CompTIA A+ 601 Certification Test! Trivia Questions Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Pickra
P
Pickra
Community Contributor
Quizzes Created: 2 | Total Attempts: 903
Questions: 32 | Attempts: 347

SettingsSettingsSettings
CompTIA A+ 601 Certification Test! Trivia Questions Quiz - Quiz

.


Questions and Answers
  • 1. 

    Ntldr loads which 3 major os files?

    • A.

      Bootsect.dos

    • B.

      Ntoskrnl

    • C.

      Hal.dll

    • D.

      Boot.ini

    • E.

      Ntdetect.com

    Correct Answer(s)
    B. Ntoskrnl
    D. Boot.ini
    E. Ntdetect.com
    Explanation
    The correct answer is ntoskrnl, boot.ini, and ntdetect.com. These three files are essential for the operating system to function properly. ntoskrnl is the main kernel file that manages various system services and functions. boot.ini is a configuration file that contains information about the operating system installations on the computer. ntdetect.com is responsible for detecting hardware components during the boot process. These files are loaded by ntldr, the initial bootloader, to initiate the operating system.

    Rate this question:

  • 2. 

    A FRU, field replacement unit, is: (pick 3)

    • A.

      Motherboard

    • B.

      Capacitor

    • C.

      Philips head screw

    • D.

      Agp card

    • E.

      Power supply

    Correct Answer(s)
    A. Motherboard
    D. Agp card
    E. Power supply
    Explanation
    a circuit board, part or assembly that can be quickly and easily removed from a personal computer or other piece of electronic equipment, and replaced by the user or a technician without having to send the entire product or system to a repair facility.

    It should be noted that FRUs are not strictly confined to computers but are also part of many high-end, lower volume consumer and commercial products. For example, in military aviation, electronic components of line-replaceable units, typically known as shop-replaceable units (SRUs), are repaired at field-service backshops, usually by a "remove and replace" repair procedure, with specialized repair performed at centralized repair depots or by the OEM.

    FRUs allow a technician lacking in-depth product knowledge to fault isolate and replace faulty components.

    Nearly every component of a typical personal computer is an FRU. Typical FRUs include:

    * Motherboards
    * socketed microprocessors
    * primary storage modules (such as RAM)
    * secondary storage devices (such as floppy drives, hard drives, and optical drives)
    * Bus devices (such as video cards and sound cards)
    * Power supply units
    * Cooling fans
    * Peripherals (such as keyboards, mice, printers, and cables connecting them)

    Rate this question:

  • 3. 

    This is an image of a ______connector.

    • A.

      ST, straight tip, used to connect multimode fiber. often used in network patch panels. the most popular fiber connector.

    • B.

      MT-RJ, mechanical transfer registered jack.A fiber-optic cable connector that is very popular for small form factor devices due to its small size. Housing two fibers and mating together with locating pins on the plug, the MT-RJ comes from the MT connector, which can contain up to 12 fibers.

    • C.

      SC, subscriber connector. used with single-mode fiber. often used in a duplex configuration where 2 fibers are terminated into SC connectors

    • D.

      LC, lucent or local connector. High-density connections, popular SFF connector, fiber optic connector with a 1.25mm ferrule.

    • E.

      AUI, attachment unit interface. Thick ethernet cable connector, used with an RG-8 cable. The network interface used with the original Ethernet, a 15-pin D-connector.

    Correct Answer
    C. SC, subscriber connector. used with single-mode fiber. often used in a duplex configuration where 2 fibers are terminated into SC connectors
    Explanation
    The correct answer is SC connector because it is used with single-mode fiber and is often used in a duplex configuration where 2 fibers are terminated into SC connectors.

    Rate this question:

  • 4. 

