Try 90 free CompTIA A+ 220-1201 questions across the exam domains, with explanations, then continue with full IT Mastery practice.
This free full-length CompTIA A+ 220-1201 practice exam includes 90 original IT Mastery questions across the exam domains.
These questions are for self-assessment. They are not official exam questions and do not imply affiliation with the exam sponsor.
Count note: this page uses the full-length practice count maintained in the Mastery exam catalog. Some certification vendors publish total questions, scored questions, duration, or unscored/pretest-item rules differently; always confirm exam-day rules with the sponsor.
Need concept review first? Read the CompTIA A+ 220-1201 Cheat Sheet on Tech Exam Lexicon, then return here for timed mocks and full IT Mastery practice.
Open the matching IT Mastery practice page for timed mocks, topic drills, progress tracking, explanations, and full practice.
Try CompTIA A+ 220-1201 on Web View full CompTIA A+ 220-1201 practice page
| Domain | Weight |
|---|---|
| Mobile Devices | 15% |
| Networking | 20% |
| Hardware | 25% |
| Virtualization and Cloud Computing | 11% |
| Hardware and Network Troubleshooting | 29% |
Use this as one diagnostic run. IT Mastery gives you timed mocks, topic drills, analytics, code-reading practice where relevant, and full practice.
Topic: Hardware
A user is moving from the United States (120V mains) to the United Kingdom (230V mains) and wants to bring a custom desktop PC. The ATX power supply has a rear red voltage selector and a label that reads “Input: 115/230VAC, 50–60Hz.” You warn the user that leaving the selector at 115V and plugging into a 230V outlet could destroy the PSU and possibly damage internal components. The user will travel back and forth and wants a safe, simple setup that does not require carrying a separate step‑down transformer. Which of the following actions will best address this issue/meet these requirements? (Select TWO.)
Options:
A. Replace the existing PSU with an auto‑ranging 100–240V unit so it can be used on either 120V or 230V mains without changing a switch.
B. Before using the PC in the U.K., move the PSU’s rear voltage selector from 115V to 230V, then plug it directly into the 230V wall outlet.
C. Leave the PSU set to 115V and plug the PC into a 230V‑to‑115V step‑down transformer whenever it is used in the U.K.
D. Set the PSU selector to 115V when in 230V countries so the PC continues to receive the same voltage it did in the U.S.
E. Use only a physical plug‑shape adapter and leave the selector at 115V, because most modern power supplies automatically adjust to higher voltage.
Correct answers: A and B
Explanation: There are two common mains voltage ranges worldwide: approximately 110–120VAC (such as in the U.S.) and 220–240VAC (such as in the U.K.). Many ATX power supplies are either manual‑switch dual‑voltage units (115/230V) or auto‑ranging 100–240V units. The PSU’s input must always match the wall voltage; otherwise, you risk destroying the power supply and possibly attached components.
For a manual‑switch PSU, setting the selector to 230V before plugging into a 230V outlet ensures the internal circuitry is configured for the higher input voltage. For frequent international travel and to reduce the chance of user error, an auto‑ranging 100–240V power supply is preferred, because it automatically handles both 110–120V and 220–240V without requiring a switch change. A simple plug adapter only changes the connector shape, not the voltage, and a step‑down transformer is explicitly excluded by the user’s requirement.
Option review:
Topic: Hardware and Network Troubleshooting
A user reports that every time they print a wide spreadsheet from Excel, the right side of the sheet is cut off. The printer’s built‑in test page prints correctly, and other users can print normally to the same printer. What should the technician do first to resolve this issue?
Options:
A. Update the printer’s firmware to the latest version
B. Change the page orientation to Landscape in the application’s Print dialog before printing
C. Replace the printer’s fuser assembly to ensure the full page is fused
D. Power cycle the printer and clear its internal memory to reset the print engine
Best answer: B
Explanation: When a printed page is cut off on one side, but the printer test page and other users’ print jobs are fine, the problem is usually with user‑level print settings in the application, not the printer hardware. Wide spreadsheets often need Landscape orientation or scaling so that the full width fits on the page.
Because only this user’s wide spreadsheet prints incorrectly, the technician should first check the orientation and page setup options in the application’s Print dialog (for example, Excel or the PDF viewer). Changing the orientation to Landscape ensures the width of the document matches the printable area, preventing the right side from being cropped.
Topic: Hardware and Network Troubleshooting
A teacher reports that the ceiling-mounted projector in a dusty classroom works for about 10–15 minutes, then the image goes black and the projector’s temperature warning light comes on before it shuts down. Brightness settings and cables have already been checked. Which of the following should the technician do NEXT?
Options:
A. Clean or replace the projector’s air filter and clear any dust from the vents following the manufacturer’s instructions
B. Adjust the projector’s keystone and focus settings
C. Replace the projector’s HDMI cable with a new high-speed cable
D. Replace the projector lamp because it is likely burnt out
Best answer: A
Explanation: The key symptom here is that the projector runs for a short time, then the image goes black, the temperature warning light comes on, and the unit shuts down. This behavior strongly indicates overheating protection, not a signal or lamp failure.
In a dusty environment, the most common cause of projector overheating is a clogged air filter and dust buildup in the cooling vents. When air cannot flow properly, internal temperatures rise, the temperature sensor trips, and the projector shuts itself off to prevent damage. The manufacturer’s recommended maintenance procedure is to periodically clean or replace the air filter and clear dust from the vents.
Because brightness and cables have already been checked and the temperature light is specifically mentioned, the best next action is to follow the vendor’s instructions to clean/replace the filter and clear the vents, restoring proper cooling airflow.
Topic: Hardware
A technician is selecting a new power supply for a 2U rack-mounted file server that must stay online even if one PSU module fails and should minimize wasted power. The available options are shown in the exhibit.
Which power supply should the technician install?
Exhibit:
| Model | Wattage (W) | Efficiency | Redundant modules | Form factor |
|---|---|---|---|---|
| RS-500 | 500 | 80 Plus Bronze | No | ATX tower |
| RS-750R-Bronze | 750 | 80 Plus Bronze | Yes | 2U rack |
| RS-650G | 650 | 80 Plus Gold | No | ATX tower |
| RS-700R-Gold | 700 | 80 Plus Gold | Yes | 2U rack |
Options:
A. Install model RS-700R-Gold.
B. Install model RS-650G.
C. Install model RS-750R-Bronze.
D. Install model RS-500.
Best answer: A
Explanation: For a critical file server, the goal is both high availability and power efficiency. The scenario states that the system must stay online even if one PSU module fails, which requires a redundant power supply, and that it should minimize wasted power, which calls for a high-efficiency (80 Plus Gold or better) unit.
In the exhibit, each PSU lists its redundancy and efficiency:
Model RS-700R-Gold is both redundant and 80 Plus Gold, and it is designed for a 2U rack, which matches the server form factor. That makes it the best choice for this scenario.
In real deployments, a server like this would use a redundant PSU cage that accepts hot-swappable modules, each fed from separate power sources where possible, to avoid downtime if one module or power feed fails.
Topic: Hardware
A café’s thermal receipt printer suddenly starts producing completely blank receipts after the manager switched to cheaper “3 in. bond paper” rolls. The printer feeds and cuts normally, and no errors appear on the POS system. What should a technician do FIRST to restore printing while keeping costs low?
Options:
A. Replace the current rolls with compatible thermal receipt paper and test printing again
B. Uninstall and reinstall the printer driver on the POS system
C. Replace the printer’s ink ribbon with a new compatible ribbon cartridge
D. Increase the printer’s darkness/contrast setting to the maximum level
Best answer: A
Explanation: Thermal receipt printers work by applying heat from the print head to special thermal paper that has a heat‑sensitive coating. When this coating is heated, it turns dark, forming text and images without any ink or toner.
If someone installs plain bond paper instead of thermal paper, the printer’s mechanics still operate: the feed assembly pulls the paper, the cutter works, and the POS thinks the job printed successfully. However, because the paper has no thermal coating, the heated head cannot make visible marks, so receipts appear completely blank.
In this scenario, the only change before the problem appeared was switching to cheaper “3 in. bond paper” rolls. This strongly indicates the wrong paper type is being used. The fastest and least expensive fix is to replace the incorrect paper with the proper thermal receipt rolls recommended by the printer vendor, then test again. This is a typical maintenance task for thermal printers: ensuring the correct paper type is installed and loaded correctly through the feed path.
Other steps like changing darkness settings, reinstalling drivers, or replacing non‑existent ribbons do not address the fundamental requirement of a thermal printer: compatible thermal media.
Topic: Networking
A remote worker currently connects a single laptop to the internet by Bluetooth tethering to a smartphone (a PAN). They now want multiple desktops, laptops, smart TVs, and a network printer throughout their house to share the same internet connection and local file sharing. To best meet this goal without unnecessary complexity, what type of network should the technician set up inside the home?
Options:
A. LAN
B. WAN
C. SAN
D. PAN
Best answer: A
Explanation: The scenario describes a user moving from a simple Bluetooth-tethered personal link (a PAN) to needing a shared home network for many devices and resources. The key requirement is to connect multiple devices within a single house so they can share an internet connection and local services like file and printer sharing.
A LAN (Local Area Network) is exactly for this purpose: it links devices in a limited geographic area—such as a home, school, or small office—using switches, routers, and often Wi-Fi access points. Setting up a home LAN (often a wired/wireless router with built-in switch and WLAN) gives all devices IP connectivity on the same local network and shared access to the ISP connection.
Other network types like PAN, WAN, and SAN either operate at a much smaller personal scope or a much larger/enterprise scope, or are specialized for storage. They do not meet the stated goal as simply and appropriately as a LAN does.
Topic: Virtualization and Cloud Computing
Which of the following statements about Infrastructure as a Service (IaaS) in cloud computing is NOT correct?
Options:
A. With IaaS, the customer typically installs, configures, and patches the guest operating systems and applications inside the virtual machines they create.
B. In an IaaS model, the cloud provider is responsible for maintaining the physical servers, storage devices, and networking hardware that host the virtual machines.
C. IaaS usually gives customers control to create, resize, and delete virtual machines on demand, similar to managing VMs on their own hypervisor server.
D. IaaS is useful when a company wants to run virtual machines in the cloud without owning or managing any operating systems or software inside those VMs.
Best answer: D
Explanation: Infrastructure as a Service (IaaS) is a cloud model where the provider owns and operates the physical infrastructure, including servers, storage, and networking. Customers rent virtual machines and related resources on top of that infrastructure.
In this model, there is a clear responsibility split:
The incorrect statement claims that IaaS lets a company avoid managing any operating systems or software inside the VMs. That description is closer to Platform as a Service (PaaS) or Software as a Service (SaaS), where the provider takes on more of the stack. In true IaaS, customers still manage their OS and applications, just not the physical hardware.
The correct statements all match how IaaS works in typical VM hosting scenarios, emphasizing that hardware responsibility shifts to the provider while OS and application management remains with the customer.
Topic: Hardware
A technician is replacing a desktop CPU cooler. They carefully clean off all old thermal paste, apply a small, thin layer of new thermal compound, and verify that case fans pull cool air in from the front and exhaust warm air out the back. Which underlying principle of CPU cooling does this practice BEST support?
Options:
A. Maximizing efficient heat transfer from the CPU to the cooler by using a proper thermal interface and directed airflow
B. Reducing electromagnetic interference (EMI) from internal components
C. Preventing logical data corruption in system memory modules
D. Increasing power supply efficiency by reducing voltage fluctuations on the rails
Best answer: A
Explanation: The scenario describes two best practices for CPU cooling: properly applying thermal paste and ensuring correct case airflow. Cleaning off old thermal compound and applying a small, even layer of new paste helps eliminate air gaps between the CPU heat spreader and the heat sink base. This improves the thermal interface so heat can move efficiently from the CPU into the cooler.
Configuring case fans so that cool air is drawn in at the front and warm air is exhausted out the back creates a consistent front‑to‑back airflow path. This helps carry the heat away from the CPU cooler and out of the case, lowering internal temperatures.
Both actions are fundamentally about maximizing efficient heat transfer away from the CPU, which is the core principle behind proper CPU cooling practice with fans, heat sinks, and thermal paste.
Topic: Networking
Which TWO of the following statements about configuring IPv4 addresses, subnet masks, and default gateways for a simple /24 SOHO network are INCORRECT? (Select TWO.)
Options:
A. On a small home network, the default gateway on client devices is normally set to the router’s LAN IP address, such as 192.168.0.1.
B. If two PCs have the same subnet mask but different default gateways, they will be unable to communicate with each other on the local network.
C. In a 192.168.0.0/24 network, both 192.168.0.25 and 192.168.0.200 can use subnet mask 255.255.255.0 and still be in the same subnet.
D. For devices to communicate directly on the same IPv4 LAN, they must be in the same IP network and typically use the same subnet mask, such as 255.255.255.0.
E. In a 192.168.1.0/24 home network where the router uses 192.168.1.1, a PC can safely use default gateway 192.168.2.1 as long as its subnet mask is 255.255.255.0.
F. In a SOHO network that uses DHCP, the DHCP server usually provides the IP address, subnet mask, and default gateway to each client automatically.
Correct answers: B and E
Explanation: In a simple SOHO network using a /24 subnet mask (255.255.255.0), all devices on the same LAN are placed in one IP network, such as 192.168.1.0/24. The valid host addresses run from .1 to .254, and devices in that range can talk directly to each other as long as their subnet mask matches the network design.
The default gateway is the IP address of the router’s LAN interface and must be in the same subnet as the clients. Clients send traffic for remote networks (such as the internet) to this default gateway. If the gateway address is on a different subnet from the client, the client has no valid next hop and off‑subnet communication fails.
In most SOHO environments, the router also acts as a DHCP server, automatically handing out the correct IP address, subnet mask, default gateway, and DNS information to both wired and wireless clients, which greatly reduces configuration errors.
Topic: Networking
Which of the following statements about Bluetooth wireless technology is NOT correct?
Options:
A. Bluetooth pairing typically involves a user confirmation step, such as entering or verifying a code, before the devices can exchange data.
B. Bluetooth is designed primarily for long‑range, high‑bandwidth networking like Wi‑Fi and typically delivers multi‑gigabit speeds over hundreds of meters.
C. Most consumer Bluetooth devices have an effective range of about 10 meters, with some newer implementations reaching roughly 100 meters in open areas.
D. Bluetooth is commonly used to connect wireless headsets, speakers, keyboards, and mice to smartphones, tablets, and computers.
Best answer: B
Explanation: Bluetooth is a short‑range wireless technology intended for personal area networks (WPANs). Typical Bluetooth ranges are around 10 m for many consumer devices, although some modern implementations and higher‑power classes can work over tens of meters or more in open space.
Data rates are modest compared to Wi‑Fi: enough for audio streaming, input devices, and basic data transfer, not multi‑gigabit throughput. Bluetooth is widely used for wireless audio (headsets, speakers) and input devices (keyboards, mice, game controllers) because it offers low power consumption and convenient pairing.
