Professional Documents
Culture Documents
Mod 00 Apresentacao Mod 02: Installing and Configuring PC Components
Mod 00 Apresentacao Mod 02: Installing and Configuring PC Components
Mod 00 Apresentacao Mod 02: Installing and Configuring PC Components
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following laptop features allows users to overcome keyboard size restrictions?
• Touchpad
• Numeric keypad
• Fn key
• Digitizer
Which of the following is a type of internal hard drive used in laptop computers? (Select all that apply)
• Flash drives
• SSHDs
• USB drives
• Magnetic disks
• SSDs
Which of the following can be used to describe the features of Solid-State Drives (SSDs)? (Select 3 answers)
• Low performance
• High performance
Which type of internal laptop hard drive combines high performance and capacity at a relatively low device cost?
• SSD
• Flash drive
• Magnetic drive
• USB drive
• SSHD
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following are characteristic features of traditional magnetic drives? (Select 3 answers)
• High capacity
• High performance
• Low capacity
• Low performance
Which of the following sizes is the most common magnetic hard disk drive form factor used in laptops?
• 3.5 inch
• 5.25 inch
• 1.8 inch
• 2.5 inch
Which of the following are SSD form factors used in laptop computers? (Select 2 answers)
• 1.5 inch
• 5.25 inch
• 1.8 inch
• 2.5 inch
• 1.3 inch
Which of the following memory module form factors are used in laptop computers? (Select 2 answers)
• SODIMM
• ECC RAM
• DIMM
• MicroDIMM
• C-RIMM
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• Storage expansion
• Access control
• Theft prevention
• Data encryption
Due to size restrictions and the compact nature of laptop devices, this type of storage media has become less
commonly found on new laptops.
• Flash drives
• Optical drives
• Solid-state drives
• Magnetic drives
• WLAN
• Riser card
• WPAN
• WWAN
• WWAN
• VLAN
• WLAN
• WPAN
A type of expansion card that enables communication over a cellular network is called a:
• WPAN card
• WAN card
• WWAN card
• WLAN card
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Due to the compact nature of laptop devices, all laptop GPUs come in the form of CPU-integrated graphics.
• True
• False
A type of laptop expansion slot characterized by a much smaller form factor when compared to its desktop
counterpart is known as:
• mITX
• MicroSD
• mini PCIe
• PCI-X
• AC
• PFC
• DC
• A/V
What is the most common battery type that can be found in modern portable devices?
• Alkaline
• Nickel–metal hydride
• Lithium-ion
• Nickel-cadmium
Which of the following is the name of a laptop component that functions as a pointing device?
• Fn key
• Touchpad
• Mouse
• KVM switch
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following hardware components is the most difficult to replace on a laptop computer?
• Optical drive
• Primary storage
• System board
• Integrated GPU
• Secondary storage
Which of the following describes the display technology most commonly used in modern laptops?
• LCD
• OLED
• Plasma
• CRT
A type of backlight technology most commonly used in modern laptop devices is called:
• CCFL
• CRT
• OLED
• LED
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following describes the function of a laptop inverter? (Select 2 answers)
• A device that translates analog data into a format suitable for computer processing
• A component of a mobile device's screen that allows users to control the device with a fingertip
A portion of a laptop's keyboard consists of special function keys, i.e. keys that allow to control additional displays,
volume settings, or screen brightness. The functionality offered by such keys can be activated by pressing and
holding the:
• Win key
• Fn key
• Ctrl key
• Alt key
Docking stations:
• Provide additional interfaces for smaller mobile devices, such as tablets or smartphones
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following physical security controls provide protection against laptop theft? (Select 2 answers)
• Encryption
• Cable lock
• Laptop lock
Which of the following devices offers the fewest amount of options for hardware upgrades that can be installed by a
device user?
• Laptop
• Workstation
• Desktop
• Tablet
Portable devices combining the capabilities of mobile phones and handheld PCs are commonly called:
• Phablets
• Smartphones
• PDAs
• Thick clients
Which of the following are examples of wearable technology devices? (Select 3 answers)
• Phablets
• Smart watches
• Fitness monitors
• Smartphones
• VR/AR headsets
A type of portable device primarily designed for document access is known as a(n):
• Phablet
• E-reader
• Subnotebook
• Digitizer
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
A mobile device's built-in functionality enabling the usage of locator applications is called:
• WPS
• GSM
• IMEI
• GPS
Examples of USB ports that can be found on mobile devices include: (Select 3 answers)
• USB-C
• Micro-USB
• USB Type-A
• Mini-USB
• USB Type-B
What is the name of a proprietary connector type used by Apple mobile devices?
