Dakota Welch
Quiz by , created more than 1 year ago

This is a compilation of all the quizzes from Career Academy CompTIA A+ training

114
4
0
Dakota Welch
Created by Dakota Welch over 8 years ago
Close

Career Academy CompTIA A+ Exam

Question 1 of 195

1

How do you read into the information configured in BIOS from within Windows?

Select one of the following:

  • Device Manager

  • Control Panel -> BIOS config

  • MS Config

  • None of the above

Explanation

Question 2 of 195

1

Firmware contains code to fix errors or support new hardware.

Select one of the following:

  • True
  • False

Explanation

Question 3 of 195

1

It is not necessary to remove the power cord from the PC to install an Expansion Card, as long as the computer has been shut down.

Select one of the following:

  • True
  • False

Explanation

Question 4 of 195

1

Firmware upgrades include:

Select one of the following:

  • Security patches

  • Performance updates

  • Known issue updates

  • All of the above

Explanation

Question 5 of 195

1

Hard drives and optical drives can be configured through the system BIOS.

Select one of the following:

  • True
  • False

Explanation

Question 6 of 195

1

Which of the following are valid form factors?

Select one of the following:

  • Tower

  • Mini tower

  • Desktop

  • All of the above

Explanation

Question 7 of 195

1

Replacing the CMOS battery will reset which of the following?

Select one of the following:

  • Device drivers

  • Operating system

  • System date and time

  • All of the above

Explanation

Question 8 of 195

1

Heat sinks and thermal pastes are types of cooling systems.

Select one of the following:

  • True
  • False

Explanation

Question 9 of 195

1

Weighing out the pros and cons of performance and price is a CPU selection factor.

Select one of the following:

  • True
  • False

Explanation

Question 10 of 195

1

What are some examples of internal components of a computer?

Select one of the following:

  • Motherboard

  • Expansion slots

  • Riser cards

  • All of the above

Explanation

Question 11 of 195

1

What are some examples of devices that could be installed with an expansion card?

Select one of the following:

  • SATA drive

  • Video card

  • Network card

  • B and C

Explanation

Question 12 of 195

1

Bus speeds determine how fast data is transmitted.

Select one of the following:

  • True
  • False

Explanation

Question 13 of 195

1

Motherboard installation considerations include:

Select one of the following:

  • Checking manufacturer’s requirements

  • Verifying that the board fits your case

  • Checking any specific system requirements

  • All of the above

Explanation

Question 14 of 195

1

SDRAM is much faster than DDR

Select one of the following:

  • True
  • False

Explanation

Question 15 of 195

1

RAM Parity checking is the storing of redundant parity bit representing the parity of a small amount of computer data, to detect whether a data error has occurred.

Select one of the following:

  • True
  • False

Explanation

Question 16 of 195

1

Single-sided memory has all of its memory accessible at one time.

Select one of the following:

  • True
  • False

Explanation

Question 17 of 195

1

ECC is used only in upper-end systems such as high-end workstations and servers.

Select one of the following:

  • True
  • False

Explanation

Question 18 of 195

1

How many pins does a male serial connector have?

Select one of the following:

  • 9

  • 15

  • 21

  • 28

Explanation

Question 19 of 195

1

What is the purpose of a PATA connection?

Select one of the following:

  • IDE hard drives

  • Floppy drives

  • A and B

  • SATA drives

Explanation

Question 20 of 195

1

Wireless device connections include:

Select one of the following:

  • Bluetooth

  • IR

  • RF

  • All of the above

Explanation

Question 21 of 195

1

Analog transmissions carry information as continuous waves of electromagnetic or optical energy.

Select one of the following:

  • True
  • False

Explanation

Question 22 of 195

1

Which of the following are valid speeds for a magnetic hard drive?

Select one of the following:

  • 5400

  • 7200

  • 10000

  • All of the above

Explanation

Question 23 of 195

1

Compact flash is a solid state drive.

Select one of the following:

  • True
  • False

Explanation

Question 24 of 195

1

A USB adapter connects the Compact Flash reader to the computer.

Select one of the following:

  • True
  • False

Explanation

Question 25 of 195

1

What is the storage capacity of a Blu-ray?

