CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA A Plus 220 802 Test 1

Free CompTIA A+ 220-802 practice test, CompTIA A Plus 220 802 Test 1. This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

A new firewall has been installed, and network users are not able to SEND email, but can receive. What port should be checked?

  • 110

  • 443

  • 25

  • 143

A network administrator does not want their wireless network to be easily identified. Which option will allow the administrator to hide the network's common name?

  • MAC Filitering

  • Static IP scheme

  • Turn off SSID Bcst

  • Encrypt the WiFi with WPA2

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NET

  • NETSTAT

  • NBTSTAT

  • NSLOOKUP

When is it acceptable to a IT business to make copies of customer's confidential data?

  • If the content is public information

  • It is never acceptable to copy customer data

  • With the customer's permission, for back up purposes

  • If the on-site tech determines it necessary

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

  • Performance Monitor

  • Local Security Policy

  • MSCONFIG

  • Users and Groups

A business needs its sales team to have laptop computers on the sales floor, but is afraid they can be easily stolen. Which choice will best secure a companies laptop from theft?

  • finger print scanner

  • CCTV System

  • Cable lock

  • Badge Reader

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

  • Block the outbound port

  • Enable static IPs

  • Change the default SSID

  • Enable MAC filtering

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?

  • Establish a plan of action to resolve the problem

  • Implement preventative measures

  • Re-establish a new theory or escalate

  • Document findings, actions, and outcomes

An unauthorized user observing system security procedures is known as:

  • Shoulder Surfing

  • A Worm

  • Phishing

  • Spyware

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

  • Select load driver

  • Hit the refresh button to force a re-detect

  • Enable PATA in the BIOS

  • Press F8 when prompted

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Phishing

  • Shredding

  • Spamming

  • Tailgaiting

A user wants to share their parallel printer, which device will allow this?

  • A port replicator

  • A wireless router

  • Parallel to WiFi adapter

  • Print server

What encryption is the most secure for a WiFi network?

  • WEP

  • MAC filtering

  • WPA2

  • WPA

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

  • "Are you able to sign on?"

  • "What type of computer is it?"

  • "What exactly does not work?"

  • "Can you get to the Internet?"

You are installing Windows 7 Home Premium onto a laptop and you want to scan the laptop's disk for bad sectors. Which option will format the disk and scan the disk for bad sectors?

  • Virtual RAID Configuration

  • Full format

  • New partition

  • Quick format

A technician recently installed a new video card in a PC. The PC already has an integrated video on the motherboard. When the technician turns on the PC there is no video during POST and after booting. Which of the following is MOST likely the cause?

  • The incorrect video card drivers are installed

  • The motherboard BIOS version is out of date

  • The video card is unsupported by the motherboard

  • The power connector for the video card is unplugged

Which of the following is a command line tool that will translate between a domain name and an IP Address?

  • TRACERT

  • VERIFY

  • IPCONFIG

  • NSLOOKUP

Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

  • ERASE

  • SHUTDOWN

  • DEL

  • TASKKILL

A user has reported that their laptop is not charging and often turns off, even when the charger is plugged in. Which of the following is most likely the problem?

  • Bad DC Jack

  • Bad HDD sector

  • Battery needs to be reseated

  • Overheating battery

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?

  • Configure the access point encryption from unsecured access to WEP

  • Enable MAC filtering and restrict access to other company

  • Adjust the radio power so that coverage is restricted to the business

  • Change the SSID to reflect the business name instead of a public access point


Remaining Time 00:15:00