CompTIA A+ 220-602 Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By StephenMC
S
StephenMC
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,881
Questions: 25 | Attempts: 4,881

SettingsSettingsSettings
CompTIA A+ 220-602 Exam - Quiz

Computer service professionals are needed to have adequate knowledge of computer networking skills for any good IT job. The CompTIA A+ exam gives one the opportunity to dive deeper into the world of networking. Are you preparing to sit for the exam and need some exercise? Take this CompTIA A+ 220-602 exam and get to find out how ready you are to tackle it.


Questions and Answers
  • 1. 

    In Windows XP which following command line function will convert a FAT volume to NTFS ?

    • A.

      COMP

    • B.

      CD

    • C.

      COMPACT

    • D.

      CONVERT

    • E.

      CHKDSK

    Correct Answer
    D. CONVERT
    Explanation
    The correct answer is CONVERT. The CONVERT command line function in Windows XP is used to convert a FAT volume to NTFS. This command allows users to change the file system of a particular volume without losing any data. It is a useful tool for upgrading the file system to take advantage of the features and benefits offered by NTFS.

    Rate this question:

  • 2. 

    A user asks you which of the follwing RAID disk arrays provide fault tolerance with parity. what should you tell him?

    • A.

      RAID 0

    • B.

      RAID 1

    • C.

      RAID 32

    • D.

      RAID 5

    • E.

      RAID 4

    Correct Answer
    D. RAID 5
    Explanation
    RAID 5 provides fault tolerance with parity. In RAID 5, data is striped across multiple disks along with parity information. This parity information allows for the reconstruction of data in case of a disk failure. When a disk fails, the data can be rebuilt using the parity information stored on the remaining disks. This provides fault tolerance as the system can continue to function even if a disk fails. RAID 0, RAID 1, RAID 32, and RAID 4 do not provide fault tolerance with parity.

    Rate this question:

  • 3. 

    Which account within Windows is the most targeted by hackers ?

    • A.

      Guest

    • B.

      Administrator

    • C.

      Limited account

    • D.

      System

    Correct Answer
    B. Administrator
    Explanation
    The correct answer is "administrator" because the administrator account has the highest level of access and control over a Windows system. This makes it an attractive target for hackers as compromising this account would give them full control over the system and allow them to carry out malicious activities without restrictions.

    Rate this question:

  • 4. 

    A user phones you and wants to know what is the max speed of USB 2.0 is, what should you tell him?

    • A.

      11Mbps

    • B.

      100Mbps

    • C.

      400Mbps

    • D.

      127Mbps

    • E.

      480Mbps

    Correct Answer
    E. 480Mbps
    Explanation
    USB 2.0 has a maximum speed of 480Mbps. This means that data can be transferred at a rate of up to 480 megabits per second.

    Rate this question:

  • 5. 

    A single sided, single layer DVD-R disc has a storage capcity of what ?

    • A.

      4.7GB

    • B.

      9.4GB

    • C.

      17GB

    • D.

      10GB

    • E.

      700MB

    Correct Answer
    A. 4.7GB
    Explanation
    A single sided, single layer DVD-R disc has a storage capacity of 4.7GB. This means that it can hold up to 4.7 gigabytes of data.

    Rate this question:

  • 6. 

    Which of the following file systems is recommended for Windows XP home

    • A.

      FAT

    • B.

      CDFS

    • C.

      DVD

    • D.

      NTFS

    • E.

      FAT16

    Correct Answer
    D. NTFS
    Explanation
    NTFS (New Technology File System) is recommended for Windows XP Home because it provides better security, stability, and performance compared to FAT (File Allocation Table) and FAT16. NTFS supports file and folder permissions, encryption, and compression, allowing for more advanced security features. It also supports larger file sizes and partitions, which is beneficial for modern systems. Additionally, NTFS has built-in recovery features that help prevent data loss in case of system failures. Therefore, NTFS is the preferred file system for Windows XP Home.

    Rate this question:

  • 7. 