Select one of the following:

  • 4.7 GB –17.08 GB

  • 128 GB

  • 5 TB

  • 8.5 GB

Explanation

Question 26 of 195

1

Which of the following is a type of optical disk?

Select one of the following:

  • CD-ROM

  • Dual Layer DVD-RW

  • BD-RE

  • All of the above

Explanation

Question 27 of 195

1

Which of the following are characteristics of a CPU?

Select one of the following:

  • Speed

  • Core

  • Cache size

  • All of the above

Explanation

Question 28 of 195

1

A heat sink is a method of cooling a CPU.

Select one of the following:

  • True
  • False

Explanation

Question 29 of 195

1

The current USB standard is which of the following?

Select one of the following:

  • 2.x

  • 3.x

  • 7.x

  • 10.x

Explanation

Question 30 of 195

1

Up to 63 devices can be attached using Firewire.

Select one of the following:

  • True
  • False

Explanation

Question 31 of 195

1

What is the range for near field communication?

Select one of the following:

  • 100 feet

  • 500 feet

  • A few centimeters to a few inches

  • One mile

Explanation

Question 32 of 195

1

IR can penetrate walls.

Select one of the following:

  • True
  • False

Explanation

Question 33 of 195

1

You must have an HDMI physical connection for a Blu-Ray player.

Select one of the following:

  • True
  • False

Explanation

Question 34 of 195

1

The basic function of a power supply is to convert the electrical power from a wall socket to one that a PC can use.

Select one of the following:

  • True
  • False

Explanation

Question 35 of 195

1

The power supply in a conventional desktop system is designed to convert either 110 V (nominal) 80 Hz AC (alternating current) or 280 V (nominal) 60 Hz AC power into +3.3 V, +5 V, and +12 V DC (direct current) power.

Select one of the following:

  • True
  • False

Explanation

Question 36 of 195

1

Power supply safety recommendations include:

Select one of the following:

  • Checking for UL certification

  • Keeping the computer case closed during normal operation

  • Protecting the power supply

  • All of the above

Explanation

Question 37 of 195

1

Which of the two hardware configurations are most important to a gaming PC?

Select one of the following:

  • CPU

  • Hard drive space

  • Video card

  • A and C

Explanation

Question 38 of 195

1

The purpose of virtualization is to condense hardware servers down to a single hardware server

Select one of the following:

  • True
  • False

Explanation

Question 39 of 195

1

What are the two types of standard clients?

Select one of the following:

  • Short and Tall

  • Thin and Thick

  • Round and Square

  • None of the above

Explanation

Question 40 of 195

1

Thin client requirements include fast network connection and specialized software for server access.

Select one of the following:

  • True
  • False

Explanation

Question 41 of 195

1

Thick client requirements include access to local storage locations and robust hardware to meet application needs.

Select one of the following:

  • True
  • False

Explanation

Question 42 of 195

1

HDMI interface is electronically identical and compatible with the video-only DVI interface

Select one of the following:

  • True
  • False

Explanation

Question 43 of 195

1

The power wire of a USB interface can supply up to 750 milliamps of power at 5 volts.

Select one of the following:

  • True
  • False

Explanation

Question 44 of 195

1

If a cable box or PC has DVI out, but the TV or monitor only has HDMI in, a DVI-to-HDMI adapter cable is used to connect the video.

Select one of the following:

  • True
  • False

Explanation

Question 45 of 195

1

USB Standard supports how many devices?

Select one of the following:

  • 10

  • 55

  • 127

  • 200

Explanation

Question 46 of 195

1

Standard keyboards always include the full number pad to the right.

Select one of the following:

  • True
  • False

Explanation

Question 47 of 195

1

Where do you go to configure multiple displays?

Select one of the following:

  • Control Panel - Appearance and Personalization – Display

  • Control Panel – Screens

  • Control Panel – Display config

  • None of the above

Explanation

Question 48 of 195

1

Multimedia devices are either peripheral or internal components that transfer sound, images, or a combination of both from a personal computer.

Select one of the following:

  • True
  • False

Explanation

Question 49 of 195

1

An interactive whiteboard would be considered a specialized input device.

