Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Take the Free CompTIA A+ 220-901/902 Practice Exam Now

Sharpen your Windows OS exam prep with this CompTIA A+ 220-901/902 quiz

Difficulty: Moderate
2-5mins
Learning OutcomesCheat Sheet
paper art computer monitor gears cables and study notes on teal background for CompTIA A plus practice exam 220 901 902

Use this free CompTIA A+ practice exam to train for 220-901 and 220-902: work through hardware, Windows OS, networking, and real troubleshooting tasks. Timed questions and clear solutions help you spot weak spots and build speed before test day; when you're ready to study the newer track, try our A+ 1001 practice.

What is the primary purpose of an anti-static wrist strap when servicing computer components?
To ground the technician and prevent electrostatic discharge
To provide power to the motherboard
To measure the airflow inside the case
To insulate the technician from electrical shock
An anti-static wrist strap grounds the technician to the computer chassis, preventing electrostatic discharge that can damage sensitive components. It ensures that both the technician and the system are at the same electrical potential. Without proper grounding, ESD events can cause immediate or latent hardware failure. More details on ESD protection are available at .
Which connector type is used for standard wired Ethernet networks?
RJ-45
HDMI
USB Type-A
RJ-11
The RJ-45 connector is used for 8P8C modular jacks on Ethernet cables, commonly employed in networking setups. RJ-11 is for telephone lines and has fewer pins. USB and HDMI connectors are unrelated to Ethernet networking. For more on Ethernet cabling, see .
Which component holds the CMOS settings such as system time and boot order?
Power supply
CMOS battery
Northbridge
CPU fan
The CMOS battery provides power to the CMOS memory, which stores BIOS settings like system time and boot sequence when the system is powered off. If it fails, settings may reset to defaults. The power supply powers all components, while CPU fan and northbridge do not store settings. More information can be found at .
What tool would you use to measure the voltage output of a power supply?
Multimeter
Crimper
Thermal probe
Oscilloscope
A multimeter measures voltage, current, and resistance, making it ideal for testing power supply outputs. An oscilloscope visualizes signal waveforms but isn't as convenient for static DC voltage checks. Thermal probes measure temperature, and crimpers attach connectors. For proper techniques, see .
Which port number is the default for HTTP traffic?
80
110
443
21
HTTP uses TCP port 80 by default for web traffic. Port 21 is for FTP, 443 is for HTTPS, and 110 is for POP3 email retrieval. Correct port assignments are critical for network configuration. More on port assignments at .
Which Windows command lists all files and directories in the current folder?
ls
dir
show
list
In Windows Command Prompt, the dir command lists files and folders in the current directory. The ls command is used in Unix/Linux shells. Other options like show or list are not valid Windows commands. For more command line usage, see .
What file extension do most Windows executable programs use?
.sh
.bin
.app
.exe
Windows executables typically have the .exe extension. Shell scripts on Linux use .sh, macOS applications may use .app, and .bin denotes binary files. Recognizing extensions helps manage files. More details at .
Which device is primarily used to convert digital documents into physical paper copies?
Router
Modem
Printer
Scanner
A printer outputs digital documents onto paper. A scanner captures physical documents into digital form. Modems and routers handle network connectivity. For printer basics, see .
Which type of RAM is most commonly used in laptop computers?
RIMM
DIMM
SO-DIMM
LRDIMM
SO-DIMM modules are smaller and designed for laptops and compact systems. DIMMs are full-sized modules for desktops, while RIMMs and LRDIMMs serve specialized or older platforms. SO-DIMM usage is standard in portable devices. More at .
What does BIOS stand for?
Basic Internet/OS Setup
Binary Integrated Operating Software
Boot Initialization Operating System
Basic Input/Output System
BIOS stands for Basic Input/Output System and initializes hardware during boot-up before handing control to the operating system. It resides in firmware on the motherboard. Modern systems may use UEFI instead. See for more.
What optical drive reads CDs and DVDs?
Optical drive
Magnetic tape drive
Solid-state drive
Floppy disk drive
An optical drive uses lasers to read and write CDs and DVDs. SSDs have no moving parts and store data electronically. Magnetic tape and floppy drives are legacy storage devices. Learn more at .
