Think You're Ready?

Your Final Exam Before the Final Exam.
Dare to Take It?

Topic 1: Main Questions

Which of the following is the best to use to stream real-time video from a network camera?

A. UDP

B. TCP

C. FTP

D. RDP

A.   UDP

Explanation:

UDP (User Datagram Protocol) is the best choice for streaming real-time video from a network camera because:

Low latency: UDP does not require acknowledgment of packet delivery or retransmission of lost packets, minimizing delay.

Speed: Video streaming prioritizes continuous playback over perfect data delivery.

Real-time tolerance:In video streaming, occasional packet loss results in minor artifacts rather than buffering or delays. TCP's retransmission would cause buffering and stuttering, degrading the viewing experience.

Why other options are incorrect:

B. TCP (Transmission Control Protocol):
TCP guarantees delivery through acknowledgments and retransmission, causing delays and buffering that disrupt real-time video streaming.

C. FTP (File Transfer Protocol):
FTP is designed for file transfers, not real-time streaming. It requires complete file download before viewing.

D. RDP (Remote Desktop Protocol):
RDP is used for remote desktop access to computers, not for streaming video from network cameras.

Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.1: "Compare and contrast TCP and UDP ports, protocols, and their purposes... UDP for streaming media, VoIP, and real-time applications where speed is prioritized over reliability."

A technician is troubleshooting a desktop PC that is plugged into a UPS. The PC loses the system date/time after every power outage. Which of the following should the technician do to resolve the issue? (Select two).

A. Run a BIOS update.

B. Swap out the RAM.

C. Disable NTP in the OS.

D. Repair the backup power source.

E. Replace the CMOS battery

F. Install a surge protector.

D.   Repair the backup power source.
E.   Replace the CMOS battery

Explanation:

A computer relies on two things to maintain its system date, time, and BIOS/UEFI settings when it is turned off:

The CMOS Battery (CR2032): This small "coin cell" battery on the motherboard provides a tiny amount of constant power to the CMOS chip (or the RTC - Real Time Clock) when the computer is unplugged. If this battery dies, the clock resets to its factory "zero" date (e.g., January 1, 1970, or the year the motherboard was manufactured) every time power is lost.

The UPS (Uninterruptible Power Supply): In this specific scenario, the user mentions a power outage. A healthy UPS is designed to provide battery backup power during an outage so the PC never actually loses power. If the PC is losing its settings during an outage, it means the UPS is failing to provide that bridge power, causing the PC to rely solely on its internal CMOS battery (which, in this case, is also likely dead).

Why the Other Options are Incorrect:

A. Run a BIOS update:
While a BIOS update fixes software bugs or adds hardware compatibility, it cannot fix a physical hardware issue like a dead battery or a power loss.

B. Swap out the RAM:
RAM is "volatile" memory and is expected to lose its data when power is lost. It has no role in storing the system time or BIOS settings.

C. Disable NTP in the OS:
NTP (Network Time Protocol) actually helps by fixing the clock once the computer boots and connects to the internet. Disabling it would make the problem worse, as the clock would stay at the wrong time even after the OS loads.

F. Install a surge protector:
A surge protector only protects against voltage spikes. It provides zero battery backup during an outage and does not help maintain system settings.

References:

CompTIA A+ Exam Objectives (220-1201): Objective 3.4 – "Explain the purposes and properties of motherboards." (Specifically CMOS battery).

A technician is setting up a scan-to-SMB function on a multifunction printer. Which of the following connection types should the technician configure?

A. Email server

B. SFTP connection

C. Network share

D. Print services

C.   Network share

Explanation:

Scan-to-SMB (Server Message Block) is a feature on multifunction printers that allows scanned documents to be saved directly to a network share (a shared folder on a file server or computer). SMB is the standard protocol used by Windows systems for file and printer sharing. To configure this, the technician must specify:

The UNC path to the destination folder (e.g., \\SERVER\Scans)
Authentication credentials (username/password) if the share requires them
Folder permissions allowing the printer to write files
This setup enables users to scan documents and have them automatically appear in a network location accessible to others, streamlining document workflow without requiring email or physical media.

Why other options are incorrect:

A. Email server:
Scan-to-email uses SMTP (Simple Mail Transfer Protocol) to send scanned documents as email attachments. While another useful feature, it is not related to SMB configuration. Email server settings would include SMTP server address and authentication, not network share paths.

