CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Google
          • Cloud Architect
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Google
          • Cloud Architect
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

Free CompTIA A+ Practice Test

Take the A+ course with us here.

Buy the 101 Labs – CompTIA A+ workbook.

Back to free exams page.

loading

1. Which of the following allows multiple USB devices to be connected to a computer?

Question 1 of 50

2. Which feature turns off all wireless connections on a mobile device. It's common on phones and tablets, and some laptops have this feature as well?

Question 2 of 50

3. You have purchased a new laptop and you noticed that the speakers are not working. You plugged in the headphones, but you can't hear any sound. How should you correct this problem?

Question 3 of 50

4. The recommended way to remove the USB drive is to use the 'Safely Remove Hardware' icon in the system tray, stop the drive and then unplug it

Question 4 of 50

5. Which device is normally worn on the wrist, and it tracks a user's movements, heart rate and it may be able to track sleep patterns and have a clock and an alarm?

Question 5 of 50

6. Which technology represents a discovery and authentication process that validates the communication link?

Question 6 of 50

7. Which of the following components are most likely replaceable in a laptop motherboard?

 

Question 7 of 50

8. Bluetooth can be used for battery charging and it can also be used to connect to speakers, headsets, game pads, and other input/output devices.

Question 8 of 50

9. Which of the following can be given to the provider to block the phone from being used by unauthorized people, in case the phone is lost?

Question 9 of 50

10. All tablets come equipped with which of the following capabilities?

Question 10 of 50

11. You want to retrieve e-mails from an internet service provider’s email server. Which of the following protocols can be used for this action?

Question 11 of 50

12. A web browser expects that the webserver is using TCP port 80. If that web server is using a port other then port 80, by default a browser will not be able to communicate to that server. In such a case, how can you get a browser to connect to the webserver?

Question 12 of 50

13. Which of the following are the functions of the SMTP protocol?

Question 13 of 50

14. Which of the following protocols is used by Microsoft Windows to transfer files from one system to another?

Question 14 of 50

15. From the following types of switches, which switch type allows to have both switching and routing functionality within the same device?

Question 15 of 50

16. You are given a network subnet 121.101.61.252/30 from your ISP. When you configure your router, what subnet mask should you assign?

Question 16 of 50

17. Of the following wireless encryption methods, which one is the newest and most secure?

Question 17 of 50

18. You work as a system administrator for a company. One of the users is working from home and complains that he is not able to connect to his work machine in the office via RDP. Which port needs to be opened on the firewall to grant him RDP access?

Question 18 of 50

19. Which of the following technologies allows you to power a device (such as a VoIP phone), through one of the ethernet ports on a switch?

Question 19 of 50

20. Which type of server hosts files for easy access, allowing users to browse, transfer and upload the files?

Question 20 of 50

21. The access control, caching, URL filtering and high level of privacy are the useful features of which one of the following server?

Question 21 of 50

22. Which of the following tools is used for crimping RJ45 to connect to the Ethernet cable?

Question 22 of 50

23. Which of the following cable you would use, If you are going to make a connection from the hub to hub, switch to switch, router to router, the hub to switch, or a computer directly to a router?

Question 23 of 50

24. Which of the following cable can transmit data at speeds up to 100 Mbps, for a distance of 100 meters?

Question 24 of 50

25. Which RAID array type combines mirroring for data protection and striping for speed?

Question 25 of 50

26. DVI-D cable sends both analog and digital. A DVI-I cable, however, is only capable of sending digital signals

Question 26 of 50

27. You are replacing a hard drive and noticed a 15-pin connector on the motherboard. What type of drive is needed?

Question 27 of 50

28. An onboard Graphics Processing Unit (GPU) uses what kind of storage medium?

Question 28 of 50

29. You work as a system administrator for a company. Few users complain that they are not able to connect to the wired network. You checked and found out that their PCs are not receiving the IP addresses from the DHCP server. What could be the possible cause that you should look at first?

