CompTIA A+ 220-602 Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By StephenMC
S
StephenMC
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,890
| Attempts: 4,890 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. There are two network printers in a large office.A user approaches you and asks why when he prints a document it prints to the wrong printer. what is the most likely cause ?

Explanation

The most likely cause for the user's document printing to the wrong printer is that the other printer is set as the default printer. This means that when the user sends a print command, it automatically goes to the default printer instead of the intended one.

Submit
Please wait...
About This Quiz
CompTIA A+ 220-602 Exam - Quiz

Computer service professionals are needed to have adequate knowledge of computer networking skills for any good IT job. The CompTIA A+ exam gives one the opportunity to dive... see moredeeper into the world of networking. Are you preparing to sit for the exam and need some exercise? Take this CompTIA A+ 220-602 exam and get to find out how ready you are to tackle it. see less

2. In Windows XP which following command line function will convert a FAT volume to NTFS ?

Explanation

The correct answer is CONVERT. The CONVERT command line function in Windows XP is used to convert a FAT volume to NTFS. This command allows users to change the file system of a particular volume without losing any data. It is a useful tool for upgrading the file system to take advantage of the features and benefits offered by NTFS.

Submit
3. Which of the following file systems is recommended for Windows XP home

Explanation

NTFS (New Technology File System) is recommended for Windows XP Home because it provides better security, stability, and performance compared to FAT (File Allocation Table) and FAT16. NTFS supports file and folder permissions, encryption, and compression, allowing for more advanced security features. It also supports larger file sizes and partitions, which is beneficial for modern systems. Additionally, NTFS has built-in recovery features that help prevent data loss in case of system failures. Therefore, NTFS is the preferred file system for Windows XP Home.

Submit
4. Bill, a user is having problems with his email, which of the following protocols could be a cause ?

Explanation

SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the protocol used for sending and receiving emails. If Bill is experiencing problems with his email, it could be due to issues with the SMTP protocol, such as server configuration problems, authentication issues, or network connectivity problems. HTTP, FTP, SSH, and SNTP are not directly related to email communication, so they are less likely to be the cause of Bill's email problems.

Submit
5. A single sided, single layer DVD-R disc has a storage capcity of what ?

Explanation

A single sided, single layer DVD-R disc has a storage capacity of 4.7GB. This means that it can hold up to 4.7 gigabytes of data.

Submit
6. A angry user comes into your office shouting that you have not fixed his PC like you said you did what should you do first ?

Explanation

In this situation, it is important to stay calm and composed. Reacting with anger or aggression will only escalate the situation further. By remaining calm, you can listen to the user's concerns and address them in a professional and respectful manner. This will help in diffusing the tension and finding a solution to the problem.

Submit
7. Joe a new computer user phones you to say his CPU disk is jammed in the harddrive, when you arrive at the customers home,you see he has tried to push a floppydisk into the CD drive What would you do next ?

Explanation

The appropriate next step would be to give the user a list of available computer training courses. This would help the user improve their computer skills and prevent them from making similar mistakes in the future. Laughing at the user or mocking them would not be professional or helpful. Contacting a colleague or supervisor may be unnecessary in this situation.

Submit
8. A user phones you and wants to know what is the max speed of USB 2.0 is, what should you tell him?

Explanation

USB 2.0 has a maximum speed of 480Mbps. This means that data can be transferred at a rate of up to 480 megabits per second.

Submit
9. Which of the following utilities can be used to keep a Windows XP computer running efficiently and keep disk drives free of errors? choose two answers

Explanation

Disk defragmenter and CHKDSK are both utilities that can be used to keep a Windows XP computer running efficiently and keep disk drives free of errors. Disk defragmenter rearranges fragmented data on the hard drive, making it easier and faster for the computer to access files. CHKDSK, on the other hand, checks the file system for errors and repairs any issues it finds. By regularly using these utilities, users can optimize their computer's performance and prevent disk drive errors.

Submit
10. What tool can be used to track and control the amount of disk space available using an NTFS volume?

Explanation

Disk quotas can be used to track and control the amount of disk space available on an NTFS volume. By setting disk quotas, administrators can limit the amount of disk space that individual users or groups can consume on the volume. This helps in managing disk space usage and preventing any single user from consuming excessive disk space, ensuring fair allocation of resources. Disk clean up, disk dump, REGEDIT, and CMD are not specifically designed for tracking and controlling disk space availability on an NTFS volume.

Submit
11. Where have i taken the following from ? [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /fastdetect

Explanation

The given correct answer "BOOT.INI" is the name of a file that is commonly found in the root directory of a Windows XP operating system. This file contains the configuration settings for the Windows boot loader, including the timeout value, default operating system, and the location of the Windows installation. The contents of the file specify that the default operating system is located on the second partition of the first disk, and it is the Microsoft Windows XP Professional. Therefore, the information provided in the given text indicates that the answer is "BOOT.INI".

Submit
12. Which account within Windows is the most targeted by hackers ?

Explanation

The correct answer is "administrator" because the administrator account has the highest level of access and control over a Windows system. This makes it an attractive target for hackers as compromising this account would give them full control over the system and allow them to carry out malicious activities without restrictions.

Submit
13. A user wants to make a file read-only and hidden, using command prompt which of the following would allow the user to do this ?

Explanation

The correct answer is "ATTRIB +R +H". The "ATTRIB" command is used to change the attributes of a file, and the "+R" flag makes the file read-only while the "+H" flag hides the file. Therefore, using "ATTRIB +R +H" will make the file both read-only and hidden.