B. SFTP connection:
SFTP (SSH File Transfer Protocol) is a secure file transfer protocol typically used for transferring files to/from Linux/Unix servers or over the internet. It operates on port 22 and uses SSH encryption, which is entirely different from SMB (port 445) used in Windows networking environments.

D. Print services:
Print services handle the printing functionality of the multifunction printer, including print queues, drivers, and spooling. Scan-to-SMB is a separate function unrelated to printing; configuring print services would not enable scanning to a network folder.

Reference:

CompTIA A+ Core 1 (220-1201) Objective 3.6: "Given a scenario, configure printers... Multifunction printer configuration includes scan-to-folder (SMB/CIFS) and scan-to-email settings for document distribution."

A user is having trouble with the location services on their smartphone. Location-based applications show incorrect positions when the user is traveling. This issue affects the user’s ability to navigate and use location-dependent applications. Which of the following is the best way to resolve this issue?

A. Downloading a third-party mapping application

B. Resetting the network settings

C. Enabling Wi-Fi to assist GPS

D. Restarting the smartphone

C.   Enabling Wi-Fi to assist GPS

Explanation:

Smartphones use a method called A-GPS (Assisted GPS) to determine location. While GPS satellites provide the most accurate coordinates, they can be slow to "lock on" and struggle in "urban canyons" (areas with tall buildings) or indoors. +1

By enabling Wi-Fi, the phone uses Wi-Fi Positioning Services (WPS). The device scans for nearby Wi-Fi networks (even if it doesn't connect to them) and compares their unique IDs against a global database of known router locations. This drastically improves:
Time to First Fix (TTFF): How fast your position appears.
Accuracy: It fills in the gaps when GPS signals are weak or reflecting off buildings.

Why the Other Options are Incorrect:

A. Downloading a third-party mapping application:
The issue is with the device's ability to determine its coordinates, which is an OS and hardware-level function. Changing the app (e.g., from Apple Maps to Google Maps) won't fix the underlying location data accuracy.

B. Resetting the network settings:
This is a "sledgehammer" approach that deletes saved Wi-Fi passwords, Bluetooth pairings, and VPN settings. It is usually reserved for cellular data connectivity issues, not for improving GPS precision.

D. Restarting the smartphone:
While "turning it off and back on again" can fix temporary software glitches, it does not address a configuration issue where the device is struggling to triangulate position in real-time while traveling.

References:

CompTIA A+ Exam Objectives (220-1201): Objective 5.4 – "Given a scenario, troubleshoot common mobile device issues while maintaining security."

A customer has bare-metal servers running Windows, Linux, and Unix. They want consolidation while maintaining isolation and compatibility. What should the technician recommend?

A. IaaS

B. Containers

C. Type 2 hypervisor

D. VDI

A.   IaaS

Explanation:

IaaS is the best recommendation because it provides the "bare-metal" equivalent in a virtualized environment. It allows the customer to move their existing, diverse workloads (Windows, Linux, and Unix) onto a provider's high-powered hardware.

Compatibility: IaaS allows you to install nearly any operating system you want on the virtual machine (VM), which is essential since the customer is using three different OS types.

Consolidation: You can move multiple physical "bare-metal" servers onto a single physical host (or cluster of hosts) managed by the provider.

Isolation: Each VM is logically isolated from the others, meaning a crash or security breach on the Linux server won't affect the Windows or Unix servers.

Why the Other Options are Incorrect:

B. Containers: Containers (like Docker) share the host's operating system kernel. While they are great for isolation and consolidation, they lack the broad compatibility required here. You cannot run a Windows container on a Linux host (or vice versa) with the same level of native "bare-metal" compatibility that a full VM in IaaS provides.

C. Type 2 hypervisor:
A Type 2 hypervisor (like VirtualBox or VMware Workstation) runs on top of an existing OS (the "host" OS). This is less efficient for server consolidation because the host OS consumes resources. In a server environment, you would use a Type 1 (Bare-Metal) hypervisor, which IaaS providers use to run their infrastructure. +1

D. VDI (Virtual Desktop Infrastructure):
VDI is designed to host desktop operating systems (like Windows 11) for end-users to access remotely. It is not the appropriate model for consolidating backend server workloads running Unix or Linux.