    Aliens are invading the earth and you desperately need to print out a confirmation page for those cute shoes you bought on amazon, before the aliens come knocking down your door. you press print, but someone at the steno pool has a few documents ahead of you. no problem...you can wait!!!! finally that cow has printed all of her "important memos" and it's your turn!! but wait... it's not printing...!!! the aliens have landed, and that coward from IT has left the building. what will you do???!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!luckily you dated a computer guy back when geek was chic, and some of it rubbed off on you; literally. all you have to do is restart the printer with a command in that black box thingy. think Priscilla, queen of the desert, think! what is the command line tool that will remedy this perspiring predicament?

    • A.

      Spool.exe

    • B.

      Setup.exe

    • C.

      Startspooler.com

    • D.

      Spoolsv.exe

    • E.

      Start.u.F!!!ER.start.exe

    Correct Answer
    D. Spoolsv.exe
    Explanation
    The command line tool that will remedy the printing issue in this situation is "spoolsv.exe".

    Rate this question:

  • 5. 

    What is the throughput for a SCSI-2/fast wide scsi?

    • A.

      5

    • B.

      10

    • C.

      20

    • D.

      40

    • E.

      80

    Correct Answer
    C. 20
    Explanation
    The throughput for a SCSI-2/Fast Wide SCSI is 20. SCSI-2 is a standard for connecting computer peripherals and Fast Wide SCSI is an enhancement of SCSI-2 that allows for faster data transfer rates. The throughput refers to the amount of data that can be transferred in a given amount of time. In this case, the throughput is 20, indicating that 20 units of data can be transferred within the specified time frame.

    Rate this question:

  • 6. 

    The IRQ for a keyboard is?

    • A.

      0

    • B.

      1

    • C.

      2

    • D.

      6

    • E.

      12

    Correct Answer
    B. 1
    Explanation
    The IRQ (Interrupt Request) for a keyboard is 1. This means that the keyboard is assigned to interrupt request line 1, allowing it to send signals to the CPU for processing.

    Rate this question:

  • 7. 

    Of all the OSI MODEL layers in the land, which one establishes and maintains communications?

    • A.

      Data link layer

    • B.

      Network layer

    • C.

      Transportation layer

    • D.

      Presentation layer

    • E.

      Session layer

    Correct Answer
    E. Session layer
    Explanation
    The session layer of the OSI model is responsible for establishing and maintaining communication sessions between two network devices. It handles the setup, coordination, and termination of sessions, allowing for reliable and orderly data exchange. This layer ensures that both devices are ready to send and receive data, manages session checkpoints, and handles any interruptions or errors that may occur during the session. Therefore, the session layer is the correct answer as it establishes and maintains communications between network devices.

    Rate this question:

  • 8. 

    Pick out the private ip address

    • A.

      127.0.0.0

    • B.

      172.27.39.2

    • C.

      192.169.234.87

    • D.

      11.24.33.32

    • E.

      192.40.25.98

    Correct Answer
    B. 172.27.39.2
    Explanation
    The private IP address in the given options is 172.27.39.2. Private IP addresses are used within a private network and are not routable on the internet. The IP address 172.27.39.2 falls within the range of private IP addresses defined by the Internet Assigned Numbers Authority (IANA) for use in private networks.

    Rate this question:

  • 9. 

    While printing out a love letter to your imaginary friend(on your laser printer), you notice that blank lines are obscuring the true emotions of your heartfelt note. "Gosh darn it!" you say to yourself. "What would cause these stupid lines to go through the words on the page?"

    • A.

      The toner isn't being evenly distributed

    • B.

      Nozzles on the print head are dry or broken

    • C.

      The drum has a scratch

    • D.

      The laser scanning module

    • E.

      The fuser

    Correct Answer
    A. The toner isn't being evenly distributed
    Explanation
    The toner not being evenly distributed can cause blank lines to appear on the printed page. This means that the toner is not being spread evenly across the page, resulting in areas where there is no toner and therefore blank lines. This can happen due to various reasons such as a malfunctioning toner cartridge or improper toner distribution within the printer.

