Reader small image

You're reading from  CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102)

Product typeBook
Published inNov 2023
PublisherPackt
ISBN-139781837633180
Edition1st Edition
Right arrow
Authors (2):
Ian Neil
Ian Neil
author image
Ian Neil

Ian Neil is one of the world's top trainers of Security+. He is able to break down information into manageable chunks so that people with no background knowledge can gain the skills required to become certified. He has recently worked for the US Army in Europe and designed a Security+ course that catered to people from all backgrounds (not just IT professionals), with an extremely successful pass rate. He is an MCT, MCSE, A+, Network+, Security+, CASP, and RESILIA practitioner that has worked with high-end training providers over the past 23 years and was one of the first technical trainers to train Microsoft internal staff when they opened their Bucharest Office in 2006.
Read more about Ian Neil

Mark Birch
Mark Birch
author image
Mark Birch

Mark Birch is an experienced courseware developer and teacher in both information systems and cyber-security. Mark has been developing content and teaching CompTIA A+ classes for more than 20 years and understands the subject area in great depth. Mark began his career working within the aerospace industry (for a major defense contractor) and has over 30 years' experience consulting, engineering, and deploying secure information systems. He has spent over 20 years working with the United States Military and United Kingdom Armed Forces, helping many students attain their learning goals. Mark has ensured that soldiers, officers, and civilians have had the best opportunities to gain cyber-security accreditation.
Read more about Mark Birch

View More author details
Right arrow

d qr

1.1 Given a scenario, install and configure laptop hardware and components

  1. The correct answer is A. The biometric reader should be set up on each laptop or desktop for only the user of that device. In the accounts department, only one person should have access to each device. All other answers are incorrect. Some users in accounts may deal with more sensitive data, and it is therefore inadvisable to give everyone access to their laptop/desktop. Employees from other departments should not be permitted access to any account’s devices. Guests are people from other companies and should not be given access to any company resources.
  2. The correct answer is B. RAM is volatile, and you will need to wear an electrostatic discharge strap to protect the RAM against any static electricity. All other answers are incorrect. DDR RAM is for desktops, and SODIMMs are used by laptops. You would only check the power voltage if you had power problems. Operating system updates have...

Chapter 2: Networking

2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes

  1. The correct answer is B. Secure Shell (SSH) is used for secure remote access. All other answers are incorrect. Telnet provides unsecure remote access, RDP uses port 3389 and is a secure remote access protocol that can only be used to connect to Microsoft desktops/servers, and SNMP 161 is unsecure and provides status and reports on network devices.
  2. The correct answer is B. Hypertext Protocol Secure (HTTPS) is used when establishing a secure session on a web server. All other answers are incorrect. TFTP is unsecure and is used to transfer configuration files. HTTP is used to make an unsecure session on a web server. SSH is used for secure remote access.
  3. The correct answer is A. Post Office Protocol (POP) is a legacy mail client that stores emails locally and uses port 110. All other answers are incorrect. IMAP is a mail client that provides diaries and calendars, allows you...

Chapter 3: Hardware

3.1 Explain basic cable types and their connectors, features, and purposes

  1. The correct answer is A. Copper cables are subject to signal attenuation, which refers to the loss of signal strength over distance. Copper cables can be susceptible to electromagnetic interference. This will reduce speed but is not the main limitation. Bandwidth limitation primarily affects the overall capacity of the network but does not directly impact the speed of data transmission. Insulation-related issues are more likely to cause signal quality problems rather than limiting the speed of data transmission.
  2. The correct answer is A. An Optical Time Domain Reflectometer (OTDR) is a tool used for troubleshooting and testing fiber optic cables. It sends light pulses into the cable and measures the reflections to identify any issues, such as breaks or signal loss. Wire cutters are used for cutting wires and not troubleshooting fiber optic cables. An Ethernet cable tester is used...