    Which of the following utilities can be used to keep a Windows XP computer running efficiently and keep disk drives free of errors? choose two answers

    • A.

      System restore

    • B.

      Disk defragmenter

    • C.

      Device manager

    • D.

      CHKDSK

    • E.

      Scheduled tasks

    Correct Answer(s)
    B. Disk defragmenter
    D. CHKDSK
    Explanation
    Disk defragmenter and CHKDSK are both utilities that can be used to keep a Windows XP computer running efficiently and keep disk drives free of errors. Disk defragmenter rearranges fragmented data on the hard drive, making it easier and faster for the computer to access files. CHKDSK, on the other hand, checks the file system for errors and repairs any issues it finds. By regularly using these utilities, users can optimize their computer's performance and prevent disk drive errors.

    Rate this question:

  • 8. 

    Telnet uses port ??

    • A.

      21

    • B.

      23

    • C.

      25

    • D.

      1389

    • E.

      1394

    Correct Answer
    B. 23
    Explanation
    Telnet is a network protocol used to establish a remote connection to a device or server. It allows users to access and manage devices remotely. Telnet uses port 23 as the default port for communication. Therefore, the correct answer is 23.

    Rate this question:

  • 9. 

    What tool can be used to track and control the amount of disk space available using an NTFS volume?

    • A.

      Disk clean up

    • B.

      Disk dump

    • C.

      REGEDIT

    • D.

      Disk quotas

    • E.

      CMD

    Correct Answer
    D. Disk quotas
    Explanation
    Disk quotas can be used to track and control the amount of disk space available on an NTFS volume. By setting disk quotas, administrators can limit the amount of disk space that individual users or groups can consume on the volume. This helps in managing disk space usage and preventing any single user from consuming excessive disk space, ensuring fair allocation of resources. Disk clean up, disk dump, REGEDIT, and CMD are not specifically designed for tracking and controlling disk space availability on an NTFS volume.

    Rate this question:

  • 10. 

    Which of the following is not part of the OSI model ?

    • A.

      Session layer

    • B.

      Physical layer

    • C.

      Transport layer

    • D.

      Transmission layer

    • E.

      Network layer

    Correct Answer
    D. Transmission layer
    Explanation
    The OSI model consists of seven layers: physical, data link, network, transport, session, presentation, and application. Each layer has a specific function in the communication process. The transmission layer is not part of the OSI model.

    Rate this question:

  • 11. 

    Which of the following is the correct size of a Type II PCMCIA card?

    • A.

      3.3mm

    • B.

      7.5mm

    • C.

      0.3mm

    • D.

      5mm

    • E.

      10.5mm

    Correct Answer
    D. 5mm
    Explanation
    The correct size of a Type II PCMCIA card is 5mm. Type II PCMCIA cards are 5mm thick and are commonly used for adding additional functionality to laptops and other portable devices.

    Rate this question:

  • 12. 

    You attend a service call and complete an installation of a printer, you then begin to explain to the user how to use the printer but the user is deaf. what would you do next?

    • A.

      Call your supervisor

    • B.

      Talk slowy and loudly

    • C.

      Use notes and hand gestures to communicate

    • D.

      Go into town to search for a person who knows sign language

    Correct Answer
    A. Call your supervisor
  • 13. 

    There are two network printers in a large office.A user approaches you and asks why when he prints a document it prints to the wrong printer. what is the most likely cause ?

    • A.

      The other printer is set as the default printer

    • B.

      The user cancelled the printer spool

    • C.

      the AUI cable for the printer is over 185m long so the data cant reach the other printer

    • D.

      The user has no printer drivers on his OS

    Correct Answer
    A. The other printer is set as the default printer
    Explanation
    The most likely cause for the user's document printing to the wrong printer is that the other printer is set as the default printer. This means that when the user sends a print command, it automatically goes to the default printer instead of the intended one.

    Rate this question:

  • 14. 

    From the ways listed how can you change the file attributes of a file?

    • A.

      You cant change file attributes

    • B.

      Use the Attrib command in CMD.exe

    • C.