Question 29 of 50

30. Refer to the exhibit. Identify the component displayed below

esata

Question 30 of 50

31. Match the type of memory with its description
ECC
It does not maintain parity information and therefore, cannot perform error checking

Unselect

Short-term memory used to store working data

Unselect

It is a file that is used as virtual memory on the system

Unselect

This type of memory can continue to work even if it contains corrupt data

Unselect

Paging
It does not maintain parity information and therefore, cannot perform error checking

Unselect

Short-term memory used to store working data

Unselect

It is a file that is used as virtual memory on the system

Unselect

This type of memory can continue to work even if it contains corrupt data

Unselect

RAM
It does not maintain parity information and therefore, cannot perform error checking

Unselect

Short-term memory used to store working data

Unselect

It is a file that is used as virtual memory on the system

Unselect

This type of memory can continue to work even if it contains corrupt data

Unselect

Non-parity
It does not maintain parity information and therefore, cannot perform error checking

Unselect

Short-term memory used to store working data

Unselect

It is a file that is used as virtual memory on the system

Unselect

This type of memory can continue to work even if it contains corrupt data

Unselect

Question 31 of 50

32. Which of the following service refers to the use of a complete cloud-based software development environment?

Question 32 of 50

33. Which type of cloud service handles the task of managing software, its deployment, and it includes the platform and infrastructure as well?

Question 33 of 50

34. Which Windows management utility allows you to configure an application to run automatically or at any regular interval?

Question 34 of 50

35. Which of the cloud service is based on the monitored use of resources such as storage, CPU utilization, or network bandwidth?

 

Question 35 of 50

36. A user reports that his PC keeps booting to an incorrect device. Put the following steps in the correct order to fix the issue
  • Restart the system
  • Enter BIOS setup
  • Remove non-bootable disc or USB flash drive
  • Change the boot sequence to include the correct device

Question 36 of 50

37. In RAID 0 the data is striped across both drives to improve performance but does not include any redundancy

Question 37 of 50

38. Which feature of cloud computing allows computing resources to be automatically allocated in response to demand?

Question 38 of 50

39. IP addresses starting with 169. are assigned automatically when an IP address cannot be received from which of the following servers?

Question 39 of 50

40. To avoid low RF signal issues, which of the following non-overlapping channels should be used?

Question 40 of 50

41. One Windows 10 user has a yellow exclamation mark on the network icon. What does it indicate?

Question 41 of 50

42. A Windows system has suffered a Blue Screen of Death (BSOD). The system indicates the NTFS_FILE_SYSTEM error. What does this error mean?

Question 42 of 50

43. Which command is used for querying the Domain Name System (DNS) server to obtain a domain name or IP address mapping?

Question 43 of 50

44. Match the command with its usage
ipconfig
Used to test the reachability of a host

Unselect

Used to check the IP address of a system

Unselect

Used to track the pathway taken by a packet

Unselect

Used to display TCP and UDP connections

Unselect

netstat
Used to test the reachability of a host

Unselect

Used to check the IP address of a system

Unselect

Used to track the pathway taken by a packet

Unselect

Used to display TCP and UDP connections

Unselect

tracert
Used to test the reachability of a host

Unselect

Used to check the IP address of a system

Unselect

Used to track the pathway taken by a packet

Unselect

Used to display TCP and UDP connections

Unselect

ping
Used to test the reachability of a host

Unselect

Used to check the IP address of a system

Unselect

Used to track the pathway taken by a packet

Unselect

Used to display TCP and UDP connections

Unselect

Question 44 of 50

45. Which of the following protocols is used to encrypt and digitally sign the E-mails?

Question 45 of 50

46. In which of the following method, the cloud service provider provides all resources in a resource pool while you have an option to select the specific resources, such as network bandwidth or storage?

Question 46 of 50

47. You work as a system administrator for a company. Few users complain that they are not able to open any website on their Windows 10 machines. You need to make sure their PCs are getting a correct DNS IP. Which of the following command you should use?

Question 47 of 50

48. Few users, using the Linux operating system report a network connectivity issue. Which command should you use to check their machine's IP address and subnet mask?

Question 48 of 50

49. Which of the following cloud model provides benefits of both public and private clouds?

Question 49 of 50

50. Which of the following statements are true about Solid State Drives (SSDs)?

Question 50 of 50

Loading... Loading...

 

content-filler

ABOUT US

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Subscription Form

Secure Site

website security secure

Copyright Reality Press Ltd . / Paul Browning

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.