Topic 1: Main Questions
Which of the following are radio frequency connections? (Select two.)
A. Cable
B. Satellite
C. DSL
D. Cellular
E. Ethernet
F. Fiber
D. Cellular
Explanation:
Satellite and Cellular connections both use radio frequency (RF) technology to transmit data wirelessly through the air.
Satellite communication uses RF signals transmitted between a dish on Earth and satellites in orbit. The signals travel through the atmosphere as electromagnetic waves in the radio frequency spectrum.
Cellular networks (4G, 5G, LTE) use RF to communicate between mobile devices and cell towers. This is the standard wireless technology for mobile phones and hotspots.
Why other options are incorrect:
A. Cable:
Cable internet uses coaxial cables to transmit data via electrical signals through physical copper conductors. It is a wired technology, not RF.
C. DSL:
DSL (Digital Subscriber Line) uses traditional telephone lines (copper wires) to transmit data. It is a wired technology.
E. Ethernet:
Standard Ethernet uses twisted-pair copper cables to transmit electrical signals. It is a wired technology (though Wi-Fi, which is RF, is often confused with Ethernet).
F. Fiber:
Fiber optic internet uses light pulses transmitted through glass or plastic cables. It is a wired technology using light, not radio frequencies.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.1 and 2.4: "Compare and contrast TCP and UDP ports, protocols, and their purposes... Internet connection types including satellite and cellular (RF-based) vs. wired technologies."
Which of the following devices is used to implement ACL polices for an environment?
A. Managed switch
B. Gateway
C. Repeater
D. Firewall
Explanation:
A Firewall is the primary network security device designed to monitor and filter incoming and outgoing network traffic based on an organization's previously established security policies. It implements these policies through an ACL (Access Control List). An ACL is essentially a set of "if-then" rules that tell the firewall which traffic to allow and which to block based on criteria like IP addresses, ports, or protocols (e.g., "Allow traffic from IP 192.168.1.5 on port 80, but block all others").
+1
Why the Other Options are Incorrect:
A. Managed switch:
While a managed switch can implement basic security features (like MAC filtering or Port Security), its primary job is to connect devices within a LAN using MAC addresses. While some high-end "Layer 3" switches can use ACLs, in the context of the A+ exam, the Firewall is the definitive answer for ACL policy enforcement.
B. Gateway:
A gateway is a general term for a device that connects two different networks (like your home network to the Internet). While a router often acts as a gateway and can have firewall features, the "Gateway" itself is a functional role, whereas the Firewall is the specific tool used for policy implementation.
C. Repeater:
A repeater is a simple Layer 1 device that receives a signal and regenerates it to extend the distance of a network. It does not look at data packets or IP addresses and has no capacity to process security policies or ACLs.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 2.1 – "Compare and contrast common networking hardware devices."
A Wi-Fi router is set up in a central room. A user on the outer edge of the building reports slow connections and intermittent internet drops. Which of the following actions will solve the issue?
A. Enabling the 5GHz band
B. Running the flushdns command
C. Upgrading the laptop to a Wi-Fi 6 NIC
D. Installing additional wireless APs around the location
Explanation:
The user is located at the "outer edge of the building" and experiencing slow connections and intermittent drops. These are classic symptoms of weak signal strength due to distance from the wireless router and potential signal attenuation from walls and obstacles. Installing additional wireless access points (APs) throughout the building extends coverage, ensuring stronger signals reach remote areas. This addresses the root cause: inadequate wireless coverage.
Why other options are incorrect:
A. Enabling the 5GHz band:
The 5GHz band offers faster speeds but has shorter range and poorer wall penetration than 2.4GHz. Enabling 5GHz would likely make the problem worse for a user at the building's edge.
B. Running the flushdns command:
flushdns clears the DNS cache on a computer, resolving domain name resolution issues. It does not affect wireless signal strength or connectivity drops.
C. Upgrading the laptop to a Wi-Fi 6 NIC:
While Wi-Fi 6 offers improved performance, it cannot overcome fundamental signal weakness caused by distance and obstacles. The user would still experience poor connectivity at the building's edge.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.2 and 5.3: Troubleshooting wireless network issues. Weak signal symptoms include slow speeds and intermittent drops; solutions include adding access points to extend coverage.
A technician checks a RAID 5 array and sees a S.M.A.R.T. alert on one disk, but the array still shows healthy. What should the technician do next?
A. Run chkdsk /f
B. Disable write caching
C. Rebuild the RAID array
D. Replace the failing drive
Explanation:
S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) is a monitoring system included in hard drives and SSDs that detects and reports on various indicators of reliability. A S.M.A.R.T. alert is a predictive failure warning; it means the hardware has detected internal errors that statistically lead to a total crash soon.
In a RAID 5 array, data is striped across three or more disks with distributed parity.
The array shows as "Healthy" because RAID 5 can survive the failure of exactly one drive.
However, if a second drive fails during this time, the entire array and all its data will be lost.
The technician's priority is to replace the drive before it fails completely to minimize the risk of a double-drive failure.
