Think You're Ready?

Your Final Exam Before the Final Exam.
Dare to Take It?

Topic 1: Main Questions

After troubleshooting a computer's connectivity, the network team determines there is a port-mapping issue. After plugging the patch cable into a different port, the issue persists. Which of the following troubleshooting steps should a technician take next to resolve the issue?

A. Convert the patch cable to a crossover cable.

B. Test the patch cable from the computer to the network closet.

C. Verify the length of the patch cable meets current standards.

D. Replace the patch cable from the device to the wall.

B.   Test the patch cable from the computer to the network closet.

Explanation:

The technician has already tried a simple fix (plugging the patch cable into a different wall port) and the issue persists. The next logical step in the troubleshooting methodology is to test the theory by isolating the problem to a specific component. The path from the computer to the network closet includes:

The patch cable from computer to wall jack
The wall jack wiring
The horizontal cabling through the building
The patch panel connection in the network closet
The patch cable from panel to switch

Since switching wall ports didn't resolve the issue, the problem could still be with the first patch cable or the cabling infrastructure. Testing the continuity and functionality of the patch cable from the computer to the network closet will help determine if the issue is in the cable itself or further downstream.

Why other options are incorrect:

A. Convert the patch cable to a crossover cable:
Crossover cables are rarely needed with modern networking equipment that supports Auto-MDIX. This is an outdated solution and does not address the core troubleshooting need.

C. Verify the length of the patch cable meets current standards:
Cable length (typically limited to 100 meters for Ethernet) is unlikely to be the issue with a standard patch cable in an office environment. This is a lower priority than testing basic functionality.

D. Replace the patch cable from the device to the wall:
This is a valid troubleshooting step but should come after testing the cable to confirm it is faulty. Testing first avoids unnecessary replacement of potentially good cables.

Reference:

CompTIA A+ Core 1 (220-1201) Objective 5.1 and 4.1: Troubleshooting methodology and network troubleshooting tools. Testing cables to isolate faults is a standard step after initial observations.

Which of the following should a company use to implement automatic time synchronization?

A. DHCP

B. UTM

C. NTP

D. AAA

C.   NTP

Explanation:

NTP (Network Time Protocol) is a networking protocol used for clock synchronization between computer systems over packet-switched, variable-latency data networks. It operates on UDP port 123.

In an enterprise environment, accurate time is critical for:


Security Logs: Correct timestamps are required to reconstruct the timeline of a security breach or system error.

Authentication: Protocols like Kerberos (used in Active Directory) will fail if the client's clock is more than 5 minutes out of sync with the server.

File Versioning: Ensuring that the "Last Modified" metadata is accurate across multiple workstations.

Why the Other Options are Incorrect:

A. DHCP (Dynamic Host Configuration Protocol):
While DHCP can provide a client with an IP address, subnet mask, and the address of a time server, it does not actually perform the synchronization of the time itself.

B. UTM (Unified Threat Management):
A UTM is a single security appliance that provides multiple functions (firewall, anti-spam, content filtering, etc.). While a UTM might contain an NTP server, its primary purpose is all-in-one security, not time synchronization.

D. AAA (Authentication, Authorization, and Accounting):
This is a framework for intelligently controlling access to computer resources, enforcing policies, and auditing usage. It is a security concept, not a time-keeping protocol.

References:

CompTIA A+ Exam Objectives (220-1201): Objective 2.1 – "Compare and contrast common networking protocols."

A technician is troubleshooting a PoE phone that will not turn on. When a laptop is plugged directly into the switchport for the phone the technician sees a data link LED and activity. Which of the following tools should the technician use to verify PoE availability to the phone?

A. Network tap

B. Cable tester

C. Loopback plug

D. Toner probe

B.   Cable tester

Explanation:

Since the laptop works when plugged into the same switch port (confirming data connectivity), the issue is specific to the phone not receiving power. A cable tester (specifically one that supports PoE testing) can verify whether the Ethernet cable is delivering Power over Ethernet to the device. Advanced cable testers can detect if PoE is present on the line, confirm voltage levels, and identify which pairs are carrying power, helping determine if the issue is with the switch port PoE configuration, the cable, or the phone itself.

Why other options are incorrect:

A. Network tap:
A network tap passively copies network traffic for monitoring and analysis. It does not test for power delivery.

C. Loopback plug:
A loopback plug tests network port functionality by redirecting transmitted signals back to the sender. It verifies data transmission but cannot detect PoE.

D. Toner probe:
A toner probe traces cables and identifies specific runs by emitting an audible tone. It does not test for electrical power delivery.

Reference:

CompTIA A+ Core 1 (220-1201) Objective 4.1: "Given a scenario, use the appropriate networking tools... Cable testers for continuity, wire mapping, and PoE detection."

A company is separating its accounting department's network from its customer service department's network. Which of the following will accomplish this task?