Select one of the following:

  • True
  • False

Explanation

Question 50 of 195

1

Expansion card configuration methods include:

Select one of the following:

  • Use plug - and - play installation

  • Install the manufacturer’s driver

  • Use the Add Hardware wizard

  • All of the above

Explanation

Question 51 of 195

1

SOHO networks are self - maintaining and do not need a firewall.

Select one of the following:

  • True
  • False

Explanation

Question 52 of 195

1

Which of the following features will you find on a wireless router?

Select one of the following:

  • Reset button

  • LAN Ethernet ports

  • WAN Ethernet ports

  • All of the above

Explanation

Question 53 of 195

1

Basic QoS is a set of parameters that controls the quality provided to network traffic

Select one of the following:

  • True
  • False

Explanation

Question 54 of 195

1

Basic QoS parameters include:

Select one of the following:

  • Delay amounts

  • Signal loss

  • Noise limits

  • All of the above

Explanation

Question 55 of 195

1

Which of the following is NOT a common SOHO security method?

Select one of the following:

  • Change default user name and password

  • Enable MAC filtering

  • Enable ports

  • Assign static IP addresses

Explanation

Question 56 of 195

1

Which of the following are valid types of printer technologies?

Select one of the following:

  • MFD

  • Laser printer

  • Thermal printer

  • All of the above

Explanation

Question 57 of 195

1

Which of the following printer technologies use heat transfer to produce an image on paper?

Select one of the following:

  • Inkjet

  • Laserjet

  • Impact printers

  • None of the above

Explanation

Question 58 of 195

1

Thermal printers can produce photo-quality output.

Select one of the following:

  • True
  • False

Explanation

Question 59 of 195

1

Printer toner is made up of which of the following?

Select one of the following:

  • Dried pigment

  • Iron, carbon and resin

  • Powdered ink

  • None of the above

Explanation

Question 60 of 195

1

Which of the following are valid Printer Driver types?

Select one of the following:

  • PPD

  • PCL

  • UDP

  • All of the above

Explanation

Question 61 of 195

1

Drivers are available on installation discs, or can be downloaded from the manufacturer’s website

Select one of the following:

  • True
  • False

Explanation

Question 62 of 195

1

Printers can be shared:

Select one of the following:

  • Via USB or Ethernet

  • Using Bluetooth, 802.11x, or IR

  • Using a printer server to manage the print queue for network shared printers

  • All of the above

Explanation

Question 63 of 195

1

A client server networking model is where all the computers in the network share responsibilities, management, and file sharing

Select one of the following:

  • True
  • False

Explanation

Question 64 of 195

1

A Network Interface Card has which of the following features?

Select one of the following:

  • Physical network address

  • Network connection port

  • Status indicator lights

  • All of the above

Explanation

Question 65 of 195

1

How many pins are in one twisted pair connector?

Select one of the following:

  • 2

  • 4

  • 8

  • 10

Explanation

Question 66 of 195

1

Fiber optic cable types include:

Select one of the following:

  • Single-mode fiber

  • Step index multimode fiber

  • Graded index multimode fiber

  • All of the above

Explanation

Question 67 of 195

1

Which of the following are part of the TCP/IP Suite of protocols?

Select one of the following:

  • TCP

  • UUP

  • SMTP

  • A and C

Explanation

Question 68 of 195

1

In the subnet mask 255.255.255.0 for the IP Address, what would be the network ID of the following IP Address: 10.1.1.1?

Select one of the following:

  • 10.0000

  • 10.1.1.1

  • 10.0.10.1

  • 10.0.0.0

Explanation

Question 69 of 195

1

Gateways are implemented as hardware, software, or both.

Select one of the following:

  • True
  • False

Explanation

Question 70 of 195

1

IPv4 uses 128 bit addresses and IPv6 uses 32 bit addresses.

Select one of the following:

  • True
  • False

Explanation

Question 71 of 195

1

Client-side DNS enables clients to perform basic DNS lookups without connecting to a server.

Select one of the following:

  • True
  • False

Explanation

Question 72 of 195

1

To send a connectionless datagram the application would have to be written to TCP.

Select one of the following:

  • True
  • False

Explanation

Question 73 of 195

1

The SMTP Protocol uses port 25.

