CompTIA A+ 220-702 Essentials Practice Test....(Part 2)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Freddyoca
F
Freddyoca
Community Contributor
Quizzes Created: 5 | Total Attempts: 4,825
Questions: 113 | Attempts: 562

SettingsSettingsSettings
A Plus Essential Quizzes & Trivia

Questions and Answers
  • 1. 

    A user reports that their system is giving a message stating that their USB 2.0 devices are running at USB 1.1 speed without an external USB hub. The devices run at USB 2.0 when tested on the technicians PC. Which of the following will MOST likely provide USB 2.0 functionality?

    • A.

      Install an IEEE 1394 compliant expansion card.

    • B.

      Install an external USB 2.0 hub.

    • C.

      Install a USB 2.0 firmware update on the motherboard.

    • D.

      Replace USB 1.1 extension cables with USB 2.0 extension cables.

    Correct Answer
    C. Install a USB 2.0 firmware update on the motherboard.
    Explanation
    Installing a USB 2.0 firmware update on the motherboard is the most likely solution to provide USB 2.0 functionality in this scenario. This update will ensure that the motherboard's firmware is compatible with USB 2.0 devices and will enable them to run at the correct speed. This solution is preferred over the other options because it directly addresses the issue with the system's USB functionality and does not require any additional hardware or cables.

    Rate this question:

  • 2. 

    Which of the following is the BEST tool to troubleshoot a DB-9 port?

    • A.

      Ohm meter

    • B.

      Anti-static wrist strap

    • C.

      Oscilloscope

    • D.

      Loopback plug

    Correct Answer
    D. Loopback plug
    Explanation
    A loopback plug is the best tool to troubleshoot a DB-9 port because it allows for testing the port's functionality by creating a loop within the port itself. This means that any issues with the port, such as connectivity or signal problems, can be identified and resolved. Unlike the other options listed, a loopback plug specifically targets the DB-9 port and provides a simple and effective method for troubleshooting. An ohm meter measures resistance, an anti-static wrist strap prevents static discharge, and an oscilloscope is used for analyzing waveforms, but none of these tools are specifically designed for troubleshooting a DB-9 port.

    Rate this question:

  • 3. 

    A customer reports that a networked printer is not printing documents. The technician successfully pings the printers IP address. Which of the following could be the problem? (Select TWO).

    • A.

      The network cable is unplugged.

    • B.

      The printer is low on toner.

    • C.

      The gateway address on the printer is incorrect.

    • D.

      The printer is out of paper.

    • E.

      The spooler is not functioning.

    Correct Answer(s)
    D. The printer is out of paper.
    E. The spooler is not functioning.
    Explanation
    The printer being out of paper could be a possible problem because if there is no paper, the printer will not be able to print the documents. Additionally, if the spooler is not functioning, it can cause issues with the printing process as the spooler is responsible for managing print jobs.

    Rate this question:

  • 4. 

    Which of the following does PING -t do?

    • A.

      Continuous ping of an IP address until cancelled

    • B.

      Continuous ping of an IP address until the count reaches 1000

    • C.

      Continuous ping of an IP address until the target responds

    • D.

      Continuous ping of an IP address until the target returns

    Correct Answer
    A. Continuous ping of an IP address until cancelled
    Explanation
    The correct answer is continuous ping of an IP address until cancelled. The "-t" option in the PING command allows the user to continuously ping an IP address until they manually cancel the command. This is useful for monitoring network connectivity and latency over an extended period of time. The other options mentioned, such as reaching a count of 1000 or waiting for a response or return from the target, do not accurately describe the functionality of the "-t" option.

    Rate this question:

  • 5. 

    Which of the following is contained in the first sector of the hard disk?

    • A.

      Operating system

    • B.

      Master file table

    • C.

      Boot sector

    • D.

      Master boot record

    Correct Answer
    D. Master boot record
    Explanation
    The first sector of a hard disk contains the Master Boot Record (MBR). The MBR is a small program that is executed when the computer is powered on and it contains information about the disk's partitions and the location of the operating system. It also contains the partition table, which helps the computer locate and access the different partitions on the disk. The MBR is crucial for the computer to boot up properly and initiate the operating system.

    Rate this question:

  • 6. 

    A technician is tasked with setting up a Windows XP computer with a user account that will only be used to access the Internet. Which account type should the user have access to?

    • A.

      Guest

    • B.

      Administrator

    • C.

      Domain User

    • D.