Pairing normally requires some user approval step, such as entering or confirming a code or tapping “Pair,” to establish trust and encryption between the devices. This helps prevent unauthorized connections and keeps data private on the wireless link.
Topic: Hardware and Network Troubleshooting
A user reports that an external LCD monitor connected to a desktop via HDMI has started flickering randomly. The technician observes that Windows is set to run the monitor at 1920x1080 and 144Hz, and the HDMI cable’s connector is loose where it plugs into the PC. Which of the following actions will best address this issue? (Select TWO.)
Options:
A. Replace the HDMI cable with a known-good, properly seated HDMI cable
B. Immediately replace the graphics card with a new one
C. Update the mouse and keyboard drivers to the latest versions
D. Adjust the monitor’s color temperature and contrast settings in its on-screen menu
E. Replace the desktop’s power supply with a higher-wattage unit
F. Lower the monitor’s refresh rate in the OS to the manufacturer-recommended value (for example, 60Hz)
Correct answers: A and F
Explanation: Screen flickering on an external monitor is often caused by signal integrity problems or mismatched refresh settings rather than a failed graphics card. In this scenario, two strong clues are present: the operating system is configured to drive the monitor at 144Hz even though many standard LCD office monitors are designed for 60Hz, and the HDMI connector is visibly loose.
A safe troubleshooting approach for video issues is to start with simple, reversible steps: verify the display settings (resolution and refresh rate) match the monitor’s specifications, and confirm the physical connection by reseating or replacing the video cable. Only after these checks fail should a technician suspect components like the GPU or power supply. By lowering the refresh rate to a supported value and replacing the loose HDMI cable with a known-good one, the technician addresses the two most likely root causes of the flicker without unnecessary part replacements.
Topic: Networking
A small office wants to keep guest Wi-Fi users separate from internal office PCs and printers while still allowing both groups to access the internet. They decide to use VLANs on a managed switch.
Which of the following configurations would NOT be an appropriate use of VLANs in this scenario?
Options:
A. Placing all staff desktops and the guest Wi-Fi access point on the same untagged VLAN to ‘simplify’ the network
B. Connecting staff desktops to VLAN10 and the guest Wi-Fi access point to VLAN20, then allowing only internet access from VLAN20 to the router
C. Using separate VLAN IDs for guest and staff networks on the switch and a trunk link to the router that carries both VLANs
D. Assigning the office printer only to the staff VLAN so that guest devices cannot see or print to it
Best answer: A
Explanation: Virtual LANs (VLANs) are used to logically segment network traffic on the same physical switch. In a small office, they are often used to separate internal (staff) devices from guest Wi‑Fi clients so that guests cannot access internal PCs, servers, or printers, while still allowing both groups to use the same internet connection.
The unsafe or incorrect choice in this scenario is the one that mixes guest and internal devices in the same VLAN. Doing so eliminates the logical separation that VLANs are supposed to provide, allowing guest users to potentially discover and access internal resources, which is a clear best‑practice violation for network segmentation and basic security.
Topic: Hardware and Network Troubleshooting
A small office laser printer has begun to experience frequent paper jams from Tray 1. The manufacturer recommends replacing the tray’s pickup rollers when the jam rate exceeds 1 jam per 1,500 pages printed. Over the last month, the printer’s counter shows 3,600 pages from Tray 1 and the log records 4 jams from that tray. Based on this information, which action should the technician take FIRST?
Options:
A. Switch to heavier-weight paper to help the printer grip sheets more effectively
B. Clean out paper dust from the tray and continue using the existing rollers
C. Reduce the amount of paper loaded in the tray to half of its rated capacity
D. Replace the Tray 1 pickup rollers because the jam rate is higher than the manufacturer’s limit
Best answer: D
Explanation: This question focuses on using manufacturer guidelines and simple math to decide when to replace pickup rollers to resolve paper jams. The vendor states that rollers should be replaced when the jam rate exceeds 1 jam per 1,500 pages. The technician can use the page counter and the number of jams to see if that limit has been passed.
In the scenario, the printer has printed 3,600 pages from Tray 1 and experienced 4 jams. Dividing the total pages by the number of jams gives 900 pages per jam. Because 900 pages per jam is worse than the recommended 1,500 pages per jam, the jam rate is higher than allowed. This strongly suggests worn pickup rollers, so replacing them is the appropriate first corrective action.
Cleaning, changing paper quantity, or changing paper weight might sometimes affect paper handling, but they do not match the manufacturer’s explicit replacement guideline tied to the measured jam rate in this case.
Topic: Networking
You are configuring a desktop with a static IPv4 address on this small network:
Internet --- [Router]
LAN IP: 192.168.50.1/24
The desktop’s IP address will be 192.168.50.23.
Which subnet mask and default gateway should you assign to the desktop?
Options:
A. Subnet mask 255.255.255.0, default gateway 192.168.1.1
B. Subnet mask 255.255.255.0, default gateway 192.168.50.1
C. Subnet mask 255.255.255.0, default gateway 192.168.50.255
D. Subnet mask 255.255.0.0, default gateway 192.168.50.23
Best answer: B
Explanation: The diagram shows the router’s LAN interface as 192.168.50.1/24. A /24 network corresponds to the subnet mask 255.255.255.0, so all clients on that network should use that mask to share the same subnet. In a SOHO network, the default gateway for clients is almost always the router’s IP address on the local LAN, which in this case is 192.168.50.1.
Therefore, the only combination that both matches the /24 mask and uses the router’s LAN IP as the default gateway is the choice with subnet mask 255.255.255.0 and default gateway 192.168.50.1.
Topic: Mobile Devices
Which TWO statements about connecting a USB-C docking station to a modern laptop or tablet are correct? (Select TWO.)
Options:
A. If a USB-C dock’s power connector fits, you can ignore power requirements because USB will always provide enough power for the laptop.
B. If the operating system lacks built-in support for a dock’s network or audio chipset, installing the manufacturer’s driver or app may be required for full functionality.
C. Any device with a USB-C port can automatically use every feature of any USB-C dock, regardless of hardware or OS support.
D. Some USB-C docks require the host device to support DisplayPort Alt Mode to send video to external monitors.
E. Using a simple USB-A to USB-C adapter allows an older USB-A-only laptop to gain full multi-monitor support and charging from a USB-C dock.
Correct answers: B and D
Explanation: USB-C docking stations can combine video, data, networking, and power over a single cable, but their features depend on both hardware and software support. For external monitors, many docks rely on the host device’s USB-C port supporting DisplayPort Alt Mode; without this capability, the dock cannot send video. On the software side, modern operating systems often include generic drivers for common dock functions, but some chipsets still need manufacturer drivers or companion apps for full functionality (such as Ethernet, audio, or special buttons). Power requirements also matter; a dock must provide enough wattage using USB Power Delivery or the laptop may charge slowly or not at all, even though the connector fits. Simply having a USB-C-shaped port or using passive adapters does not guarantee every advanced feature will work.
Topic: Virtualization and Cloud Computing
A small business runs over 20 virtual machines on a single host. All VM virtual disks are thin-provisioned and stored on one 2TB SSD, which also holds the host OS. Recently, storage performance has slowed and the datastore is almost full.
Which of the following actions will best address this issue/meet these requirements? (Select TWO.)
Options:
A. Take frequent snapshots of all VMs so you can revert if the datastore runs out of space.
B. Increase the number of virtual CPUs assigned to the busiest VMs.
C. Add an additional high-speed SSD and move the most disk-intensive VMs to the new datastore so fewer VMs share each physical disk.
D. Convert critical high-I/O VMs from thin-provisioned to thick-provisioned virtual disks on the host.
E. Upgrade the host’s network adapter from 1GbE to 10GbE to speed up VM traffic.
Correct answers: C and D
Explanation: When many virtual machines share a single physical disk, heavy I/O from multiple VMs can overwhelm that disk, causing high latency and slow performance. Thin provisioning lets virtual disks grow as data is written, which is convenient but can lead to oversubscription: the combined thin-provisioned sizes can exceed the physical capacity, risking a full datastore.
Adding another high-speed SSD and moving the most disk-intensive VMs to it directly reduces how many VMs compete for I/O on each disk while increasing total usable capacity. Converting key high-I/O VMs from thin to thick provisioning ensures their full disk space is reserved in advance, improving performance stability and making disk space planning more predictable.
Option review:
Topic: Networking
A small office has one managed switch and one router. The owner wants employee PCs and customer guest devices to be kept separate so guests cannot see internal resources, but there is no budget for additional switches or cabling. Which network configuration change should the technician implement to logically separate these two groups while still using the same physical switch?
Options:
A. Enable QoS on the switch to prioritize employee traffic over guest traffic
B. Move guest devices to a different Wi-Fi channel while keeping everything on the same wired network
C. Create separate VLANs on the managed switch and assign employee and guest ports to different VLAN IDs
D. Assign employee devices static IP addresses in one subnet and guest devices static IPs in a different subnet on the same switch ports
Best answer: C
Explanation: Virtual LANs (VLANs) allow a single physical switch to be divided into multiple logical networks. Each VLAN forms its own broadcast domain, so devices in one VLAN do not see broadcasts or ARP requests from another VLAN, even though they share the same switch and cabling. This is ideal for separating guest and internal traffic when additional physical switches are not an option.
In the scenario, the owner wants guest devices isolated from internal employee systems without buying more hardware. Configuring separate VLANs on the managed switch and assigning employee ports to one VLAN and guest ports (or guest SSID uplink) to another achieves this logical separation. Inter-VLAN communication can then be controlled or blocked at the router or Layer 3 device.
Other changes such as IP addressing, Wi-Fi channels, or QoS settings do not inherently create separate broadcast domains. Only VLANs provide the required logical segmentation at Layer 2 using the existing switch.
Topic: Mobile Devices
A help-desk technician is deciding which tablet accessory to recommend for different users.
Examine the following exhibit:
| User | Primary task | Main complaint | Preference/notes |
|---|---|---|---|
| Emma | Digital art and diagram drawing | Finger input feels too “sloppy” for detailed lines | Comfortable holding a pen-like tool |
| Raj | Email and web browsing with typing | On-screen keyboard is slow; wants faster typing | Prefers physical, clicky keys |
| Luis | Video calls and streaming media | Tablet battery drains too quickly | Usually taps large on-screen buttons |
Which user is the BEST candidate for a stylus accessory to improve their experience, based on the exhibit?
Options:
A. Emma
B. Luis
C. None of these users would significantly benefit from a stylus
D. Raj
Best answer: A
Explanation: A stylus is most useful when a user needs more precise control than a fingertip can provide, such as for drawing, handwritten notes, fine selections, or accessibility needs that benefit from pen-like pointing.
In the exhibit, Emma is doing digital art and diagram drawing and says that finger input feels too “sloppy” for detailed lines. A stylus mimics a pen or pencil, allowing for finer strokes, better control, and more natural drawing. This directly addresses Emma’s complaint and matches her preference for a pen-like tool.
Raj’s main concern is typing speed and a desire for physical keys, which points toward a keyboard accessory, not a stylus. Luis is worried about battery life, and a stylus will not improve power usage. Therefore, Emma is the best candidate for a stylus.
Topic: Hardware and Network Troubleshooting
A user reports that their 6-year-old desktop PC loses the correct date and time every time it is shut down. On each boot, both the UEFI/BIOS and the operating system show a default date far in the past, but the time stays accurate while the system is powered on. All other settings and hardware appear normal.
Which of the following troubleshooting actions should you AVOID in this situation? (Select TWO.)
Options:
A. Immediately replace the power supply, assuming it is failing to power the motherboard’s real-time clock.
B. Enable internet time synchronization in the operating system after manually correcting the BIOS date and time.
C. Reinstall the operating system to correct possible software corruption affecting the system clock.
D. Replace the CMOS/RTC battery on the motherboard with a new battery of the same type.
E. Consult the motherboard manual for the correct CMOS battery type and proper replacement procedure.
Correct answers: A and C
Explanation: When a PC consistently loses its date and time only when fully powered off, but keeps accurate time while running, this strongly points to a failing CMOS/RTC battery on the motherboard. The CMOS battery powers the real-time clock and stores firmware settings when AC power is removed. Replacing this small coin-cell battery is the normal corrective action.
Because the wrong date appears inside the BIOS/UEFI before the operating system even loads, the issue is not caused by OS corruption. Steps that target the operating system or unrelated hardware like the main power supply do not address the root cause and should be avoided. Safe, methodical troubleshooting focuses on the CMOS battery and follows the motherboard manufacturer’s guidance.
Topic: Hardware and Network Troubleshooting
A user’s Windows desktop randomly restarts and applications crash, especially when several programs are open. Event logs show frequent memory-related errors, and Windows Memory Diagnostic reports that “hardware problems were detected.” You have already reseated the RAM modules, but the issue continues. Which action is the BEST next step to resolve the problem?
Options:
A. Replace the installed RAM with new, compatible memory modules
B. Update the motherboard chipset and video drivers
C. Replace the power supply with a higher-wattage unit
D. Perform a clean reinstall of Windows
Best answer: A
Explanation: Random restarts and application crashes that worsen under heavier load are classic symptoms of faulty RAM, especially when combined with memory-related errors in system logs. When a tool like Windows Memory Diagnostic reports that hardware problems were detected, it means the test patterns written to and read from RAM did not match, indicating a physical memory fault.
Because the RAM modules have already been reseated and the issue persists, the next logical step is to replace the suspected bad RAM with new, compatible modules. This directly addresses the confirmed hardware problem and is a standard A+-level troubleshooting action for Domain 5: Hardware and Network Troubleshooting.
Replacing other components or reinstalling the operating system would add time and cost without targeting the clearly identified failing part, making them poor choices in this scenario.
Topic: Hardware and Network Troubleshooting
A small office uses a single cable modem/router for both wired and Wi‑Fi clients. Around midday, everyone reports that web pages and cloud apps are very slow, but performance is normal in the early morning and evening. The technician sees that one PC is continuously uploading a large cloud backup and is using nearly all available upload bandwidth. To restore acceptable performance while avoiding extra monthly cost, which action is BEST?
Options:
A. Configure the backup software on that PC to run during off-hours or limit its upload bandwidth
B. Change the wireless channel on the router to avoid interference from nearby networks
C. Replace the cable modem/router with a newer model that supports Wi‑Fi 6
D. Replace all Ethernet patch cables with Cat6 cables to increase local network speed
Best answer: A
Explanation: This scenario describes a classic case of bandwidth saturation on the internet link. The key clues are that performance is slow only during a specific busy period (midday) and the technician observes a single PC continuously uploading a large cloud backup and consuming almost all available upload bandwidth.
When one device uses most of the available bandwidth—especially upload bandwidth—other users’ traffic must compete for what remains. Web browsing and cloud apps feel slow or unresponsive because their packets are queued or dropped while the large upload is in progress.
The most effective, low-cost fix is to change the behavior of that backup job: either schedule it to run outside business hours or configure the software to limit its upload rate so there is bandwidth left over for normal user traffic. This directly reduces saturation without requiring new hardware or a more expensive internet plan.