• 8P8C connector
• Lightning connector
• BNC connector
Which of the following are technologies that enable wireless mobile connectivity? (Select 3 answers)
• NFC
• IEEE 802.3
• Bluetooth
• IR
• Thunderbolt
• NFC
• SDN
• PED
• WAP
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
A popular, short-range wireless technology used for connecting various personal devices in a WPAN is known as:
• 802.11
• NFC
• Bluetooth
• Z-Wave
Which of the following is a short distance, line-of-sight technology used in products such as home remote controls?
• NFC
• 802.3
• IR
• Z-Wave
A wireless network Access Point (AP) or site offering public wireless Internet access is commonly called a:
• Hotspot
• Proxy
• Hub
• Gateway
Which of the following refers to the capability of a mobile device to share its Internet connection with other
devices?
• Pairing
• Clustering
• Tethering
• Bonding
The term "Airplane mode" refers to a device function that allows a user to disable wireless transmission capability.
• True
• False
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following are ways of creating a wireless/cellular data network by using a mobile device? (Select 3
answers)
• Hotspot
• Channel bonding
• Tethering
• Link aggregation
• Bluetooth
The process of establishing a connection between Bluetooth devices (e.g. between a Bluetooth enabled headset and
a Bluetooth-enabled phone) is known as:
• Linking
• Tethering
• Three-way handshake
• Pairing
• PIN code
• Multi-factor authentication
• Biometrics
• Cleartext credentials
• Name resolution
• File exchange
• Email retrieval
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
What are the characteristic features of the secure version of IMAP (IMAPS)? (Select all that apply)
What are the basic settings required for configuring a POP3 connection? (Select all that apply)
• SSL/TLS encryption
• POP3 username
• Password
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
What are the basic settings required for configuring an IMAP connection? (Select all that apply)
• Password
• IMAP username
• SSL/TLS encryption
Multipurpose Internet Mail Extensions (MIME) specifications extend an email message format beyond simple text,
enabling the transfer of graphics, audio, and video files over Internet mail systems. A Secure MIME (S/MIME) is an
enhanced version of the MIME protocol that enables email security features by providing encryption, authentication,
message integrity, and other related services.
• True
• False
Which of the following integrated email services does not provide support for Post Office Protocol (POP)?
• iCloud Mail
• Gmail
• Yahoo! Mail
• Exchange Online
• Exchange Online
• Gmail
• iCloud Mail
• Yahoo! Mail
• Yahoo
• Microsoft
• Apple
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Exchange Online (a cloud-based version of the Exchange Server) is an email service from:
• Apple
• Yahoo
• Microsoft
Which of the following can be used as a reference during a mobile device update process?
• PRI
• RIS
• PII
• PRL
A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish
connection with the right cell phone tower is called:
• PRL
• RIS
• PRI
• PII
Which of the following is the unique number used to identify a physical mobile device?
• MAPI
• IMEI
• SSID
• IMSI
• SSID
• MAPI
• IMSI
• IMEI
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following is a way to create private encrypted network connections on a mobile device?
• WLAN
• VPN
• WPAN
• VLAN
The term "Mobile device synchronization" refers to the process of making the same data available on multiple
devices. Synchronized data might include contacts, applications, emails, pictures, music, video, calendars,
bookmarks, documents, location data, social media data, e-books, or passwords. Examples of synchronization
methods include synchronizing mobile devices to the cloud, desktop, or automobile console.
• True
• False
An authentication subsystem that enables a user to access multiple, connected system components (such as
separate hosts on a network) after a single login on only one of the components is commonly called:
• AAA framework
• Multi-factor authentication
Examples of mobile device synchronization methods for Apple iOS devices include: (Select all that apply)
• iTunes
• OneDrive
• Remote Disk
• iCloud
• Dropbox
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following are examples of universal connection types that enable mobile device synchronization?
