CompTIA A+ 220-901/902 Practice Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Alexdrum87
A
Alexdrum87
Community Contributor
Quizzes Created: 1 | Total Attempts: 416
| Attempts: 416
SettingsSettings
Please wait...
  • 1/280 Questions

    When is it appropriate to yell at a user?

    • When he screws up the second time
    • When he interrupts your troubleshooting
    • When he screws up the fifth time
    • Never
Please wait...
About This Quiz

This practice exam prepares for the CompTIA A+ 220-901\/902 certification, assessing knowledge in IT industry requirements, Windows Operating Systems, and exam administration by Pearson VUE. Essential for aspiring IT professionals.

CompTIA A+ 220-901/902 Practice Exam - Quiz

Quiz Preview

  • 2. 

    What companies dominate the chipset market? (select two)

    • AMD

    • Intel

    • NVIDIA

    • SiS

    Correct Answer(s)
    A. AMD
    A. Intel
    Explanation
    AMD and Intel produce the vast majority of the chipsets used in personal computers.

    Rate this question:

  • 3. 

    What can a government use to determine your location at a specific time as long as you're using your mobile device?

    • Multifactor authentication

    • Geotracking

    • Google Earth

    • Authenticator applications

    Correct Answer
    A. Geotracking
    Explanation
    Geotracking can locate you and your GPS-equipped mobile device.

    Rate this question:

  • 4. 

    While manning the help desk, you get a call from a distraught user who says she has a blank screen. What would be a useful follow-up question? (select two)

    • Is the computer turned on?

    • Is the monitor turned on?

    • Did you reboot?

    • What did you do?

    Correct Answer(s)
    A. Is the computer turned on?
    A. Is the monitor turned on?
    Explanation
    Go for the simple answer first. When faced with a blank screen, check to see if the computer and the monitor are turned on.

    Rate this question:

  • 5. 

    Which certification is considered a requirement for entrance into the IT industry?

    • Certified Cisco Network Associate

    • CompTIA A+ certification

    • CompTIA Network+ certification

    • Microsoft Certified Solutions Expert

    Correct Answer
    A. CompTIA A+ certification
    Explanation
    The Comptia A+ certification is considered a requirement for entrance into the PC industry.

    Rate this question:

  • 6. 

    To make your files unreadable by others, what should you use?

    • Clustering

    • Compression

    • Disk quotas

    • Encryption

    Correct Answer
    A. Encryption
    Explanation
    To make your files unreadable by others, use encryption.

    Rate this question:

  • 7. 

    How many speakers are in a Dolby Digital 5.1 setup?

    • Five speakers plus a subwoofer.

    • Six speakers plus a subwoofer

    • Seven speakers plus a subwoofer

    • Eight speakers plus a subwoofer.

    Correct Answer
    A. Five speakers plus a subwoofer.
    Explanation
    A Dolby Digital 5.1 setup has five speakers and one subwoofer.

    Rate this question:

  • 8. 

    What does System Information do?

    • Provides you with a report about the hardware resources, components, and software environment in your computer.

    • Enables you to select which programs and services start when Windows boots up.

    • Enables you to schedule hard drive defragmentation, chkdsk scans, and other computer tasks.

    • Enables you to perform automatic custom backups of your files and settings.

    Correct Answer
    A. Provides you with a report about the hardware resources, components, and software environment in your computer.
    Explanation
    System Information gives you a wide variety of information about your system.

    Rate this question:

  • 9. 

    Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and Microsoft Edge are all examples of what?

    • Web servers

    • Print servers

    • Web browsers

    • Proxy servers

    Correct Answer
    A. Web browsers
    Explanation
    All these programs are Web browsers

    Rate this question:

  • 10. 

    What is the primary benefit to adding more RAM to a laptop that uses shared memory? (select the best answer)

    • Improved battery life

    • Improved system performance

    • Improved video performance

    • None. Adding more RAM is pointless with systems that use shared memory

    Correct Answer
    A. Improved system performance
    Explanation
    Improved overall system performance is the primary benefit to adding more RAM to a laptop that uses shared memory

    Rate this question:

  • 11. 