    Rate this question:

  • 10. 

    What is IPsec?

    • A.

      Secures network traffic by using, among other things, encryption and server authentication.

    • B.

      A security protocol from the IETF that provides authentication and encryption over the Internet.

    • C.

      A utility that traces a packet from your computer to an Internet host, showing how many hops the packet requires to reach the host and how long each hop takes.

    • D.

      Used to transmit data to multiple recipients on the network at the same time using one transmission stream to the switches, at which point data are distributed out to the end users on separate lines.

    • E.

      Is a general protocol for authentication that also supports multiple authentication methods, such as token cards, Kerberos, one-time passwords, certificates, public key authentication and smart cards.

    Correct Answer
    B. A security protocol from the IETF that provides authentication and encryption over the Internet.
    Explanation
    IPsec is a security protocol developed by the IETF (Internet Engineering Task Force) that ensures the security of network traffic. It achieves this by utilizing encryption and server authentication. IPsec provides authentication and encryption over the Internet, making it a reliable and secure method for protecting data during transmission.

    Rate this question:

  • 11. 

    Throughput is-

    • A.

      A measurement of how much data a network is capable of carrying @ any given time

    • B.

      A measurement of how much data can actually pass thru the channel in any given time period.

    Correct Answer
    B. A measurement of how much data can actually pass thru the channel in any given time period.
    Explanation
    The correct answer is "A measurement of how much data can actually pass thru the channel in any given time period." This means that throughput refers to the actual amount of data that can be transmitted through a network or channel within a specific time frame. It indicates the capacity or efficiency of the network to carry and process data, rather than just the potential capacity.

    Rate this question:

  • 12. 

    If a train leaves the station from boston @ 257mph, and you want a choca matta latte from the starbux in athens georgia; what port does telnet use?

    • A.

      23

    • B.

      78

    • C.

      25

    • D.

      110

    • E.

      21

    Correct Answer
    A. 23
  • 13. 

    What tcp/ip protocol do you use if 2 computers have the same ip address?

    • A.

      Nwlink

    • B.

      Ncp

    • C.

      Apipa

    • D.

      Arp

    • E.

      Ldap

    Correct Answer
    D. Arp
    Explanation
    When two computers have the same IP address, the Address Resolution Protocol (ARP) is used in TCP/IP to resolve this conflict. ARP is responsible for mapping an IP address to a physical MAC address on a local network. It allows the computers to communicate by determining the correct MAC address associated with the duplicate IP address.

    Rate this question:

  • 14. 

    You work in a stuffy, no funny stuff, everyone is a robot; office. you have a side gig (exporting emu dung to solar farms) that no one @ the office knows about. how would you send solar power to emu dung ratio data, privately over a network to your silent partner in norway?

    • A.

      Voip

    • B.

      Vpn

    • C.

      Vvpn

    • D.

      Email

    • E.

      Coast guard

    Correct Answer
    B. Vpn
    Explanation
    A VPN (Virtual Private Network) would be the most suitable option for sending solar power to emu dung ratio data privately over a network to a silent partner in Norway. A VPN creates a secure and encrypted connection between the sender and receiver, ensuring that the data remains confidential and protected from any potential eavesdropping or interception. This would allow the person to transmit the sensitive information without the risk of it being discovered by their colleagues in the office, maintaining the privacy of their side gig.

    Rate this question:

  • 15. 

    You come home after a long night of binge drinking. you turn on your computer to see if anyone has thrown a sheep at you on facebook, and to see how your online dating profile is doing. an error# flashes on the screen but you are so wasted that you can only remember that it was somewhere in the 200-299 range. you want to fix it before you pass out or spew all over the computer. the problem is a... 

    • A.

      Monochrome video problem

    • B.

      Hard disk problem

    • C.

      Memory failure problem

    • D.

      Floppy disk problem

    • E.

