CompTIA A+ Testing Centre-paper2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Maganoor
M
Maganoor
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,827
Questions: 90 | Attempts: 70

SettingsSettingsSettings
CompTIA  A+  Testing Centre-paper2 - Quiz


Questions and Answers
  • 1. 

    Which of the following can aid a mobile user in finding the nearest coffee shop?(Select the best answer.)

    • A.

      Geotracking

    • B.

      IOS

    • C.

      GPS

    • D.

      GSM

    Correct Answer
    C. GPS
    Explanation
    GPS: global positioning system(a system by which signals are sent from satellites to a special device, used to show the position of a person or thing on the surface of the earth very accurately) : GSM : Global System For Mobile Communication : iOS : iPhone Operating System

    Rate this question:

  • 2. 

    A user wants to stop his tablet from shifting horizontally when he turns it. Whichof the following should you enable?

    • A.

      Lock Rotation

    • B.

      Accelerometer

    • C.

      Gyroscope

    • D.

      Screen Calibration

    Correct Answer
    A. Lock Rotation
    Explanation
    Enable Lock Rotation on Apple devices. On Android devices disable Autorotate.
    The Accelerometer is a term used by Apple to describe the
    hardware/software that controls the three axes of movement. The Gyroscope is
    another term used by Apple to describe the device that measures the additional
    three movements (pitch, roll, and yaw) of newer Apple devices. Screen calibration
    is used to reset the device that measures the three axes

    Rate this question:

  • 3. 

    What kind of display would an iPad2 use?

    • A.

      CRT

    • B.

      Multitouch

    • C.

      Tap screen

    • D.

      Singletouch

    Correct Answer
    B. Multitouch
    Explanation
    The correct answer is Multitouch. The iPad2 uses a multitouch display, which means it can detect and respond to multiple simultaneous touch inputs. This allows users to perform various gestures, such as pinching to zoom or swiping to scroll, making the device more intuitive and user-friendly. Multitouch technology has become a standard feature in modern touchscreen devices, providing a more interactive and versatile user experience.

    Rate this question:

  • 4. 

     A user is having difficulty tapping on icons. What should you do to help theuser? (Select the two best answers.)

    • A.

      Clean the display.

    • B.

      Tap the Home button

    • C.

      Install a screen protector.

    • D.

      Initiate a soft reset.

    • E.

      Initiate a hard reset.

    Correct Answer(s)
    A. Clean the display.
    D. Initiate a soft reset.
    Explanation
    To help the user who is having difficulty tapping on icons, you should clean the display to remove any dirt or smudges that may be affecting the touch sensitivity. Additionally, initiating a soft reset can help resolve any software-related issues that may be causing the problem. This can be done by restarting the device or performing a soft reboot. Installing a screen protector or tapping the Home button may not directly address the issue of difficulty tapping on icons, so they are not the best answers in this scenario. A hard reset should be avoided as it can potentially erase data and should only be used as a last resort.

    Rate this question:

  • 5. 

    What are two common operating systems used by mobile devices? (Select thetwo best answers.)

    • A.

      Blueberry OS

    • B.

      IOS

    • C.

      Google OS

    • D.

      Android OS

    Correct Answer(s)
    B. IOS
    D. Android OS
    Explanation
    Choose 2 compulsary 2 answers

    Rate this question:

  • 6. 

    What type of CPU do mobile devices use?

    • A.

      Core i7

    • B.

      Phenom II

    • C.

      ARM

    • D.

      Pentium

    Correct Answer
    C. ARM
    Explanation
    PhenomII : Phenom II is a family of AMD's multi-core 45 nm processors using the AMD K10 micro architecture, succeeding the original Phenom. Advanced Micro Devices : ARM : Advanced RISC Machine : Corei7 : General Microprocessors used for Desktop & Laptop

    Rate this question:

  • 7. 

    Which OS is considered to be closed-source?

    • A.

      Android OS

    • B.

      Bluetooth

    • C.

      Linux

    • D.

      IOS

    Correct Answer
    D. IOS
    Explanation
    iOS is considered to be closed-source because Apple does not release the source code to the public. This means that only Apple can modify and distribute the operating system. Users are not allowed to view or modify the source code, limiting customization and development options.

    Rate this question:

  • 8. 

