The CompTIA 220-901 exam is one of two exams requires to obtain the CompTIA A+ (900 series). This exam will cover topics like networking, mobile devices and hardware and network troubleshooting.
1) You are a Network Technician for a large IT Support Company. A client has called in saying that they switched their SOHO network to a fiber connection at the recommendation of their ISP. They have stated that they have not seen a gain in internet performance and that their ISP says it is an issue on the customer's network. What should you do next?
You should ask questions to assist the customer in determining their network equipment. The most likely cause of the poor performance is that their network equipment (routers, switches, etc) or devices (wireless or wired NIC) do not support the faster speeds. The only way to solve this issue is to get more information from the customer.
This question is filed under objective 2, Networking
2) Choose the option that could not be correctly described as Non-volatile:
Don't let the wording confuse you! You are looking for the option that is NOT described as non-volatile. Non-volatile memory retains data without a power source. Flash memory (like in thumb drives), SSD hard drives and tape drives do not require a power source to retain data. Random Access Memory (RAM) is volatile and loses its data without a power source and is therefore not described as non-volatile.
This question is filed under objective 1, Hardware
Non-volatile memory (NVM) or non-volatile storage is a type of computer memory that can retain stored information even after power is removed In contrast, volatile memory needs constant power in order to retain data Examples of non-volatile memory include flash memory, read-only memory (ROM), ferroelectric RAM, most types of magnetic computer storage devices (eg hard disk drives, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cardsNon-volatile memory typically refers to storage in semiconductor memory chips, which store data in floating-gate memory cells consisting of floating-gate MOSFETs (metal–oxide–semiconductor field-effect transistors), including flash memory… Read More
3) Which of the following allows devices to operate without requiring a separate power source?
Power over Ethernet (PoE) allows devices to use an ethernet connection as a power source, most commonly found in IP phones. The ethernet cable provides the power for the device to operate as well as network connectivity.
This question is filed under objective 2, Networking
Power over Ethernet, or PoE, describes any of several standards or ad hoc systems that pass electric power along with data on twisted pair Ethernet cabling This allows a single cable to provide both data connection and electric power to devices such as Wireless Access Points (WAPs), Internet Protocol (IP) cameras, and Voice over Internet Protocol (VoIP) phones There are several common techniques for transmitting power over Ethernet cabling Three of them have been standardized by Institute of Electrical and Electronics Engineers (IEEE) standard IEEE 8023 since 2003 These standards are known as alternative A, alternative B, and 4PPoE… Read More
4) Which of the following provides constant power to a motherboard, allowing it to retain configuration data for the BIOS?
BIOS configuration data is retained by using a small battery, called the CMOS battery, as a power source when the power supply is not on. The data is saved in the nonvolatile BIOS memory (also called CMOS RAM) and will be lost if the CMOS battery dies or is removed. If the data is lost the BIOS will revert to default settings.
This question is filed under objective 1, Hardware
Nonvolatile BIOS memory refers to a small memory on PC motherboards that is used to store BIOS settings It is traditionally called CMOS RAM because it uses a volatile, low-power complementary metal-oxide-semiconductor (CMOS) SRAM (such as the Motorola MC146818 or similar) powered by a small "CMOS" battery when system and standby power is off It is referred to as non-volatile memory or NVRAM because, after the system loses power, it does retain state by virtue of the CMOS battery The typical NVRAM capacity is 256 bytesThe CMOS RAM and the real-time clock have been integrated as a part of the southbridge chipset and it may not be a standalone chip on modern motherboards… Read More
5) Choose the option that best describes the term boot sequence:
Boot Sequence refers to the order devices should be checked for an operating system by the BIOS. When the BIOS detects an OS, it will attempt to boot to that device.
This question is filed under objective 1, Hardware
6) A user reports that their printouts contain a shadow of the previous image. Which of the following is MOST likely the cause?
After a printer applies toner to paper the fuser assembly rolls over the paper and applies heat to fuse the toner to the paper. Occasionally, the toner can stick to the fuser assembly and will be applied to the next sheet of paper passed through the printer.
This question is filed under objective 1, Hardware
Laser printing is an electrostatic digital printing process It produces high-quality text and graphics (and moderate-quality photographs) by repeatedly passing a laser beam back and forth over a negatively charged cylinder called a "drum" to define a differentially charged image The drum then selectively collects electrically charged powdered ink (toner), and transfers the image to paper, which is then heated in order to permanently fuse the text, imagery, or both, to the paper As with digital photocopiers, laser printers employ a xerographic printing process Laser printing differs from traditional xerography as implemented in analog photocopiers in that in the latter, the image is formed by reflecting light off an existing document onto… Read More
7) Which of the following ports belongs to a standard protocol used to query data from an Active Directory server?
