220-701 A+ Essentials Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tmede212
T
Tmede212
Community Contributor
Quizzes Created: 7 | Total Attempts: 1,069
| Attempts: 109
SettingsSettings
Please wait...
  • 1/100 Questions

    Which of the following describes a Quad Core processor?

    • A CPU with four direct channels to the FSB.
    • Four CPU cores operating off one CPU package.
    • A PC with four unique processors.
    • A CPU with four cache memory locations.
Please wait...
About This Quiz

This 220-701 A+ essentials quiz assesses knowledge on various technical aspects such as Windows XP connections, graphics card ports, POST keyboard signals, laptop power management, power consumption states, and external hard drive connections.

220-701 A+ Essentials Quiz - Quiz

Quiz Preview

  • 2. 

    Which of the following devices goes into an AGP slot on a computer system board?

    • Sound card

    • Processor chip

    • Memory

    • Video card

    Correct Answer
    A. Video card
    Explanation
    A video card is the correct answer because an AGP (Accelerated Graphics Port) slot is specifically designed to accommodate a video card. AGP slots provide a faster and more efficient connection between the video card and the motherboard, allowing for better graphics performance. Sound cards, processor chips, and memory do not typically use AGP slots for installation.

    Rate this question:

  • 3. 

    Which of the following is the function of a power inverter

    • Converts AC to DC

    • Provides a regulated AC voltage

    • Steps down AC voltages

    • Provides a backup power source

    Correct Answer
    A. Converts AC to DC
    Explanation
    A power inverter is a device that converts alternating current (AC) to direct current (DC). This is necessary in situations where DC power is required, such as in electronic devices that run on batteries or in solar power systems. By converting AC to DC, a power inverter allows the use of DC-powered devices and equipment, providing a reliable source of power.

    Rate this question:

  • 4. 

    Which of the following will dissipate heat and requires no moving parts?

    • Liquid cooling system

    • Motherboard riser

    • Case fan

    • Heat sink

    Correct Answer
    A. Heat sink
    Explanation
    A heat sink is a device that dissipates heat from a hot surface, such as a computer processor, without the need for any moving parts. It is typically made of metal and has a large surface area to efficiently transfer heat to the surrounding environment. Heat sinks work through a process called conduction, where heat is transferred from the hot surface to the cooler metal of the heat sink. The heat is then dissipated into the air through convection, without the need for any fans or other moving parts. Therefore, a heat sink is the correct answer as it dissipates heat without any moving parts.

    Rate this question:

  • 5. 

    Which of the following adapter cards is used for connecting external hard drives?

    • RAID

    • PCMCIA

    • ESATA

    • PATA

    Correct Answer
    A. ESATA
    Explanation
    The correct answer is eSATA. eSATA stands for External Serial Advanced Technology Attachment and is specifically designed for connecting external hard drives. It provides a fast and reliable connection between the computer and the external storage device, allowing for high-speed data transfer. RAID, PCMCIA, and PATA are not specifically designed for connecting external hard drives. RAID is a data storage technology, PCMCIA is a type of expansion card, and PATA is a type of interface used for connecting internal hard drives.

    Rate this question:

  • 6. 

    Printouts from a printer are a random mix of letters, numbers, and symbols. Which of the following is MOST likely the cause of this problem?

    • The toner cartridge needs to be replaced.

    • Duplex printing is selected on a single-sided printer.

    • The print spooler is full and needs to be restarted.

    • The incorrect printer driver is installed.

    Correct Answer
    A. The incorrect printer driver is installed.
    Explanation
    The incorrect printer driver is installed. This is the most likely cause of the problem because the printer driver is responsible for translating the data from the computer into a format that the printer can understand. If the wrong driver is installed, it can result in the printer receiving incorrect or garbled data, which would explain why the printouts are a random mix of letters, numbers, and symbols.

    Rate this question:

  • 7. 

