Free Essay

Comptia a+ Practice Questions

In:

Submitted By djs45
Words 907
Pages 4
CompTIA A+ 801 Practice Questions
Question 1
Objective: Identify types of network cables and connectors
Which of the following is the definition of an ST fiber connector?
A. Synthetic Tip
B. Standard Tip
C. Steel Tip
D. Straight Tip

Question 2
Objective: Given a scenario, demonstrate proper communication and professionalism
Customer satisfaction is best achieved by:
A. never minimizing the customer’s problems.
B. being defensive.
C. talking to coworkers while interacting with customers.
D. being judgmental.

Question 3
Objective: Install and configure storage devices and use appropriate media
SCSI hard drives can spin at a maximum speed of:
A. 5,400 rpm.
B. 7,200 rpm.
C. 10,000 rpm.
D. 15,000 rpm.

Question 4
Objective: Identify connector types and associated cables
Which of the following video connectors can display the HIGHEST resolution?
A. Composite
B. HDMI
C. VGA
D. S-video

Question 5
Objective: Given a scenario, demonstrate proper communication and professionalism
While attempting to resolve an issue, a customer talks to the technician about a recent activity that has no relevance on the repair. Which of the following is the MOST appropriate response?
A. Ask the customer for a timetable about recent activities.
B. Let the costumer complete their statement and then continue resolving the issue.
C. Document the customer’s statement and continue resolving the issue.
D. State that the activity is not relevant to the repair and continue resolving the issue.

Question 6
Objective: Configure and apply BIOS settings
Which of the following is MOST likely used at a large company? (Select TWO).
A. Windows 7 Home Premium
B. Windows 7 Professional
C. Windows XP Professional
D. Windows 7 Starter
E. Windows Vista Home Premium

Question 7
Objective: Compare and contrast network devices, their functions, and features
Hubs, switches, routers, VoIP phones and NIC cards all have which of the following out of the box?
A. PS/2 port
B. IP addresses
C. HDMI
D. MAC addresses

Question 8
Objective: Differentiate among various CPU types and features and select the appropriate cooling method
Which of the following is a best practice when applying thermal paste?
A. Follow the CPU manufacture’s guidelines and apply the correct amount of thermal paste.
B. The more thermal paste applied, the better.
C. Use as much as desired, as long as it is the most popular thermal paste.
D. The less thermal paste applied, the better.

Question 9
Objective: Explain properties and characteristics of TCP/IP
Which of the following is an example of an APIPA address?
A. 10.20.30.40
B. 169.254.43.40
C. 172.30.22.159
D. 192.168.23.110

Question 10
Objective: Given a scenario, install and configure printers
A supervisor has asked a technician to configure some Windows 7 PCs with some pre-established shared printers. The printers are all accessed via a wireless network. Where would a technician go in Windows 7 to add these printers?
A. %SystemDir%\Resources
B. Enter the paths to the printers in the Registry.
C. Start >Devices and Printers >Add a printer
D. Start >Devices and Printers >Add a Device

Question 11
Objective: Given a scenario, install and configure printers
A technician is deploying Windows 7 in a company. The supervisor wants to ensure that greatest flexibility is provided for the employees when printing. Which of the following lists defines all of the supported Windows 7 interfaces?
A. USB, Network, LPT, and Wireless
B. USB, IR, Bluetooth, and Network
C. IR, LPT, and USB
D. IR, LPT, Network, USB, and Wireless

Question 12
Objective: Evaluate and select appropriate components for a custom configuration, to meet customer specifications or needs
A custom configured PC with surround sound audio, HDMI output, and a compact form factor would be MOST suited to which of the following applications?
A. Thick Client
B. Gaming PC
C. Audio / Video Editing Workstation
D. Home Theater PC

Question 13
Objective: Identify various types of networks
Which of the following network types would be MOST likely used on a high school campus?
A. MAN
B. LAN
C. PAN
D. WAN

Question 14
Objective: Compare and contrast laptop features
A laptop docking station does which of the following?
A. Allows the user to synchronize mobile devices without additional hardware
B. Allows the user to connect one device to a monitor, network drop, and USB printer
C. Allows the user to connect wireless devices more efficiently
D. Allows the user to protect sensitive data more effectively

Question 15
Objective: Compare and contrast wireless networking standards and encryption types
Which of the following wireless encryption technologies is the WEAKEST?
A. WPA2
B. WEP
C. WPA
D. TKIP