• IEEE 802.11
• USB-C
• Cellular
• Bluetooth
• IEEE 802.3
Which of the following are Apple-proprietary connector types that can be used for iOS mobile device
synchronization? (Select 2 answers)
• USB-C connector
Which USB connector type can be used on an Android device for mobile device synchronization?
• USB Mini-B
• USB Type-A
• USB Micro-B
• USB Mini-A
• USB Type-B
• Email service
• Directory access
• File exchange
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
A type of cryptographic network protocol for secure data communication, remote command-line login, remote
command execution, and other secure network services between two networked computers is known as:
• TFTP
• SSH
• Telnet
• RDP
Which of the following describes a system that maps domain names to various types of data, such as numerical IP
addresses?
• TCP/IP
• DNS
• SQL
• DHCP
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which network protocol enables users to retrieve the contents of an Internet page from a web server?
• SNMP
• HTTP
• SMTP
• IMAP
• Email retrieval
• File exchange
• Directory access
• Name resolution
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
• SFTP
• HTTPS
• FTPS
• SNMP
Which of the following is a Microsoft-proprietary remote-access protocol providing users with a graphical interface
that allows them to connect to another computer on a network?
• RDP
• SSH
• VNC
• Telnet
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following is used when a WINS server tries to resolve a host name into an IP address on a Windows-
based LAN?
• DNS
• TCP/IP
• NetBIOS
• DHCP
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
• True
• False
Which of the following protocols permits automated discovery of networked services on Local Area Networks
(LANs)?
• SMB
• AFP
• CIFS
• SLP
• RDP
• SSH
• AFP
• SLP
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:
• DNS
• SNMP
• NAT
• DHCP
• Authentication protocol
A type of protocol used in network management systems to monitor network-attached devices is called:
• SMB
• NTP
• SNMP
• RDP
• UDP port 20
• TCP port 20
• UDP port 21
• TCP port 21
• TCP port 20
• UDP port 20
• TCP port 21
• UDP port 21
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• TCP port 21
• UDP port 22
• TCP port 20
• TCP port 22
• 20
• 21
• 22
• 23
• SNMP
• Telnet
• FTP
• SMTP
• 53
• 67
• 110
• 389
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
POP3 uses:
• 143
• 389
• 443
• 636
• TCP port 80
• UDP port 53
A network technician wishes to use an RDP client on their Windows OS to remotely troubleshoot a problem on
another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to
allow this type of network connection?
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following port numbers are reserved for NetBIOS services? (Select 3 answers)
• 136
• 161
• 137
• 162
• 138
• 139
• RDP
• SMB
• CIFS
• HTTPS
• IMAP
• 143
• 427
• 548
• 443
• 427
• 443
• 445
• 548
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• UDP port 63
• UDP port 65
• UDP port 67
• UDP port 68
• UDP port 69
• RDP
• LDAP
• SMB
• LDAPS
• 161
• 138
• 162
• 139
An SNMP management station receives SNMP notifications on which of the following UDP ports?
• 161
• 137
• 162
• 138
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support a
three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort
protocol.
• True
• False
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, a set of initial steps
required to establish a network connection. UDP supports retransmission of lost packets, flow control (managing the
amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
• True
• False
A device designed to filter and transfer IP packets between dissimilar types of computer networks is called a:
• Proxy
• Hub
• Switch
• Router
Which device improves network performance by dividing a given network segment into separate collision domains?
• Hub
• Repeater
• Switch
• Router
A network switch with configuration features that can be modified via a user interface is a:
• Virtual switch
• Multilayer switch
• PoE switch
• Managed switch
An infrastructure device designed for connecting wireless/wired client devices to a network is known as a(n):
• Captive portal
• Active hub
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Software or hardware that checks information coming from the Internet and either blocks it or allows it to pass
through depending on the applied configuration settings is called:
• Antivirus
• Firewall
• NAC
• Antispyware
Which of the following is a computer hardware component designed to enable network access?
• CPU
• PSU
• NIC
• GPU
Which of the following is a simple network device that amplifies a received signal so it can be transmitted over
greater distance without loss of quality?
• Patch panel
• Multiplexer
• Repeater
• Passive hub
The main disadvantage of using this device is its negative impact on network performance, resulting from the fact
that any incoming signal on any of its ports is re-created and sent out on any connected ports.