      System board problem

    Correct Answer
    C. Memory failure problem
    Explanation
    The correct answer is memory failure problem. When the error message flashes on the screen, it indicates that there is an issue with the computer's memory. This could be due to a variety of reasons such as faulty RAM or a problem with the memory modules. To fix the issue, the person would need to troubleshoot and potentially replace the faulty memory component.

    Rate this question:

  • 16. 

    Your sister buys you a graphix card that has a screen resolution of 1600x1200. you can't wait to install it, because WoW has really been lagging on your old graphix card. your moitor supports sxga+, will this new card work?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    The new graphics card will not work with the monitor because the screen resolution of the graphics card is 1600x1200, which is higher than the maximum resolution supported by the monitor (sxga+).

    Rate this question:

  • 17. 

    Will windows ME upgrade to 2000?

    • A.

      Yes

    • B.

      No

    • C.

      Maybe

    • D.

      I donno why are you asking me?

    • E.

      Who left the toilet seat up?

    Correct Answer
    B. No
    Explanation
    Windows ME cannot be directly upgraded to Windows 2000. Windows ME is based on the Windows 9x kernel, while Windows 2000 is based on the Windows NT kernel. They are different operating systems with different architectures and compatibility requirements. Therefore, a clean installation of Windows 2000 would be necessary to upgrade from Windows ME to Windows 2000.

    Rate this question:

  • 18. 

    What is the minimum free disk space required for XP?

    • A.

      2GB

    • B.

      3GB

    • C.

      650MB

    • D.

      1.5GB

    • E.

      1GB

    Correct Answer
    D. 1.5GB
    Explanation
    The minimum free disk space required for XP is 1.5GB. This means that in order to install and run the XP operating system, at least 1.5GB of free space on the disk is necessary.

    Rate this question:

  • 19. 

    This major operating system file contains SCSI boot drivers-

    • A.

      Ntbootdd.sys

    • B.

      Ntuser.dat

    • C.

      Ntoskrnl

    • D.

      Boot.ini

    • E.

      Ntdetect.com

    Correct Answer
    A. Ntbootdd.sys
    Explanation
    ntbootdd.sys is the correct answer because it is a major operating system file that contains SCSI boot drivers. These drivers are necessary for the operating system to recognize and communicate with SCSI devices during the boot process. Without these drivers, the operating system may not be able to properly initialize and access SCSI devices, leading to boot failures or other issues.

    Rate this question:

  • 20. 

    An amplifier is used for

    • A.

      Listening to classical music

    • B.

      Rockin out in a bee gees cover band

    • C.

      Boosting digital signal

    • D.

      Boosting multimode fiber

    • E.

      Boosting analog signal

    Correct Answer
    E. Boosting analog signal
    Explanation
    An amplifier is used for boosting analog signals. Analog signals are continuous and vary in amplitude, frequency, and phase. Amplifiers are designed to increase the strength or power of these signals without distorting their original waveform. This is useful in various applications such as audio systems, telecommunications, and instrumentation, where the signal needs to be amplified to a level that can be easily processed or transmitted.

    Rate this question:

  • 21. 

    ____ is a digital-interface device used to connect a Data Terminal Equipment device or DTE, such as a router, to a digital circuit.

    • A.

      Ipx/spx

    • B.

      Terminal

    • C.

      Wips

    • D.

      Csu/dsu

    • E.

      What the hell are you talking about????!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

    Correct Answer
    D. Csu/dsu
    Explanation
    A CSU/DSU (Channel Service Unit/Data Service Unit) is a digital-interface device used to connect a Data Terminal Equipment (DTE), such as a router, to a digital circuit. It provides signal conversion and conditioning, ensuring that the data being transmitted is compatible with the digital circuit. This allows for reliable and efficient communication between the DTE and the digital circuit.

    Rate this question:

  • 22. 

    _____ is a set of data that informs a computer's operating system, which permissions or access rights, that each user or group has to a specific system object; such as a directory or file. 