    What are a couple of differences between a tablet computer and a laptop?(Select the two best answers.)

    • A.

      Tablets have little or no field serviceable parts.

    • B.

      Tablets are upgradeable.

    • C.

      Laptops don’t use touch screens.

    • D.

      Tablets use flash memory as the hard drive.

    • E.

      Tablets use RAM.

    Correct Answer(s)
    A. Tablets have little or no field serviceable parts.
    D. Tablets use flash memory as the hard drive.
    Explanation
    Tablets have little or no field serviceable parts, meaning that they are not easily repairable or replaceable. On the other hand, laptops can often be repaired or upgraded by replacing individual components. Additionally, tablets use flash memory as the hard drive, while laptops typically use traditional hard drives. Flash memory is faster and more durable than traditional hard drives, making it a common choice for tablets.

    Rate this question:

  • 9. 

    Which of the following are valid Wi-Fi troubleshooting methods? (Select the twobest answers.)

    • A.

      Power cycle the device.

    • B.

      Restart Bluetooth.

    • C.

      Use a static IP.

    • D.

      Make sure the device is within range.

    • E.

      Rename the SSID.

    Correct Answer(s)
    A. Power cycle the device.
    D. Make sure the device is within range.
    Explanation
    Power cycling the device is a valid Wi-Fi troubleshooting method because it can help reset the network connection and resolve any temporary issues. Making sure the device is within range is also a valid method as being out of range can cause a weak or no Wi-Fi signal, resulting in connection problems. Restarting Bluetooth, using a static IP, and renaming the SSID are not relevant to Wi-Fi troubleshooting and therefore not valid methods.

    Rate this question:

  • 10. 

    Which of the following connections requires a username, password, and SMTPserver? (Select the two best answers.)

    • A.

      Bluetooth connection

    • B.

      Wi-Fi connection

    • C.

      POP3 connection

    • D.

      Exchange connection

    • E.

      IMAP connection

    Correct Answer(s)
    C. POP3 connection
    E. IMAP connection
    Explanation
    POP3 and IMAP connections require a username, password, and SMTP server. POP3 (Post Office Protocol version 3) is an email retrieval protocol that allows users to access and download their emails from a remote server to their local device. IMAP (Internet Message Access Protocol) is another email retrieval protocol that allows users to access and manage their emails stored on a remote server. Both protocols require authentication with a username and password, and the SMTP (Simple Mail Transfer Protocol) server is used for sending outgoing emails.

    Rate this question:

  • 11. 

    What is the most common connection method when synchronizing data from amobile device to a PC?

    • A.

      Wi-Fi

    • B.

      Bluetooth

    • C.

      USB

    • D.

      FireWire

    Correct Answer
    C. USB
    Explanation
    The most common connection method when synchronizing data from a mobile device to a PC is USB. USB (Universal Serial Bus) cables are widely used to connect mobile devices like smartphones and tablets to computers for data transfer and synchronization. USB connections offer a fast and reliable way to transfer files, backup data, and perform other tasks between the mobile device and the PC.

    Rate this question:

  • 12. 

     When configuring a Wi-Fi connection what step occurs after successfully enteringthe SSID?

    • A.

      Select POP3.

    • B.

      Check if the device is within range of the WAP.

    • C.

      Enter a passcode for the network.

    • D.

      Scan for networks.

    Correct Answer
    C. Enter a passcode for the network.
    Explanation
    After successfully entering the SSID, the next step in configuring a Wi-Fi connection is to enter a passcode for the network. This passcode, also known as the Wi-Fi password, is required to authenticate and gain access to the network. It ensures that only authorized users can connect to the Wi-Fi network and helps to secure the connection from unauthorized access.

    Rate this question:

  • 13. 

    Which technology would you use if you want to connect a headset to yourmobile phone?

    • A.

      Bluetooth

    • B.

      GSM

    • C.

      Wi-Fi

    • D.

      Exchange

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the correct answer because it is a wireless technology that allows for short-range communication between devices. It is commonly used for connecting peripherals such as headsets to mobile phones. GSM is a mobile network technology, Wi-Fi is a wireless networking technology, and Exchange is a messaging and collaboration server software.

    Rate this question:

  • 14. 

    Which of the following allows other mobile devices to share your mobile device’sInternet connection?

    • A.

      Internet pass-through

    • B.