    What should you do after successfully repairing a machine?

    • Do nothing; your job is done.

    • Admonish the user for causing so much work for the IT department

    • Document your findings

    • Lock it down so the user can't cause the same problem again

    Correct Answer
    A. Document your findings
    Explanation
    At the end of a repair you should always document your findings.

    Rate this question:

  • 12. 

    Steven's Windows system can't connect to the Internet, and he comes to you, his PC tech, for help. You figure out that it's a DHCP problem. What program should you run to troubleshoot his DHCP problem from the client side?

    • Ipconfig

    • Ifconfig

    • Config

    • Dhcp /review

    Correct Answer
    A. Ipconfig
    Explanation
    You should run ipconfig, or more specifically ipconfig /release and then ipconfig /renew to get a new IP address if a DHCP server is available for Steven's Windows system. This typically resolves most DHCP client-side problems. ifconfig is the program used by Mac OS X and Linux systems for this task. Neither config nor dhcp is valid.

    Rate this question:

  • 13. 

    Which of the following cellular data technologies is often considered 4G?

    • EDGE

    • UMTS

    • LTE

    • CDMA

    Correct Answer
    A. LTE
    Explanation
    Long Term Evolution (LTE) us usually considered a 4G cellular data technology

    Rate this question:

  • 14. 

    After becoming CompTIA A+ certified, what's the next certification you should attain?

    • CompTIA Network+

    • CompTIA Security+

    • Microsoft Certified Solutions Expert

    • Certified Cisco Network Associate

    Correct Answer
    A. CompTIA Network+
    Explanation
    The typical certification path goes from CompTIA A+ to CompTIA Network+, so you have all the basics before you choose to specialize in Microsoft or Cisco products.

    Rate this question:

  • 15. 

    At the very least, what tool should be in every technician's toolkit?

    • Pliers

    • Hammer

    • Straight-slot screwdriver

    • Phillips-head screwdriver

    Correct Answer
    A. Phillips-head screwdriver
    Explanation
    Every tech's toolkit should have a phillips-head screwdriver, at the very least.

    Rate this question:

  • 16. 

    What is the term for the delay in the RAM's response to a request from the MCC?

    • Variance

    • MCC gap

    • Latency

    • Fetch interval

    Correct Answer
    A. Latency
    Explanation
    Latency is the term for the delay in the RAM's response to a request from the MCC.

    Rate this question:

  • 17. 

    Which of the following form factors dominates the PC industry?

    • AT

    • ATX

    • ITX

    • CTX

    Correct Answer
    A. ATX
    Explanation
    Almost all modern motherboards follow the ATX form factor.

    Rate this question:

  • 18. 

    What is the proper voltage for a U.S. electrical outlet?

    • 120 V

    • 60 V

    • 0 V

    • -120 V

    Correct Answer
    A. 120 V
    Explanation
    U.S. outlets run at 120 V

    Rate this question:

  • 19. 

    What port does POP3 use?

    • 22

    • 110

    • 42

    • 256

    Correct Answer
    A. 110
    Explanation
    Post Office Protocol 3 (POP3) uses port 110.

    Rate this question:

  • 20. 

    Leonard just purchased a very expensive comic book and paid for it using the stored credit card information on his smartphone. What technology did he use to make the transaction?

    • Swipe lock

    • Wi-Fi calling

    • NFC

    • BitLocker To Go

    Correct Answer
    A. NFC
    Explanation
    Leonard likely purchased his comic book using the Near Field Communication (NFC) technology, which can be used for payment transactions through stored credit card information in mobile applications.

    Rate this question:

  • 21. 

    Which of the following is a good practice after completing a troubleshooting call at someone's office?

    • Follow up with a call within a couple of days to make sure everything is going well with the fixed computer.

    • Make copies of passwords you used at the site for future reference.

    • Document any particularly important people you met for future reference.

    • Do nothing. Your work is finished there.