Select one of the following:

  • True
  • False

Explanation

Question 74 of 195

1

What type of ports range from 1,024 to 49,151?

Select one of the following:

  • Well-known ports

  • Registered ports

  • Dynamic or private ports

  • None of the above

Explanation

Question 75 of 195

1

What port does HTTP use?

Select one of the following:

  • 22

  • 53

  • 80

  • 443

Explanation

Question 76 of 195

1

Which IEEE standard speaks to wireless standards?

Select one of the following:

  • 802.11

  • 802.12

  • 802.13

  • 802.15

Explanation

Question 77 of 195

1

If you wanted a more recent implementation of wireless, that supported an indoor signal range of 225 feet, which technology would you use?

Select one of the following:

  • 802.11n

  • 802.15n

  • 802.12g

  • 802.11g

Explanation

Question 78 of 195

1

There is no difference in max data rate between 802.11a and 802.11ac.

Select one of the following:

  • True
  • False

Explanation

Question 79 of 195

1

Which of the following ports would you find on a SOHO wireless router?

Select one of the following:

  • LAN

  • WAN

  • Ethernet

  • All of the above

Explanation

Question 80 of 195

1

When you create an object to represent a node on the network in the firewall tables, what is it called?

Select one of the following:

  • NAT

  • DMZ

  • Address Object

  • None of the above

Explanation

Question 81 of 195

1

Address objects define segments or hosts of your network by IP Address.

Select one of the following:

  • True
  • False

Explanation

Question 82 of 195

1

If you need to connect remotely with an encrypted connection to your office, which of the following internet connection types would you use?

Select one of the following:

  • MAN

  • VPN

  • Ethernet

  • EAN

Explanation

Question 83 of 195

1

The connection from your ISP to your office is called a WAN, and the connection from the router to the PC’s in the office network is called a LAN.

Select one of the following:

  • True
  • False

Explanation

Question 84 of 195

1

Internet connection types and features include:

Select one of the following:

  • DSL

  • ISDN

  • WiMAX

  • All of the above

Explanation

Question 85 of 195

1

In order to create your own Ethernet wires, you would use a toner probe to prep the ends of the cable with the clip that plugs into the device or wall.

Select one of the following:

  • True
  • False

Explanation

Question 86 of 195

1

A ____________ is used to correctly connect the wires in a wiring closet to the patch panel.

Select one of the following:

  • Multimeter

  • Toner probe

  • Crimper

  • Punch down tool

Explanation

Question 87 of 195

1

If you wished to have printer, monitor, and full sized keyboard always plugged in, and the ability to simply remove the laptop without the connections, which of the following would you use?

Select one of the following:

  • Laptop lock

  • Docking station

  • Patch panel

  • None of the above

Explanation

Question 88 of 195

1

Laptop power supply has an auto switch power adapter, and knows to switch to battery if the power source from the wall is disconnected.

Select one of the following:

  • True
  • False

Explanation

Question 89 of 195

1

Types of laptop displays include:

Select one of the following:

  • LCD

  • OLED

  • Plasma

  • All of the above

Explanation

Question 90 of 195

1

Which of the following are types of mobile devices?

Select one of the following:

  • Smart watches

  • Fitness monitors

  • Glasses

  • All of the above

Explanation

Question 91 of 195

1

GPS is not considered a mobile device.

Select one of the following:

  • True
  • False

Explanation

Question 92 of 195

1

Assume the same threats apply to mobile devices as desktop and laptop devices.

Select one of the following:

  • True
  • False

Explanation

Question 93 of 195

1

What is the first step in the Bluetooth Pairing Process?

Select one of the following:

  • Find the device for pairing

  • Determine if a pin code is needed

  • Enable Bluetooth

  • Test the connection

Explanation

Question 94 of 195

1

E-mail can be configured to sync with Microsoft Exchange.

Select one of the following:

  • True
  • False

Explanation

Question 95 of 195

1

NFC connections are used exclusively by Apple products.

Select one of the following:

  • True
  • False

Explanation

Question 96 of 195

1

If you have issues with mobile devices and keypads are not working, you cannot replace just the keyboard.