      Power User

    Correct Answer
    A. Guest
    Explanation
    The user should have access to the Guest account. The Guest account is designed for temporary or occasional use and has limited privileges, making it suitable for a user who only needs to access the internet. The Administrator account has full control over the computer and should not be used for regular internet access. Domain User accounts are typically used in a networked environment, and Power User accounts have elevated privileges that may not be necessary for internet access.

    Rate this question:

  • 7. 

    If a technician suspects that the voltage being delivered to a desktop computers power supply is insufficient or incorrect, which device should be used to determine the correct voltage?

    • A.

      A power supply tester

    • B.

      A multimeter

    • C.

      A loopback adapter

    • D.

      A cable tester

    Correct Answer
    B. A multimeter
    Explanation
    A multimeter is the correct device to determine the correct voltage being delivered to a desktop computer's power supply. A multimeter is a versatile tool that can measure various electrical properties, including voltage. By connecting the multimeter to the power supply, the technician can accurately measure the voltage and determine if it is within the required range or not. This allows them to identify any issues with the voltage and take necessary steps to rectify them.

    Rate this question:

  • 8. 

    A virus has been removed from the users machine, but the user still cannot access the Internet. Which of the following should the technician check NEXT?

    • A.

      Disable port forwarding on the router.

    • B.

      Reboot to Safe Mode and see if the Internet is accessible.

    • C.

      Format the machine and reinstall the OS.

    • D.

      Check the web browsers proxy settings.

    Correct Answer
    D. Check the web browsers proxy settings.
    Explanation
    After removing the virus from the user's machine, the technician should check the web browser's proxy settings next. Proxy settings can sometimes be modified by malware, causing issues with internet access. By checking and potentially adjusting the proxy settings, the technician can ensure that the user can access the internet properly. Disabling port forwarding on the router, rebooting to Safe Mode, and formatting the machine and reinstalling the OS are not necessary steps in this scenario as the issue is likely related to the proxy settings.

    Rate this question:

  • 9. 

    After upgrading to Windows Vista, a client states that the run command no longer appears on the Start menu: Which of the following is the reason the user cannot see the run command?

    • A.

      The user must be an administrator to have access to the run command.

    • B.

      The Vista run command is not installed by default during an upgrade.

    • C.

      Vista has replaced the run command with the Power Shell.

    • D.

      The run command is not displayed by default on the start menu.

    Correct Answer
    D. The run command is not displayed by default on the start menu.
    Explanation
    The reason the user cannot see the run command after upgrading to Windows Vista is because the run command is not displayed by default on the start menu.

    Rate this question:

  • 10. 

    A user states that email is not being received. Which of the following protocols should the technician check for incoming mail?

    • A.

      SMTP

    • B.

      POP3

    • C.

      NNTP

    • D.

      HTTP

    Correct Answer
    B. POP3
    Explanation
    The technician should check the POP3 protocol for incoming mail. POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server to a local email client. It allows the user to download and access their emails from the server onto their device. By checking the POP3 protocol, the technician can troubleshoot any issues related to the user not receiving emails.

    Rate this question:

  • 11. 

    On a laptop, which of the following is the name of the socket that a wireless card would typically be inserted into?

    • A.

      PCIe

    • B.

      AGP

    • C.

      Mini PCI

    • D.

      PCI

    Correct Answer
    C. Mini PCI
    Explanation
    A wireless card on a laptop is typically inserted into a Mini PCI socket. This socket is specifically designed to accommodate Mini PCI cards, which are commonly used for wireless connectivity. PCIe and PCI are different types of expansion slots found on desktop computers, while AGP is an outdated graphics card slot. Therefore, Mini PCI is the correct answer for a laptop's wireless card socket.

    Rate this question:

  • 12. 

    A technician has just installed a new hard drive into a Windows Vista desktop computer. The hard drive does not appear in Windows Explorer. Which of the following should the technician perform NEXT to have the drive recognized by the system?

    • A.

      Initialize and format the hard drive through Disk Management

    • B.

      Reboot the system

    • C.

      Assign a drive letter to the hard drive through Disk Management

    • D.

      Configure the drive in the systems CMOS program

    Correct Answer
    A. Initialize and format the hard drive through Disk Management
    Explanation
    To have the newly installed hard drive recognized by the system, the technician should initialize and format the hard drive through Disk Management. This process will prepare the hard drive for use by creating a partition and formatting it with a file system that Windows can recognize. Once the hard drive is initialized and formatted, it will be visible in Windows Explorer and ready for use.

    Rate this question:

  • 13. 

    A workstation is not booting correctly. The technician wants to locate bad sectors and recover readable information. Which of the following commands would the technician use?

    • A.

      Chkdsk c: /f

    • B.

      Chkdsk c: /i

    • C.