References:
CompTIA A+ Exam Objectives (220-1201): Objective 4.1 – "Summarize cloud-computing concepts.

While using a laptop and Bluetooth headset for conference calls, a user notices intermittent sound issues. The user frequently walks between office rooms during calls, leaving the laptop in place. The office network uses fiber internet and has two connected APs. What is the MOST likely cause?

A. The number of available APs is inadequate.

B. The user is moving in and out of range.

C. The APs are not in mesh mode.

D. The internet connection is too slow.

B.   The user is moving in and out of range.

Explanation:

The user is using a Bluetooth headset connected to a laptop. Bluetooth has a limited effective range, typically around 10 meters (33 feet) , and can be significantly reduced by walls and obstacles. The user leaves the laptop in place but walks between office rooms during calls. This movement causes the user to move in and out of Bluetooth range of the laptop, resulting in intermittent sound issues (cutting out, static, or dropped connection). The office Wi-Fi and fiber internet are irrelevant because the headset connects directly to the laptop via Bluetooth, not through the network.

Why other options are incorrect:

A. The number of available APs is inadequate:
Wi-Fi access points affect internet connectivity, not Bluetooth headset audio. The headset connects directly to the laptop.

C. The APs are not in mesh mode:
Mesh mode relates to Wi-Fi roaming between access points. Bluetooth does not use APs, and the laptop remains stationary, so AP configuration is irrelevant.

D. The internet connection is too slow:
Internet speed affects online call quality if using VoIP, but the headset is connected via Bluetooth. The issue is the wireless link between headset and laptop, not internet bandwidth.

Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.4 and 3.1: Bluetooth technology has limited range; moving out of range causes audio dropouts and disconnections.

A technician is setting up a workstation. Which of the following settings should the technician configure to ensure that users can connect to the network? (Select three).

A. APIPA

B. Gateway

C. IP address

D. Subnet mask

E. Static routes

F. UPnP settings

G. NAT rules

H. MAC filters

B.   Gateway
C.   IP address
D.   Subnet mask

Explanation:

To successfully communicate on a TCP/IP network, a workstation requires three primary pieces of information. Without any one of these, the device will be unable to communicate either locally or with external networks (like the Internet).

C. IP Address:
This is the unique identifier for the workstation on the network. Think of it like a mailing address; without it, the network doesn't know where to send data meant for that computer.

D. Subnet Mask:
This defines which part of the IP address represents the network and which part represents the specific host. It tells the computer whether a destination is on its own local network or if it needs to send the data elsewhere.

B. Gateway (Default Gateway):
This is the IP address of the router that connects the local network to other networks (like the Internet). If a workstation wants to send data to an address outside its own subnet, it sends it to the Gateway.

Why the Other Options are Incorrect:

A. APIPA (Automatic Private IP Addressing):
This is a self-assigned address (starting with 169.254.x.x) that a computer uses when it fails to reach a DHCP server. It allows local communication but generally indicates a network problem. You don't "configure" it to ensure connectivity; it's a fallback mechanism.

E. Static routes:
These are manual entries in a routing table that tell a device exactly which path to take to reach a specific network. While useful for routers or complex enterprise setups, they are not a standard requirement for a basic workstation setup.

F. UPnP settings (Universal Plug and Play):
This allows devices to discover each other and open ports on a router automatically. It is a convenience and security feature, but not a requirement for basic network connectivity.

G. NAT rules (Network Address Translation):
NAT is configured on the router, not the workstation. It allows multiple devices on a private network to share a single public IP address.

H. MAC filters:
This is a security feature (usually on a switch or WAP) that allows or denies access based on a device's hardware address. This is a management setting on the network equipment, not something you configure on the workstation to enable its connection.

References:
CompTIA A+ Exam Objectives (220-1201): Objective 2.1 – "Compare and contrast common networking protocols."

A consultant is assessing the wireless configurations for a small office. The existing equipment uses WEP encryption and operates on the default channel. The office is in a crowded urban area with many nearby networks. Which of the following is the best way to improve the wireless network performance?