Select one of the following:

  • True
  • False

Explanation

Question 97 of 195

1

Proprietary vendor specific ports include:

Select one of the following:

  • Mini USB

  • Lightning

  • IR

  • All of the above

Explanation

Question 98 of 195

1

In a mobile phone, when we press a key and it works very slowly we should reload the software to solve the problem.

Select one of the following:

  • True
  • False

Explanation

Question 99 of 195

1

What is the most common problem with the power supply?

Select one of the following:

  • Flames

  • Noise

  • Fan

  • Odor

Explanation

Question 100 of 195

1

The reason for the documentation is to write down all of the hardware and software.

Select one of the following:

  • True
  • False

Explanation

Question 101 of 195

1

What is the first step of the troubleshooting theory?

Select one of the following:

  • Identify the problem

  • Establish a theory

  • Test the theory

  • Document

Explanation

Question 102 of 195

1

Beep codes are different per manufacturer.

Select one of the following:

  • True
  • False

Explanation

Question 103 of 195

1

Intermittent device failure could be due to:

Select one of the following:

  • Power

  • Heat

  • Motherboard

  • All of the above

Explanation

Question 104 of 195

1

What is the function of POST?

Select one of the following:

  • Indexes the type of data expected from the server

  • Formats the drive upon boot

  • Confirms the drive is available and functioning upon boot

  • All of the above

Explanation

Question 105 of 195

1

What is a RAID?

Select one of the following:

  • Redundant Array of Independent Disks

  • Redundant Action for Initialized Disks

  • Redundant Arrangement of Agile Disks

  • All of the above

Explanation

Question 106 of 195

1

Checking vendor specifications for the OS and software used is a troubleshooting tip for what?

Select one of the following:

  • PATA

  • SATA

  • SCSI

  • None of the above

Explanation

Question 107 of 195

1

What could be identified as the reason there is not a video display?

Select one of the following:

  • Video card

  • Physical damage

  • Power

  • All of the above

Explanation

Question 108 of 195

1

Color issues are only caused by application problems.

Select one of the following:

  • True
  • False

Explanation

Question 109 of 195

1

What does PING (Internet Control Message Protocol) do?

Select one of the following:

  • Make a sound to test audio

  • Send an echo request to confirm connection

  • Shut down an IP address on the network

  • All of the above

Explanation

Question 110 of 195

1

What is the purpose of the toner probe?

Select one of the following:

  • Communicate with the printer

  • Remotely turns on and off the network connection

  • Follow or trace a cable, through cable management

  • All of the above

Explanation

Question 111 of 195

1

The test pattern tool is used to monitor calibration.

Select one of the following:

  • True
  • False

Explanation

Question 112 of 195

1

Which one of these tools is not best to use as a printer troubleshooting tool?

Select one of the following:

  • Compressed air

  • Your breath

  • Hair dryer

  • Toner vacuum

Explanation

Question 113 of 195

1

Printer maintenance kits are specific to the make and model of each printer.

Select one of the following:

  • True
  • False

Explanation

Question 114 of 195

1

You should vacuum toner with an ordinary vacuum.

Select one of the following:

  • True
  • False

Explanation

Question 115 of 195

1

Cortana is new to Windows 10.

Select one of the following:

  • True
  • False

Explanation

Question 116 of 195

1

When hardware has been released after the current OS version, then third party drivers are needed.

Select one of the following:

  • True
  • False

Explanation

Question 117 of 195

1

You do not need to review the documentation from the computer manufacturer before using the factory recovery partition.

Select one of the following:

  • True
  • False

Explanation

Question 118 of 195

1

The command prompt allows the user to perform the same amount of tasks as through the GUI. (Graphical User Interface)

Select one of the following:

  • True
  • False

Explanation

Question 119 of 195

1

What is the best command to run if you are looking to check the operating system’s system files?

Select one of the following:

  • Chkdsk

  • SFC

  • Fdisk

  • Robocopy

Explanation

Question 120 of 195

1

What is the best way to move your settings over to a new machine even when the operating system is different or upgraded?

Select one of the following:

  • USMT (User State Migration Tool)

  • Easy transfer

  • File and sending transfer

  • All of the above

Explanation

Question 121 of 195

1

Which of the run line utilities performs remote desktop?