What is the maximum theoretical transfer rate of USB 2.0?
10 Gbps
5 Gbps
12 Mbps
480 Mbps
USB 2.0 supports up to 480 Mbps (High Speed). USB 1.1 was 12 Mbps, USB 3.0 supports up to 5 Gbps, and USB 3.1/3.2 go higher. Understanding USB standards is key for device compatibility. More at .
Which Windows utility is used to defragment a hard drive?
System Restore
Disk Cleanup
Disk Defragmenter
Chkdsk
Disk Defragmenter reorganizes fragmented data on mechanical drives to improve performance. Disk Cleanup removes temporary files, chkdsk checks for disk errors, and System Restore reverts system files. Details at .
What is the primary advantage of a solid-state drive (SSD) over a hard disk drive (HDD)?
Mechanical moving parts
Uses magnetic platters
Higher storage capacity per dollar
Faster read/write speeds
SSDs use flash memory to deliver much faster read/write speeds compared to HDDs, which rely on spinning platters. SSDs also have no moving parts, reducing latency and failure risk. HDDs may offer lower cost per gigabyte. For SSD fundamentals, see .
Where in the BIOS/UEFI interface would you change the boot order?
Integrated peripherals
Power management
Boot menu or Boot sequence section
Security settings
The boot order is configured under the Boot menu or Boot Sequence settings in BIOS/UEFI. This determines which device the system attempts to load the OS from first. Security, power, and peripheral sections handle different configurations. More at .
What type of cable is commonly used for POTS telephone connections?
Coaxial
HDMI
RJ-11
RJ-45
RJ-11 connectors with 2 or 4 wires are standard for Plain Old Telephone Service (POTS). RJ-45 is for Ethernet, coaxial for cable TV, and HDMI for video/audio. Telephone wiring uses smaller modular plugs. See for details.
Which RAID level provides mirroring without striping?
RAID 5
RAID 10
RAID 1
RAID 0
RAID 1 mirrors data across drives providing redundancy but no striping. RAID 0 stripes data for performance but offers no fault tolerance. RAID 5 stripes with parity, and RAID 10 combines mirroring and striping. More at .
Which Windows feature allows you to run a virtual copy of an operating system within another OS?
Disk Management
Hyper-V
Defender
BitLocker
Hyper-V is a Windows virtualization feature that lets you run virtual machines under a host OS. BitLocker encrypts drives, Defender is antivirus, and Disk Management handles partitions. Virtualization details at .
What partition style supports drives larger than 2 TB and more than four partitions?
Master Boot Record (MBR)
ext3
GUID Partition Table (GPT)
FAT32
GPT supports disks over 2 TB and allows up to 128 partitions in Windows, while MBR is limited to 2 TB and four primary partitions. FAT32 and ext3 are filesystem formats, not partition tables. For GPT info see .
Which print technology uses a heated element to transfer wax-based toner onto paper?
Inkjet
Laser
Thermal wax-transfer
Dot matrix
Thermal wax-transfer printing melts wax-based toner onto paper using heated elements. Laser printers use photoconductive drums, inkjets spray ink, and dot matrix printers strike ink ribbons. More on print technologies at .
Which command-line utility repairs corrupt Windows system files?
chkdsk /f
format
sfc /scannow
diskpart
The System File Checker (sfc /scannow) scans and repairs missing or corrupted system files. chkdsk /f fixes filesystem errors, diskpart manages partitions, and format wipes volumes. See .
Which protocol encrypts email transmissions using TLS on port 587?
SMB
SMTP submission
POP3
IMAP
SMTP submission on port 587 uses STARTTLS to encrypt email transmission. IMAP typically uses port 993 for encrypted access, POP3 uses 995, and SMB is for file sharing. More on email ports at .
What mobile OS is based on Linux and maintained by Google?
iOS
Android
Windows Phone
BlackBerry OS
Android is a Linux-based open-source mobile operating system developed by Google. iOS is based on Unix but proprietary to Apple, Windows Phone is discontinued, and BlackBerry OS is legacy. More at .
Which Windows tool would you use to encrypt an entire drive?
EFS
Disk Cleanup
BitLocker
Cipher
BitLocker encrypts entire drives at the volume level, including system and data partitions. EFS encrypts individual files/folders, Cipher manages EFS from the command line, and Disk Cleanup removes temporary files. See .
Which cable type is most appropriate for connecting a DSL modem to a phone jack?
RJ-45 to RJ-45
USB-A to USB-B
RJ-11 to RJ-11
Coaxial
DSL modems use RJ-11 connectors to connect to phone lines. RJ-45 is for Ethernet networks, coaxial for cable Internet, and USB for peripheral devices. Proper cabling ensures service compatibility. More at .