    The smallest unit of data that a Windows operating system can access is called a:

    • Folder

    • File

    • Volume

    • Partition

    Correct Answer
    A. File
    Explanation
    The correct answer is "file" because a file is the smallest unit of data that a Windows operating system can access. A file is a collection of data that is stored on a computer and can be opened, modified, or deleted by the operating system or other software programs. Folders, volumes, and partitions are organizational structures used to manage and store files, but they are not the smallest unit of data that the operating system can access.

    Rate this question:

  • 8. 

    A technician determines through testing that their probable cause theory is correct. Which of the following is the NEXT step in the troubleshooting process?

    • Question the user and identify any user changes to the computer.

    • Verify full system functionality.

    • Leave a list of instructions for the user to implement.

    • Establish a plan of action to resolve the problem.

    Correct Answer
    A. Establish a plan of action to resolve the problem.
    Explanation
    Once a technician has determined through testing that their probable cause theory is correct, the next step in the troubleshooting process is to establish a plan of action to resolve the problem. This involves creating a detailed plan that outlines the steps and procedures needed to fix the issue at hand. This plan will guide the technician in implementing the necessary solutions and ensure that the problem is resolved effectively and efficiently.

    Rate this question:

  • 9. 

    Which of the following is considered social engineering?

    • Forging a login account on a server in order to gain access to a system

    • Posting confidential information on a public website

    • Entering a facility by posing as a telecommunications contractor

    • Sending a computer virus by email

    Correct Answer
    A. Entering a facility by posing as a telecommunications contractor
    Explanation
    Entering a facility by posing as a telecommunications contractor is considered social engineering. This involves manipulating people's trust and exploiting their vulnerability to gain unauthorized access to a secure location. By impersonating a legitimate contractor, the individual deceives the facility's personnel into granting them access, bypassing physical security measures. This tactic relies on human interaction and psychological manipulation rather than technical means to breach security.

    Rate this question:

  • 10. 

    Which of the following is the purpose of thermal compound?

    • To facilitate the transfer of heat from the CPU to the heat sink

    • To facilitate the adhesion of the CPU to the heat sink

    • To facilitate the reduction of heat to the heat sink

    • To assist in insulating the CPU from electrical damage

    Correct Answer
    A. To facilitate the transfer of heat from the CPU to the heat sink
    Explanation
    The purpose of thermal compound is to facilitate the transfer of heat from the CPU to the heat sink. Thermal compound is a substance that is applied between the CPU and the heat sink to fill in any microscopic gaps and improve the contact between the two surfaces. It helps to enhance the thermal conductivity and ensure efficient heat transfer, allowing the heat generated by the CPU to be effectively dissipated by the heat sink.

    Rate this question:

  • 11. 

    Which of the following cable types can transmit data the LONGEST distance without the use of a repeater?

    • UTP

    • Coaxial

    • Fiber

    • STP

    Correct Answer
    A. Fiber
    Explanation
    Fiber optic cables can transmit data over the longest distance without the use of a repeater. This is because fiber optic cables use light signals to transmit data, which can travel much farther without losing signal strength compared to electrical signals used in UTP and STP cables. Coaxial cables can transmit data over longer distances than UTP and STP cables, but they still have limitations compared to fiber optic cables. Therefore, fiber optic cables are the best choice for long-distance data transmission without the need for repeaters.

    Rate this question:

  • 12. 

    Which of the following should the technician verify FIRST if the customer reports that a laptop battery is not charging?

    • Remove all unneeded peripherals

    • Check the power light on the AC adapter

    • Swap the laptop battery for a new or refurbished battery

    • Check the backlight for functionality

    Correct Answer
    A. Check the power light on the AC adapter
    Explanation
    The technician should verify the power light on the AC adapter first because it indicates whether the adapter is receiving power and functioning properly. If the power light is off or blinking, it could indicate a problem with the adapter or the power source. This step helps to determine if the issue lies with the adapter or the laptop battery.

    Rate this question:

  • 13. 

    An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?

