Practice Free 220-1101 Exam Online Questions
Which of the following types of devices MOST often uses a Thunderbolt cable?
- A . Linux PC
- B . Android mobile
- C . Apple laptop
- D . Chromebook
C
Explanation:
Thunderbolt cables are commonly used to connect Apple laptops to external displays or other devices. While Thunderbolt is available on some Windows and Chromebook devices, it is most commonly associated with Apple products.
References: https://www.intel.com/content/www/us/en/products/docs/io/thunderbolt/thunderbolt-technology-general.html
A technician is implementing a SOHO wireless solution with three access points.
Which of the following actions would avoid high latency?
- A . Enabling and configuring a 5GHz antenna
- B . Configuring separate IP ranges
- C . Enabling multiple SSIDs
- D . Configuring all devices with different channels
D
Explanation:
If a technician is implementing a SOHO wireless solution with three access points and wants to avoid high latency, the technician should configure all devices with different channels. By configuring all devices with different channels, the technician can ensure that the wireless signals from each access point do not interfere with each other, which can cause high latency.
Which of the following models is an example of metered utilization?
- A . Reserved instance
- B . Pay-as-you-go
- C . Subscription-based
- D . Multitenant
B
Explanation:
Metered utilization is a pricing model for cloud computing services, where the customer pays only for the amount of resources that are consumed, such as CPU time, memory, storage, bandwidth, etc. The customer is billed based on the actual usage of the resources, rather than a fixed or upfront fee. Metered utilization is also known as usage-based pricing or pay-per-use12.
Pay-as-you-go is an example of metered utilization, where the customer pays for the cloud resources on demand, without any long-term commitment or contract. The customer can scale up or down the resources as needed, and only pay for what is used. Pay-as-you-go is a flexible and cost-effective option for customers who have unpredictable or variable workloads, or who want to try out new services or features12.
The other options are not examples of metered utilization. Reserved instance is a pricing model where the customer pays a discounted rate for a fixed amount of cloud resources for a specified period of time, such as one or three years. The customer can reserve the resources in advance, and benefit from lower costs and guaranteed availability. Reserved instance is suitable for customers who have predictable or steady workloads, or who want to optimize their budget12.
Subscription-based is a pricing model where the customer pays a fixed fee for a set of cloud services or features for a certain period of time, such as monthly or annually. The customer can access the services or features as much as needed, without worrying about the usage or consumption of the resources. Subscription-based is suitable for customers who want to have a consistent and predictable cost, or who want to access premium or exclusive services or features12.
Multitenant is not a pricing model, but a cloud architecture where multiple customers share the same physical or virtual resources, such as servers, databases, applications, etc. The resources are isolated and secured for each customer, and the customers can benefit from lower costs, higher scalability, and faster updates. Multitenant is a common characteristic of public cloud services, where the cloud provider manages and maintains the resources for the customers12.
Reference: CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 4: Cloud Computing and
Virtualization, Section 4.2: Cloud Computing Concepts, Page 261
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, Chapter 6: Cloud Computing and
Virtualization, Section 6.2: Cloud Computing Concepts, Page 241
While implementing a non-carrier-grade wireless backhaul, a technician notices the current channel selection is externally polluted with various RF signals. Upon performing a spectral analysis, the technician discovers a channel containing almost no RF pollution.
Unfortunately, the technician is unable to select that channel.
Which of the following is the MOST likely reason for this issue?
- A . The channel is reserved for licensed band use.
- B . The channel selection is defective, contact the manufacturer.
- C . The channel must be unblocked by the vendor.
- D . The device requires a firmware update to unlock the channel.
A
Explanation:
The 2. band is subdivided into up to 14 channels, spaced at 5 MHz intervals from 2412 MHz up to 2484 MHz. Wi-Fi requires bandwidth of approximately 20 MHz, not 5 MHz. Consequently, a site designer needs to choose the channels that do not overlap. On a WLAN where only the first 11 channels are available, channels 1, 6, and 11 can be selected as non-overlapping. Note: In the Americas, regulations permit the use of channels 1-11 only, while in Europe, channels 1-13 are permitted. In Japan, all 14 channels are permitted.
An IT technician is inspecting the internal components of a desktop computer to assess a suspected power issue with the motherboard.
Which of the following connectors should the IT technician inspect further?
- A . RJ45
- B . Straight tip
- C . DB9
- D . Molex
D
Explanation:
The connector that the IT technician should inspect further is Molex. The Molex connector is used to provide power to the motherboard and other components in the computer. If there is a suspected power issue with the motherboard, the IT technician should inspect the Molex connector to ensure that it is properly connected and providing power to the motherboard1
Which of the following best describes the concept of a DHCP lease?