Select one of the following:

  • mmc

  • dxdiag

  • mstsc

  • rem

Explanation

Question 122 of 195

1

Component services are used to configure and administer:

Select one of the following:

  • COM (Component Object Model)

  • COM + Applications

  • DTC (Distributed Transaction Coordinator)

  • All of the above

Explanation

Question 123 of 195

1

Administrative tools include iSCSI Initiator and Task Scheduler.

Select one of the following:

  • True
  • False

Explanation

Question 124 of 195

1

Share permissions apply only to actions, folders and one file or folder at a time.

Select one of the following:

  • True
  • False

Explanation

Question 125 of 195

1

Which type of user account gives you limited computer access?

Select one of the following:

  • Administrator

  • Power User

  • Standard User

  • Guest

Explanation

Question 126 of 195

1

Share permissions can include:

Select one of the following:

  • Read

  • Change

  • Full control

  • All of the above

Explanation

Question 127 of 195

1

The proxy server’s purpose is to speed up the connection of multiple machines connecting to the internet at the same time.

Select one of the following:

  • True
  • False

Explanation

Question 128 of 195

1

The Ethernet cable may also send an electrical current through what type of network connection?

Select one of the following:

  • Wake-on-LAN

  • Speed and duplex settings

  • PoE

  • QoS

Explanation

Question 129 of 195

1

When configuring a client computer to be used with a proxy the proxy server settings must be set to the correct address.

Select one of the following:

  • True
  • False

Explanation

Question 130 of 195

1

Which of the following are network connection types?

Select one of the following:

  • VPN

  • Dialup

  • WWAN cellular

  • All of the above

Explanation

Question 131 of 195

1

Recovery Image is a function in all Windows operating systems.

Select one of the following:

  • True
  • False

Explanation

Question 132 of 195

1

It is necessary to install all updates automatically instead of manually.

Select one of the following:

  • True
  • False

Explanation

Question 133 of 195

1

The rm command in Linux is the same as the:

Select one of the following:

  • copy in the command prompt

  • del in the command prompt

  • list in the command prompt

  • None of the above

Explanation

Question 134 of 195

1

Similar to Windows, Mac and Linux OS automatically run updates.

Select one of the following:

  • True
  • False

Explanation

Question 135 of 195

1

To Force Quit on Mac OS X, press Command-Option-Esc, then select unresponsive App in Force Quit Window.

Select one of the following:

  • True
  • False

Explanation

Question 136 of 195

1

The Grep command in Linux does what?

Select one of the following:

  • Change directories

  • Full text search

  • Copy a file

  • Move or change files

Explanation

Question 137 of 195

1

On the Mac OS X, Dock Apps are located on the right.

Select one of the following:

  • True
  • False

Explanation

Question 138 of 195

1

What is a good reason to run a virtual desktop infrastructure on the server?

Select one of the following:

  • The need to run multiple OS locally

  • The inability to run an OS on specific hardware

  • OS testing

  • All of the above

Explanation

Question 139 of 195

1

When setting up the client side virtual machine, it is not necessary to have the same configuration of hardware and memory as the host machine.

Select one of the following:

  • True
  • False

Explanation

Question 140 of 195

1

Virtualization requirements include:

Select one of the following:

  • Emulator to run the VMs

  • Security to protect VMs from unauthorized access

  • Network components needed to run the VDI

  • All of the above

Explanation

Question 141 of 195

1

What is sometimes considered “on demand software”?

Select one of the following:

  • IaaS

  • SaaS

  • PaaS

  • None of the above

Explanation

Question 142 of 195

1

In IaaS (Infrastructure as Service), users are responsible for applications, data, runtime, middleware, and OS.

Select one of the following:

  • True
  • False

Explanation

Question 143 of 195

1

Resource pooling is a situation where providers serve multiple clients with provisioned and scalable services.

Select one of the following:

  • True
  • False

Explanation

Question 144 of 195

1

Measured service monitors the provisions of services for:

Select one of the following:

  • Billing

  • Effective use of resources

  • Predictive planning

  • All of the above

Explanation

Question 145 of 195

1

A web server and a file server have no features in common.