Changing Wi‑Fi channels, replacing modems, or upgrading cables may be helpful in other scenarios, but they do not address the specific cause identified here: a single device monopolizing the WAN link with a large upload.
Topic: Hardware and Network Troubleshooting
Which of the following statements about RAID drive activity LEDs and controller alarms is NOT correct?
Options:
A. A solid amber or red LED on a RAID drive bay usually indicates a failed or offline disk that needs attention.
B. If a RAID controller’s audible alarm stops sounding, it always means the failed drive has been replaced and the array is fully rebuilt and healthy again.
C. Rapidly blinking green activity LEDs on multiple drives during heavy read/write operations can be normal behavior in a healthy RAID array.
D. A RAID controller may emit a continuous or repeating audible alarm when an array becomes degraded after a single‑disk failure.
Best answer: B
Explanation: RAID controllers and drive enclosures use status LEDs and audible alarms to signal disk and array health. A solid amber or red LED on a drive bay typically warns of a failed or offline disk, while a blinking green LED usually shows normal read/write activity. When an array becomes degraded because a drive has failed, many RAID controllers sound a repeating alarm tone to alert technicians.
However, audible alarms alone are not a guaranteed indicator of array health. Alarms can often be muted manually or disabled in settings. They may also stop sounding due to their own failure. Because of this, the absence of an alarm does not prove that a failed drive has been replaced or that a rebuild has completed. Technicians must always verify RAID status through the controller’s management interface and by checking drive LEDs and logs.
Understanding these visual and audible signals helps entry‑level technicians quickly recognize degraded arrays and failed drives so they can replace components and start rebuilds before data is lost.
Topic: Mobile Devices
Which of the following statements about securing a smartphone’s mobile hotspot is NOT correct?
Options:
A. Choosing a long, random passphrase helps protect the hotspot against unauthorized access.
B. Broadcasting an open hotspot without a password is acceptable security if you change the default SSID.
C. Using WPA2-Personal or WPA3-Personal is recommended to encrypt traffic on a mobile hotspot.
D. Including personal details such as your full name in the SSID can make it easier for attackers to target you and should be avoided.
Best answer: B
Explanation: To secure a smartphone hotspot, you should enable strong encryption (WPA2-Personal or WPA3-Personal) and protect it with a strong passphrase. The SSID should not contain personal details that identify you, and the hotspot should never be left open without a password. An open network allows anyone nearby to connect and intercept or misuse your internet connection.
The incorrect statement is the one that claims an open hotspot can be acceptable security if you only change the SSID. Changing the SSID alone does not provide any real protection; encryption and strong authentication are required.
Topic: Hardware and Network Troubleshooting
Which TWO of the following statements about basic RAID behavior and troubleshooting are NOT correct? (Select TWO.)
Options:
A. If all drives in a RAID enclosure suddenly appear offline at the same time, you should suspect the RAID controller, power, or cabling before assuming every disk has failed simultaneously.
B. If one disk in a RAID array shows a red or amber failure LED while the others show green, the most likely issue is with that single disk rather than the RAID controller.
C. A RAID 5 array can fully tolerate the simultaneous failure of two drives without any data loss.
D. A RAID array reported as “degraded” usually means one or more drives have failed but data is still accessible, often with reduced performance until the issue is fixed.
E. In a RAID 1 mirror, if one disk fails, the entire array immediately goes offline and no data is accessible until the failed disk is replaced and rebuilt.
Correct answers: C and E
Explanation: This question checks understanding of basic RAID behavior and how to interpret common RAID status conditions during troubleshooting.
Redundant RAID levels such as RAID 1 and RAID 5 are designed so that the array can continue operating, at least temporarily, when a single drive fails. In these cases, the array is typically marked as degraded but remains online, giving you time to replace the failed disk and rebuild.
RAID 1 (mirroring) keeps an exact copy of data on at least two disks; if one fails, the remaining disk still has a complete copy. RAID 5 uses striping with parity and can tolerate the loss of one disk. If more drives fail than the RAID level can handle, the array usually becomes inaccessible and data recovery becomes much harder.
When troubleshooting, technicians should pay attention to pattern clues: a single drive with a failure light usually indicates a bad disk, while all drives going offline at once suggests a shared component like the RAID controller, power feed, or backplane, rather than simultaneous drive failures.
Topic: Mobile Devices
A technician replaces the front assembly on a corporate smartphone, which includes the fingerprint reader and facial‑recognition camera. After reassembly, the device powers on normally. Which of the following actions related to these security components is NOT appropriate after this repair?
Options:
A. Return any removed biometric or NFC modules to a secure e-waste or parts-handling process instead of discarding them in regular trash.
B. Disable all lock-screen security (PIN, pattern, and biometrics) so the user cannot be locked out if the new sensors fail later.
C. Test NFC functionality near the repaired area using a known-good NFC tag or payment terminal, if the device supports NFC.
D. Ask the user to re-enroll their fingerprints and facial-recognition profile to ensure the new sensors work correctly.
Best answer: B
Explanation: Biometric sensors and NFC readers are physical security components that help protect access to a mobile device and secure functions such as payments or badge-based entry. After replacing these components, the technician should restore and verify security, not weaken it.
Disabling all lock-screen security defeats the purpose of fingerprint readers and facial recognition, which are designed to provide strong but convenient authentication in addition to a PIN or passcode. A proper repair process includes testing new hardware, confirming that security features function correctly, and handling any removed modules in a way that preserves privacy and security.
For NFC hardware, particularly when located near a replaced back cover or frame, the technician should confirm that contactless features still work. This ensures that tap-to-pay, transit cards, or badge readers continue to operate as intended after the physical repair.
Topic: Virtualization and Cloud Computing
A freelance graphic designer works on the same project files from a desktop at home and a laptop while traveling. Currently, they copy folders with a USB flash drive, which often leads to mismatched versions and occasionally overwriting newer work. The designer wants project files to stay automatically consistent on both computers and also wants the ability to roll back if a file is accidentally overwritten or corrupted. Which approach BEST meets these goals using consumer cloud storage?
Options:
A. Email a compressed copy of the project to themselves after each major edit and store all previous emails in a special “Archive” folder for later recovery if needed.
B. Create a shared network folder on the home desktop and map it as a network drive on the laptop, then disable any file history or previous version features to save disk space.
C. Continue using the USB flash drive but add a weekly calendar reminder to copy the latest project folder between computers and keep an extra backup folder on the drive.
D. Install the same cloud file-sync client on both computers and keep all project files inside its synchronized folder with version history left enabled by default.
Best answer: D
Explanation: Consumer file-synchronization services keep data consistent by maintaining a master copy of files in the cloud plus synced copies on each device. A sync client monitors the local folder for changes, uploads modified files to the cloud, and then distributes those changes to other devices signed into the same account. This provides automatic, near-real-time synchronization without manual copying.
Most cloud storage services also maintain a version history for each file. When a file is changed, the new version is stored while previous versions are kept for a period of time. If a user overwrites or corrupts a file, they can restore an earlier version from the cloud interface. When two devices change the same file before syncing, the service typically uses conflict resolution by keeping both versions, often renaming one as a conflicted copy, so data is not silently lost.
In the scenario, the designer needs both automatic consistency between devices and the ability to roll back to earlier versions. A consumer cloud sync service with version history enabled directly satisfies both needs in a simple, low-maintenance way that fits typical A+ cloud computing concepts.
Topic: Mobile Devices
A company has issued smartphones to field technicians and enrolled them in a mobile device management (MDM) system. Management wants every device to use a PIN lock and the corporate Wi‑Fi profile, and to have a ticketing app that users cannot remove. Technicians often forget to install the app or disable the PIN. Which of the following actions will best address this issue/meet these requirements? (Select TWO.)
Options:
A. Ask the mobile carrier to block data service for any device that does not have the ticketing app installed.
B. Publish the ticketing app in the MDM app catalog as a required app and configure the policy to auto‑install it and prevent uninstallation.
C. Use the MDM system to block the installation of all personal apps on the devices to keep users focused on work tasks.
D. Use the MDM system to send an email reminder telling users to install the ticketing app and enable a PIN on their own.
E. Configure an MDM device policy that enforces a screen lock PIN and automatically pushes the corporate Wi‑Fi settings to all enrolled devices.
F. Provide written instructions and require each user to sign a form stating that their device meets the company standards.
Correct answers: B and E
Explanation: Mobile device management (MDM) platforms allow administrators to centrally enforce device settings, deploy applications, and protect data on smartphones and tablets. Instead of relying on users to follow instructions, the MDM server pushes configuration profiles and app policies directly to enrolled devices.
In this scenario, the company needs three things: a mandatory PIN, consistent corporate Wi‑Fi settings, and a required ticketing app that users cannot remove. The best approach is to use MDM’s policy features to enforce the PIN and Wi‑Fi profile, and its app management features to require and lock down the ticketing app.
Actions that merely remind or instruct users, or that involve external parties like the carrier, do not provide the technical enforcement and consistency that MDM is specifically designed to deliver.
Topic: Hardware
You are building a mid-range desktop PC using a new motherboard with these memory specifications:
The customer wants at least 16GB of RAM installed and prefers to use both memory slots for dual-channel performance while staying within the motherboard limits.
You have the following RAM kits on hand. Which of the following actions will best meet these requirements? (Select TWO.)
Options:
A. Install two 16GB DDR4-2666 ECC desktop DIMMs
B. Install two 8GB DDR4-2666 non-ECC laptop SO-DIMMs
C. Install two 8GB DDR3-1600 non-ECC desktop DIMMs
D. Install two 16GB DDR4-2666 non-ECC desktop DIMMs
E. Install two 8GB DDR4-2666 non-ECC desktop DIMMs
Correct answers: D and E
Explanation: To choose compatible RAM, you must match the motherboard’s required DDR generation (DDR4), form factor (desktop DIMM), ECC type (non-ECC, unbuffered), supported speed (DDR4-2666), and stay within the capacity limits (up to 16GB per slot, 32GB total).
The scenario also requires at least 16GB total and to populate both slots for dual-channel operation. Any configuration that violates the memory type, form factor, ECC requirement, or capacity limits is not acceptable.
Per-option review:
Topic: Hardware and Network Troubleshooting
A desktop monitor includes both VGA and HDMI ports and is currently cabled to a PC using HDMI. The screen shows a “No signal” message even though the PC is on. Which monitor setting should the technician check to ensure the image appears from the HDMI cable?
Options:
A. Screen resolution
B. Color temperature
C. Input/source selection
D. Brightness level
Best answer: C
Explanation: When a monitor or projector has multiple input ports (such as HDMI and VGA), it must know which connector’s signal to display. This is controlled by the input/source selection setting, often labeled as “Input,” “Source,” or similar in the on‑screen menu or on a dedicated button. If the wrong input is selected (for example, VGA instead of HDMI), the display will typically show a “No signal” message even if the PC and cable on the other input are working correctly.
Adjusting image-related settings such as brightness, resolution, or color temperature will not resolve a situation where the display is simply listening on the wrong input port. The first step is to confirm the input/source matches the port where the video cable is connected.
Topic: Networking
A technician is configuring port-forwarding rules on a SOHO router for several commonly used services. Before saving the configuration, the technician wants to verify that none of the rules uses the wrong TCP port.
Which TWO of the following proposed rules are INCORRECT and should be fixed before they are applied? (Select TWO.)
Options:
A. Allow inbound HTTPS traffic to a secure website on TCP port 443.
B. Allow inbound FTP control connections to a file server on TCP port 21.
C. Allow inbound SSH remote administration to a Linux server on TCP port 23.
D. Allow inbound HTTP traffic to a web server on TCP port 80.
E. Allow inbound Telnet management sessions to a legacy switch on TCP port 22.
Correct answers: C and E
Explanation: This scenario tests knowledge of the default TCP ports used by common application protocols and how they are applied in firewall or port-forwarding rules.
HTTP uses TCP port 80 for unencrypted web traffic, and HTTPS uses TCP port 443 for encrypted web traffic. FTP typically uses TCP port 21 for the control (command) channel, which is what is usually specified in firewall rules. SSH uses TCP port 22 for encrypted remote administration, and Telnet uses TCP port 23 for unencrypted remote terminal sessions.
Any port-forwarding rule that maps a protocol to a port that belongs to a different protocol is misconfigured and should be corrected. In this question, the SSH rule that uses port 23 and the Telnet rule that uses port 22 both mismatch the standard defaults, making them the two incorrect rules.
Topic: Networking
A small IT shop has started making its own Cat6 patch cables for a SOHO router. Technicians currently crimp RJ45 plugs on both ends and plug the cables in; most links work, but some new cables cause intermittent connectivity. The manager wants a simple additional step that will improve reliability by verifying each custom cable’s wiring and continuity before it is installed, without changing how jacks are terminated or how the cable jacket is stripped. Which tool should the technicians add to their process?
Options:
A. Use a crimper with a stronger ratchet setting to press the RJ45 plug harder
B. Use a punchdown tool to reseat each conductor on the patch panel
C. Use a cable stripper with a tighter setting to remove more jacket before crimping
D. Use a cable tester on each finished patch cable
Best answer: D
Explanation: The scenario describes a shop that already knows how to crimp RJ45 plugs and has a mostly working network, but some newly made cables cause intermittent issues. The goal is to improve reliability by adding a quick verification step for each finished patch cable, without changing how terminations or stripping are done.
The networking tool specifically used to check completed cables for proper pinout, continuity, and often wiremap is a cable tester. Technicians plug each end of the cable into the tester, which then indicates whether all pairs are correctly wired end‑to‑end, revealing opens, shorts, and miswired pairs before the cable is put into production.
Crimpers, punchdown tools, and cable strippers are all important in building UTP cabling, but none of them actually test a finished cable. They are used during the construction of the cable or jack, not to verify its integrity afterward. Adding a cable tester step optimizes the process for reliability without adding unnecessary rework or complexity.
Topic: Hardware and Network Troubleshooting
A technician is checking a RAID 5 array during scheduled maintenance using the system’s S.M.A.R.T. utility to plan proactive drive replacements. The utility reports the following overall health:
Drive 0: GOOD
Drive 1: CAUTION
Drive 2: GOOD
Drive 3: GOOD
Based on this S.M.A.R.T. report, which action is MOST appropriate to take now?
Options:
A. Replace all four drives immediately to avoid any future failures.
B. Do nothing and wait until one of the drives actually fails before replacing any hardware.
C. Schedule a replacement for Drive 1, which is reporting a CAUTION S.M.A.R.T. status.
D. Schedule a replacement for Drive 0 because it is the first drive in the RAID array.
Best answer: C
Explanation: S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) is built into modern drives to report on their health. Many vendor utilities summarize detailed attributes into simple states such as GOOD, CAUTION/WARNING, or BAD/FAILING.
In this scenario, all drives except one show a S.M.A.R.T. status of GOOD. One drive reports CAUTION, which indicates that one or more internal health metrics are outside normal ranges and the drive has an elevated risk of failure. The key decision factor is this overall S.M.A.R.T. health state, not the drive’s position in the array, age, or other unstated characteristics.
For a RAID array, proactively replacing a drive that shows a warning can prevent an unplanned outage. Waiting until it fails creates unnecessary risk, especially in arrays where a second failure during rebuild would cause data loss. Therefore, the best action is to schedule a replacement for the drive with the CAUTION status while the array is still healthy and redundant.
Topic: Networking
A small warehouse is switching from manual barcode scans to a passive RFID system for inventory management. Each RFID reader gate can reliably read about 180 tagged boxes per minute as carts pass through. A shipment arrives with 2,700 tagged boxes that must all be read by a single gate. Approximately how many minutes should the manager plan for the RFID gate to read all the tags? (Round up to the next whole minute.)
Options:
A. 15 minutes
B. 10 minutes
C. 12 minutes
D. 18 minutes
Best answer: A
Explanation: RFID is commonly used for automated inventory management because passive RFID tags can be read quickly and without direct line-of-sight as items move past a fixed reader. In this scenario, the warehouse is using a passive RFID gate to read tags on boxes passing through.
To estimate the time, you compare the number of items to the reader’s throughput. The gate reads 180 boxes per minute, and there are 2,700 tagged boxes. When you divide 2,700 boxes by 180 boxes per minute, you get 15 minutes. Because the question already asks to round up to the next whole minute and the result is exactly a whole number, the answer remains 15 minutes.
Topic: Networking
A user cannot connect to a Windows system using Remote Desktop from outside the office. The firewall administrator confirms that the firewall is blocking the default Remote Desktop Protocol port. Which TCP port should be allowed to restore RDP access?
Options:
A. TCP 21
B. TCP 80
C. TCP 3389
D. TCP 22
Best answer: C
Explanation: Remote Desktop Protocol (RDP) uses TCP port 3389 by default, so if Remote Desktop connections are being blocked at a firewall, the technician must ensure that TCP 3389 is allowed through. A common confusion is with TCP 22, which is also used for remote access but specifically for SSH, not Windows RDP.
Topic: Networking
A technician is configuring a firewall and needs to allow remote encrypted command-line access to several Linux servers over their default TCP port. Which application protocol should be permitted through the firewall?
Options:
A. HTTPS
B. SSH
C. Telnet
D. HTTP
Best answer: B
Explanation: The scenario describes remote encrypted command-line access using the default TCP port. This is the standard use case for SSH (Secure Shell).
SSH is designed to replace older, insecure remote-access protocols like Telnet by providing encryption for credentials and session data. By convention, SSH servers listen on TCP port 22 unless explicitly configured otherwise. When configuring a firewall, an administrator typically allows inbound TCP 22 to enable SSH access to Linux or other SSH-capable systems.
The other listed protocols either use different default ports or serve different purposes (web browsing or unencrypted remote access), so they do not match the requirement in the stem.
Topic: Hardware and Network Troubleshooting
A small office file server uses a 4-disk hardware RAID 5 array. Users can still access files, but the RAID controller has begun emitting a continuous audible alarm, and one drive’s activity LED is solid amber while the others are green. The technician wants to restore full redundancy while minimizing downtime and risk to current data. Which of the following is the BEST action?
Options:
A. Immediately power down the server, remove all four drives, and test them individually in another system.
B. Use the RAID controller utility to mute the alarm and continue normal operations until the next scheduled maintenance window.
C. Hot-swap the failed drive with a new drive of equal or larger capacity and allow the RAID controller to rebuild the array.
D. Disable RAID in the controller BIOS and convert the disks to individual volumes to prevent future array failures.
Best answer: C
Explanation: In a hardware RAID array, drive status LEDs and controller alarms are key indicators of array health. A continuous alarm combined with a single solid amber (or red) drive LED typically means one drive has failed, while the others remain healthy and the array is in a degraded but still operational state.
In a RAID 5 configuration, the array can survive a single disk failure and continue serving data using parity, but it is vulnerable: a second disk failure will cause data loss. The priority is to replace the failed disk as soon as practical and allow the controller to rebuild the array, restoring full redundancy.
Hot-swapping the failed drive with a compatible replacement (same or greater capacity, same interface) while the system stays online is a standard, safe procedure on RAID controllers and drive bays that support hot-swap. This approach restores redundancy, minimizes downtime, and protects current data, which matches the goals in the scenario.
Topic: Hardware
A technician has just installed a new CPU on an office desktop. The system powers on, but within a minute the CPU temperature reaches 95°C and the PC shuts down to protect the hardware. The technician notices a thick, uneven layer of thermal paste between the CPU and the heat sink, but the user wants a quick, low-cost fix without changing major components. Which action should the technician take next to BEST resolve this issue?
Options:
A. Increase the CPU fan speed in firmware to run at maximum at all times
B. Remove the heat sink, clean off the old paste, apply a thin pea‑sized amount of new thermal paste, and firmly reseat the heat sink
C. Add an additional case fan to increase overall airflow inside the chassis
D. Install a liquid cooling system to handle the higher CPU temperature
Best answer: B
Explanation: The scenario describes a new CPU installation where the system quickly overheats and shuts down. The key clue is the thick, uneven layer of thermal paste observed between the CPU and the heat sink.
Thermal paste is designed to fill microscopic gaps between the CPU heat spreader and the heat sink, improving thermal conduction. It should be applied in a very thin, even layer—typically a small pea‑sized dot or thin line that spreads when the heat sink is clamped down. Too much paste can act as an insulator and prevent proper metal‑to‑metal contact, causing high temperatures and thermal shutdowns.
Because the user wants a quick, low‑cost fix and the primary symptom points to poor thermal contact, the best next step is to remove the cooler, clean both surfaces with appropriate cleaning materials (such as isopropyl alcohol and a lint‑free cloth), apply a small, even amount of new paste, and reseat the heat sink firmly. This directly addresses the real problem without replacing components.
Topic: Hardware and Network Troubleshooting
Which of the following statements about troubleshooting hard drive failures is NOT correct?
Options:
A. Intermittent read/write errors and increasing bad sectors can indicate a failing hard disk that may soon suffer data loss.
B. If a drive shows frequent S.M.A.R.T. warnings, running repeated full-format operations is a good way to repair the disk and make it reliable again.
C. Replacing a loose or damaged SATA data cable can sometimes fix an internal drive that is only detected by the system intermittently.
D. S.M.A.R.T. warnings are a sign that a drive may soon fail, so important data should be backed up as soon as possible.
Best answer: B
Explanation: S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) is built into modern drives to report health information and predict failures. When a drive begins to show S.M.A.R.T. warnings, intermittent read/write errors, or growing numbers of bad sectors, it is at significant risk of data loss.
The correct response is to immediately back up important data and plan to replace the drive. While bad cables and loose connections can cause intermittent detection problems, you should never rely on repeated full-format operations to make a failing drive reliable again. Formatting does not repair worn-out media, failing heads, or internal electronics; it can actually accelerate failure by forcing more reads and writes on an already unstable drive.
Topic: Hardware
Which statement BEST describes a key advantage of a modular power supply compared to a non‑modular power supply in a desktop PC?
Options:
A. It delivers more stable voltages to the motherboard and components than non‑modular models.
B. It uses significantly less AC power from the wall than a non‑modular power supply at the same load.
C. It always provides higher wattage output than a non‑modular power supply of the same size.
D. You can connect only the needed power cables, improving cable management and airflow inside the case.
Best answer: D
Explanation: A modular power supply has detachable cables so you only install the ones your build actually needs. This reduces unused cable clutter, which improves cable management, helps airflow through the case, and makes it easier to build and maintain the PC because cables can be added or removed without fighting a tangle of unused leads.
In contrast, a non‑modular power supply has all cables permanently attached. This often leaves extra, unused cables that must be tied up or hidden, making the case more crowded and potentially impeding airflow, especially in smaller cases.
Topic: Hardware and Network Troubleshooting
A home user reports that web pages often stop loading for a few minutes, but their PC still shows a valid IP address and can successfully ping the default gateway (the router). The technician wants to determine whether the outage is on the ISP side or limited to the local network. Which test should the technician perform NEXT to make this distinction?
Options:
A. Ping the loopback address 127.0.0.1
B. Ping a well-known public IP address on the Internet (for example, 8.8.8.8)
C. Release and renew the DHCP lease on the PC
D. Open the router’s web administration page on 192.168.x.x
Best answer: B
Explanation: When troubleshooting intermittent Internet connectivity, a technician should isolate whether the problem lies on the local network (PC, switch, Wi-Fi, router) or beyond it (ISP or wider Internet). A common stepwise method is:
In this scenario, the PC already has a valid IP and can ping the default gateway, which confirms that the local IP stack and basic LAN connectivity to the router are working. The next discriminating test is to see whether traffic can successfully leave the local network. Pinging a well-known public IP address such as 8.8.8.8 checks connectivity through the ISP into the Internet without relying on DNS.
If the ping to the public IP fails while the gateway ping succeeds, the issue is likely with the ISP or further upstream. If both pings succeed but web browsing still fails, the problem may be with DNS or the browser, not with basic network connectivity.
Topic: Hardware
Which TWO statements about DIMM and SODIMM RAM form factors are correct? (Select TWO.)
Options:
A. DIMM modules are used only in servers and never in consumer desktop PCs.
B. Laptops and many small form factor systems typically use SODIMM modules to save space.
C. Desktop motherboards commonly use full‑size DIMM modules for system memory.
D. SODIMM modules are physically longer than DIMMs but use fewer pins.
E. Laptops generally use full‑size DIMMs because they are cheaper than SODIMMs.
Correct answers: B and C
Explanation: DIMM (Dual Inline Memory Module) is the full‑size RAM form factor commonly found in desktop PCs, while SODIMM (Small Outline DIMM) is a more compact version designed primarily for laptops and other space‑constrained systems. The physical size difference is the main reason different systems favor one over the other, even though both serve the same purpose of providing system memory.
Topic: Virtualization and Cloud Computing
Which of the following statements about using virtualization to support legacy operating systems and applications is NOT correct?
Options:
A. Virtualization lets you create snapshots of a legacy virtual machine so you can quickly roll back if an update or configuration change breaks an old application.
B. You can install an older operating system inside a virtual machine on a modern host to run legacy applications that no longer work on the current host OS.
C. Virtualization guarantees that any very old operating system will have full driver support for all modern hardware because the guest OS directly uses the host’s physical device drivers.
D. A legacy operating system in a virtual machine can be configured with limited or no network access, which can reduce security risks compared to installing it directly on hardware.
Best answer: C
Explanation: Virtualization allows a modern computer to run one or more additional operating systems as virtual machines (VMs). This is especially useful for legacy support: older operating systems and their applications can continue to run inside a VM even when the host hardware and host OS have moved on.
In a typical setup, the hypervisor presents standard virtual hardware (such as a virtual NIC, virtual disk controller, and virtual display adapter) to the guest OS. This means the guest does not need drivers for every new physical device; it only needs drivers for the virtualized devices that the hypervisor emulates. However, this does not guarantee that any legacy OS will work perfectly—some very old systems may still not support the hypervisor’s virtual hardware or may have other compatibility limitations.
Virtualization also offers management and safety benefits, such as snapshots to capture a working state of a legacy environment and isolated networking to reduce the risk posed by outdated, unpatched systems. These features make virtualization an effective solution for maintaining access to critical legacy applications while running on modern platforms.
Topic: Hardware and Network Troubleshooting
Which command-line tool should a technician use first to verify basic network connectivity to a network printer by its IP address?
Options:
A. ping
B. ipconfig
C. netstat
D. nslookup
Best answer: A
Explanation: To troubleshoot a network printer that may be offline or unreachable, a technician should first verify basic IP connectivity. The standard tool for this is ping, which uses ICMP echo requests and replies to check whether a device at a given IP address can be reached over the network.
If the printer responds to ping, the technician knows there is at least basic layer 3 connectivity between the computer and the printer, and can then proceed to higher-level checks, such as print spooler status, drivers, or application issues. If ping fails, the technician can focus on network issues such as cabling, Wi‑Fi connectivity, IP configuration, or the printer being powered off.
Other commands like ipconfig, netstat, and nslookup provide useful network information but do not directly confirm that a specific printer IP is reachable in the same simple way that ping does.
Topic: Hardware
A technician is building a custom PC and has several CPUs and motherboards available from both Intel and AMD. The customer wants the most reliable build, with no risk of damaging components due to socket incompatibility.
Which of the following actions related to CPU socket compatibility should you AVOID? (Select TWO.)
Options:
A. Applying extra force to seat a CPU when it does not drop easily into the socket’s keyed orientation
B. Selecting an AMD CPU for an Intel motherboard because the pin count appears similar to the board’s LGA socket
C. Verifying that the CPU model is listed as supported for that exact motherboard socket in the manufacturer’s documentation
D. Choosing a CPU that matches the exact socket name (for example, selecting a CPU specified for that motherboard’s socket type)
E. Updating the motherboard’s UEFI/BIOS when recommended by the manufacturer to add support for newer CPUs that use the same socket
Correct answers: A and B
Explanation: CPU sockets determine both the physical and electrical compatibility between a CPU and a motherboard. Even if two CPUs or sockets look similar or share a pin count, only a CPU specifically designed for a particular socket type should be installed in that socket. For modern systems, Intel and AMD use different socket families and are not interchangeable. Additionally, a correctly matched CPU should simply drop into the socket when aligned; forcing it can cause permanent damage.
Good installation practice involves matching the exact socket name, checking the motherboard’s CPU support list, and updating firmware only as recommended by the manufacturer. Unsafe practices include mixing CPU families across incompatible sockets and using excessive force when seating a processor.
Topic: Virtualization and Cloud Computing
A small company uses an older, locally installed office suite on each Windows PC. Users often report they cannot open files sent from partners who use newer versions, and the IT technician spends a lot of time installing patches and upgrades on individual systems. Management wants users to access the office apps from anywhere over the Internet, without needing full installs or manual updates on each PC. Which solution should the technician recommend?
Options:
A. Deploy a virtual machine in the office with an office suite and require all users to remote into it
B. Migrate to a subscription-based SaaS office suite accessed through a web browser
C. Move all documents into a cloud file storage service but continue using the existing office suite locally
D. Purchase the latest perpetual-license office suite and install it on every workstation
Best answer: B
Explanation: This scenario describes a company struggling with locally installed office software: compatibility issues with newer file formats and significant time spent patching and upgrading multiple PCs. Management specifically wants users to access full office applications over the Internet with minimal local installation and maintenance.
Software as a Service (SaaS) is designed for this use case. With SaaS, the vendor hosts and maintains the complete application in the cloud. Users typically access it via a web browser or lightweight client, and the organization pays a subscription fee instead of buying and installing software on each device. Updates, security patches, and new features are handled by the provider, greatly reducing local management overhead.
A subscription-based SaaS office suite (such as a web-based email and office suite platform) addresses both key needs: up-to-date applications with current file format support and minimal local deployment, since most functionality runs in the cloud.
Topic: Mobile Devices
A company issues smartphones to employees and wants to enforce a screen lock PIN, push standardized Wi‑Fi and email settings, deploy a required suite of business apps, and remotely wipe any lost devices. Which practice BEST meets these requirements?