In Windows boot options, what does Safe Mode load?
Full network support only
All startup programs
Minimal drivers and services
No drivers or services
Safe Mode loads only essential system drivers and services to troubleshoot issues. Safe Mode with Networking adds network drivers, but standard Safe Mode does not. It excludes startup applications. For details, see .
Which wireless standard operates at 5 GHz only?
802.11b
802.11n
802.11a
802.11g
802.11a operates exclusively at the 5 GHz band. 802.11b/g use 2.4 GHz, and 802.11n can operate in both bands. Knowing frequency bands helps with network planning. More at .
Which component on a motherboard regulates voltage supplied to the CPU?
Voltage regulator module (VRM)
Southbridge
Northbridge
Heatsink
The VRM steps down and stabilizes voltage from the PSU to appropriate levels for the CPU. Heatsinks dissipate heat, and northbridge/southbridge handle chipset functions. VRMs are critical for CPU stability. See .
What Windows utility displays current network connections and protocol statistics?
netstat
tracert
ipconfig
ping
The netstat command shows active connections, listening ports, and protocol statistics. ipconfig displays network adapter IP info, ping tests reachability, and tracert maps the route to a host. For usage, see .
Which file system introduced journaling on Windows operating systems?
NTFS
FAT16
FAT32
exFAT
NTFS introduced journaling to track changes before committing them, reducing corruption risks. FAT16 and FAT32 lack journaling, while exFAT extends FAT for flash storage but without full journaling. More at .
What is the recommended sequence for troubleshooting a PC that fails to boot?
Check power, verify cables, reseat components, test POST
Run antivirus, defragment disk, delete temp files
Reinstall OS, update drivers, check power
Format drive, update BIOS, replace RAM
Proper PC troubleshooting starts with verifying power, cable connections, and reseating components before testing POST. Software reinstallation and driver updates come later. Randomly replacing parts without testing is inefficient. For systematic approaches, see .
Which IPv6 address type is used for communication on a single link and begins with FE80::/10?
Link-local
Loopback
Multicast
Global unicast
IPv6 link-local addresses start with FE80::/10 and are valid only on the local network segment. Global unicast addresses begin with 2000::/3, multicast with FF00::/8, and loopback is ::1. Link-local is auto-configured. Details at .
What is the primary risk if you update firmware with the wrong BIOS image?
Motherboard may become unbootable
Hard drive data gets encrypted
CPU multiplier resets
RAM speed will increase unexpectedly
Flashing BIOS with incorrect firmware can corrupt the boot firmware, rendering the motherboard unbootable. RAM speeds or CPU settings aren't directly affected by bad firmware images, and hard drive data encryption is unrelated. Always verify the correct BIOS file. More at .
Which Windows command configures a static IP address on an interface?
route add
ipconfig /static
netsh interface ip set address
ping -t
The netsh interface ip set address command assigns static IP, subnet mask, gateway, and DNS on Windows. ipconfig cannot set static addresses, route add modifies routing tables, and ping -t sends continuous pings. For syntax, see .
Which security protocol uses a ticket-based system for authenticating to network services?
Kerberos
RADIUS
OAuth
LDAP
Kerberos is a ticket-based authentication protocol used in Active Directory environments. LDAP is a directory access protocol, RADIUS is authentication/authorization for network access, and OAuth is authorization for web APIs. Kerberos overview at .
In virtual machine snapshots, what is preserved when a snapshot is created?
Only network settings
Physical host BIOS settings
Current state of the VM's disk and memory
Only disk configuration
Snapshots capture the VM's disk and memory state at a point in time, allowing rollback. They do not preserve only disk or network settings alone and do not affect the host's BIOS. Snapshots help in testing and backups. See .
Which tool would you use to capture and analyze network packets on a Windows PC?
Fiddler
PuTTY
Sysinternals Procmon
Wireshark
Wireshark is a packet analyzer that captures and examines network traffic. PuTTY is an SSH/Telnet client, Fiddler inspects HTTP traffic, and Procmon monitors system calls. Packet capture is crucial for network troubleshooting. See .
Which encryption method uses two different keys for encryption and decryption?
Symmetric encryption
Asymmetric encryption