    • Data mining

    • Social engineering

    • Intrusion detection

    • Hacking

    Correct Answer
    A. Social engineering
    Explanation
    Social engineering is the practice of manipulating individuals to gain unauthorized access to confidential information or protected systems. In this scenario, the outside user is using the phone conversation to collect information, suggesting that they are attempting to deceive or manipulate someone into giving them access to the company's secured files. This aligns with the concept of social engineering, making it the best description for the practice described in the question.

    Rate this question:

  • 14. 

    Which of the following ports should be left open on the firewall to enable default Internet browsing?

    • 21

    • 25

    • 80

    • 443

    Correct Answer
    A. 80
    Explanation
    Port 80 should be left open on the firewall to enable default Internet browsing. Port 80 is the default port for HTTP (Hypertext Transfer Protocol), which is the protocol used for transmitting web pages and other web content over the internet. By leaving port 80 open, the firewall allows incoming and outgoing HTTP traffic, allowing users to access websites and browse the internet.

    Rate this question:

  • 15. 

    Which of the following printer types requires the use of toner?

    • Impact

    • Inkjet

    • Laser

    • Thermal

    Correct Answer
    A. Laser
    Explanation
    Laser printers require the use of toner. Unlike inkjet printers that use liquid ink, laser printers use a dry powder called toner. The toner is transferred onto the paper using an electrostatically charged drum and then fused onto the paper with heat. This method allows for high-quality and fast printing. Impact printers use mechanical impact to create characters, inkjet printers use liquid ink sprayed onto the paper, and thermal printers use heat to create images on heat-sensitive paper.

    Rate this question:

  • 16. 

    Which of the following technologies has the HIGHEST potential throughput?

    • DSL

    • Fiber

    • Satellite

    • Cable

    Correct Answer
    A. Fiber
    Explanation
    Fiber has the highest potential throughput among the given technologies. This is because fiber optic cables use light signals to transmit data, which allows for much higher speeds compared to DSL, satellite, and cable. Fiber-optic technology has a higher bandwidth capacity and can support faster internet speeds, making it the best option for achieving high throughput.

    Rate this question:

  • 17. 

    Which of the following slots is used for a graphics card?

    • AGP

    • AMR

    • PCMCIA

    • CNR

    Correct Answer
    A. AGP
    Explanation
    AGP (Accelerated Graphics Port) is the correct answer because it is a dedicated slot on a motherboard specifically designed for connecting a graphics card. AGP provides a faster and more efficient data transfer between the graphics card and the computer's memory, allowing for better performance in graphics-intensive tasks such as gaming and video editing. AMR (Audio Modem Riser), PCMCIA (Personal Computer Memory Card International Association), and CNR (Communication and Networking Riser) are all different types of expansion slots used for other purposes and not specifically for graphics cards.

    Rate this question:

  • 18. 

    Which of the following states consumes the LEAST amount of power?

    • Sleep

    • Suspend

    • Standby

    • Hibernate

    Correct Answer
    A. Hibernate
    Explanation
    Hibernate consumes the least amount of power among the given options. In hibernate mode, the computer saves the current state to the hard drive and then shuts down completely. It uses no power while in hibernate mode, as opposed to sleep, suspend, and standby modes, which still consume a small amount of power to keep the system in a low-power state. Therefore, hibernate is the correct answer for the state that consumes the least amount of power.

    Rate this question:

  • 19. 

    Which of the following is the MOST secure method to use when setting up a wireless network?

    • WPA

    • WEP

    • Hidden SSID

    • WPA2

    Correct Answer
    A. WPA2
    Explanation
    WPA2 is the most secure method to use when setting up a wireless network. WPA2 provides stronger encryption and authentication protocols compared to WEP and WPA. WEP is an older and less secure method that can be easily cracked. Hidden SSID does not provide any additional security and can be easily discovered by attackers. Therefore, WPA2 is the recommended method for securing a wireless network.

    Rate this question:

  • 20. 

    When installing a wireless keyboard and mouse, which of the following should be installed in the laptop?

    • Digitizer

    • Infrared

    • Ethernet

    • Bluetooth

    Correct Answer
    A. Bluetooth
    Explanation
    When installing a wireless keyboard and mouse, Bluetooth should be installed in the laptop. Bluetooth technology allows for wireless communication between devices, such as the laptop and the keyboard/mouse. By installing Bluetooth on the laptop, it enables the laptop to connect and communicate with the wireless keyboard and mouse without the need for any physical cables or connections. This provides convenience and flexibility in using the keyboard and mouse, as they can be used from a distance without any wires restricting movement.

    Rate this question:

  • 21. 

    During troubleshooting, the technician determines the cause of the problem. Which of the following is the NEXT step in the troubleshooting theory? A. Document findings, actions, and outcomes. B. Verify full system functionality and if applicable implement preventative measures. C. Establish a theory of probable cause. D. Establish a plan of action to resolve the problem and implement the solutions.

    • Document findings, actions, and outcomes.

    • Verify full system functionality and if applicable implement preventative measures.

    • Establish a theory of probable cause.

    • Establish a plan of action to resolve the problem and implement the solutions.

    Correct Answer
    A. Establish a plan of action to resolve the problem and implement the solutions.
    Explanation
    After determining the cause of the problem, the next step in the troubleshooting theory is to establish a plan of action to resolve the problem and implement the solutions. This involves creating a step-by-step plan to address the issue and deciding on the appropriate solutions to implement. It is important to have a clear plan in place to ensure that the problem is effectively resolved and that the necessary actions are taken to prevent it from recurring in the future.

    Rate this question:

  • 22. 

    Which of the following is another name for an RS-232 connection?

    • Serial

    • USB

    • IEEE 1394

    • Ethernet

    Correct Answer
    A. Serial
    Explanation
    An RS-232 connection is commonly referred to as "Serial" because it is a standard communication interface that transmits data serially, one bit at a time. RS-232 is widely used for connecting devices such as computers, modems, and printers. It uses a specific set of electrical signals to transmit and receive data, making it suitable for long-distance communication. The other options, USB, IEEE 1394 (FireWire), and Ethernet, are different types of connections that have their own specifications and uses.

    Rate this question:

  • 23. 

    Which of the following printers requires a specialized paper in order to operate?

    • Thermal

    • Laser

    • Inkjet

    • Impact

    Correct Answer
    A. Thermal
    Explanation
    Thermal printers require a specialized paper in order to operate because they use heat to create images on the paper. The paper used for thermal printing has a special coating that reacts to heat, allowing the printer to create high-quality prints. Without the specialized paper, the thermal printer would not be able to produce the desired results.

    Rate this question:

  • 24. 

    Which of the following commands is used to obtain an IP address from the DHCP server?

    • Ipconfig /renew

    • Ping -t

    • Nslookup

    • Msconfig

    Correct Answer
    A. Ipconfig /renew
    Explanation
    The command "ipconfig /renew" is used to obtain an IP address from the DHCP server. When this command is executed, it sends a request to the DHCP server to renew the IP address lease. The DHCP server then assigns a new IP address to the device, allowing it to connect to the network. This command is commonly used when troubleshooting network connectivity issues or when a device needs to obtain a new IP address.

    Rate this question:

  • 25. 

    Which of the following utilities is used for troubleshooting video issues?

    • REGEDIT

    • DXDIAG

    • DCDIAG

    • MSCONFIG

    Correct Answer
    A. DXDIAG
    Explanation
    DXDIAG is the correct answer because it is a utility specifically designed for diagnosing and troubleshooting video and audio issues on Windows operating systems. It provides detailed information about the computer's hardware and drivers, including video card information, display settings, and DirectX diagnostics. By using DXDIAG, users can identify and resolve video problems such as display resolution, color depth, driver compatibility, and other related issues.