      Locator application

    • C.

      IMAP

    • D.

      Wi-Fi tethering

    Correct Answer
    D. Wi-Fi tethering
    Explanation
    IMAP: Internet Message Access Protocol (IMAP) is a communications protocol for email retrieval and storage developed by Mark Crispin in 1986 at Stanford University . Wify tehtering : Wi-Fi tethering allows a mobile device to share its Internet connection with
    other Wi-Fi capable devices. Internet pass-through is when the mobile device
    connects to a PC to share the PC’s Internet connection. Locator applications are
    used to find lost or stolen mobile devices through GPS. IMAP is another e-mail
    protocol similar to POP3.

    Rate this question:

  • 15. 

    What would a user need to synchronize contacts from an iPad to a PC?

    • A.

      Android Synchronization Application

    • B.

      Google Play

    • C.

      ITunes

    • D.

      ActiveSync

    Correct Answer
    C. ITunes
    Explanation
    PC users need iTunes to synchronize contacts and other data from an iPad to
    a PC. There are many Android sync programs, but they do not work on Apple
    devices. Google Play is a place to get applications and other items. ActiveSync
    is the older Microsoft sync program used to synchronize Windows CE and
    Mobile to PCs.

    Rate this question:

  • 16. 

    You want to prevent a person from accessing your phone while you step awayfrom your desk. What should you do?

    • A.

      Implement remote backup

    • B.

      Set up a remote wipe program

    • C.

      Configure a screen lock.

    • D.

      Install a locator application.

    Correct Answer
    C. Configure a screen lock.
    Explanation
    To prevent a person from accessing your phone while you step away from your desk, you should configure a screen lock. This is a security feature that requires a password, PIN, pattern, or fingerprint to unlock the phone and access its contents. By setting up a screen lock, you ensure that even if someone gains physical access to your phone, they won't be able to use it without the correct authentication. This helps protect your personal and sensitive information from unauthorized access.

    Rate this question:

  • 17. 

    What does the iOS Simple Passcode allow a person to enter?

    • A.

      4-letter code

    • B.

      6-number PIN

    • C.

      4-digit passcode

    • D.

      Alpha-numeric passcode

    Correct Answer
    C. 4-digit passcode
    Explanation
    The iOS Simple Passcode allows a person to enter a 4-digit passcode. This means that the passcode consists of four numbers, allowing for a relatively simple and easy-to-remember code for accessing the iOS device. This passcode provides a basic level of security for the device, preventing unauthorized access.

    Rate this question:

  • 18. 

    What do third-party apps such as Find iPhone rely on?

    • A.

      Passcode

    • B.

      Google Apps Device Policy

    • C.

      Bluetooth

    • D.

      GPS

    Correct Answer
    D. GPS
    Explanation
    Third-party locator apps such as Find iPhone and Where’s my Droid rely on
    GPS to locate the device. Passcodes are used to prevent unauthorized users
    from accessing the mobile device. Google Apps Device Policy can initiate a
    remote wipe on a mobile device. Bluetooth is used so the mobile device can
    communicate with other devices over short range.

    Rate this question:

  • 19. 

    Which of the following can be described as removing limitations on iOS?

    • A.

      Rooting

    • B.

      Jailbreaking

    • C.

      Geotracking

    • D.

      AV software

    Correct Answer
    B. Jailbreaking
    Explanation
    Jailbreaking is the process of removing the limitations of an iOS-based device
    so that the user gets superuser abilities. Rooting is a similar technique used on
    Android mobile devices. Geotracking is the practice of tracking a device over
    time. AV software is antivirus software, used to combat malware.
    5. C. If you’ve already tried to stop the application within Running Services,

    Rate this question:

  • 20. 

    An application won’t close on an Android smartphone. You’ve tried to ForceStop it to no avail. What should you do?

    • A.

      Hard reset the device.

    • B.

      Stop the service in Running Services.

    • C.

      Soft reset the device.

    • D.

      Bring the device to an authorized service center.

    Correct Answer
    C. Soft reset the device.
    Explanation
    If you’ve already tried to stop the application within Running Services,
    attempt a soft reset. Pull the battery if the application is frozen. Hard resets on
    Android devices should be used only as a last resort as they will return the
    device to factory condition—wiping all the data. The question said that the application
    won’t close, not a service, though you could try finding an underlying
    service that might be the culprit. But try resetting the device before doing this or
    bringing it to an authorized service center.
    6. B. The remote wipe application is the most important one listed. This will

    Rate this question:

  • 21. 