    Correct Answer
    A. Follow up with a call within a couple of days to make sure everything is going well with the fixed computer.
    Explanation
    A simple follow-up builds good will and trust. This is a very important step t take after completing a job.

    Rate this question:

  • 22. 

    Which tool helps you avoid accidental static discharge by keeping you at the same electrical potential as the computer on which you're working?

    • Antistatic spray

    • Antistatic bag

    • Antistatic wrist wrap

    • Phillips-head screwdriver

    Correct Answer
    A. Antistatic wrist wrap
    Explanation
    An antistatic wrist strap keeps you at the same electrical potential as the computer.

    Rate this question:

  • 23. 

    Which term describes a combo of many updates and fixes in Windows Vista/7?

    • Hot fix

    • Hot pack

    • Service pack

    • Service release

    Correct Answer
    A. Service pack
    Explanation
    A service pack is a combo of many updates and fixes in Windows Vista/7.

    Rate this question:

  • 24. 

    What tool is used in Mac OS X to perform full system backups?

    • AppleBack

    • Users and Groups

    • Time Machine

    • System Preferences Backup

    Correct Answer
    A. Time Machine
    Explanation
    Mac OS X uses Time Machine to perform full system backups.

    Rate this question:

  • 25. 

    Jack wants to watch television through his computer. He has a cable television subscription. What else does he need?

    • A cable card installed in his system.

    • TV tuner card installed in his system.

    • Smart TV added to his system.

    • A set-top box connected to his system.

    Correct Answer
    A. TV tuner card installed in his system.
    Explanation
    Jack can install a TV tuner card in his computer (or attach one via USB) and then plug his cable into it.

    Rate this question:

  • 26. 

    A client calls and is upset that he's misplaced his iPad. The mobile device has literally thousands of client records, including business addresses, e-mail addresses, phone numbers, and, in some cases, credit card information. What should he do first?

    • There's nothing he can do.

    • He should call his ISP and have them track his iPad

    • He should access his iCloud account and remotely wipe his iPad to erase all personal data

    • He should purchase another iPad and sync with his iTunes account. This automatically erases the information on the old tablet.

    Correct Answer
    A. He should access his iCloud account and remotely wipe his iPad to erase all personal data
    Explanation
    To protect his data, the client should log into his iCloud account and remotely wipe the iPad and erase all personal data

    Rate this question:

  • 27. 

    When troubleshooting a software problem on Pheobe's computer and listening to her describe the problem, you get a text from your boss. Which of the following is the most appropriate action for you to take?

    • Excuse yourself, walk out of the cube, and text your boss.

    • Pick up Pheobe's phone and dial your boss's number

    • Wait until Pheobe finishes her description and then ask to use her phone to call your boss.

    • Wait until Pheobe finishes her description, run through any simple fixes, and then explain that you need to call your boss on your cell phone

    Correct Answer
    A. Wait until Pheobe finishes her description, run through any simple fixes, and then explain that you need to call your boss on your cell phone
    Explanation
    Focus on the customer and don't use her things.

    Rate this question:

  • 28. 

    Which feature enables a single-core CPU to function like two CPUs?

    • Hyper-threading

    • SpeedStep

    • Virtualization

    • X64

    Correct Answer
    A. Hyper-threading
    Explanation
    Intel loves hyper-Threading, where a single-core CPU can function like a dual-core CPU as long as it has operating system support.

    Rate this question:

  • 29. 

    Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2 GB. The PC has an Intel Core 2 Duo 3-GHz processor and three 240-pin DIMM slots on the motherboard. When he turns on the PC, however, only 1 GB of RAM shows up during the RAM count. Which of the following is most likely to be the problem?

    • Steve failed to seat the RAM properly.

    • Steve put DDR SDRAM in a DDR 2 slot.

    • The CPU cannot handle 2 GB of RAM.

    • The motherboard can use only one RAM slot at a time.

    Correct Answer
    A. Steve failed to seat the RAM properly.
    Explanation
    Steve failed to seat the RAM properly.

    Rate this question:

  • 30. 

    Which Windows utility uses points in time that enable you to return your system to a previous date and state?

