Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
CompTIA A+ Practice Test Core 1 (220-1101)

You're reading from  CompTIA A+ Practice Test Core 1 (220-1101)

Product type Book
Published in Sep 2023
Publisher Packt
ISBN-13 9781837634729
Pages 210 pages
Edition 1st Edition
Languages
Authors (2):
Ian Neil Ian Neil
Profile icon Ian Neil
Mark Birch Mark Birch
Profile icon Mark Birch
View More author details

Chapter 1: Mobile Devices

1.1 Given a scenario, install and configure laptop hardware and components

  1. The correct answer is A. The biometric reader should be set up on each laptop or desktop for only the user of that device. In the accounts department, only one person should have access to each device. All other answers are incorrect. Some users in accounts may deal with more sensitive data, and it is therefore inadvisable to give everyone access to their laptop/desktop. Employees from other departments should not be permitted access to any account’s devices. Guests are people from other companies and should not be given access to any company resources.
  2. The correct answer is B. RAM is volatile, and you will need to wear an electrostatic discharge strap to protect the RAM against any static electricity. All other answers are incorrect. DDR RAM is for desktops, and SODIMMs are used by laptops. You would only check the power voltage if you had power problems. Operating...

Chapter 2: Networking

2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes

  1. The correct answer is B. Secure Shell (SSH) is used for secure remote access. All other answers are incorrect. Telnet provides unsecure remote access, RDP uses port 3389 and is a secure remote access protocol that can only be used to connect to Microsoft desktops/servers, and SNMP 161 is unsecure and provides status and reports on network devices.
  2. The correct answer is B. Hypertext Protocol Secure (HTTPS) is used when establishing a secure session on a web server. All other answers are incorrect. TFTP is unsecure and is used to transfer configuration files. HTTP is used to make an unsecure session on a web server. SSH is used for secure remote access.
  3. The correct answer is A. Post Office Protocol (POP) is a legacy mail client that stores emails locally and uses port 110. All other answers are incorrect. IMAP is a mail client that provides diaries and calendars, allows you...

Chapter 3: Hardware

3.1 Explain basic cable types and their connectors, features, and purposes

  1. The correct answer is A. Copper cables are subject to signal attenuation, which refers to the loss of signal strength over distance. Copper cables can be susceptible to electromagnetic interference. This will reduce speed but is not the main limitation. Bandwidth limitation primarily affects the overall capacity of the network but does not directly impact the speed of data transmission. Insulation-related issues are more likely to cause signal quality problems rather than limiting the speed of data transmission.
  2. The correct answer is A. An Optical Time Domain Reflectometer (OTDR) is a tool used for troubleshooting and testing fiber optic cables. It sends light pulses into the cable and measures the reflections to identify any issues, such as breaks or signal loss. Wire cutters are used for cutting wires and not troubleshooting fiber optic cables. An Ethernet cable tester is used...

Chapter 4: Virtualization and Cloud Computing

4.1 Summarize cloud computing concepts

  1. The correct answer is B. Infrastructure as a Service (IaaS) is a cloud computing service model in which a Cloud Service Provider (CSP) provides the hardware but nothing else. This is ideal when you want to move desktop computers to the cloud. To do this, you would install the operating system, configure it, and patch it. All other answers are incorrect. Software as a Service (SaaS) is a model in which a vendor creates an application, such as Salesforce, and companies lease the application. Security as a Service (SECaaS) is a model in which companies provide cloud identity management services through an external source. An example of this is Okta, which can provide SAML tokens. Monitoring as a Service (MaaS) is a model in which a cloud service provider monitors your network and servers for you.
  2. The correct answer is A. With a hybrid cloud, a company has employees working in both on-premises...

Chapter 5: Hardware and Network Troubleshooting

5.1 Given a scenario, apply the best-practice methodology to resolve the problem

  1. The correct answer is C. The first stage is to identify the problem with the printer and ignore any solution that a user gives you. After this, you will establish a possible cause, and then test the theory and implement a plan of action.
  2. The correct answer is C. The junior administrator has violated company policies. The standard operating procedure would state that any server updates should be done out of hours. They did not carry out patch management as that would be an enterprise solution. They just applied a single update to a single server. They did not communicate with users, which is a poor practice but not the main reason for the incident. Since there was no incident before they patched the server, it is not the troubleshooting process we need to look at; therefore, we can rule it out and establish a plan of action.
  3. The correct answers...

Mock Exam

  1. The correct answer is C. M.2 allows faster data transfer rates compared to traditional hard drives. M.2 is a form factor that is commonly used for solid-state drives (SSDs) and offers faster data transfer speeds than traditional hard drives. M.2 supports both SATA and PCIe interfaces. Graphics cards typically use the PCIe form factor. M.2 can be used as a boot device.
  2. The correct answer is A. RAID 5 requires a minimum of three drives and distributes data and parity across multiple drives to provide fault tolerance. RAID 6 provides a higher level of fault tolerance with dual parity. RAID 0 offers increased read performance due to data striping without redundancy. RAID 5 does not require dedicated parity drives.
  3. The correct answer is B. Secure Digital (SD) is commonly used in digital cameras. SD cards are widely adopted and offer varying capacities for storing photos and videos. CompactFlash (CF) was popular in the past, but it has been largely replaced by SD cards...

Why subscribe?

  • Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals
  • Improve your learning with Skill Plans built especially for you
  • Get a free eBook or video every month
  • Fully searchable for easy access to vital information
  • Copy and paste, print, and bookmark content

At www.packtpub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.

lock icon The rest of the chapter is locked
You have been reading a chapter from
CompTIA A+ Practice Test Core 1 (220-1101)
Published in: Sep 2023 Publisher: Packt ISBN-13: 9781837634729
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime}