CompTIA A+ 1102 Questions with Answers

CompTIA A+ 1102 Practice Questions with Answers

Hardware Components


What is the purpose of a motherboard?

Answer

It's the main printed circuit board (PCB) that connects all the components of a computer. Explain the difference between RAM and ROM.

Explain the difference between RAM and ROM.

Answer

RAM (Random Access Memory) is volatile memory that stores data temporarily while the computer is on. ROM (Read-Only Memory) is non-volatile and stores permanent data that can't be easily changed.  

Describe the function of a CPU.

Answer

The CPU (Central Processing Unit) is the brain of the computer, responsible for executing instructions and performing calculations. 

What are the different types of storage devices?

Answer

Common types include HDD (Hard Disk Drive), SSD (Solid-State Drive), optical drives (CD/DVD/Blu-ray), and flash drives.

How does a power supply unit (PSU) work?

Answer

A PSU converts AC power from the wall outlet to DC power that can be used by computer components.

Operating Systems


What is the difference between a single-user and multi-user operating system?

Answer

A single-user OS is designed for one user at a time, while a multi-user OS allows multiple users to access the system simultaneously.

Describe the functions of the operating system kernel.

Answer

The kernel is the core of the OS, managing memory, processes, and hardware resources.

What is the purpose of a file system?

Answer

A file system organizes and manages files and directories on a storage device.

Explain the concept of virtual memory.

Answer

Virtual memory is a technique that allows the OS to use physical memory more efficiently by swapping data between RAM and a hard drive.

How do you troubleshoot common operating system issues?

Answer

Common troubleshooting techniques include checking event logs, updating drivers, running disk checks, and reinstalling the OS if necessary.

| CompTIA A+: All You Need to Know About This Essential IT Certification

Networking Concepts


What are the different network topologies?

Answer

Common topologies include star, bus, ring, and mesh.

Describe the functions of a router and a switch.

Answer

A router connects networks and directs traffic between them, while a switch connects devices within a network.

What is the purpose of a network interface card (NIC)?

Answer

A NIC enables a computer to communicate with a network.

Explain the concept of IP addressing.

Answer

IP (Internet Protocol) addresses uniquely identify devices on a network.

How do you troubleshoot network connectivity issues?

Answer

Common troubleshooting steps include checking physical connections, verifying IP settings, pinging devices, and using network diagnostic tools.

CompTIA A+ 1101 Questions with Answer

Troubleshooting


What are the common steps involved in troubleshooting computer problems?

Answer

Common steps include identifying the problem, gathering information, isolating the issue, researching solutions, implementing solutions, and testing.

How do you use diagnostic tools to identify hardware issues?

Answer

Diagnostic tools like BIOS/UEFI, POST, and hardware diagnostic software can help identify hardware failures.

Describe the process of troubleshooting software conflicts.

Answer

Troubleshooting software conflicts often involves uninstalling or updating conflicting programs, checking for compatibility issues, and running system scans.

What are some common network troubleshooting techniques?

Answer

Common techniques include checking physical connections, verifying IP settings, pinging devices, and using network diagnostic tools.

How do you document troubleshooting procedures?

Answer

Documenting procedures helps track the troubleshooting process, share information with others, and prevent future issues.

Security


What are the different types of security threats?

Answer

Common threats include viruses, malware, phishing, hacking, and social engineering.

Explain the importance of antivirus software.

Answer

Antivirus software protects against malware by detecting and removing malicious code.

Describe the concept of firewalls.

Answer

Firewalls monitor network traffic and block unauthorized access to a computer or network.

How do you protect data from unauthorized access?.

Answer

Data protection measures include strong passwords, encryption, access controls, and regular backups.

What are the best practices for password management?.

Answer

Best practices include using strong, unique passwords, enabling two-factor authentication, and avoiding sharing passwords.

| Learn Computer Courses for free at : Operating System - CompEduBox

Software Applications


What are the different types of software applications?

Answer

Common types include system software (OS, drivers), application software (word processors, spreadsheets, etc.), and utility software (antivirus, disk cleanup).

Describe the functions of a word processor, spreadsheet, and presentation software.

Answer

Word processors create and edit text documents, spreadsheets organize and analyze data, and presentation software creates slideshows.

How do you install and uninstall software applications?

Answer

Software is typically installed using an installer file, and uninstalled through the control panel or app settings.

What are the common software troubleshooting techniques?

Answer

Common techniques include checking for updates, running compatibility mode, and reinstalling the software.

How do you configure software settings?

Answer

Software settings can be configured through the software's preferences or options menu.

Which of the following symptoms is MOST likely a sign of ransomware?

A. Internet connectivity is lost.
B. Battery life is reduced.
C. Files on devices are inaccessible.
D. A large number of ads appear.
Answer

C. Files on devices are inaccessible.

A technician has been directed to dispose of hard drives from company laptops properly. Company standards require the use of a high-powered magnet to destroy data on decommissioned hard drives. Which of the following data destruction methods should the technician choose?

A. Degaussing
B. Drilling
C. Incinerating
D. Shredding
Answer

A. Degaussing

A user reports being unable to access the Internet or use wireless headphones on a mobile device. The technician confirms the headphones properly connect to another device. Which of the following should the technician do to solve the issue?

A. Turn off airplane mode.
B. Connect to a different service set identifier.
C. Test the battery on the device.
D. Disable near-field communication.
Answer

A. Turn off airplane mode.

A sales staff member recently left a laptop at a hotel and needs a new one immediately. After remotely wiping the old laptop, a support technician prepares to take a new laptop out of inventory to begin the deployment process. Which of the following should the technician do FIRST?

A. Recycle all the cardboard and other shipping materials appropriately.
B. Call the hotel and demand the old laptop be sent back to the repair depot.
C. Confirm the shipping address for the new laptop with the sales staff member.
D. Document the serial numbers and usernames for asset management.
Answer

D. Document the serial numbers and usernames for asset management.

A technician is installing M.2 devices in several workstations. Which of the following would be required when installing the devices?

A. Air filtration
B. Heat-resistant gloves
C. Ergonomic floor mats
D. Electrostatic discharge straps
Answer

D. Electrostatic discharge straps

A user's Windows desktop continuously crashes during boot. A technician runs the following command in safe mode and then reboots the desktop: c:\Windows\system32> sfc /scannow Which of the following BEST describes why the technician ran this command?

A. The user's profile is damaged.
B. The system files are corrupted.
C. The hard drive needs to be defragmented.
D. The system needs to have a restore performed.
Answer

B. The system files are corrupted.

A user calls the IT help desk and explains that all the data on the user's computer is encrypted. The user also indicates that a pop-up message on the screen is asking for payment in Bitcoins to unlock the encrypted data. The user's computer is MOST likely infected with which of the following?

A. Botnet
B. Spyware
C. Ransomware
D. Rootkit
Answer

C. Ransomware

| Learn Computer Courses for free at : Operating System - CompEduBox

A network engineer needs to update a network firewall, which will cause a temporary outage. The network engineer submits a change request form to perform the required maintenance. If the firewall update fails, which of the following is the NEXT step?

A. Perform a risk analysis.
B. Execute a backout plan.
C. Request a change approval.
D. Acquire end user acceptance.
Answer

B. Execute a backout plan.

Which of the following workstation operating systems uses NTFS for the standard filesystem type?

A. macOS
B. Windows
C. Chrome OS
D. Linux
Answer

B. Windows

Which of the following Linux commands will display a directory of files?

A. chown
B. ls
C. chmod
D. cls
Answer

B. ls

| Learn Computer Courses for free at : Operating System - CompEduBox

Post a Comment

0 Comments