    • System Configuration utility

    • Snapshot Manager

    • System Restore

    • GRUB or LILO

    Correct Answer
    A. System Restore
    Explanation
    System Restore uses [restore points]-snapshots of a system at a given point of time-a quick and handy way to return your system to a previous state.

    Rate this question:

  • 31. 

    A great way to protect data on a removable media card is to

    • Encrypt it

    • Lock it

    • Remove it when unneeded

    • Format it

    Correct Answer
    A. Encrypt it
    Explanation
    A great way to protect data on a removable media card is to encrypt it.

    Rate this question:

  • 32. 

    Which configuration requires three same-sized volumes?

    • RAID 5

    • Mirrored set

    • Spanned volume

    • Striped volume

    Correct Answer
    A. RAID 5
    Explanation
    RAID 5 requires three same-sized volumes.

    Rate this question:

  • 33. 

    What is the most important component for building a virtualization workstation?

    • CPU

    • Power supply

    • RAM

    • Large monitor

    Correct Answer
    A. RAM
    Explanation
    Every virtual machine you run consumes a large share of RAM, so the more RAM you have, the more VMs you can run.

    Rate this question:

  • 34. 

    When you install an operating system alongside an existing operating system, what do you create?

    • A clean installation

    • An upgrade installation

    • A multiboot installation

    • A network installation

    Correct Answer
    A. A multiboot installation
    Explanation
    An OS added alongside an existing OS creates a multiboot system.

    Rate this question:

  • 35. 

    Which of the following Linux commands will show detailed information about the contents of a folder?

    • Is -l

    • Is -e

    • Is -h

    • Is -k

    Correct Answer
    A. Is -l
    Explanation
    Type [Is -l] and press ENTER to see detailed info about the contents of a folder in Linux.

    Rate this question:

  • 36. 

    Jim likes his laptop but complains that his wireless seems slow compared to all the new laptops. On further inspection, you determine that his laptop runs 802.11n. What can be done to improve his network connection speed?

    • Add more RAM

    • Replace the display with one with a better antenna

    • Replace the Mini-PCIe 802.11n card with an 802.11ac card.

    • Get a new laptop, because this one can't be upgraded.

    Correct Answer
    A. Replace the Mini-PCIe 802.11n card with an 802.11ac card.
    Explanation
    He can haev the 802.11n NIC replaced with an 802.11ac NIC.

    Rate this question:

  • 37. 

    Edna wants to put a policy in place at her company to prevent or at least limit viruses. What policies would offer the best solution?

    • Install antivirus software on every computer. Teach others how to run it.

    • Install antivirus software on every computer. Set the software up to scan regularly.

    • Install antivirus software on every computer. Set the software up to update the definitions and engine automatically. Set the software up to scan regularly.

    • Install antivirus software on every computer. Set the software up to update the definitions and engine automatically. Set the software up to scan regularly. Educate the users about sites and downloads to avoid.

    Correct Answer
    A. Install antivirus software on every computer. Set the software up to update the definitions and engine automatically. Set the software up to scan regularly. Educate the users about sites and downloads to avoid.
    Explanation
    The best policy includes updating the software engine and definitions, scanning PCs regularly, and educating users.

    Rate this question:

  • 38. 

    How many exams do you need to pass to become CompTIA A+ certified?

    • One

    • Two

    • Three

    • Four

    Correct Answer
    A. Two
    Explanation
    You need to pass two exams to become CompTIA A+ certified.

    Rate this question:

  • 39. 

    What is the name of the program that boots Windows?

    • Regsvr32

    • Msconfig

    • Bootmgr

    • Registry

    Correct Answer
    A. Bootmgr
    Explanation
    On Windows machines, bootmgr is used to boot the OS.

    Rate this question:

  • 40. 

    Which of the following is an example of a hybrid topology?

    • Bus

    • Ring

    • Star

    • Star bus

    Correct Answer
    A. Star bus
    Explanation
    A star bus topology, like the one used with Ethernet networks, is a hybrid topology.