      Right-click the file and choose properties form the drop down list

    • D.

      Use the Attrib command in CMD.mmc

    • E.

      Go into the control panel and click on system, then click on advanced system settings, then file attributes tab

    Correct Answer(s)
    B. Use the Attrib command in CMD.exe
    C. Right-click the file and choose properties form the drop down list
    Explanation
    You can change the file attributes of a file by using the Attrib command in CMD.exe or by right-clicking the file and choosing properties from the drop-down list.

    Rate this question:

  • 15. 

    Your boss Chuck Norris wants a more secure PC, from the list below which of these is part of securing chucks PC

    • A.

      Limit the use of administrator accounts

    • B.

      Use untested software

    • C.

      Open Emails from unknown people

    • D.

      Use defrag weekly

    • E.

      Make use of event logging and incident reporting

    Correct Answer(s)
    A. Limit the use of administrator accounts
    E. Make use of event logging and incident reporting
    Explanation
    Limiting the use of administrator accounts is part of securing Chuck's PC because it reduces the risk of unauthorized access and potential damage caused by malware or malicious software. By using standard user accounts instead of administrator accounts, Chuck can prevent unauthorized changes to system settings and limit the scope of potential security breaches. Additionally, making use of event logging and incident reporting helps to monitor and identify any suspicious activities or security incidents on Chuck's PC, allowing for timely response and mitigation of potential threats.

    Rate this question:

  • 16. 

    Which of the following can be used to eliminate electromagnetic interference on a network cable ?

    • A.

      Line adapter tap

    • B.

      EMI-(AC) line checker

    • C.

      QOS tester

    • D.

      Ferrite clamp

    • E.

      Helix terminating resistor

    Correct Answer
    D. Ferrite clamp
    Explanation
    A ferrite clamp can be used to eliminate electromagnetic interference on a network cable. Ferrite clamps are made of a magnetic material that can absorb and suppress high-frequency electromagnetic noise. By attaching a ferrite clamp to a network cable, it can help to reduce the interference caused by external sources such as power lines or other electronic devices. This helps to improve the signal quality and overall performance of the network connection.

    Rate this question:

  • 17. 

    ARP is responsible for the following ?

    • A.

      For discovering the internet address of a host on a network

    • B.

      Starting the boot process

    • C.

      Communicating problems with transmission

    • D.

      Locating a host on a local network

    • E.

      ARP is made up and is not responsible for anything

    Correct Answer
    D. Locating a host on a local network
    Explanation
    ARP (Address Resolution Protocol) is responsible for locating a host on a local network. It is a protocol used to map an IP address to a physical (MAC) address. When a device wants to communicate with another device on the same network, it needs to know the MAC address of that device. ARP is used to resolve this by sending out a broadcast message to all devices on the network, asking which device has the specific IP address. The device with the matching IP address responds with its MAC address, allowing communication to take place.

    Rate this question:

  • 18. 

    Bill, a user is having problems with his email, which of the following protocols could be a cause ?

    • A.

      HTTP

    • B.

      FTP

    • C.

      SMTP

    • D.

      SSH

    • E.

      SNTP

    Correct Answer
    C. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the protocol used for sending and receiving emails. If Bill is experiencing problems with his email, it could be due to issues with the SMTP protocol, such as server configuration problems, authentication issues, or network connectivity problems. HTTP, FTP, SSH, and SNTP are not directly related to email communication, so they are less likely to be the cause of Bill's email problems.

    Rate this question:

  • 19. 

    Where have i taken the following from ? [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /fastdetect

    • A.

      CMOS

    • B.

      BOOT.INI

    • C.

      SYSTEM.INI

    • D.

      NTLDR

    • E.

      NTbootdetect

    Correct Answer
    B. BOOT.INI
    Explanation
    The given correct answer "BOOT.INI" is the name of a file that is commonly found in the root directory of a Windows XP operating system. This file contains the configuration settings for the Windows boot loader, including the timeout value, default operating system, and the location of the Windows installation. The contents of the file specify that the default operating system is located on the second partition of the first disk, and it is the Microsoft Windows XP Professional. Therefore, the information provided in the given text indicates that the answer is "BOOT.INI".