A+ 801 Answer Key
Question 1) D. Straight Tip
Question 2) A. never minimizing the customer’s problems.
Question 3) D. 15,000 rpm.
Question 4) B. HDMI
Question 5) B. Let the costumer complete their statement and then continue resolving the issue.
Question 6) B. Windows 7 Professional & c) Windows XP Professional
Question 7) D. MAC addresses
Question 8) A. Follow the CPU manufacture’s guidelines and apply the correct amount of thermal paste.
Question 9) B. 169.254.43.40
Question 10) C. Start >Devices and Printers >Add a printer
Question 11) D. IR, LPT, Network, USB, and Wireless
Question 12) D. Home Theater PC
Question 13) B. LAN
Question 14) B. Allows the user to connect one device to a monitor, network drop, and USB printer
Question 15) B. WEP

Similar Documents

Premium Essay

A + Certification

...2009 Edition The latest version of CompTIA A+ is CompTIA A+ 2009 Edition. Two exams are necessary to be certified: CompTIA A+ Essentials, exam code 220-701; and CompTIA A+ Practical Application, exam code 220-702.   CompTIA A+ Essentials measures the necessary competencies of an entry-level IT professional with a recommended 500 hours of hands-on experience in the lab or field. It tests for the fundamentals of computer technology, networking and security, as well as the communication skills and professionalism now required of all entry-level IT professionals. CompTIA A+ Practical Application is an extension of the knowledge and skills identified in CompTIA A+ Essentials, with more of a "hands-on" orientation focused on scenarios in which troubleshooting and tools must be applied to resolve problems. Required exams: CompTIA A+ Essentials, CompTIA A+ Practical Application Number of questions: 100 for each exam Length of test: 90 minutes each Passing score: 675 for CompTIA A+ Essentials, 700 for CompTIA A+ Practical Application on a scale of 100-900 Exam Overiew: • CompTIA_A_220-701: pdf • CompTIA_A_220-702: pdf CompTIA A+ Test Taking Tips It is possible to study and learn about a topic and still not find success on a certification exam. Studying develops specific skill and knowledge, but it is the presentation of your skill and knowledge that satisfies the exam. This difference is vital to successful exam study. Multiple choice: What’s right and what’s...

Words: 892 - Pages: 4

Premium Essay

It220

...Exam Details In order to become CompTIA A+ certified, you must pass two exams: the Essentials Exam (number 220-701) and the Practical Application exam (number 220-702). ← Number of questions: 100 for each exam ← The exams each consist of 100 questions and are known as "linear exams". This means that you can go backward or forward within the exam, mark items, and change answers if necessary. It differs from an "adaptive exam" in that it has more questions, and the exam does not adapt to previous answers that the examinee has given. ← Type of questions: Primarily multiple-choice ← The exams consist primarily of multiple-choice questions, but you might see an occasional matching question. CompTIA reserves the right to change the bank of questions, while still adhering to the objectives. The tests are administered on a computer within a very easy-to-use program. The majority of the time, you will simply click the letter of the corresponding correct answer. The exams can be taken in many languages including English, Spanish, German, and Japanese. The new exams (220-801 and 220-802) due out in October 2012 will include Performance Based Questions where the test taker will be asked to do a task in a simulated environment, but the 701/702 exams won’t have those types of questions added to their bank of questions. Also note that the 701/702 series of exams will be retired as of August 31, 2013, but between now and then you can choose to take either series of...

Words: 447 - Pages: 2

Premium Essay

Assign

...Color profile: Disabled Composite Default screen BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Wm. Arthur Conklin / 619-8 / Chapter 2 2 General Security Concepts “The only real security that a man can have in this world is a reserve of knowledge, experience and ability.” —HENRY FORD In this chapter, you will learn how to ■ Define basic terms associated with computer and information security ■ Identify the basic approaches to computer and information security ■ Distinguish among various methods to implement access controls ■ Describe methods used to verify the identity and authenticity of an individual ■ Describe methods used to conduct social engineering ■ Recognize some of the basic models used to implement security in operating systems 20 P:\010Comp\BaseTech\619-8\ch02.vp Wednesday, November 09, 2011 2:01:20 PM I n Chapter 1, you learned about some of the various threats that we, as security professionals, face on a daily basis. In this chapter, you start exploring the field of computer security. Color profile: Disabled Composite Default screen BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Wm. Arthur Conklin / 619-8 / Chapter 2 ■ Basic Security Terminology The term hacking has been used frequently in the media. A hacker was once considered an individual who understood the technical aspects of computer operating systems...