A. VPN

B. DNS

C. VLAN

D. DHCP

C.   VLAN

Explanation:
A VLAN is the standard technology used to group devices into separate logical networks, regardless of their physical location. Even if the Accounting and Customer Service departments are plugged into the same physical switch, an administrator can assign their respective ports to different VLAN IDs. This ensures that traffic from the Accounting department is isolated from the Customer Service department, enhancing both security and network performance by reducing broadcast traffic.

Why the Other Options are Incorrect:

A. VPN (Virtual Private Network):
A VPN is used to create a secure, encrypted connection between a remote user and a private network over the internet. While it provides "separation" from the public internet, it is not the tool used to segment an internal office network.

B. DNS (Domain Name System):
DNS maps human-readable names (like accounting.company.local) to IP addresses. It helps you find devices on a network, but it has no capability to separate or isolate the network traffic itself.

D. DHCP (Dynamic Host Configuration Protocol):
DHCP automatically assigns IP addresses to devices. While you could technically give the two departments different IP ranges (subnets) via DHCP, without a VLAN or a router, those departments would still be on the same "broadcast domain" and wouldn't be truly isolated at the hardware level.

References:

CompTIA A+ Exam Objectives (220-1201): Objective 2.1 – "Compare and contrast common networking hardware devices" (specifically Managed Switches and their features).

Which RAID type offers double parity?

A. RAID 0

B. RAID 1

C. RAID 5

D. RAID 6

D.   RAID 6

Explanation:

RAID 6 (Redundant Array of Independent Disks level 6) uses double parity distributed across all drives in the array. This allows the array to withstand the failure of up to two drives simultaneously without data loss. It requires a minimum of four drives and provides higher fault tolerance than single-parity RAID levels, making it ideal for environments where data integrity is critical.

Why other options are incorrect:

A. RAID 0:
RAID 0 (striping) offers no parity or redundancy. It improves performance but provides zero fault tolerance. If one drive fails, all data is lost.

B. RAID 1:
RAID 1 (mirroring) uses data duplication, not parity. It writes identical data to two drives, allowing one drive to fail. This is single redundancy, not double parity.

C. RAID 5:
RAID 5 uses single parity distributed across all drives. It can withstand one drive failure but cannot survive a second failure without data loss.

Reference:

CompTIA A+ Core 1 (220-1201) Objective 3.2: "Compare and contrast storage devices... RAID levels 0, 1, 5, 6, and 10. RAID 6 provides dual parity allowing for two drive failures."

An IT support specialist needs to configure several laptops to access local resources wherever the employees are while in the office. Which of the following would best meet this requirement?

A. Configure cellular location services to facilitate device identification

B. Set up a Wi-Fi connection with a common SSID

C. Enable Bluetooth connectivity in all laptops

D. Create roaming profiles for each laptop

B.   Set up a Wi-Fi connection with a common SSID

Explanation:

An SSID (Service Set Identifier) is the name of a wireless network. In a corporate or office environment, multiple Wireless Access Points (WAPs) are usually distributed throughout the building to provide full coverage. By configuring all these access points with the same SSID and security credentials, devices can "roam" from one part of the office to another. As an employee walks with their laptop, the device will automatically hand off the connection to the strongest available access point without the user losing access to local resources (like printers or file shares).

Why the Other Options are Incorrect:

A. Configure cellular location services:
Location services (like GPS or cellular triangulation) help apps find your physical coordinates. They do not provide a data connection to internal "local resources" like office servers or intranet sites.

C. Enable Bluetooth connectivity:
Bluetooth is a PAN (Personal Area Network) technology. It has a very limited range (typically 10 meters/30 feet) and is intended for connecting peripherals (mice, headsets), not for providing robust network access to local resources across an entire office.

D. Create roaming profiles:
Roaming profiles are a Windows Server/Active Directory feature that allows a user's desktop settings and files to follow them to different computers. While useful, this is a software configuration for user data, not a networking solution that provides the physical "access" to the network as the user moves.

References:
CompTIA A+ Exam Objectives (220-1201): Objective 2.3 – "Given a scenario, configure and personalize a SOHO wired/wireless network."

A technician needs to confirm that desktop PCs can be deployed to a global, remote workforce. Which of the following specifications should the technician validate?

A. Input voltage

B. BIOS language support

C. Supply chain security

D. Power efficiency

A.   Input voltage

Explanation:

For a global, remote workforce, the most critical specification to validate is input voltage compatibility. Different countries use different electrical standards:
V North America: 110-120V at 60Hz
Europe, Asia, Australia: 220-240V at 50Hz

Modern PC power supplies typically have a universal input range (100-240V, 50-60Hz) that automatically adjusts to local voltage. The technician must verify that the power supplies in the deployed desktops support the voltage standards of each destination country. Deploying a PC with a fixed-voltage power supply (110V only) to a 220V country would destroy the system immediately upon connection.

Why other options are incorrect:

B. BIOS language support:
While language accessibility is important for user experience, the OS can be configured for local languages. BIOS language does not affect basic functionality and can often be changed.