    • A.

      Acl

    • B.

      Hcl

    • C.

      Hal

    • D.

      Can i buy you a drink?

    Correct Answer
    A. Acl
    Explanation
    ACL stands for Access Control List. It is a set of data that informs a computer's operating system about the permissions or access rights that each user or group has to a specific system object, such as a directory or file. ACLs are used to manage and enforce security policies, allowing administrators to control who can access or modify certain resources on a computer system.

    Rate this question:

  • 23. 

    You work for a company who's demographic is 15-65yr old men who are awake at 2am. despite the large number of clients and server upload volume, the company consists of 4 people(4 computers). most likely the node structure of the office is a(n)____

    • A.

      Infrastructure mode.

    • B.

      Adhoc mode

    • C.

      Ala mode

    • D.

      Commode

    • E.

      Horny toad

    Correct Answer
    B. Adhoc mode
    Explanation
    The correct answer is adhoc mode. In an adhoc mode, devices can directly communicate with each other without the need for a central access point or infrastructure. This mode would be suitable for a small office with limited resources, where the four computers can connect to each other directly without relying on a central server or network infrastructure.

    Rate this question:

  • 24. 

    Your company has a policy of changing login passwords every week. they have a severe conduct policy that promotes termination after 3 failed attempts. everyone loves your attitude, enthusiasm, and work ethic; but you're a party girl who often comes into work hung over. where would you go to edit your failed login attempts?

    • A.

      Event viewer, right click system, clear all events

    • B.

      Performance logs and alerts, right click counter logs, clear all events

    • C.

      Event viewer, right click security, clear all events

    • D.

      Performance logs and alerts, right click trace logs, clear all events

    Correct Answer
    C. Event viewer, right click security, clear all events
    Explanation
    The correct answer is event viewer, right click security, clear all events. The event viewer is a Windows tool that logs various system events, including security-related events such as failed login attempts. By right-clicking on the security log in the event viewer and selecting "clear all events," you can delete all the logged security events, including the failed login attempts. This action can help in hiding the evidence of the failed login attempts and potentially avoid termination under the company's conduct policy.

    Rate this question:

  • 25. 

    POST stands for:

    • A.

      Power on self test

    • B.

      Power on system test

    • C.

      Power operating system test

    • D.

      Pre operating system test

    Correct Answer
    A. Power on self test
    Explanation
    POST stands for power on self test. This is a diagnostic testing process that is performed by a computer's firmware or BIOS (Basic Input/Output System) during the startup process. It checks the hardware components of the computer to ensure that they are functioning properly before the operating system is loaded. The power on self test helps to identify any hardware issues or errors that may prevent the computer from booting up successfully.

    Rate this question:

  • 26. 

    You have stored uncountable hours of your favorite show, the tele-tubbies, on your work server. but now your hard drives are full and your boss has suggested that you remove the video. what would be the best storage device for such an endeavor?

    • A.

      DVD

    • B.

      DLT

    • C.

      An external HDD

    • D.

      FLOPPY

    • E.

      TDR

    Correct Answer
    B. DLT
    Explanation
    The best storage device for removing the video of the favorite show, the tele-tubbies, would be DLT (Digital Linear Tape). DLT is a high-capacity magnetic tape storage format that can store large amounts of data, making it suitable for storing and transferring large video files. It is commonly used for backup and archival purposes, providing a reliable and cost-effective solution for long-term data storage.

    Rate this question:

  • 27. 

    You are installing a new dye-sublimation printer so you can print elaborately detailed pictures of your grandmother sunbathing in a bikini. the printer has multiple ports, which would be the fastest?

    • A.

      Usb 2.0

    • B.

      Scsi-3 spi ultra scsi

    • C.

      Parrallel

    • D.

      Serial

    • E.

