Topic 1: Main Questions
Which of the following statements best summarize managed vs unmanaged switches? (Select two).
A. Unmanaged switches are generally more expensive
B. Unmanaged switches have more security capabilities
C. Unmanaged switches start working as soon as they are plugged in to the network
D. Managed switches have more features
E. Managed switches require no configuration
F. Managed switches consume less power
D. Managed switches have more features
Explanation:
C. Unmanaged switches start working as soon as they are plugged in to the network.
Unmanaged switches are designed for plug-and-play simplicity. They require no configuration and automatically negotiate speeds and connectivity with connected devices. This makes them ideal for home networks or simple office setups where basic connectivity is the only requirement.
D. Managed switches have more features.
Managed switches offer advanced capabilities including VLAN support, Quality of Service (QoS), port mirroring, SNMP monitoring, link aggregation, and security features like 802.1X authentication. These features provide network administrators with granular control over traffic and network performance.
Why other options are incorrect:
A. Unmanaged switches are generally more expensive:
False. Unmanaged switches are significantly less expensive than managed switches due to their simpler design and lack of advanced features.
B. Unmanaged switches have more security capabilities:
False. Managed switches provide robust security features; unmanaged switches offer virtually no security controls.
E. Managed switches require no configuration:
False. Managed switches require configuration to utilize their advanced features, though they will function at basic levels out of the box.
F. Managed switches consume less power:
False. Managed switches typically consume more power due to additional processing capabilities and management features.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.2: "Compare and contrast common networking hardware... Switches: managed vs. unmanaged features, capabilities, and use cases."
Which of the following best describes a Type 2 hypervisor?
A. It works as a firewall to control network traffic.
B. It interacts directly with the underlying hardware.
C. It runs on a host operating system.
D. It brings higher CPU capabilities to virtual machines.
Explanation:
A Type 2 hypervisor (also known as a "hosted" hypervisor) is an application that is installed on top of an existing operating system (the "host"), such as Windows, macOS, or Linux. It relies on the host OS to manage hardware resources like the CPU, memory, and networking. Common examples include Oracle VirtualBox, VMware Workstation, and VMware Fusion. This is in contrast to a Type 1 hypervisor, which is installed directly onto the "bare metal" hardware.
+3
Why the Other Options are Incorrect:
A. It works as a firewall to control network traffic:
A hypervisor's primary job is to create and manage Virtual Machines (VMs), not to filter network traffic. While a VM can run a virtual firewall, the hypervisor itself is not a firewall.
B. It interacts directly with the underlying hardware:
This describes a Type 1 (Bare Metal) hypervisor (e.g., VMware ESXi, Microsoft Hyper-V, or Xen). Type 1 hypervisors do not need a host OS and are more efficient for server environments because they have direct access to the hardware.
+1
D. It brings higher CPU capabilities to virtual machines:
Hypervisors do not increase the physical capabilities of a CPU. In fact, because a Type 2 hypervisor must pass requests through the host OS, it generally has slightly lower performance and overhead compared to a Type 1 hypervisor or a native OS installation.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 1.1 – "Summarize cloud computing concepts" (specifically Client-side virtualization).
Which of the following port numbers are associated with email traffic? (Select two).
A. 23
B. 25
C. 67
D. 110
E. 137
F. 443
D. 110
Explanation:
B. Port 25 - SMTP (Simple Mail Transfer Protocol)
Port 25 is the standard port used for SMTP, which is responsible for sending email messages between mail servers and from email clients to mail servers. SMTP handles outgoing email traffic.
D. Port 110 - POP3 (Post Office Protocol version 3)
Port 110 is used by POP3, which is responsible for receiving and downloading email from a mail server to a local email client. POP3 typically downloads messages and removes them from the server.
Why other options are incorrect:
A. Port 23:
Port 23 is used by Telnet for remote terminal connections. It is unencrypted and insecure.
C. Port 67:
Port 67 is used by DHCP (Dynamic Host Configuration Protocol) servers for assigning IP addresses to clients.
E. Port 137:
Port 137 is used by NetBIOS Name Service for Windows network name resolution.
F. Port 443:
Port 443 is used by HTTPS (HTTP Secure) for encrypted web traffic.
Note:
While port 25 and 110 are classic email ports, modern implementations also use:
Port 587 (SMTP with authentication) for sending mail
Port 995 (POP3 over SSL) for secure receiving
Port 143 (IMAP) and 993 (IMAP over SSL) for more advanced email access
Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.1: "Compare and contrast TCP and UDP ports, protocols, and their purposes... Common ports including 25 (SMTP), 110 (POP3), 143 (IMAP)."
Which of the following cable types can be used to transfer data and video?