      Chkdsk c: /c

    • D.

      Chkdsk c: /r

    Correct Answer
    D. Chkdsk c: /r
    Explanation
    The technician would use the "chkdsk c: /r" command to locate bad sectors and recover readable information. The "/r" parameter stands for "repair" and instructs the chkdsk command to locate bad sectors on the hard drive and attempt to recover any readable information from them. This command is commonly used to fix disk errors and recover data on a malfunctioning workstation.

    Rate this question:

  • 14. 

    A technician adds a video card to a single monitor system with an existing on-board video controller. After powering on the system, an error message appears on the monitor stating No Input Detected. Which of the following is the problem?

    • A.

      The add-on video card is conflicting with the onboard video controller.

    • B.

      The add-on video card is incompatible with the system.

    • C.

      The monitor is still connected to the on board video controller.

    • D.

      The monitor cannot support the video resolution of the add-on video card.

    Correct Answer
    C. The monitor is still connected to the on board video controller.
    Explanation
    The error message "No Input Detected" suggests that the monitor is not receiving any signal from the video source. Since a video card has been added to the system, it is likely that the monitor is still connected to the on-board video controller instead of the newly installed add-on video card.

    Rate this question:

  • 15. 

    Which of the following is the MAXIMUM allowable cable length of CAT5?

    • A.

      100 meters (328 feet)

    • B.

      250 meters (820 feet)

    • C.

      500 meters (1640 feet)

    • D.

      1000 meters (3280 feet)

    Correct Answer
    A. 100 meters (328 feet)
    Explanation
    The maximum allowable cable length of CAT5 is 100 meters (328 feet). This is because CAT5 cables are designed to transmit data over short distances and exceeding this length can result in signal degradation and loss.

    Rate this question:

  • 16. 

    An internal IEEE 1394 expansion card should be installed on which port type?

    • A.

      AMR

    • B.

      AGP

    • C.

      ISA

    • D.

      PCI

    Correct Answer
    D. PCI
    Explanation
    An internal IEEE 1394 expansion card should be installed on the PCI port type. PCI stands for Peripheral Component Interconnect, which is a standard expansion bus that allows devices to be connected to the computer's motherboard. This type of port is commonly used for various expansion cards, including IEEE 1394 (also known as FireWire) cards, which are used for high-speed data transfer and connecting devices such as cameras and external hard drives.

    Rate this question:

  • 17. 

    A technician is troubleshooting problems with a hard drive. After checking the drive in another computer and finding no issues, the technician takes voltage readings on the Molex connector from the power supply. Which of the following represents the readings the technician should find?

    • A.

      -5V and +12V

    • B.

      +3.3V and -5V

    • C.

      +3.3V and +12V

    • D.

      +5V and +12V

    Correct Answer
    D. +5V and +12V
    Explanation
    The technician should find voltage readings of +5V and +12V on the Molex connector. This is because the Molex connector is commonly used to provide power to hard drives, and the standard voltage outputs for the Molex connector are +5V and +12V. These voltage readings indicate that the power supply is providing the correct power levels to the hard drive, suggesting that the issue lies elsewhere in the troubleshooting process.

    Rate this question:

  • 18. 

    A user powers up their desktop PC, and instead of booting up normally, the user is taken into the BIOS setup. Which of the following is the MOST likely problem?

    • A.

      The MBR is corrupt

    • B.

      NTLDR cannot be found by the system

    • C.

      A faulty CMOS battery

    • D.

      The BIOS requires a firmware update

    Correct Answer
    C. A faulty CMOS battery
    Explanation
    A faulty CMOS battery is the most likely problem in this scenario. The CMOS battery is responsible for providing power to the CMOS chip, which stores the BIOS settings. If the battery is faulty, it may not be able to provide sufficient power to the CMOS chip, causing the BIOS to reset and take the user into the BIOS setup instead of booting up normally. This can be resolved by replacing the faulty CMOS battery.

    Rate this question:

  • 19. 

    A user reports that when typing on the laptop keyboard, the mouse pointer scrolls across the screen. Which of the following would MOST likely resolve this issue?

    • A.

      Reboot the laptop

    • B.

      Use an external monitor

    • C.

      Disable the touch pad

    • D.

      Plug in an external mouse

    Correct Answer
    C. Disable the touch pad
    Explanation
    Disabling the touchpad would most likely resolve the issue because it seems that the touchpad is sensitive and causing the mouse pointer to scroll across the screen when typing. By disabling the touchpad, the user can prevent any accidental movements of the mouse pointer while typing on the laptop keyboard.

    Rate this question:

  • 20. 

