Practice Free 220-1201 Exam Online Questions
Which of the following types of RAM is typically used in servers?
- A . SODIMM
- B . Rambus
- C . DDR3
- D . ECC
D
Explanation:
ECC (Error-Correcting Code) RAM is commonly used in servers to provide error detection and correction, improving reliability in critical systems. It is designed to detect and correct single-bit errors, ensuring data integrity in environments where stability is paramount.
Option A (SODIMM): Incorrect. SODIMM is typically used in laptops, not servers.
Option B (Rambus): Incorrect. Rambus is an outdated RAM type and not commonly used today.
Option C (DDR3): Incorrect. While DDR3 is a type of RAM, it is not specific to servers and does not provide error correction.
References:
CompTIA A+ Core 1 Objectives: 3.2 (RAM types and their uses)
A financial institution needs a secure way to protect encryption keys used for unlocking chips on its credit cards.
Which of the following should the institution use?
- A . TLS
- B . AMD
- C . HSM
- D . ARM
C
Explanation:
A Hardware Security Module (HSM) securely manages cryptographic keys, including those used to protect credit card chips.
Why Not A (TLS): TLS secures data in transit, not encryption key storage.
Why Not B (AMD): AMD refers to processors, not security modules.
Why Not D (ARM): ARM is a processor architecture, not a cryptographic security solution.
CompTIA A+ Exam
Reference: Core 2 (220-1102), Section 2.5, cryptographic hardware.
A user brings a laptop to work every morning, correctly seats it in the docking station and then opens the laptop to begin work with no issues After the user left the laptop at home during a two-week vacation the laptop is no longer working. Upon returning to the office, the user reports that the keyboard and display are no longer working.
Which of the following should the technician ask the user to do first?
- A . Ensure the docking station is plugged in.
- B . Press and release the laptop power button.
- C . Plug the laptop in and let it charge overnight
- D . Connect the laptop directly to the network.
B
Explanation:
Reasoning: Many docking stations provide power and functionality only when the laptop is properly powered on. If the laptop was powered off (e.g., during the vacation), docking it will not automatically turn it on. The technician should first ensure the laptop is powered on by pressing the power button.
This is a common troubleshooting step when laptops in docking stations appear non-functional.
Relevance to CompTIA A+ Core 1: This falls under Objective 5.2, which covers diagnosing and resolving common laptop and mobile device issues.
Why the Other Options Are Incorrect:
A customer reports that the output from their thermal receipt printer has vertical white lines.
Which of the following would most likely resolve this issue?
- A . Replacing the ink cartridge
- B . Using the correct paper type
- C . Installing a maintenance kit
- D . Cleaning the heating element
D
Explanation:
Thermal printers create images using a heated print head on specially coated thermal paper. Vertical white lines indicate that part of the heating element is dirty or blocked, preventing heat transfer to the paper. Cleaning the print head (heating element) will restore full functionality.
Option A: Thermal printers do not use ink or toner, so this is not applicable.
Option B: Wrong paper could cause blank output, but consistent vertical lines point to the print head.
Option C: Maintenance kits are typically for laser printers, not thermal printers.
CompTIA A+ Core 1 Exam Objective
Reference:
Objective 3.7: Given a scenario, troubleshoot common printer problems.
A company uses vital legacy software that does not run in the current OS version.
Which of the following will best support the software while keeping the OS current?
- A . Shared resources
- B . System sandbox
- C . Test development
- D . Application visualization
D
Explanation:
Application virtualization allows legacy software to run in a virtualized environment while the operating system remains current. It isolates the application from the OS, ensuring compatibility without downgrading the OS.
Why Not A (Shared resources): This relates to resource sharing, not application compatibility.
Why Not B (System sandbox): Sandboxes isolate applications for security testing, not compatibility.
Why Not C (Test development): Test environments are used for development, not running legacy applications.
CompTIA A+ Exam
Reference: Core 1 (220-1201), Section 4.2, virtualization concepts.