    Rate this question:

  • 26. 

    A technician has installed a new driver on a computer. Upon rebooting the computer, a stop error occurs before the technician can log back in. Which of the following would be the BEST option for the technician to do NEXT?

    • Boot the computer to the Recovery Console.

    • Boot the computer with a Windows Installation CD.

    • Boot the computer using Last Known Good Configuration.

    • Boot the computer using Safe Mode with Networking.

    Correct Answer
    A. Boot the computer using Last Known Good Configuration.
    Explanation
    The technician should choose to boot the computer using Last Known Good Configuration. This option allows the computer to start using the most recent settings that worked correctly, which can help resolve any issues caused by the newly installed driver.

    Rate this question:

  • 27. 

    Which of the following is best practice when installing memory into a computer?

    • Install memory modules in pairs.

    • Insure the proper drivers are installed for best performance.

    • Apply thermal grease to insure proper seating.

    • Wear an anti-static wrist strap.

    Correct Answer
    A. Wear an anti-static wrist strap.
    Explanation
    When installing memory into a computer, it is best practice to wear an anti-static wrist strap. This is important because static electricity can damage the sensitive electronic components of the computer, including the memory modules. By wearing an anti-static wrist strap, it helps to discharge any static electricity from the body, preventing it from transferring to the computer and causing damage.

    Rate this question:

  • 28. 

    Which of the following configuration changes can a user perform that will save the MOST energy?

    • Let the system blank the screen after five minutes of inactivity

    • Disable screen saver

    • Disable the hibernate mode

    • Enable a photo album screen saver

    Correct Answer
    A. Let the system blank the screen after five minutes of inactivity
    Explanation
    Letting the system blank the screen after five minutes of inactivity can save the most energy because it reduces the power consumption of the screen when it is not in use. Disabling the screen saver, disabling the hibernate mode, and enabling a photo album screen saver may also save some energy, but they are not as effective as simply blanking the screen after a short period of inactivity.

    Rate this question:

  • 29. 

    Which of the following commands is BEST to use when testing remote connectivity to a host?

    • Win/s

    • Ping

    • Telnet

    • Ipconfig

    Correct Answer
    A. Ping
    Explanation
    The best command to use when testing remote connectivity to a host is "ping". This command sends a request to the host and waits for a response. If the host responds, it confirms that there is connectivity between the local and remote systems. Ping is commonly used to troubleshoot network connectivity issues and to measure the response time of a network.

    Rate this question:

  • 30. 

    Which of the following devices will allow a technician to use a single set of input devices on several computers?

    • Smart card reader

    • KVM

    • SCSI

    • Bar code reader

    Correct Answer
    A. KVM
    Explanation
    A KVM (Keyboard, Video, Mouse) switch is a device that allows a technician to use a single set of input devices (keyboard, mouse, and monitor) to control multiple computers. This is achieved by connecting the input devices to the KVM switch, which then connects to the computers. The technician can easily switch between the computers using a button or keyboard shortcut on the KVM switch, thus eliminating the need for multiple sets of input devices.

    Rate this question:

  • 31. 

    Why would the display dim on a laptop when the power supply from the electrical outlet is disconnected?

    • The laptop displays require a 60 hertz alternating power source.

    • Incorrect security settings on the laptop.

    • The power management settings on the laptop.

    • The laptop cannot use full brightness on battery power.

    Correct Answer
    A. The power management settings on the laptop.
    Explanation
    When the power supply from the electrical outlet is disconnected, the laptop switches to battery power. The power management settings on the laptop are responsible for optimizing the battery usage and conserving power. One of the power-saving measures is to dim the display when on battery power to reduce power consumption and extend battery life. Therefore, the display dims on a laptop when the power supply is disconnected due to the power management settings.

    Rate this question:

  • 32. 

    A system administrator has multiple computers, of the same make and model that will remotely turn on using Wake-On-LAN (WOL). All but two systems wake correctly. Which of the following is the MOST likely problem with the two systems?

    • WOL is not enabled in the BIOS.

    • The computers do not support WOL functionality.

    • The network card settings in Windows are incorrect.

    • Power settings are incorrect in the BIOS.

    Correct Answer
    A. WOL is not enabled in the BIOS.
    Explanation
    The most likely problem with the two systems is that WOL is not enabled in the BIOS. This is because Wake-On-LAN (WOL) is a feature that allows a computer to be powered on remotely, and it requires the BIOS of the computer to have WOL enabled. Since all the computers are of the same make and model, it is unlikely that the issue is with the computers not supporting WOL functionality or the network card settings in Windows being incorrect. Additionally, power settings being incorrect in the BIOS would not prevent the computers from waking correctly. Therefore, the most likely problem is that WOL is not enabled in the BIOS.

    Rate this question:

  • 33. 

    IEEE1394b is capable of transfer rates of up to:

    • 12Mbps

    • 400Mbps

    • 480Mbps

    • 800Mbps

    Correct Answer
    A. 800Mbps
    Explanation
    IEEE1394b is capable of transfer rates of up to 800Mbps. This means that it can transfer data at a maximum speed of 800 megabits per second. This high transfer rate allows for fast and efficient data transfer, making it suitable for applications that require high-speed communication, such as video editing, audio recording, and data backup.

    Rate this question:

  • 34. 

    Which of the following is a gateway for a computer with an IP address of 10.31.64.12 and a subnet mask of 255.255.0.0?

    • 10.31.0.0

    • 10.31.1.255

    • 10.31.64.1

    • 10.31.254.0

    Correct Answer
    A. 10.31.64.1
    Explanation
    The gateway for a computer with an IP address of 10.31.64.12 and a subnet mask of 255.255.0.0 would be 10.31.64.1. The subnet mask 255.255.0.0 indicates that the first two octets of the IP address are the network address, while the last two octets are available for host addresses. Therefore, the gateway must have the same network address (10.31) as the computer's IP address, and a host address of 64.1.

    Rate this question:

  • 35. 

    Which of the following is a common protocol used to send email?

    • POP3

    • FTP

    • SFTP

    • SMTP

    Correct Answer
    A. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a common protocol used to send email. It is responsible for transmitting email messages between servers and is widely used for sending outgoing mail from a mail client to a mail server. POP3 (Post Office Protocol version 3) is used for receiving email, FTP (File Transfer Protocol) is used for transferring files, and SFTP (Secure File Transfer Protocol) is a secure version of FTP used for secure file transfers. However, none of these protocols are primarily used for sending email like SMTP.

    Rate this question:

  • 36. 

    Which of the following adapter types will use a RJ-45 connector?

    • NIC

    • Video

    • Sound

    • Dial-up modem

    Correct Answer
    A. NIC
    Explanation
    A NIC (Network Interface Card) is the correct answer because it is the only adapter type listed that typically uses a RJ-45 connector. A NIC is used to connect a computer to a network, and the RJ-45 connector is commonly used for Ethernet connections. Video, sound, and dial-up modem adapters do not typically use RJ-45 connectors.

    Rate this question:

  • 37. 

    Which of the following memory types is the MOST current?

    • DDR

    • RAMBUS

    • DRAM

    • SDRAM

    Correct Answer
    A. DDR
    Explanation
    DDR (Double Data Rate) memory is the most current memory type among the options provided. DDR memory is an improved version of SDRAM (Synchronous Dynamic Random Access Memory) that allows data to be transferred on both the rising and falling edges of the clock signal, effectively doubling the data transfer rate compared to SDRAM. RAMBUS is an outdated memory type that was popular in the late 1990s and early 2000s, while DRAM (Dynamic Random Access Memory) is a generic term that encompasses various types of memory including SDRAM and DDR. SDRAM (Synchronous Dynamic Random Access Memory) is a previous generation memory type that has been superseded by DDR.