    Your organization is concerned about a scenario where a mobile device withconfidential data is stolen. What should you recommend first? (Select the bestanswer.)

    • A.

      Remote backup application

    • B.

      Remote wipe program

    • C.

      Passcode locks

    • D.

      Locator application

    Correct Answer
    B. Remote wipe program
    Explanation
    A remote wipe program is recommended as the first measure to take in the scenario where a mobile device with confidential data is stolen. This program allows the organization to remotely erase all data on the stolen device, ensuring that sensitive information does not fall into the wrong hands. It is a proactive and effective solution to protect the confidentiality of the data and prevent any potential misuse or unauthorized access.

    Rate this question:

  • 22. 

    You are concerned with the possibility of jailbreaks on your organization’siPhones, and viruses on the Android-based devices. What should you implement?

    • A.

      AV software

    • B.

      Firewall

    • C.

      Mobile Device Management

    • D.

      Device reset

    Correct Answer
    D. Device reset
    Explanation
    You should implement antivirus (AV) software. This can protect against viruses
    and other malware as well as jailbreaks on Apple devices. As of the writing of
    this book, firewalls for mobile devices are not common, but that could change in
    the future. Mobile Device Management (MDM) is software that runs at a central
    computer enabling a user to configure and monitor multiple mobile devices.
    Device resets are used to restart the mobile device, or to reset it to factor condition
    depending on the type of reset, and the manufacturer of the device.

    Rate this question:

  • 23. 

    Which of the following application stores are compatible with iOS? 

    • A.

      Android Market

    • B.

      Windows Marketplace

    • C.

      App Store

    • D.

      Amazon Appstore

    Correct Answer
    C. App Store
    Explanation
    The App Store is compatible with iOS because it is the official application store for Apple devices, including iPhones, iPads, and iPods. It is where users can download and install apps specifically designed for iOS operating system. The other options mentioned, such as Android Market and Windows Marketplace, are not compatible with iOS as they are designed for Android and Windows devices respectively. Amazon Appstore, though available on iOS, is not the primary application store for iOS devices.

    Rate this question:

  • 24. 

    A company would like to increase the security on their company’s smart phones. Which of the following should be configured to ensure information stored on a smart phone can be removed if it is lost or stolen? 

    • A.

      Username and passwords

    • B.

      Remote wipe

    • C.

      Strong password complexity

    • D.

      Failed login attempts restrictions

    Correct Answer
    B. Remote wipe
    Explanation
    To increase the security on their company's smart phones, configuring the remote wipe feature is essential. This feature allows the company to remotely erase all the information stored on the smart phone if it is lost or stolen. By enabling remote wipe, the company can ensure that sensitive data does not fall into the wrong hands, safeguarding their information and preventing any potential security breaches.

    Rate this question:

  • 25. 

    Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS? 

    • A.

      /A

    • B.

      /C

    • C.

      /H

    • D.

      /E

    Correct Answer
    B. /C
    Explanation
    The correct answer is /C. This command line option is used to perform disk defragmentation on all volumes in Windows OS. This means that it will defragment all the drives and partitions present in the system, ensuring that the files are organized and stored contiguously on the disk for improved performance.

    Rate this question:

  • 26. 

    A technician just finished removing spyware from a computer and now they are not able to connect to any websites. Which of the following is the MOST likely cause? 

    • A.

      Automatic configuration

    • B.

      Network card driver is damaged

    • C.

      Proxy settings

    • D.

      The Internet is not functioning

    Correct Answer
    C. Proxy settings
    Explanation
    The most likely cause for the technician not being able to connect to any websites after removing spyware from the computer is the proxy settings. Spyware often modifies the proxy settings on a computer to redirect internet traffic, and when the spyware is removed, the proxy settings may not be restored to their original state, causing connectivity issues.

    Rate this question:

  • 27. 

    A customer reports that their computer crashes during usage. Which of the following is a common acronym used to describe this condition? 

    • A.

      RAID

    • B.

      VPN

    • C.

      BSOD

    • D.