    Rate this question:

  • 20. 

    Your looking for the software registry key inthe registry, where is the best place to look for it ?

    • A.

      H_KEY_CLASSES_ROOT

    • B.

      H_KEY_CURRENT_USER

    • C.

      H_KEY_USERS

    • D.

      H_KEY_PREFORMANCE_DATA

    Correct Answer
    A. H_KEY_CLASSES_ROOT
    Explanation
    The best place to look for the software registry key in the registry is H_KEY_CLASSES_ROOT. This registry key contains information about file associations and COM objects, making it a likely location for software-related registry entries.

    Rate this question:

  • 21. 

    A user phones you and complains that there printouts from there laser printer are very slow.What could be the possible problem ?

    • A.

      The printhead has overheated

    • B.

      The printer firmware is corrupt

    • C.

      The printer port is disabled in CMOS

    • D.

      Spooling is not enabled

    Correct Answer
    D. Spooling is not enabled
    Explanation
    If spooling is not enabled, it means that the printer is not able to queue print jobs and process them in the background. This can result in slow printouts as the printer has to wait for each print job to be fully processed before starting the next one. Enabling spooling allows the printer to receive print jobs and store them in a queue, allowing for faster and more efficient printing.

    Rate this question:

  • 22. 

    A user phones you and says his laser printer is printing pages with white streaks though them. what is the possible problem

    • A.

      Fuser

    • B.

      Transfer corona

    • C.

      Print drum

    • D.

      Ac power supply

    • E.

      Paper jam

    Correct Answer
    B. Transfer corona
    Explanation
    The possible problem could be with the transfer corona. The transfer corona is responsible for transferring the toner from the drum onto the paper. If it is not functioning properly, it may result in white streaks on the printed pages.

    Rate this question:

  • 23. 

    A angry user comes into your office shouting that you have not fixed his PC like you said you did what should you do first ?

    • A.

      Throw a glass of water in his face

    • B.

      Ask the user to get the hell out of your office

    • C.

      Stay clam

    • D.

      Call your supervisor

    • E.

      Offer to have another look at the PC for a price

    Correct Answer
    C. Stay clam
    Explanation
    In this situation, it is important to stay calm and composed. Reacting with anger or aggression will only escalate the situation further. By remaining calm, you can listen to the user's concerns and address them in a professional and respectful manner. This will help in diffusing the tension and finding a solution to the problem.

    Rate this question:

  • 24. 

    Joe a new computer user phones you to say his CPU disk is jammed in the harddrive, when you arrive at the customers home,you see he has tried to push a floppydisk into the CD drive What would you do next ?

    • A.

      Point at the user and laugh

    • B.

      Phone one of your colleagues and tell him what the user has done this time

    • C.

      Give the user a list of available computer training courses

    • D.

      Ask your supervisor to come to the customers home

    Correct Answer
    C. Give the user a list of available computer training courses
    Explanation
    The appropriate next step would be to give the user a list of available computer training courses. This would help the user improve their computer skills and prevent them from making similar mistakes in the future. Laughing at the user or mocking them would not be professional or helpful. Contacting a colleague or supervisor may be unnecessary in this situation.

    Rate this question:

  • 25. 

    A user wants to make a file read-only and hidden, using command prompt which of the following would allow the user to do this ?

    • A.

      ATTRIB +R -H

    • B.

      ATTRIB +A -R

    • C.

      ATTRIB +R +H

    • D.

      ATTRIB -R -H

    • E.

      ATTRIB +R/H

    Correct Answer
    C. ATTRIB +R +H
    Explanation
    The correct answer is "ATTRIB +R +H". The "ATTRIB" command is used to change the attributes of a file, and the "+R" flag makes the file read-only while the "+H" flag hides the file. Therefore, using "ATTRIB +R +H" will make the file both read-only and hidden.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.