• Router
• Switch
• Bridge
• Hub
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Network connections implemented with the use of a cable modem take advantage of: (Select 3 answers)
• Telephone lines
• Coaxial cabling
• Shared bandwidth
• Dedicated bandwidth
• Dedicated bandwidth
• Shared bandwidth
• Telephone lines
• Coaxial cabling
Which of the following describe the features of a network bridge? (Select 3 answers)
• Newer and more effective type of network device in comparison to network switch
• Typically capable of connecting more network segments than switch (more physical ports)
• Typically capable of connecting fewer network segments than switch (fewer physical ports)
• Older and less effective type of network device in comparison to network switch
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
What are the characteristic traits of a network switch? (Select all that apply)
• Typically capable of connecting more network segments than bridge (more physical ports)
• Older and less effective type of network device in comparison to network bridge
• Newer and more effective type of network device in comparison to network bridge
• Typically capable of connecting fewer network segments than bridge (fewer physical ports)
A simple device consisting of multiple connector blocks and ports used for cable management is a:
• Media converter
• Demarc
• Patch panel
Which of the following acronyms describes using a single twisted-pair Ethernet cable to carry both data and
electrical power?
• EPP
• PoE
• ECP
• PLC
Which of the following is a dedicated device designed to supply power to PoE equipment?
• Inverter
• Injector
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
A type of technology that enables sending data over wiring used for transmission of electrical power is known as:
• PLC
• ECP
• PoE
• EPP
In addition to its native routing functionality, a SOHO router is an all-in-one device that can serve the same purposes
as many other devices. It can provide the functionality of a network switch and an Access Point (AP). A SOHO router
can also provide extensive network configuration options that include a DHCP, firewall, and wired/wireless security
settings.
• True
• False
• EUI
• SSID
• OUI
• CNAME
Which of the following acronyms is used in an emerging field of new technologies, such as wearable tech or home
automation?
• SoC
• NFC
• IoT
• ESN
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
A lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall is
known as:
• VPN
• Extranet
• VLAN
• DMZ
Which of the following solutions will allow a server with a private IP address to handle requests from an outside
(public) network?
• Port bonding
• Port labeling
• Port forwarding
• Port mirroring
What is the name of a router configuration feature that allows to open an inbound port based on the outbound
requests made by hosts placed inside a private network?
• Port triggering
• Port bonding
• Port forwarding
• Port mirroring
Which of the following solutions alleviates the depletion of IPv4 address space by allowing multiple hosts on the
same private LAN to share a single public IP address?
• DNS
• APIPA
• NAT
• DHCP
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following solutions hides internal IP addresses by modifying the IP address information in IP packet
headers while it is in transit across a traffic routing device?
• QoS
• DHCP
• NAT
• DNS
Dynamic Network Address Translation (DNAT) provides a permanent mapping between an individual private IP
address and a public IP address.
• True
• False
Static Network Address Translation (SNAT) provides a mapping between an individual private IP address and any of
the IP addresses belonging to the available public IP address pool.
• True
• False
Which of the following is a Network Address Translation (NAT) method that takes a combination of a private IP
address and a port number, then binds them with the corresponding public IP address and port information?
• PAT
• NAC
• RAS
• EAP
A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure,
and learn about the presence and capabilities of other devices is known as:
• DHCP
• UPnP
• S.M.A.R.T.
• UEFI
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• WAP
• UPnP
• TKIP
• PnP
Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass
through?
• Whitelist
• Routing table
• Blacklist
• Rainbow table
Which one of the following is a network security access control method in which a 48-bit physical address assigned
to each network card is used to determine access to the network?
• MAC filtering
• Static IP addressing
Which of the following solutions allows network administrators to prioritize certain types of network traffic?
• NAC
• UAC
• NAT
• QoS
Which of the following wireless security protocols has been discouraged in favor of newer standards due to known
vulnerabilities resulting from implementation flaws?
• EAP
• AES
• WPA2
• WEP
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing
wireless networks. WEP is an older standard and is not recommended because of its vulnerabilities. WPA was
designed as an interim replacement for WEP, and WPA2 was introduced as the official standard that offers the
strongest security of the three.
• True
• False
Which of the following is the best method to secure a small network lacking an authentication server?