Chapter 4: Virtualization and Cloud Computing

4.1 Summarize cloud computing concepts

  1. The correct answer is B. Infrastructure as a Service (IaaS) is a cloud computing service model in which a Cloud Service Provider (CSP) provides the hardware but nothing else. This is ideal when you want to move desktop computers to the cloud. To do this, you would install the operating system, configure it, and patch it. All other answers are incorrect. Software as a Service (SaaS) is a model in which a vendor creates an application, such as Salesforce, and companies lease the application. Security as a Service (SECaaS) is a model in which companies provide cloud identity management services through an external source. An example of this is Okta, which can provide SAML tokens. Monitoring as a Service (MaaS) is a model in which a cloud service provider monitors your network and servers for you.
  2. The correct answer is A. With a hybrid cloud, a company has employees working in both on-premises...

Chapter 5: Hardware and Network Troubleshooting

5.1 Given a scenario, apply the best-practice methodology to resolve the problem

  1. The correct answer is C. The first stage is to identify the problem with the printer and ignore any solution that a user gives you. After this, you will establish a possible cause, and then test the theory and implement a plan of action.
  2. The correct answer is C. The junior administrator has violated company policies. The standard operating procedure would state that any server updates should be done out of hours. They did not carry out patch management as that would be an enterprise solution. They just applied a single update to a single server. They did not communicate with users, which is a poor practice but not the main reason for the incident. Since there was no incident before they patched the server, it is not the troubleshooting process we need to look at; therefore, we can rule it out and establish a plan of action.
  3. The correct answers...

Chapter 6: Mock Exam: Core 1 (220-1101)

  1. The correct answer is C. M.2 allows faster data transfer rates compared to traditional hard drives. M.2 is a form factor that is commonly used for solid-state drives (SSDs) and offers faster data transfer speeds than traditional hard drives. M.2 supports both SATA and PCIe interfaces. Graphics cards typically use the PCIe form factor. M.2 can be used as a boot device.
  2. The correct answer is A. RAID 5 requires a minimum of three drives and distributes data and parity across multiple drives to provide fault tolerance. RAID 6 provides a higher level of fault tolerance with dual parity. RAID 0 offers increased read performance due to data striping without redundancy. RAID 5 does not require dedicated parity drives.
  3. The correct answer is B. Secure Digital (SD) is commonly used in digital cameras. SD cards are widely adopted and offer varying capacities for storing photos and videos. CompactFlash (CF) was popular in the past, but it has...

Chapter 7: Operating Systems

7.1 Identify basic features of Microsoft Windows editions

  1. The correct answer is D. BitLocker Drive Encryption requires an additional BitLocker password before the Windows OS is launched. If this is successfully entered, then the user will be presented with the regular login prompt next. A BIOS password requires a special key sequence, such as Ctrl + D, the purpose of which is to prevent a user from entering the BIOS/UEFI at startup. Windows Privacy and Security does not ask for a prompt before the OS launches. Windows Accessibility is typically used for the configuration of Windows settings to help users with audio or visual impairments.
  2. The correct answer is A, D. Windows 10 Home is intended for personal use and does not offer support features for enterprise/business users. ChromeOS is a simple-to-use OS and does not allow domain join. All Windows Pro and Enterprise editions DO support domain join functionality.
  3. The correct answer is A...

Chapter 8: Security

8.1 Summarize various security measures and their purposes

  1. The correct answer is A. Motion sensors are primarily designed to detect any movement within their range. They are commonly used in security systems to identify the presence of unauthorized individuals or objects, trigger an alarm, or activate other security measures. Option B describes HVAC systems. Option C describes audio detection. Option D describes a photosensor.
  2. The correct answer is B. Soft tokens are software-based security tokens that generate one-time passwords (OTPs) to authenticate the user’s identity during the login process. They are commonly used in logical security systems to provide an additional layer of security. Soft tokens generate unique passwords that are valid for a short period of time, ensuring that only authorized users can access sensitive information or perform specific actions. Option A, generating secure passwords, is incorrect because soft tokens are not...