Lightweight Directory Access Protocol (LDAP) is an open-standard protocol used to query directory based databases such as Active Directory. LDAP uses TCP 389 by default.
This question is filed under objective 2, Networking
The Lightweight Directory Access Protocol (LDAP ) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network As examples, directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory Similarly, a telephone directory is a list of subscribers with an address and a phone number LDAP is specified in a series of Internet Engineering Task Force… Read More
8) A customer is not able to connect to any websites. Which of the following commands should a technician run FIRST to identify the issue?
The IPCONFIG command will return a computer's network information such as IP Addresses. Using this tool you can determine if the computer has a proper IP Address.
This question is filed under objective 4, Hardware and Network Troubleshooting
ipconfig (standing for "Internet Protocol configuration") is a console application program of some computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings … Read More
9) While working for a IT Consulting firm, you have been tasked with setting up several SOHO wireless networks. Which of the following will ensure the security of confidential data?
Encrypting data before transmitting wirelessly is the best method to ensure data security.
This question is filed under objective 2, Networking
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP)WPA (sometimes referred to as the draft IEEE 80211i standard) became available in 2003 The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2, which became available in 2004 and is a common shorthand for the full IEEE 802… Read More
10) You are a desktop technician for a small office. You suspect that a user has opened their desktop PC case and made unauthorized changes to the device's hardware. Which of the following can be configured to identify this in the future?
Chassis Intrusion Detection is an option in for some desktop and BIOS systems that can detect when a computer's case has been opened.
This question is filed under objective 1, Hardware
A computer case, also known as a computer chassis, tower, system unit, or cabinet, is the enclosure that contains most of the components of a personal computer (usually excluding the display, keyboard, and mouse) Cases are usually constructed from steel (often SECC—steel, electrogalvanized, cold-rolled, coil), aluminium and plastic Other materials such as glass, wood, acrylic and even Lego bricks have appeared in home-built cases … Read More
11) Data may be recovered after a drive failure in a RAID 0 configuration.
Raid 0 stripes data across multiple hard drives, which improves performance but provides no data recovery after a failure.
This question is filed under objective 1, Hardware
RAID ("Redundant Array of Inexpensive Disks" or "Redundant Array of Independent Disks") is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both This was in contrast to the previous concept of highly reliable mainframe disk drives referred to as "single large expensive disk" (SLED)Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance The different schemes, or data distribution layouts, are named by the word "RAID" followed by a number, for example RAID 0 or RAID 1… Read More
12) Failure of a single disk in a RAID 1 array will not result in permanent data loss.
True - failure of a single disk in RAID 1 will NOT result in permanent data loss. Redundant Array of Independent Disks 1 (RAID) uses disk mirroring to ensure every piece of data can also be found on another hard drive. This means if a single disk fails, another disk will still have the necessary data.
This question is filed under objective 1, Hardware
RAID ("Redundant Array of Inexpensive Disks" or "Redundant Array of Independent Disks") is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both This was in contrast to the previous concept of highly reliable mainframe disk drives referred to as "single large expensive disk" (SLED)Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance The different schemes, or data distribution layouts, are named by the word "RAID" followed by a number, for example RAID 0 or RAID 1… Read More
13) Which of the following allows network prioritization based on packet contents?
Quality of Service is a networking technique where certain types of traffic are given higher priority than less important traffic. Just like emergency vehicles are given priority on roads, business critical traffic is given higher priority than non-critical traffic.
This question is filed under objective 2, Networking
Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc In the field of computer networking and other packet-switched telecommunication networks, quality of service refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality Quality of service is the ability to provide different priorities to different… Read More
14) A customer is complaining that their laptop often restarts with no warning, most often when they are playing video games or have several programs running at once. What is most likely the issue?
Any computer can overheat, but laptops are compact and can easily overheat when the processor is stressed for long periods of time. Typically when a computer becomes too hot it will simply shut off without warning to prevent any physical damage to the computer.
This question is filed under objective 4, Hardware and Network Troubleshooting
Overheating is a phenomenon of rising temperatures in an electrical circuit Overheating causes damage to the circuit components and can cause fire, explosion, and injury Damage caused by overheating is usually irreversible the only way to repair it is to replace some components … Read More
15) Your supervisor has given you a replacement inked ribbon to install into a printer. What type of printer is this replacement for?