- A . A definition of the scope of addresses to be assigned to a device on the network
- B . A reservation of an IP configuration for a device on the network
- C . A temporary assignment of an IP configuration to a device on the network
- D . A translation of network names to IP addresses for a device on the network
C
Explanation:
A DHCP lease is a temporary assignment of an IP address and other network configuration parameters (such as DNS and gateway) to a device. The lease is renewed periodically to maintain the assignment.
Why Not A (A definition of the scope of addresses): The DHCP scope defines the range of IP addresses but is not the lease itself.
Why Not B (A reservation of an IP configuration): DHCP reservations ensure a specific device always receives the same IP address, but this is not the lease.
Why Not D (A translation of network names to IP addresses): This describes DNS, not DHCP.
CompTIA A+ Exam
Reference: Core 1 (220-1101), Section 2.6, DHCP concepts.
Which of the following are benefits of application virtualization? (Select two).
- A . The network works more quickly.
- B . Applications are easier to learn.
- C . RAM works more efficiently.
- D . The overall IT cost goes down.
- E . OS performance is superior.
- F . Upgrading applications is easier.
DF
Explanation:
The correct answers are D. The overall IT cost goes down and F. Upgrading applications is easier. Application virtualization is a technology that allows users to run applications without installing them on their devices. The applications are stored and executed on a remote server, and the users can access them through a network connection. Application virtualization has several benefits, such as12:
• The overall IT cost goes down: Application virtualization reduces the need for hardware, software, and maintenance costs, as the applications are centralized and managed on the server side. This also saves energy and space, as fewer physical machines are required to run the applications. Additionally, application virtualization can reduce licensing costs, as the applications can be delivered on-demand and based on usage.
• Upgrading applications is easier: Application virtualization simplifies the process of updating and patching applications, as the changes can be made on the server side and pushed to the users instantly. This eliminates the need for manual installation and configuration on each device, and ensures that all users have the latest version of the applications.
Other benefits of application virtualization include123:
• Allows the running of legacy apps: Application virtualization can enable users to run applications that are developed for older or incompatible operating systems, such as Windows 7 or XP. This can extend the lifespan of legacy applications and avoid compatibility issues.
• Enables cross-platform operations: Application virtualization can allow users to run applications that are designed for different platforms, such as Windows apps on iOS, Android, macOS, or Chrome OS. This can increase the accessibility and mobility of the applications and enhance the user experience.
• Improves security and compliance: Application virtualization can isolate the applications from the underlying operating system and hardware, preventing malware or unauthorized access from affecting them. This can also protect the data and settings of the applications from being tampered with or lost. Furthermore, application virtualization can help enforce compliance policies and regulations, as the applications can be controlled and monitored by the server.
Reference: 1: 5 Benefits of Virtualization – IBM Blog
2: Benefits of Application Virtualization – AppsAnywhere
3: What is Application Virtualization? | VMware Glossary
Which of the following BEST describes a lab environment in which virtual machines can be created, rebooted, and shut down without affecting the production network?
- A . SCADA
- B . Sandbox
- C . Honeypot
- D . Hybrid cloud
B
Explanation:
A sandbox is a lab environment in which virtual machines can be created, rebooted, and shut down without affecting the production network. This allows for testing and experimentation without the risk of damaging the production environment123..
Which of the following cloud models exclusively utilizes a local data center?
- A . Private
- B . Public
- C . Hybrid
- D . Community
C
Explanation:
A private cloud utilizes infrastructure that is hosted on-premises, often in a local data center, to provide services exclusively to the organization.
Isolating email attachments in a safe place until the attachments can be scanned for malware is defined as:
- A . an approve listing.
- B . a screened subnet.
- C . cross-platform virtualization.
- D . sandboxing.
D
Explanation:
The correct answer is D. Sandboxing.
Sandboxing is a security technique that isolates email attachments in a safe place until the attachments can be scanned for malware. A sandbox is a virtual environment that mimics the operating system and applications of the user, but prevents any changes or damage to the actual system. A sandbox can also monitor the behavior and activity of the attachments and detect any malicious code or actions12.
An approve listing is a security technique that allows only trusted or authorized email senders or domains to be received by the user. An approve listing can help reduce spam and phishing emails, but it does not scan or isolate email attachments for malware3.
A screened subnet is a security technique that creates a buffer zone between the internal network and the internet. A screened subnet uses firewalls and routers to filter and control the traffic that enters and exits the network. A screened subnet can help protect the network from external attacks, but it does not scan or isolate email attachments for malware.
Cross-platform virtualization is a technology that allows running multiple operating systems and applications on the same physical machine. Cross-platform virtualization can help improve efficiency, flexibility, and compatibility, but it does not scan or isolate email attachments for malware.