Steganography
Hashing
Asymmetric encryption uses a public key for encryption and a private key for decryption. Symmetric encryption uses the same key for both processes. Hashing generates fixed-size digests and steganography hides data. More at .
What is the function of the southbridge chipset on a motherboard?
Control the graphics card
Store system firmware
Perform CPU arithmetic operations
Manage I/O functions like USB and audio
The southbridge handles lower-speed I/O functions such as USB, SATA, audio, and PCI slots. The northbridge controls CPU memory and graphics interfaces. CPU arithmetic is managed by the processor's ALU, and firmware is in ROM/flash. See .
Which PowerShell cmdlet retrieves detailed service status on Windows?
Get-Content
Get-Process
Get-EventLog
Get-Service
Get-Service lists Windows services and their statuses. Get-Process lists running processes, Get-EventLog accesses event logs, and Get-Content reads file contents. PowerShell cmdlets simplify system administration. More at .
Which device uses light pulses to transmit data over long distances with minimal loss?
Twisted-pair cable
USB cable
Coaxial cable
Fiber optic cable
Fiber optic cables transmit data as light pulses, enabling high-speed communication over long distances with low attenuation. Coaxial and twisted-pair cables use electrical signals and have higher loss, while USB is for short-range peripherals. For fiber optics, see .
What is the purpose of a POST card in PC troubleshooting?
Expand USB ports
Provide additional GPU output
Display error codes during Power-On Self-Test
Increase POST speed
A POST card plugs into expansion slots to display numeric or alphanumeric codes during POST, helping identify hardware failures. It does not affect boot speed, USB availability, or video output. Technicians use it for diagnosing no-boot issues. See .
Which wireless security protocol is considered deprecated due to weak encryption?
EAP-TLS
WEP
WPA2
WPA3
WEP uses weak RC4 encryption and easily cracked IVs, making it insecure. WPA2 and WPA3 use stronger AES-based encryption, and EAP-TLS is an enterprise-grade authentication method. Migration to WPA3 is recommended. More at .
A user reports intermittent boot failures after installing a new graphics card. Which diagnostic step is most effective first?
Reinstall the operating system
Change the power supply fan
Update all device drivers
Reseat the graphics card and test with onboard video
Reseating the GPU ensures proper connection, and testing with onboard video isolates the issue to the new card. Reinstalling the OS or updating all drivers is time-consuming without narrowing the cause first. Changing a fan is unrelated. For troubleshooting video issues, see .
Which scenario best describes a MTTR that you'd aim to minimize in a data center environment?
Mean Time To Respond to emails
Mean Time To Replace UPS batteries
Mean Time To Reboot a user's PC
Mean Time To Repair a failed RAID array
MTTR measures the average time to repair a failed component, such as a RAID array, minimizing downtime in critical environments. UPS battery replacement and reboot times are different metrics, and email response time is unrelated to hardware repair. Focus on rapid hardware recovery. See .
In a locked-down Windows environment, which Group Policy setting would prevent USB mass storage devices from functioning?
Turn off AutoPlay
Prevent access to drives from My Computer
Removable Disks: Deny read access
Removable Disks: Deny write access
The 'Removable Disks: Deny read access' policy prevents the OS from reading any USB mass storage data, effectively disabling the device. Denying write access still allows reads. Other policies restrict drive visuals or autoplay but do not block device usage. More at .
You need to script the deployment of Windows images using unattended XML files. Which tool generates answer files?
Sysprep
Windows System Image Manager (WSIM)
ImageX
Deployment Image Servicing and Management (DISM)
Windows System Image Manager (WSIM) creates and validates unattended answer files for Windows deployment. DISM services images, Sysprep generalizes installations, and ImageX captures WIM images. WSIM provides a GUI for XML configuration. See .
0
{"name":"What is the primary purpose of an anti-static wrist strap when servicing computer components?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the primary purpose of an anti-static wrist strap when servicing computer components?, Which connector type is used for standard wired Ethernet networks?, Which component holds the CMOS settings such as system time and boot order?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Study Outcomes

