Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CompTIA A+ Certification Practice Test Exam Study Guide latest Updated 2025/2026, Exams of Information Technology

CompTIA A+ Certification Practice Test Exam Study Guide latest Updated 2025/2026

Typology: Exams

2024/2025

Available from 04/29/2025

TUTOR2025
TUTOR2025 🇬🇧

3

(4)

774 documents

1 / 91

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CompTIA A+ Certification Practice
Test
Exam Study Guide latest Updated
2025/2026
The main functionality of the Basic Input/Output System (BIOS) is to perform the initial
hardware checks after the computer is powered on and start up the operating system.
True or False - ansTrue
Which of the following resources can be used by an Operating System (OS) to communicate
with hardware? (Select 2 answers)
Device Manager
Secure Shell (SSH)
Device drivers
System BIOS
Command-Line Interface (CLI) - ansDevice drivers
System BIOS
In modern PCs, the procedure of replacing BIOS contents is sometimes referred to as:
Hard boot
Overclocking
Flashing the BIOS
Direct memory access (DMA) - ansFlashing the BIOS
BIOS updates are performed in order to: (Select all that apply)
-Repair damaged BIOS
-Fix physical hardware faults found in replaceable components inside the computer's case
-Provide support for new types of attached hardware
-Fix known programming errors discovered in the current BIOS version - ans-Repair
damaged BIOS
-Provide support for new types of attached hardware
-Fix known programming errors discovered in the current BIOS version
Which of the following terms refer to BIOS types that can be updated without removing the
BIOS chip from a motherboard? (Select 2 answers)
EEPROM
ROM
Plug and Play (PnP)
EPROM
Flash Memory - ansEEPROM
Flash Memory
Which Microsoft Windows OS utility can be used to view basic information about computer's
BIOS?
WINVER.EXE
MSINFO32.EXE
Control Panel
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b

Partial preview of the text

Download CompTIA A+ Certification Practice Test Exam Study Guide latest Updated 2025/2026 and more Exams Information Technology in PDF only on Docsity!

Test

Exam Study Guide latest Updated

The main functionality of the Basic Input/Output System (BIOS) is to perform the initial hardware checks after the computer is powered on and start up the operating system. True or False - ansTrue Which of the following resources can be used by an Operating System (OS) to communicate with hardware? (Select 2 answers) Device Manager Secure Shell (SSH) Device drivers System BIOS Command-Line Interface (CLI) - ansDevice drivers System BIOS In modern PCs, the procedure of replacing BIOS contents is sometimes referred to as: Hard boot Overclocking Flashing the BIOS Direct memory access (DMA) - ansFlashing the BIOS BIOS updates are performed in order to: (Select all that apply)

  • Repair damaged BIOS
  • Fix physical hardware faults found in replaceable components inside the computer's case
  • Provide support for new types of attached hardware
  • Fix known programming errors discovered in the current BIOS version - ans-Repair damaged BIOS
  • Provide support for new types of attached hardware
  • Fix known programming errors discovered in the current BIOS version Which of the following terms refer to BIOS types that can be updated without removing the BIOS chip from a motherboard? (Select 2 answers) EEPROM ROM Plug and Play (PnP) EPROM Flash Memory - ansEEPROM Flash Memory Which Microsoft Windows OS utility can be used to view basic information about computer's BIOS? WINVER.EXE MSINFO32.EXE Control Panel

Test

Exam Study Guide latest Updated

SERVICES.MSC - ansMSINFO32.EXE Power failure during BIOS upgrade can be the cause of irreversible damage to the computer system. True or False - ansTrue After a normal system shutdown, when the computer is turned off, contents of the memory used to store BIOS settings are: Erased Retained Stored in a page file Saved on a hard drive - ansRetained Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on? IDE POTS QoS POST - ansPOST After replacing a modular hardware component inside computer case, the updated information about specific parameters of the new device can be stored in: (Select 2 answers) System BIOS Flash memory Startup BIOS Secondary storage CMOS RAM - ansFlash memory CMOS RAM After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred to as: Boot record Master Boot Record (MBR) Partition table Boot sequence - ansBoot sequence In order to work, an integrated component such as Network Interface Card (NIC) on a newly assembled computer system may need to be first: Enabled in Windows Control Panel Updated with the latest driver in Device Manager Checked against the Hardware Compatibility List (HCL)