Chapter 9: Software Troubleshooting

9.1 Given a scenario, troubleshoot common Windows OS problems

  1. The correct answer is A. Outdated device drivers are a common cause of BSOD errors in Windows. When drivers are not up to date, they can conflict with the OS, leading to system instability and crashes. Options B, C, and D can also cause system issues, but outdated device drivers are specifically known to trigger BSOD errors more frequently.
  2. The correct answer is C. Faulty RAM can cause BSOD errors, and the most effective solution is to replace the faulty RAM modules. Cleaning the computer’s cooling fans (option A) may prevent overheating issues but will not directly address RAM-related errors. Updating the anti-virus software (option B) is unrelated to RAM errors. Re-installing the operating system (option D) is a more extensive troubleshooting step and is usually not required for resolving RAM-related BSOD errors.
  3. The correct answer is B. The STOP error code displayed...

Chapter 10: Operational Procedures

10.1 Given a scenario, implement best practices associated with documentation and support systems information management

  1. The correct answer is C. Splash screens are an effective way to communicate important information to users before they access a system. They can display regulatory compliance requirements, organization policies, and other essential information. By implementing splash screens, the company can ensure that users are informed and aware of the necessary guidelines and procedures. While password complexity rules are important for security (Option A), they are not directly related to regulatory compliance requirements or splash screens. Network segmentation is a technique used to divide a network into smaller segments for security and performance purposes (Option B). It is not directly related to splash screens or regulatory compliance requirements. Incident reports are typically used to document and track security incidents or...

Chapter 11: Mock Exam: Core 2 (220-1102)

  1. The correct answer is B. This is a reasonable first step for addressing a suspected malware infection. Antivirus apps can scan the device for malware and potentially remove it. However, it’s important to use a reputable antivirus app and keep the device disconnected from the internet until the scan is complete to prevent further infection. Option A: This option is a drastic measure and should only be considered as a last resort. It will erase all data on the phone, including apps, settings, and personal data. It’s not the most appropriate first step for malware removal. Option C: While disconnecting the smartphone from the internet can prevent further malware downloads or communication with command-and-control servers, it doesn’t address the existing malware infection. This step should be combined with other actions, such as running a malware scan. Option D: Keeping the operating system and apps up to date is essential...

Why subscribe?

  • Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals
  • Improve your learning with Skill Plans built especially for you
  • Get a free eBook or video every month
  • Fully searchable for easy access to vital information
  • Copy and paste, print, and bookmark content

At www.packtpub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102)
Published in: Nov 2023Publisher: PacktISBN-13: 9781837633180
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Authors (2)

author image
Ian Neil

Ian Neil is one of the world's top trainers of Security+. He is able to break down information into manageable chunks so that people with no background knowledge can gain the skills required to become certified. He has recently worked for the US Army in Europe and designed a Security+ course that catered to people from all backgrounds (not just IT professionals), with an extremely successful pass rate. He is an MCT, MCSE, A+, Network+, Security+, CASP, and RESILIA practitioner that has worked with high-end training providers over the past 23 years and was one of the first technical trainers to train Microsoft internal staff when they opened their Bucharest Office in 2006.
Read more about Ian Neil

author image
Mark Birch

Mark Birch is an experienced courseware developer and teacher in both information systems and cyber-security. Mark has been developing content and teaching CompTIA A+ classes for more than 20 years and understands the subject area in great depth. Mark began his career working within the aerospace industry (for a major defense contractor) and has over 30 years' experience consulting, engineering, and deploying secure information systems. He has spent over 20 years working with the United States Military and United Kingdom Armed Forces, helping many students attain their learning goals. Mark has ensured that soldiers, officers, and civilians have had the best opportunities to gain cyber-security accreditation.
Read more about Mark Birch