Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CompTIA A+ Certification Practice Test Exam Study Guide latest Updated 2025/2026, Exams of Information Technology

CompTIA A+ Certification Practice Test Exam Study Guide latest Updated 2025/2026

Typology: Exams

2024/2025

Available from 04/29/2025

charleswest
charleswest 🇺🇸

4.2

(12)

1.3K documents

1 / 95

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CompTIA A+ Certification Practice
Test
Exam Study Guide latest Updated
2025/2026.
100% Certified Exam Guide
The main functionality of the Basic Input/Output System (BIOS) is to perform the initial
hardware checks after the computer is powered on and start up the operating system.
True or False - ansTrue
Which of the following resources can be used by an Operating System (OS) to communicate
with hardware? (Select 2 answers)
Device Manager
Secure Shell (SSH)
Device drivers
System BIOS
Command-Line Interface (CLI) - ansDevice drivers
System BIOS
In modern PCs, the procedure of replacing BIOS contents is sometimes referred to as:
Hard boot
Overclocking
Flashing the BIOS
Direct memory access (DMA) - ansFlashing the BIOS
BIOS updates are performed in order to: (Select all that apply)
-Repair damaged BIOS
-Fix physical hardware faults found in replaceable components inside the computer's case
-Provide support for new types of attached hardware
-Fix known programming errors discovered in the current BIOS version - ans-Repair
damaged BIOS
-Provide support for new types of attached hardware
-Fix known programming errors discovered in the current BIOS version
Which of the following terms refer to BIOS types that can be updated without removing the
BIOS chip from a motherboard? (Select 2 answers)
EEPROM
ROM
Plug and Play (PnP)
EPROM
Flash Memory - ansEEPROM
Flash Memory
Which Microsoft Windows OS utility can be used to view basic information about computer's
BIOS?
WINVER.EXE
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b
pf5c
pf5d
pf5e
pf5f

Partial preview of the text

Download CompTIA A+ Certification Practice Test Exam Study Guide latest Updated 2025/2026 and more Exams Information Technology in PDF only on Docsity!

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

The main functionality of the Basic Input/Output System (BIOS) is to perform the initial hardware checks after the computer is powered on and start up the operating system. True or False - ansTrue Which of the following resources can be used by an Operating System (OS) to communicate with hardware? (Select 2 answers) Device Manager Secure Shell (SSH) Device drivers System BIOS Command-Line Interface (CLI) - ansDevice drivers System BIOS In modern PCs, the procedure of replacing BIOS contents is sometimes referred to as: Hard boot Overclocking Flashing the BIOS Direct memory access (DMA) - ansFlashing the BIOS BIOS updates are performed in order to: (Select all that apply)

  • Repair damaged BIOS
  • Fix physical hardware faults found in replaceable components inside the computer's case
  • Provide support for new types of attached hardware
  • Fix known programming errors discovered in the current BIOS version - ans-Repair damaged BIOS
  • Provide support for new types of attached hardware
  • Fix known programming errors discovered in the current BIOS version Which of the following terms refer to BIOS types that can be updated without removing the BIOS chip from a motherboard? (Select 2 answers) EEPROM ROM Plug and Play (PnP) EPROM Flash Memory - ansEEPROM Flash Memory Which Microsoft Windows OS utility can be used to view basic information about computer's BIOS? WINVER.EXE

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

MSINFO32.EXE

Control Panel SERVICES.MSC - ansMSINFO32.EXE Power failure during BIOS upgrade can be the cause of irreversible damage to the computer system. True or False - ansTrue After a normal system shutdown, when the computer is turned off, contents of the memory used to store BIOS settings are: Erased Retained Stored in a page file Saved on a hard drive - ansRetained Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on? IDE POTS QoS POST - ansPOST After replacing a modular hardware component inside computer case, the updated information about specific parameters of the new device can be stored in: (Select 2 answers) System BIOS Flash memory Startup BIOS Secondary storage CMOS RAM - ansFlash memory CMOS RAM After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred to as: Boot record Master Boot Record (MBR) Partition table Boot sequence - ansBoot sequence In order to work, an integrated component such as Network Interface Card (NIC) on a newly assembled computer system may need to be first:

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

  • Windows User Account Control (UAC) settings
  • User password required to proceed when the computer is powered on
  • Password-restricted access to the BIOS setup utility (Supervisor password) - ans-User password required to proceed when the computer is powered on
  • Password-restricted access to the BIOS setup utility (Supervisor password) Which of the following statements is true?
  • Aborted BIOS update can be resumed by the transaction recovery system
  • A common security measure is to store BIOS on a non-rewritable memory chip
  • The process of BIOS update can be aborted and resumed at a later time
  • Aborted BIOS update could render the computer unusable - ans-Aborted BIOS update could render the computer unusable Which type of password provides the highest level of permissions in BIOS? root Supervisor Administrator Power User - ansSupervisor What is LoJack?
  • Loopback adapter
  • Security feature used for locating stolen desktops, laptops, or tablets
  • Connector standard
  • RJ-11 plug - ans-Security feature used for locating stolen desktops, laptops, or tablets Which of the following terms refers to a technology that allows for storing passwords, certificates, or encryption keys in a hardware chip? Access Control List (ACL) Encrypting File System (EFS) User Account Control (UAC) Trusted Platform Module (TPM) - ansTrusted Platform Module While trying to enable the entire drive encryption feature in Windows technician receives the following error message: "A compatible Trusted Platform Module (TPM) Security Device must be present on this computer, but a TPM was not found". Knowing that the system has a TPM chip installed, which of the following steps might help in solving this problem? Re-installation of the OS Enabling the TPM security feature in CMOS setup menu Hard drive replacement Enabling the TPM security feature in Windows Control Panel - ansEnabling the TPM security feature in CMOS setup menu

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

Which of the answers listed below describe(s) the features of UEFI? (Select all that apply)

  • DRM support
  • GUI mode
  • Mouse support
  • Support for hard drives with a maximum of 4 partitions per drive
  • Secure boot
  • Support for partitions/hard drives of up to 2TB
  • Network access - ans-DRM support
  • GUI mode
  • Mouse support
  • Secure boot
  • Network access A computer supporting LoJack technology has two main components installed: an Application Agent residing in the operating system which sends tracking signals to the monitoring center allowing the law enforcement to locate and recover stolen device, and Persistence Module which restores the Application Agent and allows it to survive operating system re-installation or hard drive format. The highest level of security offered by LoJack can be achieved when Persistence Module resides in: Operating system Partition gap on the hard drive Computer's BIOS USB key - ansComputer's BIOS A UEFI functionality designed to prevent the loading of malware and unauthorized OSs during system start-up is known as: LoJack Bitlocker Secure boot Kerberos - ansSecure boot What is the function of a SMTP server? Email handling Serving of web pages Name resolution File storage & sharing - ansEmail handling Which of the server types listed below is used for the purpose of verification of the identity of a person or process? Proxy server

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

  • Lack of free access to the application code - ans-Permission to modify and redistribute the application
  • Free access to the application code Windows Phone, iOS, and Android are all examples of closed-source operating systems. True or False - ansFalse Mobile apps for iOS are available for purchase and download through which of the following online marketplaces? Amazon Appstore App Store Windows Marketplace for Mobile Google Play - ansApp Store Which of the marketplaces listed below offer(s) apps for Android-based devices? (Select all that apply) App Store Google Play Windows Marketplace for Mobile Amazon Appstore - ansGoogle Play Modern mobile devices have the capability to present landscape or portrait views of the device's screen based on the way the device is being held. Which of the following built-in functionalities allows for determining screen orientation in those devices? Hypervisor Geotracking Accelerometer Gyroscope - ansAccelerometer Which of the following built-in functionalities available in modern mobile devices supplements the function of an accelerometer by offering more accurate recognition of movement within a 3D space? Direct3D Multitouch Gyroscope Hypervisor - ansGyroscope Resistive touchscreen displays rely on the electrical properties of the human body to detect when and where on a display the user is touching. Because of this, resistive displays can be controlled with very light touches of a finger and generally cannot be used with a mechanical stylus or a gloved hand. Another characteristic feature of resistive touchscreens is that they do not require screen calibration.

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

True or False - ansFalse Capacitive touchscreen displays are composed of two flexible sheets coated with a resistive material and separated by an air gap or microdots. Pressure applied to the surface of the display by a finger or stylus causes the layers to touch, which completes electrical circuits and tells the device where the user is touching. As such, capacitive touchscreens require much more pressure to activate than resistive touchscreens as well as periodic screen calibration in order to be able to register the exact touch location. True or False - ansFalse A procedure of identifying someone's physical location by obtaining GPS data from their mobile device or other GPS-enabled devices is known as: Geotagging Wireless survey Geotracking Tethering - ansGeotracking Which of the solutions listed below was designed to alleviate cellular network coverage problems? Wi-Fi Calling Voice over IP (VoIP) Route aggregation Quality of Service (QoS) - ansWi-Fi Calling A type of mobile user interface presenting the main view of the device with a group of shortcut icons to apps is known as: Title screen Launcher Virtual assistant Desktop - ansLauncher Which of the following acronyms refers to a set of tools used for developing applications for a specific platform? GUI SDLC API SDK - ansSDK A package file format used by Android OS for distribution and installation of mobile apps is called:

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

Crosstalk Pairing - ansPairing Which of the following tools are used to provide protection against ESD? (Select all that apply) Antistatic bag Ground mat Tech bench Antistatic wrist strap - ansAntistatic bag Ground mat Antistatic wrist strap Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (Select all that apply) PSUs Batteries CRTs Toner cartridges LCDs - ansBatteries CRTs Toner cartridges Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that apply) CRTs Power supplies Inverters CPUs Laser printers - ansCRTs Power supplies Inverters Laser printers A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called: AUP MSTSC MAU MSDS - ansMSDS Which of the terms listed below refers to an environmental control system?