A. Replacing the access point

B. Disabling SSID broadcasting

C. Enabling MAC address filtering

D. Updating the firmware

A.   Replacing the access point

Explanation:

The existing equipment is utilizing WEP (Wired Equivalent Privacy). WEP is a legacy encryption standard that is considered fundamentally broken and can be cracked in seconds using basic software

Why the Other Options are Incorrect:

B. Disabling SSID broadcasting:
This is often called "security by obscurity." It does not improve performance and does not actually secure the network, as the SSID can still be found by a motivated attacker using a wireless sniffer.

C. Enabling MAC address filtering:
This is a security measure, not a performance improver. It is also easily bypassed by "MAC spoofing" and does nothing to solve the issue of a crowded urban radio environment or outdated encryption.

D. Updating the firmware:
While firmware updates are good practice for security patches, they cannot physically change the radio hardware. If the hardware is old enough to be using WEP as its primary configuration, a firmware update will not grant it the ability to use modern, faster wireless standards or higher frequency bands.

References:

CompTIA A+ Exam Objectives (220-1201): Objective 2.3 – "Summarize services provided by managed service providers." (Specifically wireless security protocols).

The Chief Information Security Officer asks a technician to inventory desktop PCs to determine which ones meet the requirements for Secure Boot. The technician must also configure the PCs for non-user-controllable keys. Which of the following are necessary to meet the enhanced security requirements? (Select two).

A. VDI

B. BIOS password

C. TPM

D. UEFI

E. Disabled boot drive

F. USB permissions

C.   TPM
D.   UEFI

Explanation

To meet the requirements for Secure Boot with non-user-controllable keys, the technician must ensure the system has UEFI firmware and a TPM (Trusted Platform Module).

D. UEFI (Unified Extensible Firmware Interface):
Secure Boot is a feature of the UEFI specification. It cannot be enabled on older Legacy/BIOS systems. UEFI acts as the root of trust, checking the validity of the bootloader before it is allowed to run . The technician must verify the PCs are configured for UEFI mode (not Legacy/CSM) and have Secure Boot enabled in the firmware settings .

C. TPM (Trusted Platform Module):
The requirement for "non-user-controllable keys" is fulfilled by the TPM. This dedicated hardware chip securely stores the encryption keys used to verify the boot process. It can "seal" these keys, making them inaccessible if the system's boot configuration has been tampered with, effectively taking control away from a potential physical attacker and placing it in the hands of the hardware . The technician must check that a TPM (version 2.0 is common) is present and enabled .

Why other options are incorrect

A. VDI (Virtual Desktop Infrastructure):
This is a technology for hosting desktop environments on a central server. It is unrelated to the physical hardware security of a boot process.

B. BIOS password:
While a security measure, a BIOS password can often be cleared by removing the system's CMOS battery or using motherboard jumpers . It does not provide the hardware-based, non-controllable key storage that a TPM does.

E. Disabled boot drive:
Disabling a boot drive prevents the system from starting but does nothing to ensure the integrity or security of the boot process for other drives.

F. USB permissions:
Controlling USB ports is a security policy for peripheral access, but it has no function in the pre-boot authentication chain managed by Secure Boot and the TPM.

Reference:

CompTIA A+ Core 1 (220-1201) Objective 3.5 & 4.3: PC security, BIOS/UEFI settings, and TPM. Secure Boot is a UEFI feature that, combined with a TPM, ensures a secure and measured boot process to prevent unauthorized code from running during startup

Which of the following connectors is found on an optical networking cable?

A. RJ45

B. LC

C. USB-C

D. Lightning

B.   LC

Explanation:

LC (Lucent Connector) is a standard fiber optic connector used in optical networking cables. It features a small form-factor (about half the size of SC connectors) with a 1.25mm ferrule and uses a push-pull latching mechanism. LC connectors are commonly found on:

Fiber optic patch cables
SFP (Small Form-factor Pluggable) transceivers
Fiber optic network interface cards
Patch panels in data centers

Why other options are incorrect:

A. RJ45:
RJ45 is the standard connector for twisted-pair Ethernet copper cabling (Cat5e, Cat6), not fiber optics.

C. USB-C:
USB-C is a universal connector for data transfer and charging on modern devices (phones, laptops, tablets), not optical networking.

D. Lightning:
Lightning is a proprietary Apple connector used for charging and syncing iOS devices, not optical networking.

Reference:
CompTIA A+ Core 1 (220-1201) Objective 3.1: "Given a scenario, connect and configure peripherals and ports... Connector types including LC for fiber optic connections."

Page 11 out of 40 Pages