Words: 16889 - Pages: 68

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Free Essay

Network Plus

...CompTIA Network+ Practice Question Answers Question 1. Objective: Given a scenario, install and configure routers and switches. The IEEE standard 802.3af states the specifications for which of the following? a) Quality of Service b) VLANs c) Routing tables d) Power over Ethernet Question 2. Objective: Given a scenario, troubleshoot common router and switch problems. A user's remote marketing server has changed IP address schemes and now the user can no longer access it. The user further discovers that the distant end still has access to them. Which of the following is a possible cause? a) SNMP strings need to be added b) Firewall rules need to be configured c) Port bonding on the interface needs to be enabled d) The switch has lost power Question 3. Objective: Explain the purpose and features of various network appliances. Which of the following is a network device that allows remote users access to a network? a) DNS server b) Content filter c) Load balancer d) VPN concentrator Question 4. Objective: Given a scenario, use the appropriate network monitoring resource to analyze traffic. A technician suspects that a virus has been introduced on the network. Which network resource is BEST used to confirm this problem? a) Syslog b) SNMP c) Network sniffer d) Environmental monitor Question 5. Objective: Given a scenario, implement the following network troubleshooting methodology. A user reports a network connectivity problem. Which...

Words: 1379 - Pages: 6

Free Essay

Certified Ethical Hacker

...http://www.ipass4sure.com 312-50 ECCouncil Certified Ethical Hacker http://www.ipass4sure.com/exams.asp?examcode=312-50 The 312-50 practice exam is written and formatted by Certified Senior IT Professionals working in today's prospering companies and data centers all over the world! The 312-50 Practice Test covers all the exam topics and objectives and will prepare you for success quickly and efficiently. The 312-50 exam is very challenging, but with our 312-50 questions and answers practice exam, you can feel confident in obtaining your success on the 312-50 exam on your FIRST TRY! ECCouncil 312-50 Exam Features - Detailed questions and answers for 312-50 exam - Try a demo before buying any ECCouncil exam - 312-50 questions and answers, updated regularly - Verified 312-50 answers by Experts and bear almost 100% accuracy - 312-50 tested and verified before publishing - 312-50 exam questions with exhibits - 312-50 same questions as real exam with multiple choice options Acquiring ECCouncil certifications are becoming a huge task in the field of I.T. More over these exams like 312-50 exam are now continuously updating and accepting this challenge is itself a task. This 312-50 test is an important part of ECCouncil certifications. We have the resources to prepare you for this. The 312-50 exam is essential and core part of ECCouncil certifications and once you clear the exam you will be able to solve the real life problems yourself.Want to take advantage of the Real 312-50...

Words: 1963 - Pages: 8

Premium Essay

Environmental Scanning

...Scanning at Ole Miss 10 Environmental Scanning at the Center for Information Technology, Bellevue University 11 General Attitudes Toward Scanning 11 Sources Being Scanned 11 Interview with Director Creagan 12 Conclusions and Recommendations 14 Conclusions 14 Recommendations 15 Bibliography 16 Introduction Environmental scanning is a tool used by strategic planners in the business and academic worlds. However, these terms often meet with a blank stare when presented to people outside of senior management. What is strategic planning? What is environmental scanning? How do businesses and universities use these tools? Is environmental scanning a tool that can be used more effectively at universities? These questions will be investigated, with specific attention on the role of environmental scanning at the Center for Information Technology at Bellevue University. First, this paper will provide background information about strategic planning and the role of environmental scanning. Second, this paper will examine environmental scanning as business executives use it. Third, this paper will highlight the potential for environmental scanning in the academic world and investigate several...

Words: 3484 - Pages: 14

Premium Essay

Internet Technology, Marketing, and Security

...Michael Hawkins Dr. Daniel Sersland BUS 508 – Contemporary Business July 26, 2012 Marketing has changed and businesses need to employ a variety of Digital Media tools in a marketing plan to be successful. Social Media is one of these tools. Social Media Examiner and CompTIA researched the benefits of Social Media Marketing and found many reasons why businesses should be marketing with Social Media. In addition to improving communication and fostering relationships with potential clients and business partners, five reasons to use Social Media include to: 1. Increase Exposure 85% of marketers said that they saw increased exposure for their businesses with Social Media. (Stelzner, 2012) Nearly all marketers surveyed said that using Social Media for a year or longer saw an increase in the exposure of their business. 2. Generate Leads just by spending as few as 6 hours a week using Social Media 61% of marketers saw the benefits of generating leads. This number increases 10% with at least 3 years of marketing with Social Media. Small Business saw an even greater increase in lead generation. 3. Save Money 51% of businesses saw cost savings with using Social Media to market. (CompTIA) According to HubSpot, inbound marketing costs 62% less than traditional outbound marketing. There is no other marketing avenue where you can get the daily exposure for your business than on Social Media. 4. Improve Search Rankings Businesses marketing on the top Social Networks for...