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

SCADA

HIPS

TEMPEST

HVAC - ansHVAC The term "Brownout" refers to what kind of situation? Power spike Electromagnetic interference Temporary drop in voltage Power outage - ansTemporary drop in voltage What does the term "Blackout" refer to? Power outage Electromagnetic interference Power spike Drop in voltage - ansPower outage A device designed to provide emergency power during an unexpected main power source outage is called: UPS PoE SVC PSU - ansUPS Which of the following solutions add(s) redundancy in areas identified as single points of failure? (Select all that apply) Virtualization RAID Uninterruptible Power Supply (UPS) Backup generator - ansRAID Uninterruptible Power Supply (UPS) Backup generator A device designed to protect electronic devices from large voltage fluctuations is known as: Power Supply Unit (PSU) Uninterruptible Power Supply (UPS) Surge suppressor Voltage regulator module (VRM) - ansSurge suppressor Which of the following tools would be used to clean the inside of a laser printer? (Select all that apply)

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

PII

PKI - ansPII Examples of proper communication and professional skills while dealing with difficult customer include: (Select 2 answers)

  • Clarifying customer statements by asking open ended questions to narrow the scope of the problem
  • Restating the issue to verify understanding
  • Adjusting to the technical user conversation style by using technical jargon
  • Asking close-ended questions to let the customer answer with a simple "Yes" or "No"
  • Clarifying customer statements by interrupting them if necessary - ans-Clarifying customer statements by asking open ended questions to narrow the scope of the problem
  • Restating the issue to verify understanding Which of the following is an example of good communication skills when dealing with a customer?
  • Asking close-ended questions to let the customer answer with a simple "Yes" or "No"
  • Arguing with a technical user if necessary to educate them
  • Listening to the customer and avoiding interruptions until he or she has finished describing the problem
  • Relying on your own judgment and not restating/clarifying what the customer says - ansListening to the customer and avoiding interruptions until he or she has finished describing the problem Which of the answers listed below refers to an example of appropriate handling of customer's confidential data in a situation where troubleshooting requires user's password?
  • Ask user to type in the password themselves
  • Ask user for password and their consent to use it
  • Break the password
  • Ask user for password and provide them with help in setting up new password after the problem is fixed - ansAsk user to type in the password themselves Which of the following actions should be the first step in the troubleshooting process?
  • Establishing a theory of probable cause of the problem
  • Conducting external or internal research based on problem symptoms
  • Identifying the problem
  • Establishing a plan of action to resolve the problem - ansIdentifying the problem Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech.

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

True or False - ansFalse Once the theory of probable cause of the problem has been established, the next troubleshooting step should involve: Verifying full system functionality Testing the theory to determine the problem cause Implementing the solution Establishing a plan of action to resolve the problem - ansTesting the theory to determine the problem cause Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology process is to: Conduct research based on symptoms Test the theory to determine problem cause Implement the solution Establish a theory of probable cause of the problem - ansImplement the solution According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed: After documenting findings, actions and outcomes As the first step of the troubleshooting process After implementing the solution As the last step of the troubleshooting process - ansAfter implementing the solution The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures. True or False - ansTrue If an application written for an earlier version of MS Windows doesn't run correctly the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and:

  • Choosing "Restore previous versions" option from the pop-up menu
  • Selecting "Run program using recommended compatibility settings" option from the pop-up menu
  • Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab
  • Selecting "Run as administrator" option from the pop-up menu - ansClicking on the Properties menu item, and then applying the required settings on the Compatibility tab

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

display all drives - > Right-click on the drive and select Properties from the pop-up window -