Options:
A. Using a virtual private network for all remote connections
B. Syncing documents through a cloud-based file sharing service
C. Implementing mobile device management with centrally enforced policies
D. Requiring users to manually configure their own devices from written guidelines
Best answer: C
Explanation: The scenario describes several centralized controls over company smartphones: enforcing a screen lock PIN, pushing consistent Wi‑Fi and email settings, deploying a standard set of business apps, and remotely wiping lost devices. These are all classic capabilities of mobile device management (MDM).
An MDM solution allows IT to enroll mobile devices and then remotely push configuration profiles, security policies, and app installations from a central console. It can also track, lock, or wipe devices if they are lost or stolen, helping protect company data and maintain consistent configurations across the fleet.
Other technologies mentioned, such as VPNs and cloud file sharing, solve different problems (secure connectivity or data sync) and do not inherently provide the configuration enforcement and remote management described in the scenario.
Topic: Mobile Devices
A user connects a USB microphone to a Windows 11 laptop using a USB‑C to USB‑A adapter. In Windows Sound settings, the “USB Microphone” appears and the input level meter moves when the user speaks, but in a video conferencing app other participants still cannot hear them. The user has already reinstalled the microphone driver and restarted the app. Which of the following is the BEST next step to resolve the issue?
Options:
A. Open the conferencing app’s audio settings and select the USB microphone as the input device
B. Disable the laptop’s internal microphone in Device Manager so only the USB microphone is available
C. Replace the USB‑C to USB‑A adapter with a Thunderbolt dock to increase bandwidth
D. Run the Windows audio troubleshooter to repair corrupted system audio drivers
Best answer: A
Explanation: This scenario tests understanding of how external USB audio devices, such as microphones, interact with both the operating system and individual applications.
Because Windows Sound settings show the USB microphone and the input level meter responds to speech, the USB connection and driver installation are already working correctly. This confirms the OS is receiving audio from the external microphone.
Many communication and recording applications maintain their own audio device settings that can be different from the system default. If an app is still configured to use the built‑in laptop microphone or an old device, it will ignore the external USB microphone even when the OS sees it. The correct next step is to open the conferencing app’s audio settings and select the USB microphone as the input device.
This aligns with common real‑world issues where external webcams and microphones connect over USB or USB‑C without problems at the OS level, but the user must still select the correct input in each application they use.
Topic: Networking
Which type of Internet connection typically offers relatively high download speeds but has the highest latency due to the long distance signals must travel between the user and the provider?
Options:
A. Satellite
B. Fiber
C. Cable
D. DSL
Best answer: A
Explanation: Satellite Internet connections work by sending data from the user’s dish to a satellite orbiting the Earth and then down to the provider’s ground station (and back again). Even though the signal travels at the speed of light, the long round-trip distance to orbit adds a significant delay, which shows up as high latency.
By contrast, fiber, cable, and DSL are all terrestrial technologies that send signals over cables laid on or under the ground. The physical distance to the provider is much shorter, so the propagation delay is much smaller. As a result, their latency is usually far lower than that of satellite links, even if their raw download speeds may be similar or lower.
For CompTIA A+ Core 1, you should remember that satellite is associated with high latency, while fiber is low-latency and high-speed, and cable/DSL sit in the middle for both speed and latency.
Topic: Virtualization and Cloud Computing
Which of the following statements about cloud elasticity and on‑demand scalability is NOT correct?
Options:
A. Cloud platforms often support automatic scaling rules that react to metrics such as CPU load or request rate.
B. On‑demand scalability lets an organization quickly add computing capacity without purchasing and installing new physical servers.
C. Elastic cloud resources can automatically increase during busy periods and decrease when demand falls.
D. Elasticity means that once cloud resources are allocated, they remain fixed and cannot be reduced again without downtime.
Best answer: D
Explanation: Elasticity and on‑demand scalability are core characteristics of cloud computing. Elasticity means resources can automatically expand and contract as workload demand changes. On‑demand scalability allows customers to quickly increase (and often decrease) capacity without buying and installing new hardware.
The incorrect statement claims that once resources are allocated, they are fixed and cannot be reduced without downtime. That is the opposite of elasticity. In reality, a key benefit of cloud elasticity is the ability to remove capacity when it is no longer needed, often automatically and without interrupting service, which helps control cost and maintain performance.
The other statements correctly describe automatic scaling up and down, rapid capacity increases without new physical servers, and autoscaling rules based on metrics like CPU usage or request rates.
Topic: Hardware
A technician is unboxing a new networked multifunction printer for a small office. The manager wants it placed somewhere out of the way but still powered properly and easy to service. Which TWO placement choices should the technician AVOID? (Select TWO.)
Options:
A. Positioning the printer on a stable table near users, with clear space for input and output trays to open fully
B. Placing the printer on the floor next to an area where employees cut and sand wood to keep it away from desks
C. Placing the printer at about waist height in an open hallway near a network jack, with enough clearance behind it for technicians
D. Connecting the printer to a properly grounded wall outlet or surge protector shared with typical office equipment
E. Installing the printer in a small storage closet with the door normally closed so that fan noise does not bother staff
Correct answers: B and E
Explanation: When deploying a new printer or multifunction device, the technician must consider more than just where there is empty space. Good placement includes a stable surface, proper power, adequate ventilation, and easy access to paper trays and service panels. Poor placement can lead to overheating, excess dust intake, and difficulty performing routine maintenance.
Putting a printer on the floor next to an area where employees cut and sand wood exposes it to significant dust and debris. Dust can be pulled into the printer’s vents and paper path, causing paper feed problems, dirty rollers, and premature hardware failure. This is exactly the type of dusty location that should be avoided.
Installing the printer in a small storage closet with the door usually closed restricts airflow and traps heat from the printer’s internal components. Multifunction devices generate heat and rely on air circulation around their vents. A cramped, closed closet can cause overheating and also makes it inconvenient to reach trays, doors, and panels for loading paper, clearing jams, and servicing.
In contrast, placing the printer on a stable table at waist height in an open area with enough room for trays to extend, using a grounded outlet or surge protector, and ensuring clearance behind the device for service are all examples of appropriate, manufacturer-aligned placement practices.
Topic: Mobile Devices
Which TWO of the following statements about troubleshooting Bluetooth connection issues are INCORRECT? (Select TWO.)
Options:
A. Verifying that Bluetooth is enabled and that the device is not in airplane mode is a good first step.
B. Removing an existing Bluetooth pairing and then re-pairing the devices can resolve some connection problems.
C. Moving the Bluetooth devices closer together can help resolve intermittent disconnects.
D. If a Bluetooth pairing fails, repeatedly entering random PIN codes can eventually force a successful connection.
E. Bluetooth devices will always connect successfully, even if one of them is powered off or has shut down due to a low battery.
Correct answers: D and E
Explanation: Bluetooth connectivity issues are often caused by simple factors such as distance, power state, radio settings, and pairing information. Because Bluetooth is low-power and short-range, technicians should first verify that both devices are powered on, have sufficient battery, and are within range. They should also confirm that Bluetooth is enabled, airplane mode is off, and that there are no corrupted or conflicting pairings.
Randomly guessing PIN codes or assuming that devices can connect while powered off contradicts how Bluetooth works and may even cause temporary lockouts. Instead, technicians should use the correct PIN or pairing confirmation method and, if necessary, remove and recreate the pairing to clear any stored errors.
Topic: Hardware
A freelance photographer is buying a new monitor and setting up a workspace for photo and video editing where color accuracy is critical. Which of the following practices should the photographer AVOID to maintain accurate color on screen? (Select TWO.)
Options:
A. Choose the lowest-cost office monitor even if it has a much smaller color gamut than sRGB, focusing only on price
B. Use a hardware or software color calibration tool and set the monitor to a neutral, color-accurate mode
C. Use the monitor’s “vivid” or “game” mode with extremely saturated colors and skip any calibration or color-accurate mode
D. Work in color-managed editing software and export web images in sRGB after checking how they look on the calibrated display
E. Select a wide-gamut IPS monitor that can display a much larger range of colors than basic office displays
Correct answers: A and C
Explanation: Color gamut is the range of colors a display can produce. A wider gamut means the monitor can show more distinct colors, which is especially important for tasks like photo editing, video production, and graphic design where small color differences matter.
For creative professionals, using a narrow-gamut office monitor makes it impossible to see many of the colors in the original content. This can cause dull, inaccurate previews and edits that do not match how the work will look on better displays or in print. Similarly, using exaggerated “vivid” or “game” modes without calibration makes colors look flashy rather than accurate, which defeats the purpose of careful color correction.
Good practices center on choosing a wide-gamut, color-accurate display, calibrating it, and using color-managed software. These steps help ensure that what you see on screen is a reliable representation of the actual image or video data.
Topic: Hardware
A user brings in a tablet with a cracked front glass. The image is bright and sharp everywhere, but touch input only works on part of the screen and sometimes registers taps in the wrong spot. The technician wants to restore full touch function while reusing the existing display panel and keeping parts cost low. Which component should the technician replace?
Options:
A. The entire LCD/OLED display panel while leaving the digitizer in place
B. The graphics adapter or display driver software to correct image rendering
C. The touch screen digitizer layer that sits in front of the LCD/OLED panel
D. The tablet’s battery to provide more stable power to the display
Best answer: C
Explanation: A touch screen assembly typically has two main layers: a display panel (LCD or OLED) that produces the visible image, and a digitizer layer that sits in front of it and senses touch input. The digitizer converts finger or stylus contact into electrical signals that the device interprets as taps, swipes, and gestures.
In this scenario, the tablet still shows a bright, sharp image, which means the underlying LCD/OLED panel is functioning correctly. The problems are with touch detection: portions of the screen do not respond, and taps register in the wrong locations. Those are classic symptoms of a damaged or failing digitizer, especially when the front glass is cracked.
Because the goal is to restore touch while reusing the existing display panel and keeping parts cost low, the best choice is to replace only the touch screen digitizer layer. This preserves the good LCD/OLED panel and directly targets the component responsible for touch input.
When a digitizer fails, common symptoms include:
By contrast, when the LCD/OLED panel fails, you usually see visual issues such as no image, lines, discoloration, or dead pixels, regardless of touch behavior.
Topic: Hardware and Network Troubleshooting
A user reports that their Windows laptop becomes very sluggish whenever several browser tabs and an office suite are open at the same time. A technician checks a generic system performance monitor and sees the following:
| Resource | Usage |
|---|---|
| CPU | 22% |
| Memory | 96% |
| Disk | 8% |
| Network | 4% |
Based on this information, which of the following is the MOST likely cause of the sluggish performance?
Options:
A. Network congestion is saturating the connection and slowing the computer
B. The system has insufficient RAM for the current workload, causing high memory usage
C. A failing hard drive is causing excessive disk activity
D. The CPU is overloaded and needs to be upgraded
Best answer: B
Explanation: The key to this scenario is interpreting the simple resource-monitor style output. Only one resource is close to fully utilized: memory at 96%. CPU, disk, and network all show low usage.
When RAM is nearly full, the operating system has to move data between RAM and disk (paging or swapping). This is much slower than working entirely in RAM and results in noticeable lag when switching between applications, opening new tabs, or loading additional data.
Since the user becomes slow specifically when multiple applications and browser tabs are open, and the monitor shows very high memory usage but low CPU, disk, and network utilization, the most likely cause is insufficient RAM for the current workload (or too many memory-hungry programs running at once).
Topic: Hardware and Network Troubleshooting
A small office reports that VoIP calls sound choppy and cut in and out, especially during the evening. You capture WAN usage statistics while a call is in progress.
Exhibit:
| Metric | Value |
|---|---|
| WAN uplink capacity | 10 Mbps |
| Total current uplink usage | 9.5 Mbps |
| VoIP traffic (RTP/SIP) | 0.3 Mbps |
| Cloud backup traffic | 7.8 Mbps |
| Web and other traffic | 1.4 Mbps |
Based only on the information in the exhibit, which action would be the BEST next step to improve VoIP call quality?
Options:
A. Move the VoIP phones to a different Ethernet switch separate from the backup server.
B. Configure QoS on the WAN router to prioritize VoIP traffic over cloud backup traffic.
C. Lower the handset speaker volume on the VoIP phones to reduce audio distortion.
D. Replace all VoIP phones with newer models that support wideband codecs.
Best answer: B
Explanation: The exhibit shows a 10Mbps WAN uplink with 9.5Mbps currently in use. Most of this is consumed by cloud backup traffic (7.8Mbps), while VoIP traffic uses only 0.3Mbps. This indicates the link is heavily congested and that large, non-real-time traffic is competing with delay-sensitive voice packets.
VoIP traffic is highly sensitive to latency, jitter, and packet loss, which all increase when a link is saturated. Quality of Service (QoS) is specifically designed to handle this situation by classifying and prioritizing voice packets above bulk data, such as backups. When the link is congested, QoS ensures voice traffic is forwarded first, reducing jitter and dropped packets for calls.
Other options that focus on hardware changes, switch layout, or handset volume do not address the clear congestion shown in the exhibit and therefore will not resolve the choppy call quality problem in this scenario.
Topic: Hardware
A technician is selecting a single hard disk drive for a small-form-factor desktop that only has 2.5-inch bays. The user needs at least 1.5TB of storage and wants the best possible HDD performance. The shop has these drives in stock:
| Drive | Form factor | RPM | Capacity |
|---|---|---|---|
| W | 2.5" | 5,400 | 1TB |
| X | 2.5" | 7,200 | 2TB |
| Y | 3.5" | 5,400 | 2TB |
| Z | 3.5" | 7,200 | 1TB |
Which drive should the technician install to best meet the requirements?
Options:
A. Drive Y (3.5-inch, 5,400RPM, 2TB)
B. Drive Z (3.5-inch, 7,200RPM, 1TB)
C. Drive W (2.5-inch, 5,400RPM, 1TB)
D. Drive X (2.5-inch, 7,200RPM, 2TB)
Best answer: D
Explanation: The system only supports 2.5-inch drives, so the 3.5-inch options cannot be used. That immediately rules out the 3.5-inch drives. Among the 2.5-inch drives, the user needs at least 1.5TB of storage, so only the 2TB model satisfies the capacity requirement.
Between the remaining choices, a 7,200RPM HDD generally offers better performance than a 5,400RPM HDD because the faster spindle speed reduces average seek and access times and improves sequential transfer rates. Therefore, the 2.5-inch, 7,200RPM, 2TB drive is the best match for both capacity and performance in this scenario.
Topic: Networking
A 10-person design studio currently uses a low-bandwidth DSL connection for cloud backups and daily video meetings. Backups of large project files often run all night, and video calls are frequently choppy due to limited upload speed and high utilization. Several providers now offer different WAN options in their building. They want significantly higher bandwidth and lower latency with a fixed, always-on connection and predictable monthly cost. Which internet connection type would BEST meet these needs?