• WPA-PSK
• WPA2-Enterprise
• WPA2-PSK
• WPA-Enterprise
Wi-Fi Protected Setup (WPS) simplifies the configuration of new wireless networks by enabling non-technical users
to easily set up new networks, configure network security settings and add new devices to an existing network.
However, due to its known security vulnerabilities, WPS is not recommended and should be disabled.
• True
• False
What are the characteristic features of a WPA/WPA2 Enterprise mode? (Select 2 answers)
Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the
same area without causing interference.
• True
• False
Which of the following IEEE standards provides the basis for implementing most modern WLANs?
• IEEE 802.11
• IEEE 802.1x
• IEEE 802.3
• IEEE 802.1q
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following answers apply to the IEEE 802.11a wireless standard? (Select 2 answers)
What are the characteristic features of the IEEE 802.11b wireless standard? (Select 2 answers)
Which of the following answers apply to the IEEE 802.11g wireless standard? (Select 2 answers)
• 802.11n
• 802.11a
• 802.11b
• 802.11ac
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following are characteristic features of the IEEE 802.11n wireless standard? (Select all that apply)
The IEEE 802.11n standard offers backward compatibility with: (Select all that apply)
• 802.11g
• 802.11ac
• 802.11b
• 802.11a
Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data
throughput due to the use of multiple antennas and multiple data streams.
• True
• False
Which of the following answers describe features of the IEEE 802.11ac wireless standard? (Select 3 answers)
Which of the following frequency bands can be used by IEEE 802.11 networks? (Select all that apply)
• 2.0 GHz
• 2.4 GHz
• 5.0 GHz
• 5.4 GHz
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• 20 MHz
• 22 MHz
• 40 MHz
• 80 MHz
• 20 MHz
• 22 MHz
• 40 MHz
• 80 MHz
Which of the following channel bandwidths is specified in the IEEE 802.11g standard?
• 20 MHz
• 22 MHz
• 40 MHz
• 80 MHz
The term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the
amount of available bandwidth.
• True
• False
The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers)
• 20 MHz
• 22 MHz
• 40 MHz
• 80 MHz
• 160 MHz
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following describes the IEEE 802.11ac channel bandwidth option(s)?
• 20 MHz
• 40 MHz
• 80 MHz
• 160 MHz
Which of the following channel options would allow three Wireless Access Points (WAPs) to be set up on non-
overlapping channels?
• 1
• 5
• 6
• 9
• 11
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
• WMN
• RFID
• GPS
• WTLS
Which of the following refer to IoT technologies designed to permit communication between appliances in a home
automation network? (Select 2 answers)
• Ant+
• RFID
• Z-Wave
• NFC
• Zigbee
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE is
much faster than the older generation of 2G and 3G cellular networks. Both LTE and its later upgrade, LTE-Advanced
(LTE-A), are often marketed as 4G standards.
• True
• False
• File storage
• Name resolution
• Email handling
• SMTP server
• DNS server
• HTTP server
• FTP server
• Name resolution
• Printing
• Email handling
• IP address allocation
Which of the following server types is used for automatic allocation of IP addresses on a network?
• DNS server
• DHCP server
• FTP server
• HTTP server
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
To connect to a website on the Internet and display its contents, a URL entered in a web browser address bar needs
to be translated into an IP address. Which of the following servers handles this type of request?
• ICS server
• Web server
• DNS server
• DHCP server
Which of the following is a computer system or an application/service that acts as an intermediary between a
network host and the Internet?
• Bridge
• Active hub
• Switch
• Proxy
• Authentication
• Name resolution
• Email handling
Which of the following is one of the functions provided by RADIUS and TACACS servers?
• Name resolution
• Email handling
• Authentication
Which of the following is a type of server used to collect diagnostic and monitoring data from networked devices?
• Proxy server
• UC server
• Syslog server
• ICS server
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a
dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall
with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection,
IDS/IPS functionality, or malware inspection.
• True
• False
Intrusion Detection Systems (IDSs) are devices or software applications designed to detect malicious activities or
violations of security policies on a network or computer host. An IDS designed to monitor networks is known as a
Network Intrusion Detection System (NIDS); an IDS monitoring a single host is called a Host Intrusion Detection
System (HIDS). An IDS does not take any active steps to prevent or stop intrusions, relying on passive responses such
as sending an alert to a management console or recording information about an event in logs.