Launch the disk defragmenter utility available on the Tools tab

  • Press the R key while holding the Windows Logo key - > type in "cmd" (without quotation marks), and hit Enter - > Launch the disk defragmenter utility by typing in DEFRAG with the appropriate command switch
  • In Windows 8/8.1: Open File Explorer by pressing the E key while holding the Windows Logo key - > Click on the This PC menu item list on the left to display all drives - > Right- click on the drive and select Properties from the pop-up window - > Launch the disk defragmenter utility available on the Tools tab Similarly to magnetic drives, Solid State-Drives (SSDs) require periodic defragmentation in order to improve system performance. True or False - ansFalse Which of the following might be the cause of slow computer system performance? (Select all that apply) Unpatched OS Disk mirroring Malware presence OS power management options Disk striping File fragmentation Disk thrashing - ansUnpatched OS Malware presence OS power management options File fragmentation Disk thrashing Automatic booting into Safe mode on a Windows-based host might be caused by: (Select 2 answers) Overheating MSCONFIG settings RAID failure Malware presence Corrupt device driver - ansMSCONFIG settings Corrupt device driver Which of the answers listed below refer(s) to troubleshooting solution(s) used when a Windows-based host does not start in Normal mode, but only in Safe mode? (Select all that apply) System Restore

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

Change in boot order Driver rollback Troubleshooting system startup files Malware removal Startup Repair utility - ansSystem Restore Driver rollback Malware removal Startup Repair utility Examples of MS Windows system utilities that allow to pinpoint corrupt device drivers include: (Select 2 answers) Device Manager (DEVMGMT.MSC) Event Viewer (EVENTVWR) Computer Management (COMPMGMT.MSC) Performance Monitor (PERFMON) Task Manager (TASKMGR) - ansDevice Manager (DEVMGMT.MSC) Event Viewer (EVENTVWR) Which of the Control Panel applets in Windows 7/8/8.1 provides access to a system tool used for troubleshooting mismatched file associations? File Explorer Options Default Programs Sync Center Programs and Features - ansDefault Programs Which of the answers listed below refer to possible causes of the "NTLDR is missing" error message displayed during system boot? (Select 2 answers) Kernel panic Damaged hard drive Corrupt NTLDR file Improper shutdown The system is trying to boot from a non-bootable drive - ans-Corrupt NTLDR file

  • The system is trying to boot from a non-bootable drive Which of the following solutions would be of help in troubleshooting the "NTLDR is missing" error message displayed during system boot? (Select all that apply) Startup Repair utility Disconnecting any external drives Safe mode troubleshooting Adjusting the boot sequence in CMOS setup utility System File Checker (SFC.EXE) - ansStartup Repair utility

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

Which of the solutions/software tools listed below would be of use when troubleshooting a missing system GUI in MS Windows? (Select all that apply) Device Manager (DEVMGMT.MSC) Safe mode video driver update Control Panel Display applet System File Checker (SFC.EXE) VGA mode - ansSafe mode video driver update System File Checker (SFC.EXE) VGA mode The term "Live CD" typically refers to a compact disc (although other types of media such as DVD or USB can also be used to offer similar functionality) with a fully operational bootable Linux operating system distribution (the term is also used with reference to other OSs) which is run in the computer's memory thus eliminating the need for its installation on the hard drive. Live CDs can be used as an OS installation media, but also provide a convenient way for testing a given distro before installation as well as means for troubleshooting various OS- related problems. True or False - ansTrue "Kernel panic" is a term used to describe stop errors in: (Select all that apply) Windows Linux Android Mac OS - ansLinux Mac OS Which of the following locations would be the right source for finding information pertaining to a digital certificate validity? User Account Control (UAC) applet Web browser padlock icon menu Storage Spaces Control Panel applet Windows Security Account Manager (SAM) - ansWeb browser padlock icon menu Which of the file-related symptoms might indicate that the system has been infected by malware? Renamed system files Missing files File permission changes Denied file access All of the above - ansAll of the above

Test

Exam Study Guide latest Updated

100% Certified Exam Guide

One of the best practices for malware removal involves the process of isolation of files and applications suspected of containing malware in order to prevent further execution and potential harm to the user's system. This process is referred to as: Quarantine Content filtering Protected mode Blacklisting - ansQuarantine One of the recommended ways for enhancing a mobile device's security includes employing a web-based service (an app scanner) that allows users to check for known potential security/privacy risks related to a mobile application before downloading/purchasing the app. True or False - ansTrue The term "Cell tower analyzer" refers to a software tool that can be used for obtaining data on coverage, location, and signal strength of a Wi-Fi network. True or False - ansFalse A type of memory module form factor most commonly used for extending the capacity of primary storage in laptop computers is called: SO-DIMM SRAM MicroDIMM RDIMM - ansSO-DIMM Which of the answers listed below refers to a memory type commonly used as an additional external storage in laptops? ROM Flash USB Magnetic drive - ansFlash What is the most common type of laptop port used for the purpose of connecting peripheral devices? eSATA USB FireWire PS/2 - ansUSB Which of the following functionalities allows to overcome standard keyboard size restrictions in laptops?