Options:
A. Switch to a consumer satellite internet service
B. Upgrade to a fiber-optic internet service from the local provider
C. Use a 5G cellular hotspot as the primary internet connection
D. Keep the existing DSL line and reschedule backups to run overnight
Best answer: B
Explanation: This scenario focuses on selecting the most appropriate WAN connection type based on bandwidth, latency, and reliability requirements for a small office. A 10-person design studio needs to move large files to the cloud and support frequent video meetings. These activities demand higher upload bandwidth and low latency.
Fiber-optic internet is designed to provide very high throughput (both download and upload) with low latency over a stable, wired connection. It is well-suited for cloud backup traffic and real-time applications such as video conferencing and VoIP. It is also typically billed as a fixed monthly service, which satisfies the requirement for predictable cost.
In contrast, satellite and cellular connections often have higher latency, usage limits, or variability in performance, making them less suitable as a primary business-grade connection when heavy, regular data transfers and video calls are required. Simply changing when backups run does not resolve the fundamental bandwidth and latency limitations of the existing DSL service.
Topic: Networking
A home office already has an Internet gateway/router that provides enough wired Ethernet ports, but Wi‑Fi coverage is weak at the far end of the house where users need to connect laptops and smartphones. The cabling to that area is already in place. Which device should the technician install at the far end of the house to meet this requirement?
Options:
A. A cable modem with more Ethernet ports in place of the router
B. A second SOHO router with its own DHCP and NAT enabled
C. A standalone wireless access point connected back to the router
D. An unmanaged Ethernet switch connected to the existing router
Best answer: C
Explanation: In a SOHO network, different devices serve distinct roles. A router connects the local network to the Internet and typically performs NAT, DHCP, and basic firewall functions. A switch connects multiple wired devices within the same local network. A wireless access point (AP) bridges wired and wireless segments, allowing Wi‑Fi clients to join the existing wired LAN.
In this scenario, the wired side of the network is already sufficient, and the router is in place and functioning. The single requirement is to improve wireless coverage at the far end of the house, where Ethernet cabling already exists. The deciding attribute is therefore the ability to provide wireless connectivity while attaching to the existing wired network.
A standalone wireless access point fulfills exactly this role: it connects by Ethernet to the router and creates a Wi‑Fi cell in that area, extending coverage without introducing a new subnet or extra routing complexity.
Topic: Mobile Devices
A graphic designer uses a 10-inch tablet and wants quick access to 120 drawing and photo-editing apps without constantly swiping between home screens. The tablet’s launcher offers either:
The designer is comfortable using either a stylus or direct touch but wants to minimize swiping between screens. Assuming each screen must be completely visible (no partial screens), which option is the best recommendation based on these numbers? (Round up to whole screens.)
Options:
A. Use direct touch with small icons arranged on 2 screens.
B. Use direct touch with large icons spread across 4 screens.
C. Use a stylus with small icons arranged on 2 screens.
D. Use a stylus with large icons spread across 4 screens.
Best answer: C
Explanation: This scenario compares stylus versus direct touch for a dense home screen layout and adds a simple calculation about how many screens are needed. With large, finger-friendly icons, 120 apps divided by 30 per screen means the designer would need 4 full screens. With smaller icons optimized for stylus input, 120 apps divided by 60 per screen means only 2 screens are needed.
A stylus is most useful when precision is required, such as tapping small icons, drawing, or handwriting notes. In this case, the smaller icons pack more apps per screen but are harder to use accurately with a finger. Pairing a stylus with the small icons allows accurate selection while reducing the number of screens to 2, which best meets the requirement to minimize swiping while supporting precise input.
Topic: Mobile Devices
A user’s smartphone battery has started draining quickly. On inspection, the technician sees that a navigation app, a company check‑in app, several games, and a social media app are all set to always use location in the background. The user needs accurate GPS for navigation and the check‑in app while they are open, but does not want games or social media tracking their location or wasting battery. Which of the following actions will best address this issue/meet these requirements? (Select TWO.)
Options:
A. Set the games and social media app location permission to “Deny.”
B. Disable the GPS radio and rely only on Wi‑Fi and cellular location to save power.
C. Enable the highest accuracy mode with always‑on scanning for Wi‑Fi and Bluetooth beacons.
D. Change the navigation and check‑in apps’ location permission to “Allow only while using the app.”
E. Turn off all location services for the entire device except emergency services.
Correct answers: A and D
Explanation: This scenario is about managing per‑app location permissions to balance privacy, battery life, and app needs. Navigation and corporate check‑in apps legitimately require accurate location, but only while in active use. Games and social media apps do not need continuous location and represent avoidable privacy and battery costs. Modern mobile OSes allow fine‑grained control so you can grant location only when needed and deny it entirely for noncritical apps.
Topic: Hardware
Which statement BEST describes error-correcting code (ECC) RAM?
Options:
A. It is faster but less reliable than standard RAM and is primarily used in gaming PCs for higher frame rates.
B. It can detect and correct certain memory errors and is commonly used in servers and workstations that require high reliability.
C. It is physically smaller than standard RAM and is used only in laptops to save space.
D. It is designed mainly for discrete graphics cards to increase video rendering performance.
Best answer: B
Explanation: ECC (error-correcting code) RAM adds extra parity or check bits that allow it to detect and automatically correct certain kinds of memory bit errors, typically single‑bit errors. This reduces the chance of data corruption and system crashes caused by random memory faults.
Because of this reliability benefit, ECC RAM is commonly used in environments where data integrity and uptime are critical, such as servers and professional workstations (for example, systems used for databases, virtualization hosts, or scientific computing). Standard consumer desktops and gaming PCs typically use non‑ECC RAM, which is less expensive and slightly simpler but does not provide automatic error correction.
Non‑ECC RAM is still very common and acceptable for most home and office users, but when an organization prioritizes stability and data accuracy over cost, ECC memory is preferred and often required by the platform.
Topic: Virtualization and Cloud Computing
A technician is creating several new virtual machines on a host whose storage is nearly full. To avoid overcommitting disk capacity and to help ensure more predictable storage performance as VMs grow, the technician decides to allocate the entire configured size of each virtual disk on the physical datastore at creation time. Which virtualization storage practice does this describe?
Options:
A. Storing each VM on a separate physical host
B. Taking frequent snapshots of each virtual machine
C. Using thin-provisioned virtual disks
D. Using thick-provisioned virtual disks
Best answer: D
Explanation: The scenario describes a technician who wants to avoid disk overcommitment and keep storage performance more predictable as multiple virtual machines (VMs) grow. To achieve this, the technician allocates the full configured size of each virtual disk on the physical datastore when the disk is created.
This practice is called thick provisioning. With thick-provisioned disks, if a VM is given a 200GB virtual disk, 200GB is immediately reserved on the underlying storage. That makes capacity planning simpler: you know that if you provision five 200GB disks, you will consume 1,000GB of real space right away.
In contrast, thin provisioning initially consumes much less physical space and grows as data is written. While thin provisioning is space-efficient, it can lead to overcommitment: the sum of all virtual disk sizes may exceed the actual available storage. If many VMs expand at the same time on the same physical disk, this can cause both space exhaustion and I/O contention, degrading performance.
Thick provisioning is therefore the storage practice that best matches the described goal: reserving the whole disk up front to avoid oversubscription and to keep storage behavior more predictable when many VMs share the same physical disk.
Topic: Mobile Devices
A warehouse issues rugged Android smartphones to employees. Currently, users unlock the phones with a 6-digit PIN. Workers wear gloves and safety goggles and already carry NFC-enabled ID badges for building access. Management wants faster, touch-free sign-in by letting workers tap their existing ID badges to unlock the phones, without adding any extra accessories. Which hardware feature should be added to the next phone model to BEST meet this goal?
Options:
A. A Bluetooth smart-card reader that employees wear on their belts
B. A higher-resolution front camera with infrared for facial recognition
C. An integrated NFC reader in each smartphone
D. A capacitive fingerprint sensor built into the power button
Best answer: C
Explanation: Near Field Communication (NFC) is a short-range wireless technology commonly used in contactless payment terminals and badge readers. Many corporate ID badges are NFC-enabled, allowing devices with NFC readers to authenticate a user when a badge is tapped close to the device.
In this scenario, the phones already function using PINs, but management wants to optimize sign-in: it should be faster, touch-free, and use the existing NFC-enabled badges without adding extra gear. The only option that directly enables the phone itself to read those badges and meet all constraints is integrating an NFC reader into each smartphone.
Biometric options like fingerprint readers or facial recognition can improve convenience and security, but they do not satisfy the requirement to unlock via the current NFC badges. External Bluetooth readers would support badge use, but they violate the “no extra accessories” constraint and add complexity and maintenance overhead.
Topic: Hardware
A small business has a standard mid‑tower desktop PC used for bookkeeping. It has 8GB of DDR4 RAM installed in one desktop memory slot and one matching empty slot. The owner wants better performance for light multitasking but also wants to keep costs low and avoid replacing the system. As the technician, which of the following is the BEST way to meet these goals?
Options:
A. Install an 8GB DDR4 SODIMM laptop memory module in the empty slot using a low‑cost adapter.
B. Replace the existing 8GB desktop DIMM with a single 32GB DDR5 SODIMM for maximum capacity and future‑proofing.
C. Install an additional 8GB DDR4 DIMM designed for desktop systems in the empty memory slot.
D. Replace the entire desktop with a new small‑form‑factor PC that uses SODIMM memory and includes 16GB preinstalled.
Best answer: C
Explanation: Standard desktop PCs typically use full‑size DIMM modules, while laptops and many very small PCs use the shorter SODIMM form factor. When upgrading a desktop where the goal is modest performance improvement at low cost, the best approach is to add compatible DIMM RAM to the existing open slot.
In this scenario, the desktop already has 8GB of DDR4 and an empty slot. Adding another 8GB DDR4 DIMM doubles the RAM to 16GB, which is usually plenty for bookkeeping and light multitasking. This solution uses the correct form factor for a desktop motherboard, keeps costs down, and avoids unnecessary system replacement or complex adapters.
Options that involve SODIMM modules are aimed at laptops or very compact systems, and they either will not fit a standard desktop DIMM slot or introduce extra cost and compatibility issues. Replacing the entire desktop just to gain more RAM is also wasteful when the existing hardware supports a straightforward DIMM upgrade.
Topic: Hardware and Network Troubleshooting
A user brings in a smartphone with a cracked front glass and reports that parts of the on-screen keyboard do not respond to touch, but the display image looks normal. You run a touch test app, which produces the following results:
Exhibit:
Touch Test - Screen Check
-------------------------
Display pixels: OK (no dead pixels)
Touch row 1 (top): OK
Touch row 2: OK
Touch row 3 (center): NO RESPONSE
Touch row 4: OK
Touch row 5 (bottom): OK
Multi‑touch: OK
Screen rotation: OK
Based on the exhibit, which of the following is the MOST appropriate next step to resolve the issue?
Options:
A. Replace the digitizer or full screen assembly
B. Perform a factory reset of the smartphone
C. Remove any screen protector and clean the display surface
D. Recalibrate the touch screen in the device settings
Best answer: A
Explanation: The exhibit shows that the smartphone’s display pixels are functioning normally, with no dead pixels, and that touch input works on rows 1, 2, 4, and 5. Only the center portion of the screen, labeled as “Touch row 3 (center): NO RESPONSE,” consistently fails to register touches.
This pattern—good display image plus a specific, horizontal area of the screen that never detects input—is classic for a digitizer failure rather than a software or calibration issue. The digitizer is the touch-sensitive layer on top of the display. When part of it is physically damaged (often due to cracks), that section becomes a permanent dead zone for touch.
Because the problem is confined to a specific area and is repeatable in the touch test app, software fixes like calibration changes or factory resets will not restore functionality. The appropriate repair is to replace the failed digitizer, which in most modern smartphones is integrated with the glass and often replaced as a full screen assembly.
Topic: Hardware
Which TWO of the following statements about STP vs UTP cabling and plenum‑rated vs direct‑burial cable are NOT correct? (Select TWO.)
Options:
A. Direct‑burial cable and plenum‑rated cable serve the same purpose, so either one is normally approved by building codes for use in air‑handling spaces.
B. Direct‑burial‑rated Ethernet cable is designed to be run underground and has extra protection against moisture and physical damage.
C. UTP is usually sufficient inside a typical office wall or cubicle area where there is little nearby electrical noise.
D. Plenum‑rated network cable uses a special low‑smoke, fire‑resistant jacket designed for use in air‑handling spaces such as drop ceilings.
E. STP cable is preferred over UTP when running network lines parallel to power cables or near heavy machinery to reduce electromagnetic interference.
F. In plenum spaces used for air circulation, it is acceptable to save money by installing standard PVC‑jacketed non‑plenum cable instead of plenum‑rated cable.
Correct answers: A and F
Explanation: STP (shielded twisted pair) and UTP (unshielded twisted pair) are both common Ethernet media, but they are chosen based on the electrical environment. STP adds shielding to reduce electromagnetic interference, which is useful where cables run near power wiring or noisy equipment, while UTP is adequate in typical low‑noise office runs.
Plenum‑rated cable and direct‑burial cable solve different safety problems. Plenum‑rated cable is designed for air‑handling spaces (such as drop ceilings or some raised floors) and uses a low‑smoke, fire‑resistant jacket to meet building and fire codes. Direct‑burial cable is designed for outdoor underground runs and is built to resist moisture and physical damage, not to meet plenum fire‑smoke requirements. Using the wrong jacket type in plenums is both unsafe and a code violation.
The false statements are the ones that suggest it is acceptable to use non‑plenum PVC‑jacketed cable in plenum spaces and that direct‑burial and plenum‑rated cables are interchangeable for air‑handling spaces, both of which misrepresent important fire‑safety requirements.
Topic: Hardware and Network Troubleshooting
A technician is troubleshooting a PC that displays a “Bootable device not found” message. Before touching any cables or running disk repair tools, the technician first opens the UEFI/BIOS setup to confirm the correct drive is selected as the first boot device. This behavior BEST demonstrates which troubleshooting best practice?
Options:
A. Begin with the least invasive, non-destructive steps
B. Assume the drive has failed and replace it immediately
C. Format the drive to clear any corrupted boot sectors
D. Run low-level OS repair utilities before checking firmware settings
Best answer: A
Explanation: When a system reports “Bootable device not found,” CompTIA A+–level troubleshooting emphasizes starting with simple, non-destructive checks. One of the safest and most common first steps is to verify the UEFI/BIOS boot order to ensure the correct drive is selected.
This aligns with the broader troubleshooting principle: start with the least invasive steps that are most likely to solve the problem, especially before doing anything that could risk data loss (like formatting a drive) or incur cost (like replacing hardware). If the boot order is wrong, simply correcting it can restore normal boot without touching cables or performing risky disk operations.
Only after confirming settings like boot priority and secure boot options, and then checking physical connections, should a technician move on to more aggressive actions such as running boot sector repair tools or replacing the drive.
Topic: Hardware and Network Troubleshooting
A small office reports that their Wi-Fi connection often drops or becomes very slow around lunchtime, even when users are close to the access point. A technician runs a Wi-Fi analyzer and sees many nearby 2.4GHz networks using channel 6, with almost no networks on channel 11. The office access point is currently set to channel 6. Which configuration change would MOST likely improve the wireless reliability?