Test

Exam Study Guide latest Updated

  • Aborted BIOS update can be resumed by the transaction recovery system
  • A common security measure is to store BIOS on a non-rewritable memory chip
  • The process of BIOS update can be aborted and resumed at a later time
  • Aborted BIOS update could render the computer unusable - ans-Aborted BIOS update could render the computer unusable Which type of password provides the highest level of permissions in BIOS? root Supervisor Administrator Power User - ansSupervisor What is LoJack?
  • Loopback adapter
  • Security feature used for locating stolen desktops, laptops, or tablets
  • Connector standard
  • RJ-11 plug - ans-Security feature used for locating stolen desktops, laptops, or tablets Which of the following terms refers to a technology that allows for storing passwords, certificates, or encryption keys in a hardware chip? Access Control List (ACL) Encrypting File System (EFS) User Account Control (UAC) Trusted Platform Module (TPM) - ansTrusted Platform Module While trying to enable the entire drive encryption feature in Windows technician receives the following error message: "A compatible Trusted Platform Module (TPM) Security Device must be present on this computer, but a TPM was not found". Knowing that the system has a TPM chip installed, which of the following steps might help in solving this problem? Re-installation of the OS Enabling the TPM security feature in CMOS setup menu Hard drive replacement Enabling the TPM security feature in Windows Control Panel - ansEnabling the TPM security feature in CMOS setup menu Which of the answers listed below describe(s) the features of UEFI? (Select all that apply)
  • DRM support
  • GUI mode
  • Mouse support
  • Support for hard drives with a maximum of 4 partitions per drive
  • Secure boot
  • Support for partitions/hard drives of up to 2TB

Test

Exam Study Guide latest Updated

  • Network access - ans-DRM support
  • GUI mode
  • Mouse support
  • Secure boot
  • Network access A computer supporting LoJack technology has two main components installed: an Application Agent residing in the operating system which sends tracking signals to the monitoring center allowing the law enforcement to locate and recover stolen device, and Persistence Module which restores the Application Agent and allows it to survive operating system re-installation or hard drive format. The highest level of security offered by LoJack can be achieved when Persistence Module resides in: Operating system Partition gap on the hard drive Computer's BIOS USB key - ansComputer's BIOS A UEFI functionality designed to prevent the loading of malware and unauthorized OSs during system start-up is known as: LoJack Bitlocker Secure boot Kerberos - ansSecure boot What is the function of a SMTP server? Email handling Serving of web pages Name resolution File storage & sharing - ansEmail handling Which of the server types listed below is used for the purpose of verification of the identity of a person or process? Proxy server DNS server Authentication server Web server - ansAuthentication server The term "Unified Threat Management" (UTM) refers to a network security solution (commonly in the form of a dedicated device called UTM appliance) which combines the functionality of a firewall with additional safeguards such as for example URL filtering, spam filtering, gateway antivirus protection, intrusion detection or prevention, content inspection, or malware inspection. True or False - ansTrue

Test

Exam Study Guide latest Updated

Google Play - ansApp Store Which of the marketplaces listed below offer(s) apps for Android-based devices? (Select all that apply) App Store Google Play Windows Marketplace for Mobile Amazon Appstore - ansGoogle Play Modern mobile devices have the capability to present landscape or portrait views of the device's screen based on the way the device is being held. Which of the following built-in functionalities allows for determining screen orientation in those devices? Hypervisor Geotracking Accelerometer Gyroscope - ansAccelerometer Which of the following built-in functionalities available in modern mobile devices supplements the function of an accelerometer by offering more accurate recognition of movement within a 3D space? Direct3D Multitouch Gyroscope Hypervisor - ansGyroscope Resistive touchscreen displays rely on the electrical properties of the human body to detect when and where on a display the user is touching. Because of this, resistive displays can be controlled with very light touches of a finger and generally cannot be used with a mechanical stylus or a gloved hand. Another characteristic feature of resistive touchscreens is that they do not require screen calibration. True or False - ansFalse Capacitive touchscreen displays are composed of two flexible sheets coated with a resistive material and separated by an air gap or microdots. Pressure applied to the surface of the display by a finger or stylus causes the layers to touch, which completes electrical circuits and tells the device where the user is touching. As such, capacitive touchscreens require much more pressure to activate than resistive touchscreens as well as periodic screen calibration in order to be able to register the exact touch location. True or False - ansFalse A procedure of identifying someone's physical location by obtaining GPS data from their mobile device or other GPS-enabled devices is known as: Geotagging

Test

Exam Study Guide latest Updated

Wireless survey Geotracking Tethering - ansGeotracking Which of the solutions listed below was designed to alleviate cellular network coverage problems? Wi-Fi Calling Voice over IP (VoIP) Route aggregation Quality of Service (QoS) - ansWi-Fi Calling A type of mobile user interface presenting the main view of the device with a group of shortcut icons to apps is known as: Title screen Launcher Virtual assistant Desktop - ansLauncher Which of the following acronyms refers to a set of tools used for developing applications for a specific platform? GUI SDLC API SDK - ansSDK A package file format used by Android OS for distribution and installation of mobile apps is called: XAP APK IPA EXE - ansAPK Which of the answers listed below refers to a technology that enables carrying out mobile payment transactions with the use of the physical phone device? WAP NFC IR RFC - ansNFC A wireless network Access Point (AP) or site offering public wireless Internet access is commonly referred to as: Hotspot Proxy