      LAN

    Correct Answer
    C. BSOD
    Explanation
    RAID: Redundant Array Of Inexpensive Disk : VPN: Virtual Private Network BSOD : Blue Screen of Death : LAN : Local Area Network

    Rate this question:

  • 28. 

    A user wishes to secure their tablet from unauthorized access. The BEST option is to:? 

    • A.

      Enable RFID authentication

    • B.

      Establish a remote wipe policy

    • C.

      Setup a strong passcode

    • D.

      Establish strong email passwords.

    Correct Answer
    C. Setup a strong passcode
    Explanation
    Setting up a strong passcode is the best option for securing a tablet from unauthorized access. A strong passcode is a combination of letters, numbers, and special characters that makes it difficult for others to guess or crack. This provides an extra layer of security to prevent unauthorized users from accessing the tablet and its contents. Enabling RFID authentication, establishing a remote wipe policy, and setting up strong email passwords are also important security measures, but setting up a strong passcode is specifically mentioned as the BEST option.

    Rate this question:

  • 29. 

    Question 12 Which of the following is a common type of biometric authentication on a laptop? (Select TWO).? 

    • A.

      Facial recognition

    • B.

      Blood sample

    • C.

      Retinal

    • D.

      Voice recognition

    • E.

      Fingerprint

    Correct Answer(s)
    A. Facial recognition
    E. Fingerprint
    Explanation
    Facial recognition and fingerprint authentication are common types of biometric authentication on a laptop. Facial recognition uses the unique characteristics of a person's face to verify their identity, while fingerprint authentication uses the unique patterns and ridges on a person's fingertip. Both methods provide a secure and convenient way to access a laptop, as they require the physical presence of the user and cannot be easily duplicated or stolen.

    Rate this question:

  • 30. 

    A user calls about their workstation not powering on in the morning. According to the troubleshooting theory, which of the following steps should the technician perform NEXT?? 

    • A.

      Document the resolution to problem.

    • B.

      Purchase the appropriate replacement part.

    • C.

      Verify that the workstation is able to boot up.

    • D.

      Ask the user about any previous changes

    Correct Answer
    D. Ask the user about any previous changes
    Explanation
    After troubleshooting the issue and determining that the workstation is not powering on, the next logical step would be to ask the user about any previous changes. This step is important as it can provide valuable information about any recent modifications or updates that may have caused the problem. By gathering this information, the technician can narrow down the potential causes and proceed with the appropriate solution.

    Rate this question:

  • 31. 

    Which of the following should be performed regularly in order to help restore a computer’s data after a hard drive failure?? 

    • A.

      Windows Memory Diagnostics

    • B.

      Factory Restore

    • C.

      System Restore

    • D.

      Scheduled Backups

    Correct Answer
    D. Scheduled Backups
    Explanation
    Read the question 2 times , then answer

    Rate this question:

  • 32. 

    What is the best way of maintaining data security for a mobile device that has been lost or stolen?   

    • A.

      Passcode lock

    • B.

      GPS

    • C.

      Remote wipe

    • D.

      Login attempt restrictions

    Correct Answer
    C. Remote wipe
    Explanation
    The best way of maintaining data security for a lost or stolen mobile device is by using remote wipe. Remote wipe allows the user to erase all the data on the device remotely, ensuring that sensitive information does not fall into the wrong hands. This feature is particularly important in preventing unauthorized access to personal or confidential data stored on the device. Passcode lock, GPS, and login attempt restrictions are also important security measures, but remote wipe provides the most effective solution in case of a lost or stolen device.

    Rate this question:

  • 33. 

    Of the following, which represent security vulnerabilities to mobile devices? (Select the two best answers.)  

    • A.

      Viruses

    • B.

      Improper file permissions

    • C.

      Phishing

    • D.

      Theft

    • E.

      Unauthorized downloads

    Correct Answer(s)
    A. Viruses
    D. Theft
    Explanation
    The correct answer is Viruses and Theft. Viruses can infect mobile devices and compromise their security, leading to data loss or unauthorized access. Theft of mobile devices can also result in security vulnerabilities as the thief may gain access to sensitive information stored on the device. Improper file permissions, phishing, and unauthorized downloads can also pose security risks, but they are not mentioned in the correct answer.

    Rate this question:

  • 34. 

    Which of the following OSes supports full usage of 8 GB of RAM?  

    • A.