    A computer is responding slowly and the Task Manager shows that spool.exe is using 95% of system resources. Which of the following is MOST likely the cause of this problem?

    • A.

      Printing subsystem

    • B.

      Windows Update is running

    • C.

      A virus infection has occurred

    • D.

      Hyper threading has been disabled

    Correct Answer
    A. Printing subsystem
    Explanation
    The most likely cause of the computer responding slowly and spool.exe using 95% of system resources is the printing subsystem. The spool.exe process is responsible for managing print jobs in the Windows operating system. If there is a problem with the printing subsystem, such as a large number of print jobs or a printer driver issue, it can cause the spool.exe process to consume excessive system resources and slow down the computer.

    Rate this question:

  • 21. 

    Which of the following should MOST likely be replaced if the laptop will not display any video through the laptops screen or an external monitor?

    • A.

      LCD

    • B.

      Power inverter

    • C.

      Video drivers

    • D.

      Video card

    Correct Answer
    D. Video card
    Explanation
    If the laptop is not displaying any video through the laptop screen or an external monitor, the most likely component that needs to be replaced is the video card. The video card is responsible for generating and sending video signals to the display. If the video card is faulty or not functioning properly, it can result in no video output on the screen. Replacing the video card should resolve the issue and restore video display on the laptop.

    Rate this question:

  • 22. 

    A technician is replacing a motherboard in a users desktop PC. Which of the following tools should be used before replacing the new motherboard?

    • A.

      Power supply tester

    • B.

      BIOS update disk

    • C.

      Loopback plug

    • D.

      Wire tester

    Correct Answer
    A. Power supply tester
    Explanation
    Before replacing the new motherboard, a technician should use a power supply tester. This tool is used to check if the power supply unit (PSU) is functioning properly. By testing the PSU, the technician can ensure that the motherboard will receive the correct amount of power and prevent any potential issues that may arise from a faulty power supply.

    Rate this question:

  • 23. 

    A computer just had a memory upgrade installed on the machine. Upon boot, the system does not recognize the new memory even though it is listed as being compatible on the manufacturers website. Which of the following is MOST likely needed to resolve the issue?

    • A.

      OS update

    • B.

      Adjust jumper settings

    • C.

      BIOS update

    • D.

      New CMOS battery

    Correct Answer
    C. BIOS update
    Explanation
    The most likely solution to the issue of the computer not recognizing the new memory after a memory upgrade is a BIOS update. The BIOS (Basic Input/Output System) is responsible for initializing and configuring hardware components, including memory. Updating the BIOS can ensure that the system recognizes and properly utilizes the new memory.

    Rate this question:

  • 24. 

    USER1 is part of the Users Group and is attempting to access files via UNC path \\SERVER\FILESHARE. \\ SERVER\FILESHARE has the following share permissions: AdministratorsFull ControlUsersRead OnlyGuestsNo AccessThe directory on the hard drive where the share is located has the following permissions: AdministratorsFull ControlUsersChangeGuestsNo AccessWhich of the following levels of access will login account USER1 have?

    • A.

      Read Only

    • B.

      Full Control

    • C.

      Change

    • D.

      No Access

    Correct Answer
    A. Read Only
    Explanation
    Based on the given information, the share permissions for \\SERVER\FILESHARE are set to "Read Only" for the Users group. Therefore, the login account USER1, being a part of the Users group, will have "Read Only" access to the files via the UNC path \\SERVER\FILESHARE. The directory permissions on the hard drive are not relevant in this case, as the share permissions take precedence.

    Rate this question:

  • 25. 

    A user states that the computer is too slow when capturing video from an HD camera. Upon inspection the technician realizes that the computer is state-of-the-art in hardware, but it is using an external legacy USB 1.1 video capture card. The camera has USB 2.0 and IEE1394b outputs. Which of the following is the BEST recommendation to increase the video capture capabilities in this situation?

    • A.

      Recommend using lower resolution in the video signal.

    • B.

      Install an IEEE1394b video capture card.

    • C.

      Recommend replacing the camera with a USB 1.1 connection.

    • D.

      Install a USB 2.0 video capture card.

    Correct Answer
    B. Install an IEEE1394b video capture card.
    Explanation
    The technician should recommend installing an IEEE1394b video capture card. This is because the computer is already state-of-the-art in terms of hardware, so the issue lies with the external legacy USB 1.1 video capture card. By installing an IEEE1394b video capture card, which is a faster and more modern connection, the computer will be able to capture video from the HD camera at a higher speed and improve its video capture capabilities.

    Rate this question:

  • 26. 