Select one of the following:

  • True
  • False

Explanation

Question 146 of 195

1

Which of the following is responsible for name resolution?

Select one of the following:

  • Web server

  • File server

  • DHCP server

  • DNS server

Explanation

Question 147 of 195

1

Open Source software is the same as Closed Source software, the only difference is where it is sold.

Select one of the following:

  • True
  • False

Explanation

Question 148 of 195

1

What do Office 365, iCloud, Google Apps and eBooks have in common?

Select one of the following:

  • They have mobile data synchronization

  • They are open source

  • They are only mobile based

  • All of the above

Explanation

Question 149 of 195

1

A gyroscope determines the orientation of the device with respect to Earth’s magnetic fields.

Select one of the following:

  • True
  • False

Explanation

Question 150 of 195

1

Bluetooth is most secure when it is paired.

Select one of the following:

  • True
  • False

Explanation

Question 151 of 195

1

Having your contacts from your e-mail server copied to your mobile device is a process known as:

Select one of the following:

  • Updating

  • Patching

  • Synchronizing

  • Confirming

Explanation

Question 152 of 195

1

Tethering is when you turn your smartphone into a mobile Wi-Fi hotspot.

Select one of the following:

  • True
  • False

Explanation

Question 153 of 195

1

IMSI stands for International Mobile Satellite Identity.

Select one of the following:

  • True
  • False

Explanation

Question 154 of 195

1

An attacker may obtain credentials only via their network connection.

Select one of the following:

  • True
  • False

Explanation

Question 155 of 195

1

Malware is software that attacks the hardware and shuts down or makes using the computer difficult.

Select one of the following:

  • True
  • False

Explanation

Question 156 of 195

1

Types of malware include:

Select one of the following:

  • Worms

  • Trojan horses

  • Logic bombs

  • All of the above

Explanation

Question 157 of 195

1

When an attacker obtains credentials from another user and then uses those credentials to mount an attack it is known as what?

Select one of the following:

  • Virus

  • Social engineering

  • Spam

  • None of the above

Explanation

Question 158 of 195

1

What is the purpose of a firewall?

Select one of the following:

  • To stop traffic coming in and going out

  • To alert the user of all traffic coming in and out

  • To prevent malware

  • All of the above

Explanation

Question 159 of 195

1

What is the best way to clear a hard drive and get rid of the information?

Select one of the following:

  • Low level formatting

  • Drilling a hole in the center of the hard drive

  • Standard formatting

  • Shredding the hard drive

Explanation

Question 160 of 195

1

Which of the following are physical security measures?

Select one of the following:

  • Video surveillance

  • Security guards

  • Physical barriers

  • All of the above

Explanation

Question 161 of 195

1

Fire and facility intrusions are events that can threaten physical security.

Select one of the following:

  • True
  • False

Explanation

Question 162 of 195

1

Host firewalls and personal firewalls are two common types of firewalls.

Select one of the following:

  • True
  • False

Explanation

Question 163 of 195

1

Which of the following user accounts have the permissions to install software?

Select one of the following:

  • Administrator

  • Power user

  • Guest

  • A and B

Explanation

Question 164 of 195

1

Which of the following represents an administrative share?

Select one of the following:

  • \\PC\C$

  • X:C$

  • \\PC\Admin$

  • None of the above

Explanation

Question 165 of 195

1

If you have a complex password, there is no reason to change it in regular intervals.

Select one of the following:

  • True
  • False

Explanation

Question 166 of 195

1

Which of the following are examples of user account restrictions?

Select one of the following:

  • Lockout

  • Login time restrictions

  • AutoRun

  • A and B

Explanation

Question 167 of 195

1

Which of the following are methods for locking a mobile device to secure it?

Select one of the following:

  • Screen locks

  • Face locks

  • Swipe locks

  • All of the above

Explanation

Question 168 of 195

1

A shredder can be used to physically destroy a device.

Select one of the following:

  • True
  • False

Explanation

Question 169 of 195

1

When troubleshooting a BSOD, which would be methods to use?

Select one of the following:

  • Safe mode / safe boot

  • Disabling a driver

  • Removing hardware

  • All of the above

Explanation

Question 170 of 195

1

Where can you go to see logfiles with error codes for troubleshooting?