  1. Understand A+ Exam Objectives -

    Gain familiarity with the core topics of the CompTIA A+ 220-901 and 220-902 exams, including Windows OS, hardware components, and troubleshooting processes.

  2. Identify Common Windows OS Concepts -

    Recognize key Windows operating system components and features pertinent to the CompTIA A+ exam, such as file systems, command-line tools, and system utilities.

  3. Apply Troubleshooting Methodologies -

    Utilize structured troubleshooting steps to diagnose and resolve hardware, network, and software issues similar to real A+ exam scenarios.

  4. Analyze Hardware and Peripheral Problems -

    Pinpoint and differentiate between common hardware and peripheral malfunctions, and propose effective solutions based on best practices.

  5. Evaluate Network and Security Fundamentals -

    Assess basic networking and security principles, including IP addressing, protocols, and security threats, to enhance certification readiness.

  6. Assess Exam Readiness -

    Track your performance, identify knowledge gaps, and focus on areas needing improvement before taking the official CompTIA A+ certification tests.

Cheat Sheet

  1. Windows OS Installation & File Systems -

    When tackling the CompTIA A+ practice exam, understanding partition schemes (MBR vs GPT) and file systems (NTFS vs FAT32) is essential for Windows OS exam prep. Learn Disk Management GUI and Diskpart commands, plus run chkdsk /f and sfc /scannow to maintain file integrity.

  2. Networking Fundamentals & the OSI Model -

    For your CompTIA A+ 220-901 quiz, master the seven OSI layers using the mnemonic "All People Seem To Need Data Processing." Know common TCP/UDP ports (e.g., 80, 443, 53) and cable types (Cat5e vs Cat6) to ace IT certification practice test networking questions.

  3. Hardware Components & Diagnostic Tools -

    Review motherboard form factors, CPU socket types, and RAM generations (DDR3 vs DDR4) from reputable hardware guides. Practice using a multimeter to check PSU voltages (12V/5V rails) and interpret POST beep codes with a loopback plug for quick troubleshooting.

  4. Virtualization, Cloud & Mobile Device Features -

    Differentiate Type 1 hypervisors (VMware ESXi) from Type 2 (VirtualBox) and grasp cloud models (IaaS, PaaS, SaaS) as outlined by official vendor docs. Understand mobile OS quirks (iOS sandboxing vs Android fragmentation) to handle CompTIA troubleshooting questions on portable devices.

  5. Security Fundamentals & Best Practices -

    Memorize encryption standards (AES for symmetric, RSA for asymmetric) and implement the principle of least privilege in line with NIST guidelines. Recognize social engineering tactics (phishing, vishing) and configure firewalls, VPNs, and WPA2/PW3 for a robust security posture.

Powered by: Quiz Maker