Why the Other Options are Incorrect:
A. Run chkdsk /f:
This is a software-level utility used to fix file system errors. It cannot fix physical hardware degradation or mechanical issues flagged by S.M.A.R.T.
B. Disable write caching:
While this can prevent data loss during a sudden power failure, it does nothing to address a physically failing disk.
C. Rebuild the RAID array:
You cannot "rebuild" the array using the failing drive. A rebuild is the process that happens after you have replaced the faulty disk with a new one.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 5.2 – "Troubleshoot problems related to storage drives and RAID arrays."
A thief stole a company phone and successfully extracted confidential company information from the device. Which of the following should have been used to prevent the extraction?
A. GPS
B. EPS
C. eSIM
D. MDM
Explanation:
Mobile Device Management (MDM) software should have been used to prevent data extraction from a stolen company phone. MDM solutions allow administrators to enforce security policies including:
Full device encryption to make data unreadable without authentication
Remote wipe capability to erase all data if the device is stolen
Strong password/PIN requirements to prevent unauthorized access
Containerization to separate corporate data from personal data
These features would have prevented the thief from accessing confidential information even after stealing the physical device.
Why other options are incorrect:
A. GPS (Global Positioning System):
GPS can help locate a stolen device but does not prevent data extraction once the thief has the phone.
B. EPS (Emergency Power System) or Ethernet Protection Switch:
EPS typically refers to backup power systems or network protection, not mobile security features.
C. eSIM (Embedded SIM):
eSIM is a digital SIM that allows cellular plan activation without a physical SIM card. It does not provide security features to protect data on the device.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.5: "Given a scenario, configure mobile device settings... Mobile device management (MDM) policies including remote wipe, encryption, and lock screens to protect against data theft."
A technician needs to move a workstation to a different logical network segment. Which of the following technologies should the technician use?
A. DHCP
B. VLAN
C. DNS
D. VPN
Explanation:
A VLAN allows a technician to group devices together into a single "logical" network segment, even if they are physically connected to the same switch as devices on a different network. By assigning a specific switch port to a VLAN ID, the technician can move a workstation from one network (e.g., HR) to another (e.g., Accounting) entirely through software configuration, without having to physically move cables or hardware. This provides security, reduces broadcast traffic, and increases administrative flexibility.
Why the Other Options are Incorrect:
A. DHCP (Dynamic Host Configuration Protocol):
While DHCP is used to assign IP addresses automatically, it does not define the network segment itself. Even if a device gets a new IP, the logical segmentation is handled by the switch or router configuration (the VLAN).
C. DNS (Domain Name System):
DNS is used to resolve hostnames (like www.google.com) to IP addresses. it has no role in segmenting or organizing the physical or logical layers of a local network.
D. VPN (Virtual Private Network):
A VPN is used to create a secure, encrypted tunnel over a public network (like the Internet) to a private network. While it connects a remote user to a network segment, it is not the technology used to move a local workstation between internal segments.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 2.1 – "Compare and contrast common networking hardware devices" (specifically Managed Switches).
Which of the following networking technologies allows for high-speed data transmission over short distances between devices like smartphones and tablets?
A. Near-field communication
B. Zigbee
C. Infrared
D. Wi-Fi Direct
Explanation:
Near-field communication (NFC) is a short-range wireless technology that enables high-speed data transmission over very short distances (typically less than 4 centimeters or 1.5 inches) between devices like smartphones and tablets. NFC is commonly used for:
Contactless mobile payments (Apple Pay, Google Pay)
Pairing Bluetooth devices quickly
Sharing small amounts of data (contacts, URLs) by tapping devices together
Access control and ticketing
Why other options are incorrect:
B. Zigbee:
Zigbee is a low-power, low-data-rate wireless technology used for home automation and IoT devices (smart lights, sensors). It is not designed for high-speed data transmission between smartphones and tablets.
C. Infrared:
Infrared (IR) requires line-of-sight and is slower than NFC. It is largely obsolete for smartphone-to-smartphone communication, though still used in some remote controls.
D. Wi-Fi Direct:
Wi-Fi Direct allows devices to connect directly without a wireless access point. It supports longer ranges and higher speeds than NFC, but it is not specifically designed for the "tap-to-share" ultra-short-distance use case described.
Reference:
CompTIA A+ Core 1 (220-1201) Objective 2.4: "Given a scenario, configure wireless networking... Near-field communication (NFC) for short-range data transmission between mobile devices."
Which of the following best represents the purpose of NFC?
A. Wired connections between several devices
B. Short-distance wireless connections between two devices
C. Wireless connections between multiple devices at once
D. Direct connection of two computers for file sharing
Explanation:
NFC (Near Field Communication) is a very short-range wireless technology, typically requiring a distance of 4 cm (about 1.5 inches) or less to establish a connection. Its purpose is to allow two devices to exchange small amounts of data securely and quickly. Unlike Bluetooth or Wi-Fi, it doesn't require a complex "pairing" process; you simply "tap" the devices together.
+2
Common Use Cases for NFC:
Contactless Payments: Apple Pay, Google Pay, or tap-to-pay credit cards.
Easy Pairing: Tapping a phone to a Bluetooth speaker to initiate the handshake.