• True
• False
Which of the following reflects differences between passive and active network security breach responses?
• Private IP address
• Dynamic IP address
• Public IP address
• Static IP address
• DHCP server
• Authentication server
• DNS server
• Proxy server
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IP address and subnet mask
when a Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between
169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within the network
segment that a given host is connected to (i.e. a host with an APIPA-assigned address cannot connect to the
Internet).
• True
• False
• FE80::/10
• Non-routable IP address
• Public IP address
• APIPA address
• 169.254.0.0/16
• Routable IP address
• 2002::/16
• ::1/128
• FE80::/10
• 2001::/32
• SLP
• DHCP
• DNS
• SNMP
Dynamic Host Configuration Protocol (DHCP) allows for static allocation of an IP address based on an IP-to-MAC
address mapping.
• True
• False
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following terms is used to describe a permanent IP address assignment from a DHCP server?
• Scope
• Reservation
• DHCP relay
• Lease
Networked clients not residing on the same subnet as a DHCP server can still obtain an IP address from the server
through a DHCP relay agent (a.k.a. IP helper).
• True
• False
• 32 bits
• 48 bits
• 64 bits
• 128 bits
• Octagonal numbers
• Binary numbers
• Hexadecimal numbers
• Decimal numbers
• 32 bits
• 48 bits
• 64 bits
• 128 bits
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• Decimal numbers
• Hexadecimal numbers
• Binary numbers
• Octagonal numbers
A double colon in an IPv6 address indicates that one part of the address, containing only zeros, has been
compressed to make the address shorter.
• True
• False
Which of the following determines which network segment an IP address will belong to?
• Physical address
• Subnet mask
Which of the following is a networked device providing an entry point into another network or onto the Internet?
• Hub
• Switch
• Proxy server
• Default gateway
A system that uses a public network (such as the Internet) to create a private encrypted connection between
remote locations is called:
• WWAN
• VPN
• PAN
• VLAN
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• Point-to-point
• Site-to-site
• Remote-access
• Client-to-site
Which of the following is a dedicated device designed to manage encrypted connections established over an
untrusted network such as the Internet?
• VPN concentrator
• Proxy server
• Distributed switch
• UTM appliance
Which of the following VPN types is used to connect computers to a network? (Select 2 answers)
• Remote-access
• Client-to-site
• Site-to-site
• Point-to-point
• True
• False
Which of the following terms describes a logical grouping of computers that allow computer hosts to act as if they
were attached to the same broadcast domain, regardless of their physical location?
• VLAN
• DMZ
• SNMP community
• VPN
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the
Internet.
• True
• False
Using cable modems for Internet access within a standard cable television infrastructure is known as:
• Dial-up
• Cable broadband
• Frame relay
• Metro-Ethernet
Which of the following is the most common type of DSL Internet access?
• VDSL
• ADSL
• SDSL
• UDSL
Which of the following types of Internet access uses traditional analog telephone lines?
• WiMAX
• Ethernet
• Cable broadband
• Dial-up
Which of the following are characteristics of fiber-optic network cabling? (Select 3 answers)
• Limited bandwidth and maximum cable segment length in comparison to copper cabling
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network
services over a PSTN?
• VoIP
• WiMAX
• NFC
• ISDN
Which of the following WAN technologies uses cell towers that provide wireless signal coverage for mobile devices?
• WAP
• WWAN
• Satellite
• WLAN
Examples of tethering methods used in mobile Internet connection sharing include: (Select all that apply)
• Bluetooth
• DSL connection
• Wi-Fi
• Ethernet
• USB cable
The term "Mobile hotspot" refers to a type of WLAN that enables network access through a mobile device that acts
as a portable WAP.
• True
• False
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• WiMAX
• IEEE 802.11
• IR
• Bluetooth
Which of the following is a network connecting computers within a small geographical area, such as within a single
building or between a group of buildings?
• PAN
• LAN
• MAN
• WAN
• True
• False
A computer network that connects multiple smaller networks over very large geographical areas is called a:
• PAN
• LAN
• MAN
• WAN
A type of limited-range computer network used for data transmission among various types of personal devices is
known as:
• PAN
• LAN
• SAN
• MAN
In terms of its size and reach, a Metropolitan Area Network (MAN) is larger than a LAN but smaller than a WAN.