Select one of the following:

  • Errorlog.txt

  • BSOD

  • Event viewer

  • All of the above

Explanation

Question 171 of 195

1

Slow transfer speed is a common network issue.

Select one of the following:

  • True
  • False

Explanation

Question 172 of 195

1

Common network troubleshooting utilities include all the following except:

Select one of the following:

  • IPCONFIG

  • TRACERT

  • TRACKSTAT

  • NETSTAT

Explanation

Question 173 of 195

1

Always using trusted installation sources and websites is a malware removal best practice.

Select one of the following:

  • True
  • False

Explanation

Question 174 of 195

1

Which of the following are indicators of a virus?

Select one of the following:

  • Pop ups

  • Slow network connections

  • Slow PC

  • All of the above

Explanation

Question 175 of 195

1

What are some of the consequences of getting a virus?

Select one of the following:

  • Renamed files

  • Hijacked e-mail

  • Automated replies from unknown sent e-mail

  • All of the above

Explanation

Question 176 of 195

1

Which of the following are symptoms of mobile operating system issues?

Select one of the following:

  • Dim display

  • Apps not loading

  • Slow performance

  • All of the above

Explanation

Question 177 of 195

1

Which tools are available to use for mobile operating system troubleshooting?

Select one of the following:

  • Hard reset

  • Soft reset

  • Uninstall / reinstall apps

  • All of the above

Explanation

Question 178 of 195

1

If applications are not loading you can:

Select one of the following:

  • Check for updates to application

  • Force close the app and restart

  • Restart the phone

  • All of the above

Explanation

Question 179 of 195

1

To help counter extremely short battery life you can adjust your brightness settings.

Select one of the following:

  • True
  • False

Explanation

Question 180 of 195

1

Mobile devices slow down as internal storage fills up.

Select one of the following:

  • True
  • False

Explanation

Question 181 of 195

1

Electrical currents give off ozone gas.

Select one of the following:

  • True
  • False

Explanation

Question 182 of 195

1

Workplace security practices should include equipment storage and cable management.

Select one of the following:

  • True
  • False

Explanation

Question 183 of 195

1

You should always read the labels and follow instructions carefully when disposing of materials.

Select one of the following:

  • True
  • False

Explanation

Question 184 of 195

1

AUP stands for Audible Use Protocol.

Select one of the following:

  • True
  • False

Explanation

Question 185 of 195

1

Chemical hazards include:

Select one of the following:

  • Laser printer toner

  • Batteries

  • Capacitors

  • All of the above

Explanation

Question 186 of 195

1

Your basic PC toolkit should have which of the following?

Select one of the following:

  • Screwdrivers

  • Tweezers

  • Three prong pickup tool

  • All of the above

Explanation

Question 187 of 195

1

Which of the following are software diagnostic tools you can use for maintenance and troubleshooting?

Select one of the following:

  • Computer management

  • Event viewer

  • ERRORlog.txt

  • A and B

Explanation

Question 188 of 195

1

Software diagnostic tests can:

Select one of the following:

  • Detect problems

  • Repair problems

  • Prevent problems

  • All of the above

Explanation

Question 189 of 195

1

A hard drive self-test is a tool that enables a hard disk drive to test itself when the computer starts.

Select one of the following:

  • True
  • False

Explanation

Question 190 of 195

1

A compressed air canister is considered a cleaning compound or material.

Select one of the following:

  • True
  • False

Explanation

Question 191 of 195

1

Which of the following are valid licensing types?

Select one of the following:

  • Personal license

  • Open source license

  • Shared license

  • A and B

Explanation

Question 192 of 195

1

You only need backups when you are making large changes.

Select one of the following:

  • True
  • False

Explanation

Question 193 of 195

1

You should avoid talking to co-workers while with customers.

Select one of the following:

  • True
  • False

Explanation

Question 194 of 195

1

When dealing with difficult situations and customers you should rant on social media outlets.

Select one of the following:

  • True
  • False

Explanation

Question 195 of 195

1

Confidential materials can be located on a printer.

Select one of the following:

  • True
  • False

Explanation