    Rate this question:

  • 38. 

    Which of the following would be used to increase the efficiency in which programs execute?

    • Disk Cleanup

    • Task Manager

    • Task Scheduler

    • Defrag

    Correct Answer
    A. Defrag
    Explanation
    Defrag, short for defragmentation, is a process that rearranges fragmented data on a computer's hard drive, making it more organized and improving the efficiency of program execution. Fragmentation occurs when files are broken into pieces and scattered across different locations on the disk, leading to slower read and write speeds. By defragmenting the hard drive, files are consolidated and placed contiguously, reducing the time it takes for the computer to access and retrieve data. This ultimately enhances the overall performance and execution speed of programs.

    Rate this question:

  • 39. 

    Which of the following can be disabled to help prevent access to a wireless network?

    • SSID broadcast

    • MAC filtering

    • WEP key

    • WPA passphrase

    Correct Answer
    A. SSID broadcast
    Explanation
    Disabling SSID broadcast can help prevent access to a wireless network because when SSID broadcast is enabled, the network name is visible to anyone in range, making it easier for unauthorized users to identify and connect to the network. By disabling SSID broadcast, the network name is hidden, making it more difficult for unauthorized users to discover and access the network.

    Rate this question:

  • 40. 

    Which of the following has the LEAST amount of storage capacity?

    • FDD

    • Tape drive

    • Blue-Ray

    • SSD

    Correct Answer
    A. FDD
    Explanation
    FDD (Floppy Disk Drive) has the least amount of storage capacity compared to the other options listed. FDDs typically have a storage capacity of 1.44 MB, which is significantly lower than the storage capacities of tape drives, Blu-Ray discs, and SSDs. Tape drives can store large amounts of data, Blu-Ray discs can hold up to 50 GB or more, and SSDs can have capacities ranging from a few hundred gigabytes to several terabytes. Therefore, FDD is the correct answer as it has the least storage capacity among the given options.

    Rate this question:

  • 41. 

    Which of the following is the MOST secure way to destroy sensitive data?

    • Use the command line delete on the data.

    • Use a program that rewrites over the data several times.

    • Move the data into the Recycle Bin and then empty it.

    • Move the data onto a portable drive and then destroy the drive.

    Correct Answer
    A. Use a program that rewrites over the data several times.
    Explanation
    Using a program that rewrites over the data several times is the most secure way to destroy sensitive data. This method ensures that the original data is overwritten with random characters multiple times, making it extremely difficult to recover any information from the destroyed data. Simply using the command line delete or moving the data into the Recycle Bin and emptying it may not completely remove the data from the storage device, as it can still be recovered using specialized software. Destroying the drive itself is also secure, but it may not be practical in all situations.

    Rate this question:

  • 42. 

    Which of the following wireless technology standards has the GREATEST indoor range?

    • 802.11a

    • 802.11b

    • 802.11g

    • 802.11n

    Correct Answer
    A. 802.11n
    Explanation
    802.11n has the greatest indoor range among the given wireless technology standards. This is because 802.11n operates on both the 2.4 GHz and 5 GHz frequency bands, allowing for better signal penetration through walls and other obstacles. Additionally, 802.11n utilizes multiple-input multiple-output (MIMO) technology, which uses multiple antennas to improve both range and signal quality. Therefore, 802.11n provides a longer range and better coverage in indoor environments compared to the other options.

    Rate this question:

  • 43. 

    A technician dropped a screw in the case of a desktop computer. Which of the following tools should be used to retrieve the screws?

    • Computer vacuum

    • Plastic tweezers

    • Canned air

    • Screwdriver with magnetized tip

    Correct Answer
    A. Plastic tweezers
    Explanation
    Plastic tweezers should be used to retrieve the screws because they are non-conductive and will not cause any damage to the computer components. The technician can safely use the plastic tweezers to carefully pick up the screw without risking any electrical short circuits or other potential damage.

    Rate this question:

  • 44. 