    Rate this question:

  • 41. 

    Which encryption protocol offers the best security?

    • Hi-Encrypt

    • WEP

    • WPA

    • WPA2

    Correct Answer
    A. WPA2
    Explanation
    WPA2 is the best of the encryption technologies listed.

    Rate this question:

  • 42. 

    What command often enables you to diagnose TCP/IP errors such as connection problems?

    • FTP

    • Ping

    • QoS

    • APIPA

    Correct Answer
    A. Ping
    Explanation
    You can often use the ping command to diagnose TCP/IP problems.

    Rate this question:

  • 43. 

    Which of the following would be a legitimate reason a mobile device is running slowly?

    • Incorrect calibration

    • RAM too slow

    • Lack of storage space

    • Incorrect version of application

    Correct Answer
    A. Lack of storage space
    Explanation
    Lack of storage space is a legitimate reason a mobile device would run slow

    Rate this question:

  • 44. 

    Which of the following should Mary set up on her Wi-Fi router to make it the most secure?

    • NTFS

    • WEP

    • WPA

    • WPA2

    Correct Answer
    A. WPA2
    Explanation
    Mary should set up WPA2 on her Wi-Fi router

    Rate this question:

  • 45. 

    Darren has installed a new CPU in a client's computer, but nothing happens when he pushes the power button on the case. The LED on the motherboard is lit up, so he knows the system has power. What could be the problem?

    • He forgot to disconnect the CPU fan.

    • He forgot to apply thermal paste between the CPU and the heat-sink and fan assembly.

    • He used an AMD CPU in an Intel Motherboard

    • He used an Intel CPU in an AMD motherboard

    Correct Answer
    A. He forgot to apply thermal paste between the CPU and the heat-sink and fan assembly.
    Explanation
    The best answer here is that he forgot the thermal paste, though you can also make an argument for a disconnected fan.

    Rate this question:

  • 46. 

    Davos finds that a disgruntled former employee decided to sabotage her computer when she left by putting a password in CMOS that stops the computer from booting. What can Davos do to solve this problem?

    • Davos should boot the computer while holding the left SHIFT key. This will clear the CMOS information.

    • Davos should try various combinations of the former employee's name. The vast majority of people use their name or initials for CMOS passwords.

    • Davos should find the CMOS clear jumper on the motherboard. Then she can boot the computer with a shunt on the jumper to clear the CMOS information.

    • Davos should find a replacement motherboard. Unless she knows the CMOS password, there's nothing she can do.

    Correct Answer
    A. Davos should find the CMOS clear jumper on the motherboard. Then she can boot the computer with a shunt on the jumper to clear the CMOS information.
    Explanation
    Davos should find the clear jumper on the motherboard and then boot the computer with a shunt on the jumper to clear the CMOS information.

    Rate this question:

  • 47. 

    What is a thin client?

    • A computer with a 32-bit-wide address bus

    • A portable computer

    • A system designed to handle only very basic applications with the minimum hardware required by the operating system.

    • A computer in a narrow, small form-factor case

    Correct Answer
    A. A system designed to handle only very basic applications with the minimum hardware required by the operating system.
    Explanation
    Thin clients rely on servers to perform anything beyond the most basic computing tasks.

    Rate this question:

  • 48. 

    Which is the best password for the user Joy, who has a pet named Fido and a birth date of January 8, 1982.

    • Joy1982

    • Joylovesfido

    • 1982cutie

    • Oddvr88*

    Correct Answer
    A. Oddvr88*
    Explanation
    Of the choices listed, oddvr88* would be the best password; it has a non-alphanumeric character, which makes it more difficult for a hacker to crack.

    Rate this question:

  • 49. 

    What Microsoft API supports 3-D graphics?

    • Active Desktop

    • DirectX

    • Glide

    • OpenGL

    Correct Answer
    A. DirectX
    Explanation
    Microsoft makes the DirectX API to support 3-D graphics.

    Rate this question:

Quiz Review Timeline (Updated): Jan 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 24, 2016
    Quiz Created by
    Alexdrum87
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.