Words: 3775 - Pages: 16

Free Essay

Online and Face to Face Education

...FSB Instructor Course Student Guide 15.03.23 PREPARATION 1 Instructor and Classroom Preparation 3 Classroom Management 17 Course Introduction 33 LESSON PLANNING AND PRESENTATION 41 Introduction to Lesson Planning 43 Anticipatory Set 51 Learning Objectives Writing Questions and Objectives Using Bloom’s Taxonomy 57 Input and Modeling Implications of Short-Term Memory Research Implications of Long-Term Memory Research Presentation Skills: Verbal, Vocal, Visual Presentation Skills: Questioning 77 93 105 113 Guided Practice Cooperative Learning Learning Styles/Modalities: Multiple Intelligences 121 135 Independent Practice Differentiated Instruction Assessment 153 161 Closure 171 REFERENCES 177 1 2 3 4 5 6 Course Overview Lesson Planning •  •  •  •  •  •  •  •  •  •  •  Class Schedule •  Start Time •  Lunch •  Dismissal •  Breaks Class Agenda: what topics are taught on what days Review Anticipatory Set Objectives Purpose Input and Modeling Check for Understanding Guided Practice Closure Independent Practice (Sousa, 2011) The instructor is given what to teach, and he/she chooses how to teach it. We intend not to overwhelm students with information, and we will learn why in later lessons on memory. 7 Reliable Sources •  •  •  •  Quick reference guides Training manuals Manufacturer’s website or customer...

Words: 11421 - Pages: 46

Premium Essay

Wprs

...researchers? The study is presently being carried out by Mr. Kwete Nyandongo from the University of Johannesburg. Other academics and senior students will also be involved. What do we request of you in the study? Participation in this survey is voluntary and anonymous. By completing and returning this questionnaire, you agreed to participate in this research and to the publication of the results with the understanding that anonymity will be preserved. Although this is an anonymous survey, space is provided at the end of the questionnaire for contact details of people who would be prepared to make themselves available for short follow-up interviews. The questionnaire will take you, at most, 30 minutes to complete. The majority of questions are in multiple choice format and we ask that you select the most appropriate answer. However, in some cases there is space to provide your own input should you wish to do so. How are we going to use the results? This is an anonymous survey. We are not attempting to uncover your identity, the identity of your organisation or examine the responses on an individual basis. The results of the project will be published, but you may be assured that any information obtained...

Words: 2735 - Pages: 11

Premium Essay

Sec583 Week 2

...The security industry is no longer the simple entity it was once considered, over the decade or so it has become a very diverse profession and can be compared to both the medical and legal professions. Changes in technology and the events of 9/11 have forever changed the face of the security industry and has lead to the diversification of the field. Where it was thought that security consisted of only security guards patrolling an area or watching CCTV, the industry now specializes in areas spanning from physical, IT and forensic security. With these specializations come the need for both specialized higher education degrees and industry certifications. The principal purpose of certification is to create a standard level of knowledge for those individuals employed in a particular industry. Certification in security management communicates to potential employers and the public that the possessor has demonstrated they have the basic skills, education and proficiency to take on a particular assignment. My research has identified one primary source for security certifications: American Society for Industrial Security (ASIS). The American Society for Industry Security (ASIS) offers three board certifications: Certified Protection Professional (CPP), Professional Certified Investigator (PCI) and Physical Security Professional (PSP). Beginning in 1977 ASIS certifications have been setting the standard fro security professionalism. ASIS claims their certifications are the global...