    A technician needs to implement a RAID 1 set on a computer. Which of the following is the MINIMUM number of hard drives that would be required?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      5

    Correct Answer
    B. 2
    Explanation
    To implement a RAID 1 set, also known as disk mirroring, the technician needs to have at least two hard drives. In RAID 1, data is written simultaneously to two drives, creating an exact copy or mirror of the data. This redundancy provides data protection in case one of the drives fails. Therefore, the minimum number of hard drives required for RAID 1 is 2.

    Rate this question:

  • 27. 

    Which of the following is a method used in the removal of a boot sector virus?

    • A.

      Performing a standard format of the hard drive partitions

    • B.

      Booting the computer with peripheral devices disconnected

    • C.

      Scanning all CD-R and CD-RW media prior to initial use

    • D.

      Booting from the floppy disk or CD-ROM prior to scanning

    Correct Answer
    D. Booting from the floppy disk or CD-ROM prior to scanning
    Explanation
    Booting from the floppy disk or CD-ROM prior to scanning is a method used in the removal of a boot sector virus. This is because booting from a clean and trusted source, such as a floppy disk or CD-ROM, allows the computer to bypass the infected boot sector on the hard drive. By doing so, the virus is not loaded into memory, which enables the antivirus software to effectively scan and remove the virus from the system.

    Rate this question:

  • 28. 

    A user is not able to receive files off the FTP server. Which of the following default ports needs to be opened for FTP to work properly?

    • A.

      21

    • B.

      80

    • C.

      110

    • D.

      44 443

    Correct Answer
    A. 21
    Explanation
    Port 21 is the default port for FTP (File Transfer Protocol). When a user wants to receive files from an FTP server, they need to have port 21 opened on their network or firewall. This is because FTP uses port 21 for its control connection, which is responsible for sending commands and responses between the client and server. By opening port 21, the user will be able to establish a connection with the FTP server and receive files successfully.

    Rate this question:

  • 29. 

    Which of the following is the MOST important reason for ensuring a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port?

    • A.

      RJ-11 jacks do not support full duplex.

    • B.

      Ethernet supports pulse dialing, not tone dialing.

    • C.

      The public telephone network uses token-ring, not Ethernet.

    • D.

      Phone line voltages can damage Ethernet equipment.

    Correct Answer
    D. pHone line voltages can damage Ethernet equipment.
    Explanation
    Phone line voltages can damage Ethernet equipment. RJ-11 jacks are designed for phone lines, which typically carry lower voltages compared to Ethernet networks. Connecting a RJ-11 phone line jack to a RJ-45 Ethernet network port can result in higher voltages being applied to the Ethernet equipment, potentially causing damage. Therefore, it is important to ensure that a RJ-11 phone line jack is not connected to a RJ-45 Ethernet network port to prevent any potential damage to the equipment.

    Rate this question:

  • 30. 

    Users are reporting that a Vista feature asks them for confirmation before running most applications or making system changes. Which of the following is the name of this Vista feature and where should the technician direct users to turn the functionality off?

    • A.

      User Account Control; it can be turned off under Security in the Control Panel.

    • B.

      Security Center; it can be turned off in the Services MMC snap-in.

    • C.

      User Account Control; it can be turned off under User Accounts in the Control Panel.

    • D.

      Windows Firewall; it can be turned off under System Properties.

    Correct Answer
    C. User Account Control; it can be turned off under User Accounts in the Control Panel.
    Explanation
    The correct answer is User Account Control; it can be turned off under User Accounts in the Control Panel. User Account Control (UAC) is a feature in Windows Vista that prompts users for confirmation before running most applications or making system changes. To turn off this functionality, users should navigate to the User Accounts section in the Control Panel and disable UAC.

    Rate this question:

  • 31. 

    After replacing the motherboard in a laptop, the system overheats and fails to boot. Which of the following is the MOST likely cause of this error?

    • A.

      Thermal paste was not applied between the heat sink and CPU.

    • B.

      The fan is not compatible with the new motherboard.

    • C.

      The GPU is not compatible with the CPU.

    • D.

      The replacement motherboard firmware is out of date.

    Correct Answer
    A. Thermal paste was not applied between the heat sink and CPU.
    Explanation
    The most likely cause of the system overheating and failing to boot after replacing the motherboard in a laptop is that the thermal paste was not applied between the heat sink and CPU. Thermal paste is a crucial component that helps to transfer heat from the CPU to the heat sink, ensuring proper cooling. Without thermal paste, the heat cannot be effectively dissipated, leading to overheating and potential damage to the system.

    Rate this question:

  • 32. 

    Which of the following tools allows the technician to copy a file without prompts?

    • A.