A. USB-C
B. HDMI
C. DisplayPort
D. VGA
Explanation:
USB-C (USB Type-C) is a versatile, 24-pin reversible connector that supports multiple "Alt Modes." It is unique because it can simultaneously carry high-speed data (USB 3.2 or USB4), video signals (via DisplayPort or HDMI protocols), and Power Delivery (PD) to charge a device. While other cables on this list are primarily dedicated to video, USB-C is designed as a universal standard for peripherals, docking stations, and external displays.
Why the Other Options are Incorrect:
B. HDMI (High-Definition Multimedia Interface):
While HDMI carries video and audio, it is not used for general-purpose data transfer (such as connecting a mouse, keyboard, or external storage for file manipulation). There is an "HDMI with Ethernet" specification, but it is rarely used and does not represent standard data transfer in A+ scenarios.
C. DisplayPort:
Similar to HDMI, this is a dedicated digital display interface. It carries video and audio signals to a monitor but is not a standard interface for general data transfer between a computer and a storage device or peripheral.
D. VGA (Video Graphics Array):
This is an older, analog-only video connector. It does not carry audio, nor does it support data transfer. It is strictly for transmitting video signals to a legacy monitor or projector.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 3.1 – "Explain basic cable types and their connectors, features, and purposes."
Users working with large files back up the files to external hard drives. One user's files take longer to back up than other users' files. The user has tried backing up the files to other users' drives with the same results. Which of the following steps should the technician take first to correct this issue?
A. Replace the hard drive's USB cable.
B. Defragment the user's external hard drive.
C. Update the storage drivers on the user's system.
D. Instruct the user to compress the files.
Explanation:
Since the user's files take longer to back up even when using other users' external hard drives, the issue is not with the external drive itself, but with the user's connection method. The most likely culprit is the USB cable. A damaged, low-quality, or out-of-spec USB cable can negotiate a slower connection speed (e.g., USB 2.0 instead of USB 3.0) or cause transmission errors requiring retransmission, both of which drastically reduce transfer speeds. Swapping the cable is the simplest and most logical first step.
Why other options are incorrect:
B. Defragment the user's external hard drive:
Defragmentation is largely obsolete for modern systems and can actually reduce the lifespan of an SSD. More importantly, since the slow speed follows the user's files to other drives, the original external drive's fragmentation level is irrelevant.
C. Update the storage drivers on the user's system:
While outdated storage controllers can cause slow speeds, it is less likely than a physical cable issue. Additionally, this problem would likely affect all USB storage devices connected to that system, not just this specific backup scenario. A cable check should come before driver troubleshooting.
D. Instruct the user to compress the files:
Compressing files reduces their size, which would speed up the transfer of that specific data, but it does not fix the underlying slow transfer speed caused by a hardware or connection problem. It is a workaround, not a solution.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 3.1 and 5.3: Troubleshooting methodology and common hardware symptoms. A failing or incorrect cable is a primary cause of intermittent or slow connectivity for external peripherals.
An office manager wants to block all outbound internet traffic but continue to enable all inbound traffic. Which of the following should a technician configure to achieve this goal?
A. MAC filtering
B. Network interface card
C. Firewall
D. Switch
Explanation:
A firewall is a network security device designed to monitor and control incoming and outgoing network traffic based on predetermined security rules. To achieve the goal of blocking all outbound internet traffic while allowing all inbound traffic, a technician would configure outbound rules (also called egress filtering) on the firewall to deny all traffic leaving the internal network, while ensuring inbound rules are permissive.
Why other options are incorrect:
A. MAC filtering:
MAC filtering controls network access based on device hardware addresses. It can allow or deny specific devices from connecting to the network, but it cannot selectively control inbound versus outbound traffic patterns.
B. Network interface card (NIC):
A NIC is the hardware component that connects a computer to a network. It has no capability to filter or block traffic based on direction; it simply transmits and receives data.
D. Switch:
A switch connects devices within a local network and forwards frames based on MAC addresses. Standard switches do not have the intelligence to filter traffic based on direction or to block outbound internet traffic specifically.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.2: "Compare and contrast common networking hardware... Firewalls: hardware and software-based, rules for inbound and outbound traffic filtering."
A user purchases a new mobile phone and tries to connect it to the corporate communications and email applications without success. Which of the following should a technician do to allow the phone to connect?
A. Configure biometric security settings.
B. Turn on LTE hotspot connectivity.
C. Enroll the device in the MDM software.
D. Complete the company’s BYOD training process.
Explanation:
Mobile Device Management (MDM) software is used by organizations to manage, secure, and enforce policies on mobile devices that access corporate resources. For a new personal phone to connect to corporate communications and email applications, it typically must first be enrolled in the company's MDM system. This enrollment process registers the device, applies necessary security configurations, and grants it access to authorized corporate apps and data.