Dot Matrix and Daisy Wheel printers use a hammer mechanism to push an inked ribbon onto paper. This type of printer is known as an Impact Printer.
This question is filed under objective 1, Hardware
Impact printers create an image by using some mechanism to physically press an inked ribbon against the page, causing the ink to be deposited on the page in the shape desired These printers are typically loud, but remain in use today because of their unique ability to function with multipart forms … Read More
16) Which of the following connector types would not be used as an internal PC component?
BNC (Bayonet Neill–Concelman) connectors are used with coaxial cables, found in broadband internet and cable TV. Molex is a connector used between power supplies and internal components like disk drives. SATA and PATA are used to transfer data between components like the motherboard and disk drives.
This question is filed under objective 1, Hardware
The BNC connector (initialism of "Bayonet Neill–Concelman") is a miniature quick connect/disconnect radio frequency connector used for coaxial cable … Read More
17) Which of the following choices is used as a standard measurement when referring to printed media?
Dots per Inch (DPI) is the standard measurement used for printers. It refers to the amount of dots that are placed by the printer in a one inch space. This is similar to Pixels Per Inch (PPI), which is used to measure how many pixels are placed in an inch by a monitor or screen. Aspect/Contrast Ratios are used to compare height and width of paper, monitors, etc. For example 4x1 would be 4 height for every 1 width - this could be 400x100 or 800x200.
This question is filed under objective 1, Hardware
Dots per inch (DPI, or dpi) is a measure of spatial printing, video or image scanner dot density, in particular the number of individual dots that can be placed in a line within the span of 1 inch (254 cm) Similarly, the more newly introduced dots per centimeter (d/cm or dpcm) refers to the number of individual dots that can be placed within a line of 1 centimeter (≈ 0393 in) Monitors do not have dots, but do have pixels the closely related concept for monitors and images is pixels per inch or PPI Many resources, including the Android developer guide, use the terms DPI and PPI interchangeably… Read More
18) You are a technician in a computer repair shop. A customer has brought in an old (broken) laptop and has asked you to extract the data for use on a new computer. Assuming the hard drive is fully functioning, which of the following methods would most easily allow this?
Removing the hard drive from the laptop and using a USB hard drive enclosure would be the easiest solution. The customer can then easily extract the data and use the hard drive as an external USB drive when needed.
This question is filed under objective 1, Hardware
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage and one or more rigid rapidly rotating platters coated with magnetic material The platters are paired with magnetic heads, usually arranged on a moving actuator arm, which read and write data to the platter surfaces Data is accessed in a random-access manner, meaning that individual blocks of data can be stored and retrieved in any order HDDs are a type of non-volatile storage, retaining stored data even when powered offIntroduced by IBM in 1956, HDDs were the dominant secondary storage device for general-purpose computers beginning in the early 1960s… Read More
19) You have been assigned to configure a new enterprise wireless router for your employer's network. Which of the following settings should be changed first?
Networking equipment typically ships with a default password or no password at all. Changing the password should be step one, before any other configurations.
This question is filed under objective 4, Hardware and Network Troubleshooting
Where a device needs a username and/or password to log in, a default password is usually provided that allows the device to be accessed during its initial setup, or after resetting to factory defaults Manufacturers of such equipment typically use a simple password, such as admin or password on all equipment they ship, in the expectation that users will change the password during configuration The default username and password is usually found in the instruction manual (common for all devices) or on the device itself Default passwords are one of the major contributing factors to large-scale compromises of home routers… Read More
20) Your employer is in the middle of a remodel and the IT Department is responsible for moving RJ-45 wall jacks to new locations. Which tool can be used verify connectivity of a RJ-45 port after it has been moved?
Loopback plugs are inexpensive tools used to create a loop in wiring. For networking, RJ-45 loopback plugs are great tools for quickly checking if data is being properly transmitted.
This question is filed under objective 2, Networking
Loopback (also written loop-back) is the routing of electronic signals, digital data streams, or flows of items back to their source without intentional processing or modification It is primarily a means of testing the communications infrastructure There are many example applications It may be a communication channel with only one communication endpoint Any message transmitted by such a channel is immediately and only received by that same channel In telecommunications, loopback devices perform transmission tests of access lines from the serving switching center, which usually does not require the assistance of personnel at the served terminal Loop around is a method of testing between stations that are not necessarily adjacent, wherein… Read More
You can go back and review your answers or grade your test.