      XCOPY

    • B.

      COPY /Y

    • C.

      COPY /Z

    • D.

      COPY /A

    Correct Answer
    B. COPY /Y
    Explanation
    The correct answer is COPY /Y because the /Y switch in the COPY command allows the technician to copy a file without prompts. When the /Y switch is used, any existing file with the same name as the file being copied will be automatically overwritten without any prompts or confirmation messages. This saves time and allows for a quicker and more efficient file copy process.

    Rate this question:

  • 33. 

    Which of the following devices has the options of: master, slave and cable select?  (Select THREE).

    • A.

      CD-ROM

    • B.

      Floppy drive

    • C.

      Internal modem

    • D.

      Hard drive

    • E.

      Network card

    • F.

      DVD-ROM

    Correct Answer(s)
    A. CD-ROM
    D. Hard drive
    F. DVD-ROM
    Explanation
    CD-ROM, Hard drive, and DVD-ROM are the correct answers because these devices have the options of master, slave, and cable select. These options determine the device's role and behavior when connected to the computer's motherboard or controller. The master device typically controls the communication on the data cable, while the slave device follows the commands of the master. Cable select allows the devices to automatically determine their roles based on their position on the cable. This flexibility in configuration is commonly found in optical drives (CD-ROM and DVD-ROM) and hard drives.

    Rate this question:

  • 34. 

    Using the NET command which variable would be used to find out the number of files sent by the workstation service?

    • A.

      Group

    • B.

      View

    • C.

      File

    • D.

      Statistics

    Correct Answer
    D. Statistics
    Explanation
    The correct answer is "statistics" because the question is asking about the variable used to find out the number of files sent by the workstation service when using the NET command. The "statistics" variable would provide this information.

    Rate this question:

  • 35. 

    A technician plugs a USB device into the front panel of a desktop computer and nothing happens. The technician knows that plug-n-play is enabled. Which of the following BEST describes a possible cause to this issue?

    • A.

      The technician plugged a USB 2.0 device into a USB 1.1 port.

    • B.

      The technician needs to reboot the computer for the device to work.

    • C.

      The technician plugged a USB 1.1 device into a USB 2.0 port.

    • D.

      The front panel connectors are not plugged into the motherboard.

    Correct Answer
    D. The front panel connectors are not plugged into the motherboard.
    Explanation
    The front panel connectors not being plugged into the motherboard is the best explanation for the issue because if they are not connected properly, the USB device will not be recognized by the computer. Plugging a USB 2.0 device into a USB 1.1 port or vice versa would still allow the device to be recognized, although it may not function at its optimal speed. Rebooting the computer is not necessary for a USB device to work, as plug-n-play should automatically detect and install the necessary drivers.

    Rate this question:

  • 36. 

    An office laser printer is printing lighter in random areas. Which of the following is the EASIEST solution to implement for this issue?

    • A.

      Clean the drum with a computer vacuum.

    • B.

      Replace the toner cartridge.

    • C.

      Clean the fuser area with a lint free cloth.

    • D.

      Use a can of compressed air to clean the pickup assembly.

    Correct Answer
    B. Replace the toner cartridge.
    Explanation
    The easiest solution to implement for the issue of random lighter printing areas in an office laser printer is to replace the toner cartridge. This is because the toner cartridge is responsible for supplying the toner, which is used to create the image on the drum and transfer it onto the paper. If the toner cartridge is old or faulty, it may not be distributing the toner evenly, resulting in lighter areas on the printed pages. By replacing the toner cartridge, the printer will have a fresh supply of toner and should be able to print evenly again.

    Rate this question:

  • 37. 

    Which of the following private IP addresses is commonly used for internal IP addressing?

    • A.

      127.0.0.1

    • B.

      169.254.0.1

    • C.

      192.168.0.1

    • D.

      224.0.0.1

    Correct Answer
    C. 192.168.0.1
    Explanation
    192.168.0.1 is commonly used for internal IP addressing because it belongs to the private IP address range specified by the Internet Assigned Numbers Authority (IANA) for use in private networks. This address range is reserved for use within local area networks (LANs) and is not routable on the internet. 192.168.0.1 is often used as the default gateway IP address for home routers and is commonly used for configuring network devices within a private network.

    Rate this question:

  • 38. 

    A technician has deleted all the files in the directory C:\tempfiles. Which of the following commands should the technician use to delete this directory?

    • A.

      CD

    • B.

      SFC

    • C.

      MD

    • D.

      RD

    Correct Answer
    D. RD
    Explanation
    The technician should use the "RD" command to delete the directory C:\tempfiles. RD stands for "Remove Directory" and is used to delete directories in the Windows command prompt.

