003. The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2, which became available in 2004 and is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard. In January 2018, the Wi-Fi Alliance announced the release of WPA3, which has several security improvements over WPA2.As of 2023, most computers that connect to a wireless network have support for using WPA, WPA2, or WPA3.
Wi-Fi_Protected_Access - Wikipedia, the free encyclopediaA user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?
Re-establish a new theory or escalate
Implement preventative measures
Document findings, actions, and outcomes
Establish a plan of action to resolve the problem
Although the technician was able to locate and remove a virus, that virus was not the cause of the user's issues. The technician should continue to troubleshoot the computer.
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process operational again. Troubleshooting is needed to identify the symptoms. Determining the most likely cause is a process of elimination—eliminating potential causes of a problem. Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state.
Troubleshooting - Wikipedia, the free encyclopediaA new firewall has been installed, and network users are not able to SEND email, but can receive. What port should be checked?
110
443
25
143
Port 25 is used by SMTP, which is used to send email. While POP3 (110), and IMAP (143) are instead used to receive email.
The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages. User-level email clients typically use SMTP only for sending messages to a mail server for relaying, and typically submit outgoing email to the mail server on port 587 or 465 per RFC 8314. For retrieving messages, IMAP (which replaced the older POP3) is standard, but proprietary servers also often implement proprietary protocols, e.g., Exchange ActiveSync. SMTP's origins began in 1980, building on concepts implemented on the ARPANET since 1971. It has been updated, modified and extended multiple times. The protocol version in common use today has extensible structure with various extensions for authentication, encryption, binary data transfer, and internationalized email addresses. SMTP servers commonly use the Transmission Control Protocol on port number 25 (for plaintext) and 587 (for encrypted communications).
Simple_Mail_Transfer_Protocol - Wikipedia, the free encyclopediaA user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?
"Are you able to sign on?"
"What exactly does not work?"
"What type of computer is it?"
"Can you get to the Internet?"
As a support technician you should always assume that a user has no knowledge of how computers and networks function. With this, it is always best to begin troubleshooting with the most basic questions to determine the issue.
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process operational again. Troubleshooting is needed to identify the symptoms. Determining the most likely cause is a process of elimination—eliminating potential causes of a problem. Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state.
Troubleshooting - Wikipedia, the free encyclopediaA business needs its sales team to have laptop computers on the sales floor, but is afraid they can be easily stolen. Which choice will best secure a companies laptop from theft?
Cable lock
finger print scanner
Badge Reader
CCTV System
A cable lock will physically secure the laptop to a desk, counter, or table. This will keep the laptops from being stolen, but still portable when unlocked.
A Kensington Security Slot (also called a K-Slot or Kensington lock) is part of an anti-theft system designed in the mid 1980s and patented by Kryptonite in 1999–2000, assigned to Schlage in 2002, and since 2005 owned and marketed by Kensington Computer Products Group, a division of ACCO Brands.
Kensington_Security_Slot - Wikipedia, the free encyclopediaAn unauthorized user observing system security procedures is known as:
A Worm
Phishing
Spyware
Shoulder Surfing
Shoulder surfing is a common tactic to gain information by standing near a person as they talk on the phone, fill out a form, or type in their password.
In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder. Unauthorized users watch the keystrokes inputted on a device or listen to sensitive information being spoken, which is also known as eavesdropping.
Shoulder_surfing_(computer_security) - Wikipedia, the free encyclopediaA technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?
Change the default SSID
Enable MAC filtering
Block the outbound port
Enable static IPs
The outbound port should be blocked to ensure no one can connect to the webcam outside of the LAN. This is probably the default setting for the router, but you should still check to be sure.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Firewall_(computing) - Wikipedia, the free encyclopediaThe practice of following an authorized person through an entrance without using a badge or token to defeat security is called:
Tailgaiting
Phishing
Spamming
Shredding
Tailgaiting is when an unauthorized person "tails" an authorized person through a secured entryway without the authorized person's knowledge.
In security, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint. It can be either electronic or physical. The act may be legal or illegal, authorized or unauthorized, depending on the circumstances. However, the term more often has the connotation of being an illegal or unauthorized act.To describe the act of an unauthorized person who follows someone to a restricted area without the consent of the authorized person, the term tailgating is also used. "Tailgating" implies no consent (similar to a car tailgating another vehicle on a road), while "piggybacking" usually implies consent of the authorized person.Piggybacking came to the public's attention particularly in 1999, when a series of weaknesses were exposed in airport security. A study showed that the majority of undercover agents attempting to pass through checkpoints, bring banned items on planes, or board planes without tickets, were successful. Piggybacking was revealed, as one of the methods that was used in order to enter off-limits areas.