Words: 2289 - Pages: 10

Free Essay

Term

...COMP 129 (On-Line) Notes Chapter 1 Introduction to Computer Repair Chapter Summary * • Computer technicians should actively listen, have a positive attitude, refrain from using technical acronyms and terminology when speaking with nontechnical people, and be culturally sensitive. * • Easily identify important computer parts installed in a computer and as standalone parts: case, keyboard, mouse, motherboard, monitor, power supply, hard drive, optical drive, adapter, riser board, and memory. * • Easily identify various ports to determine what device attaches to them: VGA, DVI, HDMI, DisplayPort, USB, IEEE 1394, 3.5mm sound jack, PS/2, RJ-45, eSATA, parallel, serial, and RJ-11. * • The most popular method for adding functionality to desktops, laptops, and tablets is to use a USB port. * • USB 3.0 ports will accept 3.0 and older devices and provide more power. You can add additional ports by connecting a USB module to motherboard pins. This module takes an expansion space (but not a slot). A PCI/PCIe adapter can also be installed to provide additional ports. Cabling from the power supply to the adapter might be required to provide power to the new USB ports. * • Up to five USB hubs can be daisy-chained to one port. Upstream ports connect to the computer or another USB port. Devices connect to downstream ports. * • USB hubs can be self-powered or bus powered. * • IEEE 1394 devices do not have to have a computer port and can be cabled to each...

Words: 6936 - Pages: 28

Premium Essay

Inventory of Assets

...Inventory of Assets Introduction Inventory of assets is the accounting of information technology and systems, both hardware and software, that is necessary for maintaining a stable and accurate support in order to provide information security and assurance, disaster recovery, as well as to avoid service interruption. In any organization, it is important to have an organized list of all assets including hardware and software, as well as licensing. Company-issued laptops, smartphones, tablets, and other mobile devices can be an easy target of cyber attackers. It is ideal to have an organized way of keeping track of company assets (i.e. spreadsheets or database). Quick references such as spreadsheets/workbooks or databases can easily provide reports of asset inventory containing type of equipment, count, value, asset tag information, software license number, license expiration, employee ID to whom assets are issued to, etc. As an employee of any company or organization, the company issued laptops, devices and other peripherals should be the responsibility of the employee that the item(s) is issued to. A stolen laptop could cause the company a huge amount because it does not only require the replacement cost, but has serious security concerns involved. According to Mitnick and Simon, “Even when security is being well handled within a company, there is too often a tendency to overlook the corporate network, leaving an opening that attacker(s) can take advantage of. Laptops and...

Words: 2212 - Pages: 9

Premium Essay

Offshoring Impact on U.S. Software Engineers

...Conclusion 11 3.1 Summary of Findings 11 3.2 Recommendations 11 4 Appendices 13 4.1 2008 Projected Base Salary Increases 13 5 Bibliography 14 1 Introduction 1.1 Definitions According to United States Department of Labor, software engineers (job 15-1031) develop, create, and modify general computer applications software or specialized utility programs. Analyze user needs and develop software solutions. Design software or customize software for client use with the aim of optimizing operational efficiency. May analyze and design databases within an application area, working individually or coordinating database development as part of a team. According to Webster's New Millennium™ Dictionary of English, offshoring is the practice of moving business processes or services to another country, especially overseas, to reduce costs. Note that the Bureau of Labor Statistics Data, a subsidiary of the United States Department of Labor, refers to offshoring as “overseas relocation”. 1.2 Summary Would...

Words: 2446 - Pages: 10

Premium Essay

Comptia Project+ Study Guide

...Answers to Review Questions 1. C, E. A project creates a unique product, service, or result and has defi ned start and fi nish dates. Projects must have resources in order to bring about their results, and they must meet the quality standards outlined in the project plan. Interrelated activities are not projects because they don ’ t meet the criteria for a project. Project management processes are a means to manage projects, and processes used to generate profi ts or increase market share do not fi t the defi nition of a project. Processes are typically ongoing; projects start and stop. 2. B. The Project Management Institute (PMI) is the leading professional project management association, with more than 400,000 members worldwide. 3. D. A program is a group of related projects that can benefi t from coordinated management. Life cycles are the various stages a project goes through, and process groups consist of Initiating, Planning, Executing, Monitoring and Controlling, and Closing. 4. B, C, E. The steps in pre - project setup include the following: identifying the project, validating the project, preparing a project charter, and obtaining approval of the charter. 5. B. Project managers can spend up to 90 percent of their time communicating. The other skills listed here are important as well, but the clue in this question is the 90 percent fi gure that relates to the amount of time project managers may spend communicating. 6. A. A request to develop a product...

Words: 15268 - Pages: 62