    Rate this question:

  • 39. 

    A home user is setting up a wireless network. Which of the following could be used to prevent a neighbor from accessing the network? (Select TWO).

    • A.

      Ensure all PCs are turned off when not in use

    • B.

      Enable wireless encryption

    • C.

      Create a DMZ for the main PC

    • D.

      Disable SSID broadcasting

    • E.

      Disable SSID broadcasting

    Correct Answer(s)
    B. Enable wireless encryption
    D. Disable SSID broadcasting
    Explanation
    Enabling wireless encryption adds a layer of security to the wireless network by encrypting the data transmitted between devices. This prevents unauthorized access as the neighbor would need the encryption key to decrypt the data.

    Disabling SSID broadcasting hides the network's name from being broadcasted publicly, making it more difficult for the neighbor to discover and connect to the network. They would need to manually enter the network name to connect, which adds an extra layer of security.

    Rate this question:

  • 40. 

    A user has just moved to a new office and is unable to access the network. The technician suspects the users network settings need to be changed. Which of the following tools would the technician use on the Windows XP computer to view the network settings?

    • A.

      NETDIAG

    • B.

      TRACERT

    • C.

      IPCONFIG

    • D.

      PATHPING

    Correct Answer
    C. IPCONFIG
    Explanation
    The technician would use IPCONFIG on the Windows XP computer to view the network settings. IPCONFIG is a command-line tool that displays the current configuration of all network interfaces on the computer, including IP addresses, subnet masks, and default gateways. By using IPCONFIG, the technician can check if the user's network settings are correctly configured and make any necessary changes to allow access to the network.

    Rate this question:

  • 41. 

    The technician is moving a users files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?

    • A.

      C:\users\user1\documents to c:\users\user1\documents

    • B.

      C:\documents and settings\user1\my documents to c:\users\user1\documents

    • C.

      C:\documents and settings\user1\my documents to c:\documents and settings\user1\my documents

    • D.

      C:\users\user1\my documents to c:\users\user1\documents

    Correct Answer
    B. C:\documents and settings\user1\my documents to c:\users\user1\documents
    Explanation
    The correct answer is c:\documents and settings\user1\my documents to c:\users\user1\documents. In Windows XP, the default directory for user documents is "c:\documents and settings\user1\my documents", while in Windows Vista, it is "c:\users\user1\documents". Therefore, when moving the user's files from Windows XP to Windows Vista, the files in the "c:\documents and settings\user1\my documents" directory should be moved to the "c:\users\user1\documents" directory.

    Rate this question:

  • 42. 

    Which of the following are items that can be configured on a wireless router to make it more difficult for attackers to gain access? (Select TWO).

    • A.

      Change the wireless channel

    • B.

      Disable SSID broadcast

    • C.

      Change SSID from default

    • D.

      Enable DES encryption

    • E.

      Turn on port forwarding

    Correct Answer(s)
    B. Disable SSID broadcast
    C. Change SSID from default
    Explanation
    Disabling SSID broadcast and changing the SSID from default are two items that can be configured on a wireless router to make it more difficult for attackers to gain access. Disabling SSID broadcast prevents the router from broadcasting its network name, making it less visible to potential attackers. Changing the SSID from default adds an extra layer of security as attackers often target routers with default settings. By changing the SSID, the attacker would need to spend more time figuring out the network name, making it harder for them to gain access.

    Rate this question:

  • 43. 

    Users in the office report that the speed of the Internet has drastically decreased since the recent network hardware refresh. Which of the following could be attributed to the problem?

    • A.

      The firewall was not powered back on.

    • B.

      The DHCP server is not working correctly.

    • C.

      The cellular repeater installed is interfering with the network speed.

    • D.

      The new switches are configured for 10MB.

    Correct Answer
    D. The new switches are configured for 10MB.
    Explanation
    The correct answer is that the new switches are configured for 10MB. This means that the switches are set to operate at a maximum speed of 10 megabits per second, which is significantly slower than what the office network requires. As a result, the speed of the Internet has drastically decreased since the network hardware refresh.

    Rate this question:

  • 44. 

    A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?

    • A.

      FTP

    • B.

      SMTP

    • C.

      POP

    • D.

      SNMP

    Correct Answer
    B. SMTP
    Explanation
    SMTP stands for Simple Mail Transfer Protocol, which is responsible for sending email messages from a client to a server. In this scenario, if a user can receive emails but cannot send them, it indicates that the SMTP protocol is incorrectly configured. This means that there may be an issue with the SMTP settings or the server may not be properly configured to allow outgoing email messages.