Options:
A. Reduce the transmit power level of the access point on channel 6
B. Change the DHCP lease time from 8 hours to 24 hours
C. Enable MAC address filtering for all authorized client devices
D. Change the access point to use channel 11 on the 2.4GHz band
Best answer: D
Explanation: This scenario describes intermittent Wi-Fi drops and slowdowns that correlate with a busy time of day and a Wi-Fi analyzer showing many nearby networks on the same 2.4GHz channel (channel 6). This points to channel congestion and co-channel interference as the main cause.
On 2.4GHz Wi-Fi, channels 1, 6, and 11 are the standard non-overlapping channels in most regions. If many neighboring access points use channel 6, devices must share airtime and deal with increased interference, which often causes reduced throughput, retries, and sometimes dropped connections.
By changing the office access point from the congested channel 6 to a relatively unused non-overlapping channel (channel 11), the technician reduces channel congestion, which is the key discriminating factor in this question. Less congestion means fewer competing signals and collisions, leading to more stable and faster wireless connections.
The other options either do not affect RF interference at all (MAC filtering, DHCP lease time) or change power in a way that does not address the core issue of too many APs on the same channel and can even reduce coverage.
Topic: Hardware and Network Troubleshooting
In the context of troubleshooting a network printer that is unreachable, what is the primary purpose of printing the printer’s network configuration/status page?
Options:
A. To reinstall the printer driver on the user’s computer automatically
B. To calibrate the printer’s color output and printhead alignment
C. To view the printer’s IP address and other network settings for connectivity checks
D. To clear all pending print jobs from the print queue
Best answer: C
Explanation: When a network printer is offline or unreachable, one of the first steps is to confirm its IP address and other network parameters. A printer’s network configuration/status page prints out the device’s current IP address, subnet mask, default gateway, and sometimes its MAC address and wireless status. With this information, a technician can verify that the printer is on the correct network, ping the correct IP, and compare settings to the router or DHCP scope.
Without the correct IP address, ping tests and port checks may target the wrong device or an old address. The status page does not install drivers, clear queues, or perform mechanical maintenance; it is strictly an informational tool for configuration and troubleshooting.
Topic: Networking
A small company has three internal departments with wired PCs: Sales (12 PCs), Support (18 PCs), and HR (5 PCs). Management also wants a separate guest Wi‑Fi network that cannot reach any internal department. To logically segment traffic using VLANs while creating the fewest VLANs possible, how many distinct VLANs should the technician configure on the switch?
Options:
A. 5
B. 3
C. 2
D. 4
Best answer: D
Explanation: To meet the requirement, you count how many distinct groups must be isolated: Sales, Support, HR, and guests, giving a total of four VLANs. VLANs provide logical segmentation at the switch level, allowing each group’s traffic to be separated even when they share the same physical cabling infrastructure.
Topic: Virtualization and Cloud Computing
A small office uses a cloud backup service that advertises storage at $0.10/GB per month and egress data transfer at $0.03/GB. In a typical month, they store about 200GB and download only 10GB of individual file restores. Last month they performed a full 500GB restore from the cloud, and the monthly bill was much higher even though stored data stayed near 200GB. The office manager asks you to explain this cost increase and how metered utilization works. Which explanation is MOST accurate?
Options:
A. Cloud services often use metered utilization, so you pay for what you use. The stored 200GB cost stayed about the same, but downloading 500GB instead of 10GB greatly increased egress charges at $0.03/GB, so the total bill went up.
B. Metered utilization applies only to CPU hours for virtual machines, not to storage or data transfer, so the increase must come from extra compute usage, not the 500GB restore.
C. Only ingress (uploads) are billed in a metered cloud plan, so the larger 500GB download could not affect the cost; the change must be due to increased stored capacity.
D. Cloud pricing is fixed once you choose a plan, so the higher bill must be a billing error unrelated to how much data you downloaded.
Best answer: A
Explanation: Metered utilization in cloud computing means you are billed based on how much of a resource you actually use. Common metered resources include storage capacity, CPU time, and network data transfer.
In the scenario, the storage component stayed near 200GB, so the storage portion of the bill should be roughly 200 × $0.10 = $20. However, egress data transfer changed dramatically. In a normal month, 10GB of downloads would cost 10 × $0.03 = $0.30. In the month with a 500GB full restore, egress costs become 500 × $0.03 = $15.00.
Even though storage usage didn’t change much, the egress portion of the bill increased from a few cents to many dollars because it is billed per GB. This is a clear example of metered utilization: when you transfer more data out of the cloud, you pay more, even if the stored data amount is similar.
Ingress (uploads) and egress (downloads) can be billed differently. Many providers charge nothing or very little for ingress but charge per GB for egress to cover bandwidth leaving their network. Understanding this helps small offices predict that large restores or frequent downloads will increase monthly cloud costs.
Topic: Hardware
A small accounting office has a workgroup laser printer that has printed close to the page-count listed in its manual for scheduled maintenance. Users report that pages are coming out slightly wrinkled and the toner can be easily rubbed off. The printer’s display shows a “Maintenance required” message. Which of the following is the BEST next step to restore proper print quality and reliability?
Options:
A. Update the printer driver on all workstations and power cycle the printer
B. Replace only the toner cartridge and reset the page counter
C. Run several cleaning pages through the printer to remove excess toner from the rollers
D. Install the manufacturer’s maintenance kit, including replacing the fuser, according to the recommended service interval
Best answer: D
Explanation: In this scenario, the laser printer is near the page-count threshold listed by the manufacturer for scheduled maintenance and is displaying a maintenance message. The print symptoms—slightly wrinkled pages and toner that can be easily rubbed off—strongly suggest a problem with the fuser assembly.
In a laser printer, the fuser uses heat and pressure to permanently bond toner to the paper. Over time and many pages, the fuser’s rollers and heating elements wear out, which can lead to poor toner adhesion and paper wrinkling. Manufacturers specify maintenance intervals, often in terms of a page count, and provide maintenance kits that typically include a new fuser and other high-wear components (such as rollers).
Because the printer has reached the recommended maintenance point and is showing fuser-related symptoms, the appropriate action is to follow the manufacturer’s guidance and install the maintenance kit, including fuser replacement. This restores print quality, reduces the chance of paper jams or damage, and keeps the printer operating reliably.
Simply replacing toner, cleaning, or updating drivers may address other issues, but they do not correct the underlying mechanical wear indicated here and do not align with the explicit maintenance warning and page-count threshold.
Topic: Hardware and Network Troubleshooting
A user reports that their laptop’s Wi‑Fi disconnects or becomes very slow only when a nearby microwave oven is running. The access point currently broadcasts a single SSID on both 2.4 GHz and 5 GHz bands. Which configuration change would most directly reduce this interference problem?
Options:
A. Create a 5 GHz–only SSID and connect the laptop to that network
B. Rename the SSID so users can more easily identify the Wi‑Fi network
C. Change the 2.4 GHz channel from 6 to 11 on the access point
D. Increase the transmit power of the 2.4 GHz radio on the access point
Best answer: A
Explanation: Microwave ovens are a classic source of wireless interference because they emit radio noise around 2.4 GHz, which overlaps with the 2.4 GHz Wi‑Fi band. When the microwave is running, it can severely degrade or temporarily disrupt 2.4 GHz Wi‑Fi connections.
By moving the client device to use the 5 GHz band only, you avoid this specific interference source, because 5 GHz Wi‑Fi operates at a different frequency range that microwaves do not significantly affect. This is a direct, configuration-based way to resolve the problem without changing physical layout or hardware.
Other changes like increasing transmit power, shifting channels within 2.4 GHz, or renaming the SSID do not address the root cause: the frequency overlap between the microwave and the 2.4 GHz Wi‑Fi band.
Topic: Mobile Devices
A sales representative is traveling internationally with a limited roaming data plan. Company policy states that cellular data must be disabled while roaming, but the user still needs to use hotel Wi‑Fi and Wi‑Fi calling. Which of the following actions should the technician AVOID? (Select TWO.)
Options:
A. Turn on airplane mode, then enable Wi‑Fi to connect to the hotel wireless network.
B. Configure the device to always prefer cellular data even when a known Wi‑Fi network is available.
C. Enable Wi‑Fi calling for the corporate VoIP app when connected to trusted wireless networks.
D. Disable the data roaming setting while leaving Wi‑Fi turned on.
E. Enable data roaming and keep cellular data on so apps stay connected everywhere.
Correct answers: B and E
Explanation: In this scenario, the goal is to prevent any cellular data use while the user is roaming internationally, in line with company policy, but still allow Wi‑Fi and Wi‑Fi calling. Good configurations disable or avoid using the cellular data connection and roaming, while still enabling Wi‑Fi. Bad configurations either turn on data roaming or otherwise cause the phone to use cellular data when Wi‑Fi is available, risking unexpected charges and violating policy.
Enabling data roaming or preferring cellular data over Wi‑Fi are clear anti‑patterns here because both make it more likely that the device will use a foreign carrier’s network for data instead of free or low‑cost Wi‑Fi. Correct configurations either fully disable cellular radios (for example, via airplane mode) and then re‑enable Wi‑Fi, or explicitly turn off data roaming while leaving Wi‑Fi and Wi‑Fi calling enabled.
Topic: Virtualization and Cloud Computing
Which TWO statements correctly describe a Platform as a Service (PaaS) cloud model for application development and deployment? (Select TWO.)
Options:
A. With PaaS, the customer is responsible for choosing, installing, and patching the hypervisor on the physical servers used by the application.
B. Using PaaS always requires the customer to own and operate on-premises hardware that hosts the cloud platform.
C. PaaS offerings commonly include managed services such as databases, authentication, and development tools that simplify building and deploying applications.
D. PaaS is the same as SaaS because users only access finished applications over the internet and cannot deploy their own code.
E. Developers deploy their application code to a provider-managed platform without configuring or maintaining the underlying servers or operating systems.
Correct answers: C and E
Explanation: Platform as a Service (PaaS) is a cloud model where the provider manages the underlying infrastructure, including physical servers, virtualization, operating systems, and often the application runtime and middleware. The customer focuses on writing, testing, and deploying application code to this managed environment instead of setting up and maintaining servers.
In a typical PaaS scenario, a developer pushes code to the platform, which automatically handles provisioning compute resources, configuring the runtime, and often integrating with managed services such as databases, message queues, and authentication. This abstraction speeds development and reduces operational overhead compared to managing full server stacks or hypervisors directly.
PaaS is distinct from both IaaS and SaaS: it sits in the middle, offering more control than SaaS (because you deploy your own code) but less responsibility for infrastructure than IaaS (because the provider manages the platform layer).
Topic: Mobile Devices
Which TWO statements accurately describe a typical laptop docking station when compared with a simple port replicator? (Select TWO.)
Options:
A. Both docking stations and port replicators are internal cards that must be installed inside the laptop chassis.
B. Docking stations commonly include extra video outputs so the laptop can drive multiple external displays.
C. A simple port replicator usually includes its own dedicated graphics hardware to add more monitors than a docking station.
D. Port replicators generally offer more ports and higher‑wattage power delivery than docking stations.
E. A docking station can supply power to the laptop and connect many peripherals through a single cable or proprietary connector.
Correct answers: B and E
Explanation: A docking station is a more capable expansion device that lets a laptop behave like a full desktop system when connected. It usually attaches via a single proprietary connector or modern USB‑C/Thunderbolt port and can deliver power, network, USB, audio, and video through that one link. This makes it ideal for permanent desk setups where the user wants to connect many devices quickly.
In contrast, a simple port replicator mainly breaks out or duplicates existing laptop ports and often does not add extra graphics capability or substantial power delivery. Because of this, docking stations are the option most associated with charging the laptop and supporting multiple external displays, while port replicators are lighter, cheaper ways to add a few extra connections with fewer features.
Topic: Mobile Devices
When pairing a new Bluetooth headset with a smartphone for the first time, which action is typically required so that the phone can detect the headset and complete pairing?
Options:
A. Connect both the headset and phone to the same Wi‑Fi network
B. Insert the headset’s USB cable and install its driver software on the phone
C. Place the headset into pairing/discovery mode until its indicator light flashes
D. Enable mobile hotspot on the smartphone before searching for devices
Best answer: C
Explanation: To pair a Bluetooth accessory like a headset, the accessory usually must be put into pairing/discovery mode so it is visible to nearby devices. Once in this mode (often indicated by a flashing LED), the smartphone can scan for Bluetooth devices, select the headset, enter a PIN if prompted, and complete the connection.
Wi‑Fi networks, USB driver installs, and mobile hotspots are separate networking features and are not required to allow a phone to discover a Bluetooth headset for pairing.
Topic: Hardware
A user in a small office calls the help desk because their 30‑page PDF prints as 30 single‑sided sheets, even though the office wants to save paper. The technician confirms the printer model supports automatic two‑sided printing and does not want the user to manually flip pages. Which printer setting should the technician configure in the OS print dialog to BEST meet this requirement?
Options:
A. Increase the print quality from draft to high
B. Change the page orientation from portrait to landscape
C. Select a different paper tray that holds more paper
D. Enable two‑sided (duplex) printing in the printer properties
Best answer: D
Explanation: In this scenario, the main requirement is to reduce paper usage by having a supported printer automatically print on both sides of each sheet. Because the technician has already confirmed that the model supports automatic two‑sided printing, the change needed is purely a configuration option in the printer driver/OS print dialog.
Most desktop OS print dialogs and printer drivers provide a setting labeled something like Two‑sided, Duplex, or Print on both sides. Enabling this setting instructs the printer to mechanically pull the page back in and print on the reverse side, producing double‑sided pages without any manual intervention.
Other settings in the print dialog, such as page orientation, paper tray selection, and print quality, are important for different requirements (for example, fitting layout to the page, drawing from letterhead, or adjusting quality vs toner use), but they do not change a job from single‑sided to double‑sided output. Therefore, enabling duplex printing is the only option that directly satisfies the stated goal.
Topic: Hardware and Network Troubleshooting
A small office reports that Wi‑Fi connections in the break room drop or become very slow whenever someone uses the microwave. The access point currently uses only the 2.4 GHz band and is configured on the same channel as several neighboring networks. The business wants to improve performance without buying new hardware. Which of the following actions will best address this issue/meet these requirements? (Select TWO.)
Options:
A. Reduce the DHCP lease time from 8 hours to 30 minutes so clients renew their addresses more frequently
B. Lower the transmit power of the access point so it does not reach as far into neighboring offices
C. Change the SSID name and disable SSID broadcast so neighboring users cannot see the network
D. Relocate the access point farther away from the break‑room microwave and large metal appliances
E. Reconfigure the access point to allow clients to use the 5 GHz band and migrate compatible devices to that SSID
Correct answers: D and E
Explanation: Microwave ovens emit RF energy in the 2.4 GHz range, the same band used by many Wi‑Fi networks. This can cause significant interference and dropouts, especially when the wireless network uses only 2.4 GHz and shares channels with multiple neighboring access points.