A user reports that the printouts from a laser printer have lines and smudges on them. The printer is also intermittently misfeeding the paper.
Which of the following components should a technician replace to address this issue?
- A . Fuser
- B . Maintenance kit
- C . Corona wire
- D . Toner cartridge
B
Explanation:
Amaintenance kitfor a laser printer often includesrollers, fuser, and other partsthat wear out over time. If the printer issmudging and misfeeding, it’s a sign thatmultiple components are failing, which a maintenance kit is designed to resolve.
Option A (Fuser): May cause smudging if it’s not heating correctly, but it won’t resolve paper misfeeds alone.
Option C (Corona wire): Can cause poor image quality if dirty but doesn’t affect paper feeding.
Option D (Toner cartridge): Can cause streaks if defective, but not paper feed issues.
CompTIA A+ Core 1 Exam Objective
Reference:
Objective 3.4: Given a scenario, install and configure printers.
A salesperson is unable to reach the internet from a home office PC A support technician wants to verify the router is receiving a valid public IP address.
Which of the Wowing is a valid public IP address in this scenario?
- A . 10.254.128.11
- B . 66.157.195.20
- C . 172.16.0.30
- D . 192.168 1.50
B
Explanation:
A valid public IP address must fall outside the private IP address ranges:
A technician wants to upgrade a computer to a new Windows version. The Windows Upgrade Advisor states that the computer is not compatible with the new Windows version due to a lack of TPM 2.0 support.
Which of the following should the technician do next?
- A . Enable the module in the UEFI BIOS.
- B . Install an HSM in the computer.
- C . Perform a clean Install of the new Windows version.
- D . Implement BitLocker on the computer.
A
Explanation:
TPM 2.0 (Trusted Platform Module) is often disabled by default in the UEFI BIOS. Enabling it is necessary to meet the requirements for certain Windows installations, including Windows 11.
Why Not B (Install an HSM): A Hardware Security Module (HSM) is a separate device used for cryptographic functions and is not related to TPM on the motherboard.
Why Not C (Perform a clean install): A clean installation will not bypass the TPM 2.0 requirement.
Why Not D (Implement BitLocker): BitLocker requires TPM but does not resolve its absence or lack of activation.
CompTIA A+ Exam
Reference: Core 1 (220-1201), Section 3.4, BIOS/UEFI configuration.
An SAS RAID array has severely degraded and gone offline A systems administrator examines the syslog, and the point of failure is not obvious.
Which of the following techniques should the administrator use to identify the issue (Select two).
- A . Run a magnet over each drive.
- B . Check if one of the drives is not level
- C . Listen for clicking and grinding noises
- D . Check the OS logs
- E . Update the RAID controller firmware.
- F . Check the historical SMART data
C F
Explanation:
Clicking and grinding noises indicate mechanical drive failure.
SMART data provides insights into the health and status of drives, helping identify failing components in the RAID array.
Why Not A (Run a magnet): This would damage drives.
Why Not B (Check if one drive is not level): Physical leveling is irrelevant.
Why Not D (Check OS logs): OS logs may provide limited information for RAID arrays.
Why Not E (Update RAID controller firmware): While important, it does not diagnose drive failure.
CompTIA A+ Exam
Reference: Core 1 (220-1201), Section 3.3, storage troubleshooting.
A human resources department uses a network shared with other departments to produce a variety of printed resources for legal retention. The human resources department only wants Its members to have access to these materials.
Which of the following should the technician Implement?
- A . Security groups
- B . Audit logs
- C . Time-of-day access
- D . Print server
A
Explanation:
Security groups are used to manage access permissions to network resources, ensuring only authorized HR department members can access the shared materials.
Why Not B (Audit logs): Audit logs monitor activity but do not restrict access.
Why Not C (Time-of-day access): Time-of-day access limits when users can access resources but doesn’t specify user permissions.
Why Not D (Print server): A print server manages print jobs but does not control file access.
CompTIA A+ Exam
Reference: Core 2 (220-1102), Section 2.5, access control and permissions.