Why other options are incorrect:
A. Configure biometric security settings:
Biometrics (fingerprint, face unlock) are device-level security features that may be required by MDM policies, but configuring them alone does not grant access to corporate applications. Enrollment comes first.
B. Turn on LTE hotspot connectivity:
LTE hotspot allows the phone to share its cellular data connection with other devices. This feature is unrelated to accessing corporate email and communications.
D. Complete the company's BYOD training process:
While training may be part of the overall Bring Your Own Device (BYOD) program, the technical step required for connectivity is MDM enrollment. Training alone does not configure the device for access.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.5: "Given a scenario, configure mobile device settings... Mobile device management (MDM) enrollment for corporate access and policy enforcement."
A student configures a wireless SOHO network to connect four laptops and one multifunction printer. Which setting ensures the printer is always available?
A. Dynamic IPs for laptops, static IP for printer on same subnet
B. Manually assign public IPs to laptops and printer
C. Use APIPA for laptops and connect printer directly to ISP router
D. Use dynamic IP addressing for all devices
Explanation:
For a Small Office/Home Office (SOHO) network, devices like laptops are best served by DHCP (Dynamic Host Configuration Protocol), which assigns IP addresses automatically. However, a shared resource like a multifunction printer should have a Static IP address. If a printer uses a dynamic IP, its address could change after a reboot or lease expiration; if this happens, the laptops (which are configured to "look" for the printer at its old address) will lose the connection. Assigning a static IP ensures the printer’s "location" on the network remains permanent and accessible. Both must be on the same subnet to communicate without a complex routing setup.
Why the Other Options are Incorrect:
B. Manually assign public IPs:
Public IP addresses are used for devices directly facing the internet. Assigning them to internal office devices is a massive security risk and is unnecessary for a local SOHO network, which should use Private IP ranges (like 192.168.x.x).
C. Use APIPA for laptops:
APIPA (Automatic Private IP Addressing) occurs when a device cannot reach a DHCP server. It assigns an address in the 169.254.x.x range. It is a sign of a network failure, not a valid configuration strategy, and would prevent the laptops from reaching the internet.
D. Use dynamic IP addressing for all devices:
While this is easy to set up, it is the exact cause of the "Printer Offline" errors common in office environments. Once the printer's DHCP lease expires and it receives a new IP, all existing printer "ports" on the laptops will break.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 2.3 – "Given a scenario, configure and personalizing a SOHO wired/wireless network."
A developer wants to ensure their critical data is protected from hard drive failure. Their workstation has two hard drives. Which RAID level should they use?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Explanation:
RAID 1 (Mirroring) is the appropriate choice for protecting critical data with two hard drives. RAID 1 writes identical data to both drives simultaneously, creating an exact mirror. If one drive fails, the data remains accessible on the second drive with zero data loss. This provides complete redundancy with exactly two drives.
Why other options are incorrect:
A. RAID 0:
RAID 0 (striping) splits data across both drives for improved performance but provides no redundancy. If either drive fails, all data is lost, making it unsuitable for protecting critical data.
C. RAID 5:
RAID 5 requires a minimum of three drives to implement striping with distributed parity. It cannot be configured with only two drives.
D. RAID 10:
RAID 10 (RAID 1+0) combines mirroring and striping, requiring a minimum of four drives (two mirrored pairs striped together). It cannot be implemented with only two drives.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 3.2: "Compare and contrast storage devices... RAID levels 0, 1, 5, 6, and 10. RAID 1 uses disk mirroring with two drives for fault tolerance."
A developer wants to protect critical data from hard drive failure. Their workstation has two hard drives. Which RAID level should they use?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Explanation:
RAID 1, also known as mirroring, is the only viable option for a workstation with exactly two hard drives that requires protection against drive failure. In a RAID 1 configuration, data is written identically to both drives simultaneously. If one drive fails, the system continues to run using the second drive with zero data loss. It provides 100% redundancy but offers no storage capacity increase (e.g., two 1TB drives in RAID 1 only provide 1TB of usable space).
+2
Why the Other Options are Incorrect:
A. RAID 0 (Striping):
This level splits data across two or more drives to increase performance. However, it provides zero redundancy. If one drive fails in a RAID 0 array, all data on both drives is lost. This is the opposite of what a developer needs for data protection.
C. RAID 5 (Striping with Parity):
This is a popular choice for balancing speed and redundancy, but it requires a minimum of three hard drives. Since the workstation in the scenario only has two drives, RAID 5 is mathematically and physically impossible to implement.
D. RAID 10 (A Stripe of Mirrors):
This level combines the speed of RAID 0 with the redundancy of RAID 1. However, it requires a minimum of four hard drives. Like RAID 5, it cannot be configured with only two disks.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 3.5 – "Given a scenario, install and configure storage devices." (Focus: RAID types 0, 1, 5, 10).
| Page 3 out of 35 Pages |