      Windows XP Professional

    • B.

      Windows Vista Home Premium x86

    • C.

      Windows 7 Professional x86

    • D.

      Windows 7 Home Premium x64

    Correct Answer
    D. Windows 7 Home Premium x64
    Explanation
    Windows 7 Home Premium x64 supports full usage of 8 GB of RAM because it is a 64-bit operating system. 64-bit operating systems can utilize more RAM compared to 32-bit operating systems, which have a RAM limit of around 4 GB. Therefore, Windows 7 Home Premium x64 is able to fully utilize the 8 GB of RAM.

    Rate this question:

  • 35. 

    A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. What is the cause of the issue?    

    • A.

      The auto-adjust setting is not enabled in the operating system

    • B.

      The tablet is running low on power and disabled landscape mode.

    • C.

      The application was not developed to react to changes to the gyroscope

    • D.

      The user did not switch the tablet to landscape mode

    Correct Answer
    C. The application was not developed to react to changes to the gyroscope
    Explanation
    The issue is caused by the fact that the application was not programmed to respond to changes in the gyroscope. The gyroscope is responsible for detecting the orientation of the device, so when the user turns the tablet to landscape mode, the gyroscope sends a signal to the application to adjust accordingly. However, if the application does not have the necessary code to interpret this signal and adjust its display, it will not automatically switch to landscape mode.

    Rate this question:

  • 36. 

    You are placing a computer back into service that has not been turned on in several months. It was healthy when taken out of service and boots quickly without any problems. What actions would be best practices to begin computer maintenance? (Select the two best answers.)  

    • A.

      Defragment the hard disk

    • B.

      Run AV updates

    • C.

      Run an AV scan

    • D.

      Run Windows updates

    • E.

      Configure the firewall

    Correct Answer(s)
    B. Run AV updates
    D. Run Windows updates
    Explanation
    Running AV updates is important to ensure that the computer has the latest virus definitions and protection against any new threats that may have emerged during the time it was not in use. Running Windows updates is also crucial as it ensures that the computer has the latest security patches and updates for the operating system, which helps to protect against vulnerabilities and improve overall system performance.

    Rate this question:

  • 37. 

    You previously installed a new application for a customer that has added three new services. Today, the customer informs you that the application will not start. You find out that one of the three new services has failed to start, and manual attempts to start it fail. Where should you look next for information? (Select the two best answers.)   

    • A.

      Registry

    • B.

      Event Viewer

    • C.

      %systemroot%\System32\Drivers

    • D.

      Log files for the new application

    • E.

      Task Manager

    Correct Answer(s)
    A. Registry
    D. Log files for the new application
    Explanation
    You should look in the Registry and the Log files for the new application for information. The Registry contains important configuration settings for the application and can provide insights into any issues that may be causing it to fail. The Log files for the new application can also provide valuable information about any errors or failures that occurred during the startup process.

    Rate this question:

  • 38. 

    You are configuring a SOHO wireless network for a customer. The customer wants only five authorized computers to connect to the network within a defined IP range. What should you configure on the router? (Select the two best answers.)   

    • A.

      SSID

    • B.

      D M Z

    • C.

      DHCP

    • D.

      MAC filtering

    • E.

      ARP

    Correct Answer(s)
    C. DHCP
    D. MAC filtering
    Explanation
    SSID: Service Set Identifier DMZ: (DeMilitarized Zone) A middle ground between an organization's trusted internal network and an untrusted, external network such as the Internet. Also called a "perimeter network," the DMZ is a subnetwork (subnet) that may sit between firewalls or off one leg of a firewall. Organizations typically place their Web, mail and authentication servers in the DMZ. DMZ is a military term that refers to the area between two enemies DHCP: Dynamic Host Configuration Protocol

    Rate this question:

  • 39. 

    You are having issues booting a newly built PC. You notice the following jumper configurations on each IDE device: - Hard drive: Master - Optical drive: Cable Select Which of the following jumper configuration should you modify this to?  

    • A.

      HD: Slave, Optical Drive: Slave

    • B.

      HD: Cable Select, Optical drive: Master

    • C.

      HD: Cable Select, Optical drive: Cable Select

    • D.