• True
• False
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• PAN
• LAN
• MAN
• WAN
A type of network topology in which each node directly connects to every other node is called a:
• Star
• Bus
• Mesh
• Ring
• Ring
• Mesh
• Bus
• Star
Which wireless network type has a design that uses mesh topology?
• MAN
• WMN
• VLAN
• WAN
Which of the following tools should be used to attach an RJ-45 connector to a twisted-pair Ethernet cable?
• Wire cutters
• Cable stripper
• Needle-nose pliers
• Crimper
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following tools should be used to remove electrical insulation covers from electric wires?
• Needle-nose pliers
• Crimper
• Snips
• Cable stripper
Which of the following tools should be used to test power supply voltage output?
• Torx screwdriver
• Loopback plug
• Multimeter
Which of the following tools should be used to locate a cable in a cabling bundle, or to trace individual wires in a
cable?
• Spectrum analyzer
• Multimeter
An Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that locates faults and breaks in
fiber-optic cabling.
• True
• False
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following are characteristic features of a signal that can be carried through a VGA cable? (Select 2
answers)
• Audio
• Digital
• Video
• Analog
Which of the following interfaces can transmit both video and audio data? (Select 2 answers)
• S/PDIF
• DVI
• VGA
• HDMI
• DisplayPort
Which of the following are characteristic features of signals that can be carried through an HDMI cable? (Select 2
answers)
• Analog signal
• Video only
• Digital signal
• Audio only
• USB
• Thunderbolt
• FireWire
• DisplayPort
• HDMI
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following is a Mini-HDMI connector used with portable devices such as camcorders and digital
cameras?
• Type A
• Type B
• Type C
• Type D
• Analog video
• Audio only
• Digital audio/video
• Video only
• Analog audio
Which of the following Digital Visual Interface (DVI) connector types does not support digital signal transmission?
• DVI-D
• DVI-A
• DVI-I
• DVI-A/D
Which of the following DVI connector types does not support analog signal transmission?
• DVI-D
• DVI-A
• DVI-I
• DVI-A/D
The DVI-I connector supports both digital and analog video signal transmissions.
• True
• False
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
Which of the following is a proprietary 8-pin power connector for iOS devices?
• Thunderbolt
• DisplayPort
• Molex
• Lightning
What are the characteristic features of Thunderbolt 1? (Select all that apply)
• USB-C connector
• USB-C connector
• Provides the capability to send PCIe/DisplayPort data and power over single cable
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
• Up to 3 meters
• Up to 6 meters
• Up to 10 meters
• Up to 15 meters
• 30 meters
• 40 meters
• 50 meters
• 60 meters
USB version 1.1 specifies two data transfer rates: 1.5 Mbps (sometimes referred to as "Low Speed USB"), and 12
Mbps (also known as "Full Speed USB").
• True
• False
USB 2.0 (a.k.a. "High Speed USB") has a maximum data transfer rate of:
• 120 Mbps
• 240 Mbps
• 480 Mbps
• 960 Mbps
Which of the following apply to the USB 3.0 standard? (Select 3 answers)
• SuperSpeed USB
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
USB 3.1 offers an improvement over its predecessors by enabling a maximum data transfer rate of up to:
• 6 Gbps
• 10 Gbps
• 20 Gbps
• 40 Gbps
• 10 Gbps
• 20 Gbps
• 30 Gbps
• 40 Gbps
Which of the following USB variants have a practical cable length limitation of 3 meters? (Select 2 answers)
• SuperSpeed USB
What is the maximum allowable cable length for both Full Speed USB and High Speed USB?
• 3 meters
• 4.5 meters
• 5 meters
• 10 meters
The Universal Serial Bus (USB) standard specifies that type A connectors can be attached to: (Select 2 answers)
• Target devices
• Host devices
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)
CompTia A+ (220-1001 and 220-1002)
Mod 00 Apresentacao
Mod 02 Installing and Configuring PC Components
What is the maximum number of USB devices that can be connected to a single USB host controller?
• 31
• 63
• 127
• 255
The Universal Serial Bus (USB) standard specifies that type B connectors can be attached to: (Select 2 answers)
• Target devices
• Host devices
_______________________________________________________________________________________________
CompTia A+ (220-1001 and 220-1002)