Data Exchange: Sharing contact info (vCards) or small files between phones.
Identity/Access: Using a phone or key fob to scan into a secure building.
Why the Other Options are Incorrect:
A. Wired connections:
NFC is strictly wireless (it uses electromagnetic radio fields).
C. Wireless connections between multiple devices:
NFC is a point-to-point technology. It only connects two devices at a time. If you want to connect multiple devices simultaneously, you would use Wi-Fi or a Bluetooth mesh.
D. Direct connection of two computers for file sharing:
While NFC can initiate a file transfer, it is far too slow (maximum speed of 424 kbps) for moving significant amounts of data between computers. For this, you would use an Ethernet crossover cable, Wi-Fi Direct, or a USB-to-USB bridge.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 1.1 – "Given a scenario, install and configure laptop hardware and components" (Specifically mobile connection types).
Each floor at a new corporate facility will have four printers available for all users to print from AH of the printers will be connected with RJ45 and not joined to a domain Which of the following needs to be set up to accomplish this task? (Select two).
A. Printer shares
B. DHCP server
C. Print server
D. Printer subnet
E. SMB configuration
F. Printer Wi-Fi settings
C. Print server
Explanation:
To allow all users on each floor to print to the four network printers that are not joined to a domain, a technician needs to set up a Print Server and configure Printer Shares.
C. Print Server:
A print server is a computer (or dedicated device) that manages the printers on the network . It hosts the printers and manages the print queues for all users. By setting up a print server, you centralize printer management, allowing all users to see a single print queue for each printer, receive consistent error messages, and share driver settings without needing to join a domain . The printers are connected to the network via RJ45 (Ethernet), so they are network-ready devices that the print server can communicate with.
A. Printer Shares:
Once the printers are installed on the print server, you must share them. Creating "printer shares" makes the printers available to other users on the network . Users on each floor can then connect to the shared printer path (e.g., \\PrintServerName\PrinterShareName) instead of configuring the printer directly on their own workstations . This provides centralized access and management.
Why other options are incorrect
B. DHCP server:
A DHCP server automatically assigns IP addresses to devices on the network, including these printers . While this is a standard and recommended practice for network configuration, it is not the solution for accomplishing the task of making the printers available for all users to print. It's a supporting infrastructure service, not the core printing solution required by the question.
D. Printer subnet:
Creating a separate "printer subnet" (VLAN) is a network segmentation practice, not a requirement for printer sharing. It is related to network design and security, not enabling multi-user access to printers.
E. SMB configuration:
SMB (Server Message Block) is the protocol used for file and printer sharing in Windows networks. While the print server and printer shares rely on SMB, configuring SMB at a protocol level is not a direct step a technician takes to accomplish this task. The technician creates the share, and the OS handles the underlying SMB configuration.
F. Printer Wi-Fi settings:
The question explicitly states that all printers are "connected with RJ45," meaning they are connected via wired Ethernet. Therefore, configuring Wi-Fi settings is irrelevant and unnecessary for this scenario.
Reference
This aligns with CompTIA A+ Core 1 (220-1201) objectives related to configuring printers in a networked environment, specifically using print servers and creating printer shares for centralized access and management .
A technician is troubleshooting a computer that has random BSOD alerts and intermittently freezes during normal use. Performance degrades as the day goes on. No new software or hardware changes have been implemented. Freezing occurs under performance-intensive operations. Which of the following hardware components is most likely at fault?
A. Video card
B. HDD
C. RAM module
D. TPM
Explanation:
The combination of random BSOD (Blue Screen of Death) alerts, intermittent freezing, and performance degradation over time is a hallmark of faulty RAM (Random Access Memory).
Randomness: Because data is stored in different memory addresses every time you open a program, a "bad spot" in a RAM module will only cause a crash when the OS happens to write data to that specific failing sector.
Intensive Operations: When you perform performance-intensive tasks (like video editing or gaming), the system utilizes more of the RAM capacity, increasing the statistical likelihood of hitting a faulty memory cell.
Degradation over time: This often points to memory leaks or thermal issues where the module begins to fail as it reaches operating temperature.
Why the Other Options are Incorrect:
A. Video card:
While a failing GPU can cause freezing and BSODs, it usually presents with visual artifacts (lines on the screen, flickering, or "tearing") particularly during 3D rendering. It wouldn't typically cause general performance degradation throughout the day in standard office applications.
B. HDD (Hard Disk Drive):
A failing HDD usually results in very specific errors: "File Not Found," clicking noises, or the system hanging specifically when trying to save or open a file. It rarely causes "random" BSODs across various unrelated tasks unless the OS system files themselves are on a corrupted sector.
D. TPM (Trusted Platform Module):
The TPM is a security chip used for encryption (like BitLocker). If a TPM fails, the computer usually fails to boot or cannot unlock the drive; it does not cause performance degradation or random freezes during normal use.
References:
CompTIA A+ Exam Objectives (220-1201): Objective 5.2 – "Troubleshoot problems related to motherboards, RAM, CPU, and power."
| Page 8 out of 35 Pages |