    Rate this question:

  • 45. 

    A technician is setting up a SOHO and has configured the wireless NIC on the laptop with WPA2. While configuring the WAP, WPA2 is not listed as an option. Which of the following should the technician do NEXT?

    • A.

      Install the latest wireless NIC drivers

    • B.

      Install the latest wireless NIC firmware

    • C.

      Install the latest WAP firmware

    • D.

      Install the latest WAP drivers

    Correct Answer
    C. Install the latest WAP firmware
    Explanation
    The technician should install the latest WAP firmware. This is because the WAP (Wireless Access Point) is not listing WPA2 as an option, indicating that it may not be compatible with the current firmware. By installing the latest firmware, the technician can ensure that the WAP supports WPA2 and can properly configure it for the SOHO setup.

    Rate this question:

  • 46. 

    Which of the following BEST explains a system experiencing intermittent memory errors?

    • A.

      Southbridge is faulty

    • B.

      Memory sticks have corroded contacts

    • C.

      BIOS memory settings are misconfigured

    • D.

      Memory socket is faulty

    Correct Answer
    B. Memory sticks have corroded contacts
    Explanation
    The best explanation for a system experiencing intermittent memory errors is that the memory sticks have corroded contacts. Corroded contacts can cause poor electrical connections between the memory sticks and the motherboard, leading to intermittent errors. This can result in data corruption, system crashes, and other memory-related issues.

    Rate this question:

  • 47. 

    A second optical drive has been added to the computer and needs to be referenced as the R: drive by the Microsoft Windows operating system. Which of the following places in Microsoft Windows will BEST accomplish this task?

    • A.

      Administrative Tools

    • B.

      Disk Management

    • C.

      Device Manager

    • D.

      Event Viewer

    Correct Answer
    B. Disk Management
    Explanation
    Disk Management is the best place in Microsoft Windows to accomplish the task of referencing a second optical drive as the R: drive. Disk Management allows users to manage and configure disk drives, including assigning drive letters to new drives. By accessing Disk Management, the user can assign the letter R: to the newly added optical drive, ensuring that it is recognized and accessible by the operating system.

    Rate this question:

  • 48. 

    A yellow exclamation mark next to a device in Device Manager indicates which of the following?

    • A.

      The device driver is outdated.

    • B.

      The device driver is missing.

    • C.

      The device driver is corrupt.

    • D.

      The device is disabled.

    Correct Answer
    B. The device driver is missing.
    Explanation
    A yellow exclamation mark next to a device in Device Manager indicates that the device driver is missing. This means that the operating system is unable to locate the necessary software to communicate with the device. Without the driver, the device will not function properly, if at all.

    Rate this question:

  • 49. 

    A technician is replacing a hard drive with a new 30GB drive formatted with FAT32. While transferring a 5GB file an error appears indicating that the new drive has insufficient space for the transfer. Which of the following is the cause of the problem?

    • A.

      FAT32 cannot handle single files larger than 4GB.

    • B.

      FAT32 cannot handle single files larger than 2GB.

    • C.

      The old drive uses NTFS and is incompatible with the new drive.

    • D.

      The file is formatted with NTFS and is incompatible with the new drive.

    Correct Answer
    A. FAT32 cannot handle single files larger than 4GB.
    Explanation
    The cause of the problem is that FAT32 cannot handle single files larger than 4GB. This means that when trying to transfer a 5GB file to the new drive, the file size exceeds the maximum limit supported by the FAT32 file system.

    Rate this question:

  • 50. 

    A customer is trying to copy a DVD with a third-party application. The program reads the source DVD fine, but when the blank is inserted, the program continuously prompts to insert blank media. Which of the following are possible causes? (Select THREE).

    • A.

      A CD is inserted into the drive.

    • B.

      A DVD is inserted upside down in the drive.

    • C.

      The wrong DVD type is inserted into the drive.

    • D.

      The drive is only a CD-RW drive.

    • E.

      The program cannot copy the DVD due to copyright laws.

    • F.

      There is not enough free space on the hard drive.

    Correct Answer(s)
    A. A CD is inserted into the drive.
    B. A DVD is inserted upside down in the drive.
    C. The wrong DVD type is inserted into the drive.
    Explanation
    The possible causes for the program continuously prompting to insert blank media are:
    1) A CD is inserted into the drive, which is not compatible for copying a DVD.
    2) A DVD is inserted upside down in the drive, preventing the program from recognizing it as blank media.
    3) The wrong DVD type is inserted into the drive, meaning it is not compatible for copying.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 17, 2011
    Quiz Created by
    Freddyoca
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.