      HD: Master, Optical drive: Master

    Correct Answer
    C. HD: Cable Select, Optical drive: Cable Select
    Explanation
    The correct answer is to modify the jumper configuration to HD: Cable Select, Optical drive: Cable Select. This is because both devices are currently set to different configurations, which can cause conflicts and prevent the PC from booting properly. By setting both devices to Cable Select, the system will automatically determine the appropriate configuration for each device based on their placement on the IDE cable.

    Rate this question:

  • 40. 

    What is an advantage of a PC-hosted virtual machine?  

    • A.

      It reduces the amount of physical hardware required.

    • B.

      It reduces the amount of CPU required on the host PC. C. It reduces the amount of RAM

    • C.

      Required on the host PC.

    • D.

      It reduces the amount of training required for employees.

    Correct Answer
    A. It reduces the amount of pHysical hardware required.
    Explanation
    A PC-hosted virtual machine allows multiple virtual machines to run on a single physical PC, reducing the need for additional hardware. This means that instead of purchasing separate physical machines for different tasks or operating systems, a single PC can be used to host multiple virtual machines, saving costs and space. This advantage is particularly beneficial for businesses or organizations that need to run multiple operating systems or applications simultaneously.

    Rate this question:

  • 41. 

    You are tasked with fixing a computer that is overheating after 30 minutes of use. What is the most likely cause?  

    • A.

      ACPI is disabled

    • B.

      Incorrect input voltage settings

    • C.

      Internal dust buildup

    • D.

      Clogged temporary folders

    Correct Answer
    C. Internal dust buildup
    Explanation
    The most likely listed cause is internal dust buildup, especially if
    the buildup is within the CPU fan. If the fan has too much dust and dirt, it will
    stop spinning at the right speed, thus reducing its effective cooling ability,
    and causing the CPU to overheat, shutting down the system. ACPI is the
    Advanced Configuration and Power Interface, used by operating systems for configuration and management of power to the system. This can be disabled in the BIOS on some systems, but isn't recommended. Regardless, the older APM (Advanced Power Management) should take over if it is. "Incorrect input
    voltage settings" is somewhat vague. Incorrect CPU voltage settings could cause the system to overheat—for example, if it was overclocked—but it is
    more likely that there is dust and debris in one of the fans. Temporary
    folders are folders in Windows. You can have as much data as you want in
    your Windows folders; it shouldn't cause the system to overheat

    Rate this question:

  • 42. 

    Which of the following can allow a hidden backdoor to be used by remote workstations on the Internet?  

    • A.

      XS S

    • B.

      Rootkit

    • C.

      Firmware

    • D.

      SQL injection

    Correct Answer
    B. Rootkit
    Explanation
    Rootkits are used to gain privileged
    access to the computer, perhaps with a hidden backdoor. A remote access
    Trojan (RAT) might be used to access the backdoor, which then uses the
    rootkit code to gain that privileged access. XSS stands for cross-site
    scripting, a vulnerability in web applications. Hidden backdoors are usually
    found in software (operating systems or applications), not in firmware
    (BIOS). SQL injection is another type of attack on websites that uses code to extract confidential information from website databases.

    Rate this question:

  • 43. 

    Which of the following enables a user to reset their password with a series of security questions that only the user should know?  

    • A.

      Permission propagation

    • B.

      Administration

    • C.

      Verification

    • D.

      Authentication

    Correct Answer
    D. Authentication
    Explanation
    Authentication enables a user to reset their password with a
    series of security questions that only the user should know. An example of
    verification would be if you logged in to a bank with your username (or
    account number) and password, are authenticated, and are then asked to
    type in a code, known as a verification code. Permission propagation is when NTFS rights (permissions) are automatically copied from the parent folder to
    a subfolder. The subfolder inherits the permissions when they are propagated
    from the parent. Administration could mean many things, but one example would be when an administrator sets a policy where a user needs to type a verification code after logging in.

    Rate this question:

  • 44. 

    You need to set up an alert that will be sent to an administrator when the CPU stays above 90% for an extended period of time. Which tool will allow you to accomplish this?   

    • A.

      Task Scheduler

    • B.

      Task Manager

    • C.

      Performance Monitor

    • D.

      System Configuration

    Correct Answer
    C. Performance Monitor
    Explanation
    Performance Monitor is the correct answer because it is a tool that allows you to monitor the performance of your system, including CPU usage. It can be configured to set up alerts that will be sent to an administrator when the CPU stays above a certain threshold, such as 90%, for an extended period of time. This allows the administrator to take appropriate action to address the high CPU usage and prevent any potential issues or performance degradation.