To improve reliability without adding new hardware, the technician should either move devices away from the interference source or use a less affected frequency band that the existing access point already supports. Configuration changes that only affect IP addressing or visibility (SSID) do not change the physical RF environment and therefore will not resolve this type of problem.
Topic: Networking
A technician is configuring the internal LAN for a small office behind a SOHO router. The router will perform NAT to the public internet, and the technician can choose any IPv4 range for the internal network.
Which of the following IPv4 ranges should the technician AVOID using on the internal LAN because they are public rather than private ranges? (Select TWO.)
Options:
A. 172.40.0.0/16 for all internal devices
B. 10.0.0.0/8 for all internal devices
C. 8.8.4.0/24 for all internal devices
D. 172.20.0.0/16 for all internal devices
E. 192.168.10.0/24 for all wired and wireless devices
Correct answers: A and C
Explanation: For SOHO networks, internal devices should use private IPv4 address ranges defined by RFC1918. These ranges are reserved for internal use and are not routed on the public internet. A SOHO router then uses NAT to translate between private internal addresses and a public address from the ISP.
The three RFC1918 private IPv4 ranges are:
Using public address ranges, such as 8.8.4.0/24 or 172.40.0.0/16, on an internal LAN is an anti-pattern. It can cause routing conflicts and makes troubleshooting more difficult, because these addresses may exist on the public internet and are not meant for private internal addressing.
Topic: Hardware
A home user is organizing and labeling cables for a small office setup that includes a desktop PC, a VoIP/analog phone adapter connected to a telephone wall jack, and a cable modem from the ISP.
Which TWO of the following cable uses should the technician AVOID because they use the wrong connector for the device? (Select TWO.)
Options:
A. Use an F-type coaxial connector, with a simple passive adapter, to plug a cable directly into an Ethernet switch’s RJ45 port.
B. Use an RJ11 connector to connect a modem’s Ethernet LAN port to a router’s WAN port.
C. Use an F-type coaxial connector to connect the cable from the wall to the cable modem’s coax input.
D. Use an RJ45 connector to plug a patch cable into a desktop’s Ethernet NIC.
E. Use an RJ11 connector to connect a corded phone to a telephone wall jack.
Correct answers: A and B
Explanation: This question tests recognition of where common connectors—RJ45, RJ11, and F-type—are appropriately used in a small office or home network.
RJ45 is the normal connector for Ethernet networking over twisted-pair cabling, used by desktops, switches, and routers. RJ11 is the common connector for analog telephone lines. F-type coaxial connectors are used for cable TV and cable Internet connections between the wall jack and the cable modem or set-top box.
Two of the options describe trying to use phone or coax connectors where Ethernet over twisted pair is required. Those scenarios are incorrect and should be avoided because they either will not work or may damage the equipment. The other options show proper, real-world uses of each connector type.
Topic: Hardware and Network Troubleshooting
A user reports that their desktop has recently begun making loud clicking and grinding sounds, and it occasionally freezes during file access. You open a diagnostics tool and see the following:
Storage Diagnostic – Disk 0
---------------------------------
Model: ST1000DM010-2EP102
Type: HDD (SATA)
SMART Status: FAILED
Warning: Imminent disk failure detected.
User report: Repetitive clicking / grinding noise
---------------------------------
Recommendation: Back up data immediately.
Based on the information in the exhibit, what should you do NEXT?
Options:
A. Run a full disk defragmentation and advise the user to monitor the system for a few weeks.
B. Immediately back up the user’s data and arrange to replace the hard drive.
C. Reinstall the operating system on the same drive to clear any corrupted system files.
D. Disable SMART warnings in the BIOS/UEFI so the user is not interrupted, and continue normal use.
Best answer: B
Explanation: The exhibit clearly indicates a serious hard drive problem: SMART status is listed as FAILED, there is a warning of imminent disk failure, and the user reports repetitive clicking / grinding noise. For mechanical hard drives, grinding or clicking sounds typically mean internal moving parts are failing.
When a drive shows both audible mechanical symptoms and a SMART failure warning, the correct response is to prioritize data protection. That means performing an immediate backup of any important data while the drive is still accessible, then replacing the drive. Attempting extended maintenance tasks or continued use increases the chance of total failure and data loss.
Therefore, the best next step is to back up the user’s data right away and arrange for a replacement hard drive, then restore the data to the new drive.
Topic: Hardware and Network Troubleshooting
A graphic designer’s Android tablet will not install a new drawing app from the official app store. The store shows the message: This app requires Android 13 or later. Your device is running Android 11. The tablet has 4GB of free storage, and a system notification indicates an OS update to Android 13 is available. The user wants to use this specific app, avoid losing existing data, and keep costs low. Which action should the support technician perform first to BEST meet these requirements?
Options:
A. Recommend replacing the tablet with a newer model that ships with Android 13 or later already installed.
B. Side-load the app’s APK from a third-party website that does not enforce OS-version checks.
C. Uninstall several unused apps to increase free storage space, then attempt the app installation again.
D. Update the tablet’s OS to Android 13 using the vendor’s official system update, then reinstall the app from the store.
Best answer: D
Explanation: The app store’s message clearly indicates that the drawing app requires Android 13 or later and that the tablet is currently running Android 11. Because there is sufficient free storage (4GB) and a vendor-provided OS update to Android 13 is available, the core issue is OS compatibility, not space or MDM/security policy.
The best response is to upgrade the tablet to the supported OS version using the official system update mechanism. This usually preserves user data and settings while enabling compatibility with apps that require the newer OS. It also avoids unnecessary expense, such as buying new hardware, and stays within standard security practices by continuing to use the official app store.
Other options either fail to address the OS requirement, introduce security risks by bypassing official channels, or incur avoidable costs, so they are not the best first step for this scenario.
Topic: Networking
A technician is configuring a new 2.4GHz Wi‑Fi access point for a small office in the United States. A Wi‑Fi analyzer shows that most nearby networks are using channels 1 and 6. To reduce interference from neighboring networks, which channel should the technician select for the new access point?
Options:
A. Channel 6
B. Channel 11
C. Channel 1
D. Channel 3
Best answer: B
Explanation: In the 2.4GHz Wi‑Fi band, the standard practice (in regions like the United States) is to use channels 1, 6, and 11 because they are spaced far enough apart that their primary frequency ranges do not overlap. Overlapping channels interfere with each other, causing lower throughput and more retransmissions.
If a Wi‑Fi analyzer shows that nearby networks are already using channels 1 and 6, selecting channel 11 keeps the new access point on a non‑overlapping channel that is not already crowded. This single decision factor—choosing a non‑overlapping, unused channel—is what most improves performance and reduces interference in this scenario.
Channels like 2, 3, 4, 5, 7, 8, 9, and 10 fall between the non‑overlapping channels and will overlap with one or more of them, making them poor choices when trying to avoid interference from existing networks.
Topic: Networking
A small office administrator configures the DHCP server so the network printer always receives the same IP address (192.168.1.50) whenever it requests one, based on the printer’s MAC address. Which DHCP concept does this configuration demonstrate?
Options:
A. DHCP scope
B. DHCP lease duration
C. DHCP reservation
D. DHCP exclusion
Best answer: C
Explanation: In DHCP, a reservation is used when you want a specific device to always get the same IP address, but you still want to manage addresses centrally with DHCP rather than configuring static IPs on the device itself.
A reservation ties a device’s MAC address to a fixed IP address within the DHCP scope. When that device requests an address, the DHCP server recognizes the MAC and always offers the reserved IP. This is common for network printers, VoIP phones, or small servers in a SOHO network where predictable IPs are needed.
Other DHCP concepts support this behavior but do not provide it directly. A scope defines the full pool of addresses, exclusions carve out addresses that DHCP will never hand out, and lease duration controls how long a client keeps an assigned address before renewal. None of those, by themselves, guarantee that one device always gets the same IP.
Topic: Hardware
A freelance photographer uses a low-cost 24-inch TN LCD as the only display on a desktop. The system works fine for casual gaming, but colors shift noticeably when viewed from the side, and printed photos rarely match what appears on screen. The photographer wants to replace this single monitor to get more accurate colors and better viewing angles for photo editing, without paying extra for gaming features that are not needed. Which option BEST meets these goals?
Options:
A. Keep the TN monitor and add a hardware color-calibration tool to adjust the existing display’s color profile.
B. Replace the TN monitor with a midrange IPS LCD designed for photo editing, using a standard 60–75Hz refresh rate.
C. Replace the TN monitor with another TN panel that supports a 240Hz refresh rate and low input lag for competitive gaming.
D. Replace the TN monitor with a VA-based gaming monitor that has very high contrast, curved screen, and a fast 165Hz refresh rate.
Best answer: B
Explanation: TN (twisted nematic) panels are popular in budget and gaming displays because they are inexpensive and have fast response times. However, they suffer from poor viewing angles and less accurate color reproduction, which are serious drawbacks for photo or video editing.
IPS (in-plane switching) panels are preferred for color-critical work because they maintain more accurate colors and brightness across wide viewing angles. A midrange IPS monitor targeted at content creators, even at a standard 60–75Hz refresh rate, will give the photographer more consistent color and allow the image to look similar from different viewing positions.
VA (vertical alignment) panels sit between TN and IPS: they often have better contrast and deeper blacks than IPS, but their viewing angles and color consistency usually do not match IPS. High-refresh VA or TN gaming monitors add cost for features (very high refresh, low input lag) that the scenario explicitly says are not needed. Calibration tools can help any monitor but cannot overcome the inherent viewing-angle limitations of TN technology.
Therefore, upgrading from a TN to a midrange IPS display designed for accurate color reproduction best addresses both required attributes—color accuracy and viewing angles—without paying extra for unnecessary gaming features.
Topic: Hardware
A technician is upgrading a laptop’s memory. The laptop currently has one RAM slot populated and one empty slot.
Using only the information in the exhibit, which RAM module should the technician install in the empty slot to ensure compatibility?
Exhibit:
System Information - Memory
Model: ProBook 450 G9
Memory Technology: DDR4 SDRAM
Form Factor: SODIMM
Total Memory Slots: 2
Installed Memory: 8GB (1 x 8GB)
Empty Slots: 1
Max Supported Memory: 32GB
Max Capacity Per Slot: 16GB
Supported Speed: 2666 / 2933 / 3200 MHz
Options:
A. 16GB DDR4-3200 SODIMM module
B. 32GB DDR4-3200 SODIMM module
C. 16GB DDR5-4800 SODIMM module
D. 16GB DDR4-3200 DIMM module
Best answer: A
Explanation: The exhibit provides all the key memory specifications for the laptop: it uses DDR4 SDRAM, with a SODIMM form factor, a maximum of 16GB per slot, and supports speeds up to 3200MHz. There are two slots, one of which is empty.
To be compatible, the new RAM module must:
The 16GB DDR4-3200 SODIMM meets all of these requirements. It is DDR4, it is a SODIMM, it is within the 16GB-per-slot limit, and 3200MHz is explicitly listed as a supported speed in the exhibit.
The other options each violate at least one of the exhibit’s constraints: either they use the wrong memory generation, exceed the per-slot capacity, or use the wrong physical form factor.
Topic: Hardware
A small accounting firm is ordering a new on‑premises database server to host financial records. The draft build sheet specifies a desktop‑class motherboard and 32GB of non‑ECC DDR4 RAM. The owner’s top priority is maximizing data integrity and uptime, not gaming performance. Which change to the memory configuration would BEST meet this goal?
Options:
A. Use 32GB of ECC DDR4 RAM with a server‑class motherboard that supports ECC.
B. Increase the memory to 64GB of non‑ECC DDR4 RAM to reduce the chance of running out of RAM.
C. Keep 32GB of non‑ECC DDR4 RAM but choose overclocked modules with higher frequency and XMP support.
D. Keep 32GB of non‑ECC DDR4 RAM and add a larger NVMe SSD for the paging file.
Best answer: A
Explanation: ECC (error‑correcting code) RAM adds extra parity or check bits to each memory word, enabling the system to detect and automatically correct many single‑bit errors and detect some multi‑bit errors. This is especially useful in environments where data integrity and continuous operation are critical, such as servers and high‑end workstations.
In this scenario, the firm is deploying a database server that holds financial data. The system already has enough RAM specified for normal operation, but the priority is to improve reliability and protect against memory errors that could corrupt records or crash the server. Changing the design to use ECC RAM on hardware that supports it directly addresses that requirement without adding unnecessary gaming or overclocking features.
Non‑ECC RAM may be acceptable in typical home or office desktops where occasional bit errors are less likely to cause serious damage, but for servers and professional workstations, ECC is commonly used to lower the risk of silent data corruption and unexpected crashes.
Topic: Virtualization and Cloud Computing
Which statement BEST describes how desktop virtualization allows a company to keep using a legacy business application that only runs on an older operating system?
Options:
A. It lets you install the older operating system inside a virtual machine that presents compatible virtual hardware on a modern host system.
B. It automatically rewrites the legacy application’s code so it is fully compatible with the newest operating system.
C. It converts the legacy application into a web-based service that can be accessed from any browser.
D. It replaces the new operating system with the older one at boot time using a dual-boot configuration.
Best answer: A
Explanation: Virtualization allows multiple operating systems to run on the same physical hardware by inserting a hypervisor layer between the hardware and the guest operating systems. For legacy support, you can create a virtual machine (VM), install the older operating system that the business application requires, and run it alongside a modern host OS.
The VM presents standardized, virtual hardware to the legacy operating system. As long as the host hardware and hypervisor support the VM, the older OS and its applications can continue to run even if the physical PC is new and the main host OS is a current version. This is a common way businesses keep older, critical apps running when they no longer work natively on new hardware or operating systems.
Topic: Hardware and Network Troubleshooting
In the context of hard drive diagnostics, what does a S.M.A.R.T. status of “Warning” or “Predicted Failure” from a vendor disk utility most accurately indicate?
Options:
A. The drive is in normal condition and no maintenance or action is required
B. The drive is still operating but has crossed vendor health thresholds and should be backed up and proactively replaced
C. The file system is corrupt, but the physical drive hardware is definitely healthy
D. The drive has already failed completely and no further data can be recovered from it
Best answer: B
Explanation: S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology) is built into modern drives to track health metrics and report an overall status such as OK, Warning, or Predicted Failure. When a vendor utility reports a S.M.A.R.T. warning or predicted failure, it means the drive has crossed built-in thresholds that suggest a high likelihood of near-term failure, even if it still seems to be working.
An A+ technician should treat this as a chance to prevent data loss: immediately verify backups, copy important data, and schedule a proactive replacement of the drive. The goal is to act before the drive becomes unreadable, not to wait for total failure.
Use the CompTIA A+ 220-1201 Practice Test page for the full IT Mastery route, mixed-topic practice, timed mock exams, explanations, and web/mobile app access.
Try CompTIA A+ 220-1201 on Web View CompTIA A+ 220-1201 Practice Test
Read the CompTIA A+ 220-1201 Cheat Sheet on Tech Exam Lexicon for concept review before another timed run.