      1394

    Correct Answer
    A. Usb 2.0
    Explanation
    The correct answer is USB 2.0. USB 2.0 is the fastest option among the given choices for connecting the dye-sublimation printer. It provides high-speed data transfer rates, making it suitable for printing elaborately detailed pictures. SCSI-3 SPI Ultra SCSI and 1394 (FireWire) are also fast options, but USB 2.0 is generally more commonly used and widely compatible. Parallel and serial ports are older and slower options compared to USB 2.0.

    Rate this question:

  • 28. 

    A cyborg with bluetooth is trying to steal national secrets from your PDA. assuming she has already hacked your device, how far away from her do you have to be to stay out of range?

    • A.

      30 meters

    • B.

      10 feet

    • C.

      20 meters

    • D.

      30 feet

    • E.

      20 feet

    Correct Answer
    D. 30 feet
    Explanation
    To stay out of range from the cyborg with Bluetooth who has already hacked your device, you need to be at least 30 feet away from her. This distance ensures that the Bluetooth signal cannot reach your PDA, preventing her from stealing the national secrets.

    Rate this question:

  • 29. 

    What does winnt32.exe do?

    • A.

      Is used when booting from DOS or a boot disk to upgrade to windows 2000.

    • B.

      Sets up or upgrades to Windows 2000 and can be run from the Windows 95, Windows 98, or Windows NT command prompt.

    • C.

      Is used to install the recovery console in windows xp.

    • D.

      System command-line Utility used in 2000/XP to check protected files for changed, deleted, or corrupted files.

    Correct Answer
    B. Sets up or upgrades to Windows 2000 and can be run from the Windows 95, Windows 98, or Windows NT command prompt.
    Explanation
    Winnt32.exe is a system command-line utility that is used to set up or upgrade to Windows 2000. It can be run from the command prompt of Windows 95, Windows 98, or Windows NT. This utility allows users to install or upgrade their operating system to Windows 2000 without the need for a separate installation disk.

    Rate this question:

  • 30. 

    On the OSI model, what does the application layer do?

    • A.

      Places the network data on the wire.

    • B.

      Routes data to different LANs and WANs based n network addresses

    • C.

      Ensures delivery of entire file, reliable end to end communication

    • D.

      Provides network services:email, file transfer, client/server

    • E.

      What apps do when they're cold.

    Correct Answer
    D. Provides network services:email, file transfer, client/server
    Explanation
    The application layer of the OSI model is responsible for providing network services such as email, file transfer, and client/server communication. It is the layer where applications interact with the network and where data is formatted and presented to the user. This layer ensures that the necessary network services are available for applications to communicate and exchange data effectively.

    Rate this question:

  • 31. 

    Where is the cmd.exe in windows 2000/XP system

    • A.

      C:\program files

    • B.

      C:\windows\system

    • C.

      C:\windows\systemroot

    • D.

      C:\windows\system32

    Correct Answer
    D. C:\windows\system32
    Explanation
    The correct answer is c:\windows\system32. In Windows 2000/XP systems, the cmd.exe file is located in the system32 folder within the Windows directory. This folder contains essential system files and executables, including the command prompt executable (cmd.exe).

    Rate this question:

  • 32. 

    ____is a security feature included in modern Microsoft Windows operating systems that is intended to prevent an application or service from executing code from a non-executable memory region. 

    • A.

      Data Execution Prevention (DEP)

    • B.

      WFP Windows File Protection

    • C.

      Thrashing

    • D.

      The Client for Microsoft Networks

    • E.

      Interleaving

    Correct Answer
    A. Data Execution Prevention (DEP)
    Explanation
    Data Execution Prevention (DEP) is a security feature in modern Microsoft Windows operating systems. It is designed to prevent an application or service from executing code from a non-executable memory region. DEP helps to protect against certain types of attacks, such as buffer overflow attacks, by marking certain memory regions as non-executable. This prevents malicious code from being executed in those regions, enhancing the overall security of the system.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 18, 2009
    Quiz Created by
    Pickra
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.