Test

Exam Study Guide latest Updated

LCDs - ansBatteries CRTs Toner cartridges Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that apply) CRTs Power supplies Inverters CPUs Laser printers - ansCRTs Power supplies Inverters Laser printers A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called: AUP MSTSC MAU MSDS - ansMSDS Which of the terms listed below refers to an environmental control system? SCADA HIPS TEMPEST HVAC - ansHVAC The term "Brownout" refers to what kind of situation? Power spike Electromagnetic interference Temporary drop in voltage Power outage - ansTemporary drop in voltage What does the term "Blackout" refer to? Power outage Electromagnetic interference Power spike Drop in voltage - ansPower outage A device designed to provide emergency power during an unexpected main power source outage is called: UPS

Test

Exam Study Guide latest Updated

PoE SVC PSU - ansUPS Which of the following solutions add(s) redundancy in areas identified as single points of failure? (Select all that apply) Virtualization RAID Uninterruptible Power Supply (UPS) Backup generator - ansRAID Uninterruptible Power Supply (UPS) Backup generator A device designed to protect electronic devices from large voltage fluctuations is known as: Power Supply Unit (PSU) Uninterruptible Power Supply (UPS) Surge suppressor Voltage regulator module (VRM) - ansSurge suppressor Which of the following tools would be used to clean the inside of a laser printer? (Select all that apply) Regular vacuum Cleaning brush Can of compressed air Toner vacuum - ansCan of compressed air Toner vacuum In cases where users are found in violation of policies related to prohibited content or activity, the elements of first response should include: (Select all that apply) Consulting co-workers Reporting through proper channels Multi-factor authentication Problem identification Data/device preservation - ansReporting through proper channels Problem identification Data/device preservation In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as: Proxy list Order of volatility Access log Chain of custody - ansChain of custody

Test

Exam Study Guide latest Updated

Which of the answers listed below refers to an example of appropriate handling of customer's confidential data in a situation where troubleshooting requires user's password?

  • Ask user to type in the password themselves
  • Ask user for password and their consent to use it
  • Break the password
  • Ask user for password and provide them with help in setting up new password after the problem is fixed - ansAsk user to type in the password themselves Which of the following actions should be the first step in the troubleshooting process?
  • Establishing a theory of probable cause of the problem
  • Conducting external or internal research based on problem symptoms
  • Identifying the problem
  • Establishing a plan of action to resolve the problem - ansIdentifying the problem Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech. True or False - ansFalse Once the theory of probable cause of the problem has been established, the next troubleshooting step should involve: Verifying full system functionality Testing the theory to determine the problem cause Implementing the solution Establishing a plan of action to resolve the problem - ansTesting the theory to determine the problem cause Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology process is to: Conduct research based on symptoms Test the theory to determine problem cause Implement the solution Establish a theory of probable cause of the problem - ansImplement the solution According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed: After documenting findings, actions and outcomes As the first step of the troubleshooting process After implementing the solution As the last step of the troubleshooting process - ansAfter implementing the solution

Test

Exam Study Guide latest Updated

The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures. True or False - ansTrue If an application written for an earlier version of MS Windows doesn't run correctly the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and:

  • Choosing "Restore previous versions" option from the pop-up menu
  • Selecting "Run program using recommended compatibility settings" option from the pop-up menu
  • Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab
  • Selecting "Run as administrator" option from the pop-up menu - ansClicking on the Properties menu item, and then applying the required settings on the Compatibility tab Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows. True or False - ansTrue Which of the following could cause slow performance of a hard drive? (Select 3 answers) Disk striping File fragmentation Disk mirroring Disk thrashing Insufficient amount of RAM Disk duplexing - ansFile fragmentation Disk thrashing Insufficient amount of RAM Disk Defragmenter is a software tool used for rearranging data on disks and drives in order to improve system performance. Defragmentation results in faster read/write operations of the magnetic hard drive's read/write heads as they can access the data sequentially without seeking data fragments in different areas of the disk (defragmentation consolidates data into smallest contiguous regions). True or False - ansTrue