    Rate this question:

  • 45. 

    You have been tasked with limiting computer access to certain users. Which of the following should you configure?  

    • A.

      System Configuration

    • B.

      Local Security Policy

    • C.

      Boot.ini file

    • D.

      Advanced Security

    Correct Answer
    B. Local Security Policy
    Explanation
    To limit computer access to certain users, you should configure the Local Security Policy. This policy allows you to define various security settings and restrictions for individual users or groups on a local computer. By configuring the Local Security Policy, you can control user rights, password policies, account lockouts, audit policies, and other security-related settings. This ensures that only authorized users have access to the computer and its resources, enhancing overall system security.

    Rate this question:

  • 46. 

    One of your customers has set up a perimeter firewall and has implemented up-to-date AV software. She asks you what else she can do to improve on security. What will have the greatest impact on her network security? (Select the two best answers.)   

    • A.

      Conduct a daily security audit

    • B.

      Use strong passwords

    • C.

      Install additional antivirus software

    • D.

      Disable screen savers

    Correct Answer(s)
    B. Use strong passwords
    D. Disable screen savers
    Explanation
    Using strong passwords and disabling screen savers will have the greatest impact on network security. Strong passwords help prevent unauthorized access to accounts and systems, while disabling screen savers reduces the risk of unauthorized access when the user is away from their computer. Conducting a daily security audit and installing additional antivirus software are also important security measures, but they may not have as significant an impact as using strong passwords and disabling screen savers.

    Rate this question:

  • 47. 

    A computer has been infected with multiple viruses and spyware. What should you do first before the removal of this malware? 

    • A.

      Disable system restore

    • B.

      Disable network cards

    • C.

      Run Windows Update

    • D.

      Run the CHKDSK /R command

    Correct Answer
    A. Disable system restore
    Explanation
    Disabling system restore is the first step that should be taken before removing malware from a computer. System restore points can contain infected files, and if system restore is enabled, the malware can easily re-infect the computer after removal. Disabling system restore ensures that the infected files are not saved in the restore points and prevents the malware from returning.

    Rate this question:

  • 48. 

    When setting up a Microsoft Exchange mail account to synchronize with an iPhone, which of the following items can be configured to synchronize besides e-mail? (Select the two best answers.)  

    • A.

      Shared calendars

    • B.

      Archives

    • C.

      Global address list

    • D.

      Calendar

    • E.

      Address book

    Correct Answer(s)
    D. Calendar
    E. Address book
    Explanation
    When setting up a Microsoft Exchange mail account to synchronize with an iPhone, two items that can be configured to synchronize besides email are the calendar and the address book. This means that the user will be able to access and update their calendar events and contacts from their iPhone, ensuring that all their important scheduling and contact information is synchronized across devices.

    Rate this question:

  • 49. 

    Newer smartphones have a feature that enables their data to be backed up to a remote location. What is this known as?  

    • A.

      ICloud

    • B.

      iOS

    • C.

      App Market

    • D.

      Google Play

    Correct Answer
    A. ICloud
    Explanation
    Newer smartphones have a feature called iCloud that enables their data to be backed up to a remote location. iCloud is a cloud storage and cloud computing service provided by Apple Inc. It allows users to store their photos, videos, documents, and other data on remote servers and access them from any device. This feature ensures that users can easily restore their data if their smartphone is lost, damaged, or replaced.

    Rate this question:

  • 50. 

    Which of the following has compatibility with the widest range of operating systems?  

    • A.

      FAT16

    • B.

      FAT32

    • C.

      CDFS

    • D.

      N T FS

    Correct Answer
    B. FAT32
    Explanation
    FAT32 has compatibility with the widest range of operating systems compared to the other options. FAT16 is an older file system that is not as widely supported, while CDFS is a file system specifically designed for CDs and DVDs. NTFS, on the other hand, is a file system used primarily in Windows operating systems and is not compatible with other operating systems such as macOS or Linux. Therefore, FAT32 is the correct answer as it can be used on a variety of operating systems including Windows, macOS, and Linux.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 26, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 30, 2015
    Quiz Created by
    Maganoor
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.