Learn About CompTIA’s Exam 220-602: IT Technician

These practice test questions from MeasureUp are based on CompTIA’s exam 220-602: IT Technician .

The audience for this exam includes individuals who are in the early stages of a career in information technology (IT). This includes positions such as computer technicians, desktop support technicians and computer support specialists. Experience with installing, configuring and supporting computer hardware and software will help you prepare for this exam.

Passing exams 220-601 and 220-602 earns a candidate one of the certifications required by the U.S. Department of Defense (DOD) Directive 8570.1. This directive mandates that both DOD employees and contractors who work with the DOD on any security-related initiative must receive proper training and earn one or more network-related and security-related certifications.

Objective: Operating systems.
Sub-objective: Identify the fundamental principles of operating systems.

Single answer, multiple-choice

You want to create a text file. You create the file with a text editor and save it as INFO.TXT. You want the file to be easily accessible so that anyone can read it, but you want to protect the file so it cannot be easily edited or deleted. Which file or utility can you use to do this?

A.    MSDOS.SYS
B.    REGEDIT.EXE
C.    CONFIG.SYS
D.    ATTRIB.EXE

Answer:
D

Tutorial:
ATTRIB.EXE is a command prompt program that is used to display, add or change file attributes. You can type ATTRIB +R INFO.TXT to add the Read-Only attribute to the file. To edit or delete the file, the Read-Only attribute must be removed using the command ATTRIB -R INFO.TXT. This will not absolutely prevent someone from editing or deleting the file, but extra steps are required to do it.

Other attributes include the following:

* A (Archive): Used by backup programs to indicate which files have been changed since the last backup.
* H (Hidden): Used to keep a file name from being displayed with the DIR command.
* S (System): Designates a file critical to the system start-up and operation.

CONFIG.SYS is the DOS system file that contains hardware/driver information and environment settings.

MSDOS.SYS is one of the hidden, necessary files that must be on a boot disk for DOS to initialize.

REGEDIT.EXE is the Windows Registry Information Editor. It makes it easier to edit the keys and entries in the Windows registry.

References:
Using the command Prompt
A+ Complete Study Guide, 3rd Edition
Chapter 12
                
File attributes
CompTIA A+ Certification: 220-602
Unit 10                

Objective: Laptops and portable devices.
Sub-objective: Identify fundamental principles of using laptops and portable devices.

Single answer, multiple-choice

Which standard is used to connect a Personal Digital Assistant (PDA) to a desktop computer using radio frequencies?

A.    Bluetooth.
B.    802.11b
C.    802.11g
D.    FireWire.

Answer:
A

Explanation:
Bluetooth is a standard that allows devices to discover each other and communicate over short-distance radio raves. Bluetooth devices include PDAs, PC peripherals such as a mouse and cell phones.

802.11b is a wireless networking standard that operates at 10 Mbps. It is used to network computers, not to allow devices to connect to a computer. However, if the configuration was different and the computer was set up as a wireless access point, it would be possible to access shared resources over 802.11b or 802.11g.

802.11g is also a wireless networking standard. It operates at up to 54 Mbps.

FireWire (IEEE 1394) is a high-speed serial SCSI interface. It is used for data transfer, but requires a FireWire cable. It does not operate using radio frequencies.

References:
7 things to know before buying a PDA
http://www.microsoft.com/smallbusiness/resources/technology/hardware/7_things_to_know_before_buying_a_pda.mspx?xid=OVPI381
     
FireWire ports, cables, and connectors
CompTIA A+ Certification: 220-602
Unit 6
                
Infrared and Bluetooth wireless ports
CompTIA A+ Certification: 220-602
Unit 6                

Objective: Communication and professionalism.
Sub-objective: Use good communication skills, including listening and tact/discretion, when communicating with customers and colleagues.

Single answer, multiple-choice

You are fixing a problem for a user. The problem is taking longer to solve than you had originally expected, and you have a department meeting to attend. What should you do?

A.    Excuse yourself to go to the meeting and return later to finish fixing the problem.
B.    Excuse yourself to call your department manager and explain the situation.
C.    Continue working on the user's problem until it is solved even if it means missing the meeting.
D.    Tell the user that you have a more pressing problem that needs to be solved and return later to finish fixing the problem.
 
Answer:
B

Tutorial:
You should call your department manager and explain the situation. Most likely the manager will want you to stay and solve the user's problem. But you have covered all your bases by notifying the manager of the situation.

You should not just excuse yourself to go to the meeting and return later to fix the problem. You should not let a user know that a meeting is more important than his or her problem.

You should not just continue working on the user's problem without notifying your manager of the situation. Most likely your manager will be angry if you do not attend the meeting without calling.

You should not lie to the user and return later. A user should never be told that another user's problem is more important.

References:
Professionalism
CompTIA A+ Certification: 220-602
Unit 15                

Objective: Networks.
Sub-objective: Install, configure, optimize and upgrade networks.

Single answer, multiple-choice

A user telecommutes three days a week using a laptop computer that is running Windows XP Professional. The user's Internet Service Provider at home requires a static IP address, subnet mask and DNS server setting. The company network assigns addresses using DHCP. You need to configure the user's computer so the user can access the Internet when at home and the corporate network when at the office. What should you do?

A.    Create separate user profiles for the user at home and at work.
B.    Create separate hardware profiles for the user at home and at work.
C.    Enable automatic configuration. Add the ISP-defined settings to the Alternate Configuration tab.
D.    Configure both IP configurations manually in Advanced TCP/IP settings.
 
Answer:
C

Explanation:
You should enable automatic configuration and add the ISP-defined settings to the Alternate Configuration tab. With this configuration, the computer first tries to find a DHCP server. If one cannot be found, the IP configuration on the Alternate Configuration tab is used.

You should not create separate user profiles for the user at home and at work. IP configuration settings are not defined in the user profile.

You should not create separate hardware profiles for the user at home and at work. The hardware profile limits the drivers that are loaded. It cannot be used to establish different IP configuration settings.

You should not configure both IP configurations manually in Advanced TCP/IP settings. Doing so would create a multi-homed network adapter, but the settings would not work correctly given the situation. Also, you want to be able to dynamically assign addresses when the user is connected to the company network, not manually assign the address.

References:
Networking configuration
CompTIA A+ Certification: 220-602
Unit 12        
        
To configure TCP/IP for an alternate configuration
https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/sag_tcpip_pro_altconfig.mspx?mfr=true

Objective: Security.
Sub-objective: Identify the fundamentals and principles of security.

Single answer, multiple-choice

How can you configure a system to provide a warning of an attempted brute force attack?

A.    Enable logging of failed log-in attempts.
B.    Require strong passwords.
C.    Install a firewall between the company network and the Internet.
D.    Enable Windows Firewall on each user's computer.

Answer:
A

Tutorial:
A brute force attack — also called a dictionary attack — is one in which an attacker uses software that tries password combinations until the correct password is found. You can enable logging of failed log-in attempts to provide yourself with a warning that an attacker is attempting a brute force attack. A large number of failed log-in attempts indicate that such an attack is under way.

Requiring strong passwords can help prevent a brute force attack from succeeding, but it does not inform you that one is being attempted.

Installing a firewall between the company network and the Internet can help limit access to the company network from the outside, but it cannot give warning of an attempted brute force attack.

Enabling Windows Firewall on each user's computer can help prevent certain types of packets from being accepted by a user's computer and can help prevent various types of attacks. However, it cannot provide you with warning of an attempted brute force attack.

Reference:
Auditing and logging
CompTIA A+ Certification: 220-602
Unit 13               

Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>