Piggybacking_(security) - Wikipedia, the free encyclopediaWhich of the following is a command line tool that will translate between a domain name and an IP Address?
IPCONFIG
VERIFY
NSLOOKUP
TRACERT
NSLOOKUP will return the IP Address of a domain name by querying a computers assigned DNS Servers for the information.
nslookup (from "name server lookup") is a network administration command-line tool for querying the Domain Name System (DNS) to obtain the mapping between domain name and IP address, or other DNS records.
Nslookup - Wikipedia, the free encyclopediaWhen is it acceptable to a IT business to make copies of customer's confidential data?
If the content is public information
It is never acceptable to copy customer data
If the on-site tech determines it necessary
With the customer's permission, for back up purposes
As an IT, you have access to personal data. You should always get customer permission before copying or changing it.
Client confidentiality is the principle that an institution or individual should not reveal information about their clients to a third party without the consent of the client or a clear legal reason. This concept, sometimes referred to as social systems of confidentiality, is outlined in numerous laws throughout many countries.The access to a client's data as provided by the institution in question is usually limited to law enforcement agencies and requires some legal procedures to be accomplished prior to such action (e.g.: court order issued, etc.). This applies to bank account information or medical record. In some cases the data is by definition inaccessible to third parties and should never be revealed; this can include confidential information gathered by attorneys, psychiatrists, psychologists, or priests. One well known result that can seem hard to reconcile is that of a priest hearing a murder confession, but being unable to reveal details to the authorities. However, had it not been for the assumed confidentiality, it is unlikely that the information would have been shared in the first place, and to breach this trust would then discourage others from confiding with priests in the future. So, even if justice was served in that particular case (assuming the confession led to a correct conviction), it would result in fewer people taking part in what is generally considered a beneficial process. This could also be said of a patient sharing information with a psychiatrist, or a client seeking legal advice from a lawyer.
Client_confidentiality - Wikipedia, the free encyclopediaA user has reported that their laptop is not charging and often turns off, even when the charger is plugged in. Which of the following is most likely the problem?
Bad HDD sector
Bad DC Jack
Battery needs to be reseated
Overheating battery
If the battery is not charging and the laptop powers off when plugged in, it is most likely an issue with the power cord or DC jack. Remember: Laptops do not convert AC->DC. The power is converted by the power cord before reaching the laptop's DC jack.
A DC connector (or DC plug, for one common type of connector) is an electrical connector for supplying direct current (DC) power. Compared to domestic AC power plugs and sockets, DC connectors have many more standard types that are not interchangeable. The dimensions and arrangement of DC connectors can be chosen to prevent accidental interconnection of incompatible sources and loads. Types vary from small coaxial connectors used to power portable electronic devices from AC adapters, to connectors used for automotive accessories and for battery packs in portable equipment.
DC_connector - Wikipedia, the free encyclopediaA network administrator does not want their wireless network to be easily identified. Which option will allow the administrator to hide the network's common name?
MAC Filitering
Turn off SSID Bcst
Encrypt the WiFi with WPA2
Static IP scheme
A Wireless Access Point's SSID Broadcast is what allows a person or computer to easily identify a wireless network, turning this off will help mask/hide a network's identification.
In IEEE 80211 wireless local area networking standards (including Wi-Fi), a service set is a group of wireless network devices which share a service set identifier (SSID)—typically the natural language label that users see as a network name (For example, all of the devices that together form and use a Wi‑Fi network called Foo are a service set) A service set forms a logical network of nodes operating with shared link-layer networking parameters they form one logical network segment A service set is either a basic service set (BSS) or an extended service set (ESS) A basic service set is a subgroup, within a service set, of devices that share physical-layer medium access characteristics (e
Service_set_(802.11_network) - Wikipedia, the free encyclopediaA technician recently installed a new video card in a PC. The PC already has an integrated video on the motherboard. When the technician turns on the PC there is no video during POST and after booting. Which of the following is MOST likely the cause?
The video card is unsupported by the motherboard
The power connector for the video card is unplugged
The motherboard BIOS version is out of date
The incorrect video card drivers are installed
Many video cards, especially those used in gaming computers, require a 6-pin power connector from the power supply to operate. Along with this, you should check that the video card is properly seated. Drivers work with the operating system (not the BIOS) and the video is not working prior to boot, meaning it is unlikely to be a driver issue.
Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?
ERASE
SHUTDOWN
TASKKILL
DEL
The TASKKILL command in Windows is used to manually stop a process from running. Example: TASKKILL /IM notepad.exe, will stop the notepad.exe process.
In computing, kill is a command that is used in several popular operating systems to send signals to running processes.
Kill_(command) - Wikipedia, the free encyclopediaLooks like thats it! You can go back and review your answers or click the button below to grade your test.
Join premium for unlimited access and more features