Test

Exam Study Guide latest Updated

Automatic booting into Safe mode on a Windows-based host might be caused by: (Select 2 answers) Overheating MSCONFIG settings RAID failure Malware presence Corrupt device driver - ansMSCONFIG settings Corrupt device driver Which of the answers listed below refer(s) to troubleshooting solution(s) used when a Windows-based host does not start in Normal mode, but only in Safe mode? (Select all that apply) System Restore Change in boot order Driver rollback Troubleshooting system startup files Malware removal Startup Repair utility - ansSystem Restore Driver rollback Malware removal Startup Repair utility Examples of MS Windows system utilities that allow to pinpoint corrupt device drivers include: (Select 2 answers) Device Manager (DEVMGMT.MSC) Event Viewer (EVENTVWR) Computer Management (COMPMGMT.MSC) Performance Monitor (PERFMON) Task Manager (TASKMGR) - ansDevice Manager (DEVMGMT.MSC) Event Viewer (EVENTVWR) Which of the Control Panel applets in Windows 7/8/8.1 provides access to a system tool used for troubleshooting mismatched file associations? File Explorer Options Default Programs Sync Center Programs and Features - ansDefault Programs Which of the answers listed below refer to possible causes of the "NTLDR is missing" error message displayed during system boot? (Select 2 answers) Kernel panic Damaged hard drive

Test

Exam Study Guide latest Updated

Corrupt NTLDR file Improper shutdown The system is trying to boot from a non-bootable drive - ans-Corrupt NTLDR file

  • The system is trying to boot from a non-bootable drive Which of the following solutions would be of help in troubleshooting the "NTLDR is missing" error message displayed during system boot? (Select all that apply) Startup Repair utility Disconnecting any external drives Safe mode troubleshooting Adjusting the boot sequence in CMOS setup utility System File Checker (SFC.EXE) - ansStartup Repair utility Disconnecting any external drives Adjusting the boot sequence in CMOS setup utility One of the fixes for the "NTLDR is missing" error message during system boot relies on replacing the corrupt NTLDR file with the same file copied from another Windows host using the same operating system (Windows XP), or restoring it from the Windows XP installation CD. Copying the NTLDR file manually requires access to the command-line interface which can be found as one of the options available in the Advanced Boot Options menu displayed after pressing the F8 key during system boot. After gaining access to the CLI, the NTLDR file can be restored with the COPY command from an external storage device (e.g. USB flash drive) to the root folder (typically C:) of the drive containing the corrupt version of the file. True or False - ansTrue While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following BOOTREC options should be used by a technician for manual CLI troubleshooting of this error? BOOTREC /ScanOs BOOTREC /RebuildBcd BOOTREC /FixMbr BOOTREC /FixBoot - ansBOOTREC /RebuildBcd Which of the answers listed below refer(s) to possible cause(s) of the "Missing operating system" error message displayed during system boot? (Select all that apply) Damaged hard drive BIOS does not detect the hard drive Windows starts in VGA mode System partition not set as active Kernel panic Corrupt Master Boot Record (MBR) - ansDamaged hard drive BIOS does not detect the hard drive

Test

Exam Study Guide latest Updated

Which of the file-related symptoms might indicate that the system has been infected by malware? Renamed system files Missing files File permission changes Denied file access All of the above - ansAll of the above One of the best practices for malware removal involves the process of isolation of files and applications suspected of containing malware in order to prevent further execution and potential harm to the user's system. This process is referred to as: Quarantine Content filtering Protected mode Blacklisting - ansQuarantine One of the recommended ways for enhancing a mobile device's security includes employing a web-based service (an app scanner) that allows users to check for known potential security/privacy risks related to a mobile application before downloading/purchasing the app. True or False - ansTrue The term "Cell tower analyzer" refers to a software tool that can be used for obtaining data on coverage, location, and signal strength of a Wi-Fi network. True or False - ansFalse A type of memory module form factor most commonly used for extending the capacity of primary storage in laptop computers is called: SO-DIMM SRAM MicroDIMM RDIMM - ansSO-DIMM Which of the answers listed below refers to a memory type commonly used as an additional external storage in laptops? ROM Flash USB Magnetic drive - ansFlash What is the most common type of laptop port used for the purpose of connecting peripheral devices? eSATA

Test

Exam Study Guide latest Updated

USB

FireWire PS/2 - ansUSB Which of the following functionalities allows to overcome standard keyboard size restrictions in laptops? Touchpad Numeric keypad Fn key Digitizer - ansFn key Internal hard drive types used in laptop computers include: (Select all that apply) Flash drives SSHDs USB drives Magnetic disks SSDs - ansSSHDs Magnetic disks SSDs Which of the following answers describe the features of Solid-State Drives (SSDs)? (Select 3 answers) Low performance High device cost Lower capacity compared to magnetic drives High performance Low device cost Higher capacity compared to magnetic drives - ansHigh device cost Lower capacity compared to magnetic drives High performance What is the name of an HDD type that combines high performance and capacity at a relatively low device cost? SSD Flash drive Magnetic drive USB drive SSHD - ansSSHD Which of the statements listed below refer to the characteristic features of traditional magnetic drives? (Select 3 answers) High capacity Low device cost