C. Supply chain security:
This is a procurement and logistics concern, not a technical specification of the PC hardware itself.

D. Power efficiency:
Energy efficiency (80 Plus ratings) affects operating costs but is not a critical requirement for global deployment. The PC will function regardless of efficiency rating.

Reference:
CompTIA A+ Core 1 (220-1201) Objective 3.1: "Given a scenario, connect and configure peripherals and ports... Power supply specifications including input voltage ranges for international deployment."

Which of the following internet connection types provides the fastest speeds and greatest coverage in less populated areas with minimal infrastructure?

A. Fiber

B. Cable

C. DSL

D. Cellular

D.   Cellular

Explanation:

Cellular (specifically 4G LTE and 5G) is the best answer here because of the requirement for minimal infrastructure in less populated areas.

Infrastructure:Unlike Fiber, Cable, or DSL, which require physical wires (glass, copper, or coaxial) to be buried and run directly to every single home or building, cellular only requires a few strategically placed towers.

Speed: Modern 5G cellular networks can provide speeds that significantly outperform DSL and, in many cases, rival Cable and entry-level Fiber.

Coverage: In rural or less populated areas, it is much more cost-effective for a provider to build one cellular tower that covers several miles than to dig trenches for cables to reach a few isolated houses.

Why the Other Options are Incorrect:

A. Fiber:
While Fiber provides the absolute fastest speeds, it requires the most infrastructure. It is extremely expensive to run fiber-optic cables to less populated areas, which is why Fiber is usually limited to cities and dense suburbs.

B. Cable:
Cable internet uses the same coaxial lines as cable TV. While common, it still requires a wired physical connection to the local "node," making it less viable for remote areas with minimal existing infrastructure.

C. DSL:
DSL runs over existing telephone lines. While it has broad coverage, it is the slowest of these options and the signal degrades significantly the further you are from the provider's central office.

References:

CompTIA A+ Exam Objectives (220-1201): Objective 2.5 – "Summarize services provided by managed service providers" (specifically Internet connection types).

Which of the following can carry data and electricity to network devices? (Select two).

A. Router

B. Injector

C. Cable modem

D. Access point

E. PoE

F. Unmanaged switch

B.   Injector
E.   PoE

Explanation:

PoE (Power over Ethernet) is the technology that enables network cables to carry both data and electricity to devices. The question asks what "can carry data and electricity," referring to both the technology itself and the devices that enable it.

E. PoE:
This is the overarching technology standard (IEEE 802.3af/at/bt) that allows Ethernet cables to transmit electrical power along with data to devices like IP cameras, VoIP phones, and wireless access points.

B. Injector:
A PoE injector (also called a midspan) is a device that adds power to an Ethernet cable. It sits between a non-PoE switch and the powered device, injecting electricity into the cable while passing through the data signal.

Why other options are incorrect:

A. Router:
A router directs network traffic between networks. While some routers include PoE ports, the router itself does not inherently carry data and electricity; it processes data.

C. Cable modem:
A cable modem connects to the ISP via coaxial cable and provides data connectivity. It does not supply power over Ethernet to downstream devices.

D. Access point:
An access point provides wireless connectivity. While it may receive power via PoE, it is a consumer of PoE, not a provider or carrier of both data and electricity.

F. Unmanaged switch:
A standard unmanaged switch forwards data frames but does not typically provide PoE unless specifically labeled as a PoE switch. The question asks what can carry both, implying the capability to do so.

Reference:

CompTIA A+ Core 1 (220-1201) Objective 2.2: "Compare and contrast common networking hardware... Power over Ethernet (PoE) and PoE injectors for powering devices over network cabling."

Which of the following cloud models would multiple organizations in the same industry most likely use?

A. Public

B. Hybrid

C. Community

D. Private

C.   Community

Explanation:

A Community Cloud is a specialized model where the infrastructure is shared among several organizations that have similar concerns or goals, such as security requirements, compliance regulations (like HIPAA for healthcare or CJIS for law enforcement), or a common industry mission.

Instead of a single organization paying for a Private cloud, multiple organizations (e.g., four different hospitals or three local government agencies) pool their resources to build or lease a cloud that meets their specific industry needs.

Why the Other Options are Incorrect:

A. Public:
This model is open to the general public (e.g., AWS, Microsoft Azure, Google Cloud). While multiple organizations use it, they do not share the underlying infrastructure for a specific industry purpose; it is a multi-tenant environment for anyone who pays.

B. Hybrid:
This is a combination of two or more distinct cloud models (usually a mix of Private and Public). It allows an organization to keep sensitive data on a private server while using the public cloud for high-volume tasks. It doesn't inherently imply industry-specific sharing.

D. Private:
This is cloud infrastructure operated solely for a single organization. It provides the highest level of control and security but is expensive and not shared with other organizations in the industry.

References:

CompTIA A+ Exam Objectives (220-1201): Objective 4.1 – "Summarize cloud-computing concepts."

Page 9 out of 40 Pages