Submit
14. Which of the following is not part of the OSI model ?

Explanation

The OSI model consists of seven layers: physical, data link, network, transport, session, presentation, and application. Each layer has a specific function in the communication process. The transmission layer is not part of the OSI model.

Submit
15. Which of the following is the correct size of a Type II PCMCIA card?

Explanation

The correct size of a Type II PCMCIA card is 5mm. Type II PCMCIA cards are 5mm thick and are commonly used for adding additional functionality to laptops and other portable devices.

Submit
16. A user phones you and complains that there printouts from there laser printer are very slow.What could be the possible problem ?

Explanation

If spooling is not enabled, it means that the printer is not able to queue print jobs and process them in the background. This can result in slow printouts as the printer has to wait for each print job to be fully processed before starting the next one. Enabling spooling allows the printer to receive print jobs and store them in a queue, allowing for faster and more efficient printing.

Submit
17. A user asks you which of the follwing RAID disk arrays provide fault tolerance with parity. what should you tell him?

Explanation

RAID 5 provides fault tolerance with parity. In RAID 5, data is striped across multiple disks along with parity information. This parity information allows for the reconstruction of data in case of a disk failure. When a disk fails, the data can be rebuilt using the parity information stored on the remaining disks. This provides fault tolerance as the system can continue to function even if a disk fails. RAID 0, RAID 1, RAID 32, and RAID 4 do not provide fault tolerance with parity.

Submit
18. Your looking for the software registry key inthe registry, where is the best place to look for it ?

Explanation

The best place to look for the software registry key in the registry is H_KEY_CLASSES_ROOT. This registry key contains information about file associations and COM objects, making it a likely location for software-related registry entries.

Submit
19. Your boss Chuck Norris wants a more secure PC, from the list below which of these is part of securing chucks PC

Explanation

Limiting the use of administrator accounts is part of securing Chuck's PC because it reduces the risk of unauthorized access and potential damage caused by malware or malicious software. By using standard user accounts instead of administrator accounts, Chuck can prevent unauthorized changes to system settings and limit the scope of potential security breaches. Additionally, making use of event logging and incident reporting helps to monitor and identify any suspicious activities or security incidents on Chuck's PC, allowing for timely response and mitigation of potential threats.

Submit
20. Telnet uses port ??

Explanation

Telnet is a network protocol used to establish a remote connection to a device or server. It allows users to access and manage devices remotely. Telnet uses port 23 as the default port for communication. Therefore, the correct answer is 23.

Submit
21. From the ways listed how can you change the file attributes of a file?

Explanation

You can change the file attributes of a file by using the Attrib command in CMD.exe or by right-clicking the file and choosing properties from the drop-down list.

Submit
22. A user phones you and says his laser printer is printing pages with white streaks though them. what is the possible problem

Explanation

The possible problem could be with the transfer corona. The transfer corona is responsible for transferring the toner from the drum onto the paper. If it is not functioning properly, it may result in white streaks on the printed pages.

Submit
23. Which of the following can be used to eliminate electromagnetic interference on a network cable ?

Explanation

A ferrite clamp can be used to eliminate electromagnetic interference on a network cable. Ferrite clamps are made of a magnetic material that can absorb and suppress high-frequency electromagnetic noise. By attaching a ferrite clamp to a network cable, it can help to reduce the interference caused by external sources such as power lines or other electronic devices. This helps to improve the signal quality and overall performance of the network connection.

Submit
24. ARP is responsible for the following ?

Explanation

ARP (Address Resolution Protocol) is responsible for locating a host on a local network. It is a protocol used to map an IP address to a physical (MAC) address. When a device wants to communicate with another device on the same network, it needs to know the MAC address of that device. ARP is used to resolve this by sending out a broadcast message to all devices on the network, asking which device has the specific IP address. The device with the matching IP address responds with its MAC address, allowing communication to take place.

Submit
25. You attend a service call and complete an installation of a printer, you then begin to explain to the user how to use the printer but the user is deaf. what would you do next?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 29, 2008
    Quiz Created by
    StephenMC
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
There are two network printers in a large office.A user approaches you...
In Windows XP which following command line function will convert a FAT...
Which of the following file systems is recommended for Windows XP home
Bill, a user is having problems with his email, which of the following...
A single sided, single layer DVD-R disc has a storage capcity of what...
A angry user comes into your office shouting that you have not fixed...
Joe a new computer user phones you to say his CPU disk is jammed in...
A user phones you and wants to know what is the max speed of USB 2.0...
Which of the following utilities can be used to keep a Windows XP...
What tool can be used to track and control the amount of disk space...
Where have i taken the following from ? ...
Which account within Windows is the most targeted by hackers ?
A user wants to make a file read-only and hidden, using command prompt...
Which of the following is not part of the OSI model ?
Which of the following is the correct size of a Type II PCMCIA card?
A user phones you and complains that there printouts from there laser...
A user asks you which of the follwing RAID disk arrays provide fault...
Your looking for the software registry key inthe registry, where is...
Your boss Chuck Norris wants a more secure PC, from the list below...
Telnet uses port ??
From the ways listed how can you change the file attributes of a file?
A user phones you and says his laser printer is printing pages with...
Which of the following can be used to eliminate electromagnetic...
ARP is responsible for the following ?
You attend a service call and complete an installation of a printer,...
Alert!

Advertisement