    Which of the following log files would reference third party software specific error messages?

    • Application Logs

    • Security Logs

    • Archive Logs

    • System Logs

    Correct Answer
    A. Application Logs
    Explanation
    Application Logs are the most likely log files to reference third-party software-specific error messages. These logs are specifically designed to capture information related to the functioning of applications and any errors or issues encountered while running them. Therefore, it is expected that these logs would contain error messages related to third-party software, as it is an integral part of the application's functioning. On the other hand, Security Logs focus on security-related events, Archive Logs store historical data, and System Logs record information about the operating system and hardware, making them less likely to contain third-party software-specific error messages.

    Rate this question:

  • 45. 

    A user reports that their machine will not power up. The technician has already tested the wall outlet and the power cord, which are functioning properly. Which of the following should the technician do NEXT?

    • Test the machine on a UPS battery backup.

    • Plug the machine into a different wall outlet.

    • Check to make sure the motherboard is seated correctly.

    • Test the machine with a power supply tester.

    Correct Answer
    A. Test the machine with a power supply tester.
    Explanation
    The technician should test the machine with a power supply tester next. Since the wall outlet and power cord have already been tested and found to be functioning properly, the issue may be with the power supply of the machine itself. Testing the machine with a power supply tester will help determine if the power supply is faulty and needs to be replaced.

    Rate this question:

  • 46. 

    Which of the following boot devices would a technician use for RIS?

    • Tape drive

    • Zip drive

    • Network

    • HDD

    Correct Answer
    A. Network
    Explanation
    A technician would use the network as the boot device for RIS (Remote Installation Services). RIS is a feature in Windows Server that allows remote installation of the operating system on client computers over a network. By using the network as the boot device, the technician can initiate the installation process remotely and deploy the operating system to multiple computers simultaneously. This eliminates the need for physical media like tape drives or zip drives, and allows for a more efficient and centralized deployment process.

    Rate this question:

  • 47. 

    Which of the following is the MAXIMUM data rate of IEEE 1394a?

    • 20Mbps

    • 40Mbps

    • 200Mbps

    • 400Mbps

    Correct Answer
    A. 400Mbps
    Explanation
    IEEE 1394a, also known as FireWire 400, has a maximum data rate of 400Mbps. This high-speed serial bus standard is commonly used for connecting devices such as digital cameras, external hard drives, and audio interfaces to a computer. With a data rate of 400Mbps, it allows for fast and efficient transfer of large files and real-time streaming of high-quality audio and video.

    Rate this question:

  • 48. 

    A user reports a loud noise from their desktop PC. Which of the following would be suspected as a source? (Select TWO).

    • USB thumb drive

    • Cooling fan

    • CMOS battery

    • Power supply

    • Motherboard

    Correct Answer(s)
    A. Cooling fan
    A. Power supply
    Explanation
    The cooling fan and power supply are the most likely sources of a loud noise in a desktop PC. The cooling fan is responsible for keeping the components cool and can sometimes become noisy if it is not functioning properly or if it is clogged with dust. The power supply is also a common culprit for loud noises, especially if the fan inside it is malfunctioning or if there are issues with the electrical components. Both of these components are essential for the proper functioning of the PC and can cause noise-related issues if they are not working correctly.

    Rate this question:

  • 49. 

    Which of the following IP addresses would a technician see if a computer is connected to a network device but is not receiving an IP address from the DHCP server?

    • 172.16.10.10

    • 192.168.0.10

    • 169.254.10.10

    • 192.168.10.10

    Correct Answer
    A. 169.254.10.10
    Explanation
    If a computer is connected to a network device but is not receiving an IP address from the DHCP server, the computer will likely assign itself an Automatic Private IP Address (APIPA) in the range of 169.254.0.0 to 169.254.255.255. This is a self-configured IP address that allows the computer to communicate with other devices on the local network. Therefore, the technician would see the IP address 169.254.10.10 in this scenario.

    Rate this question:

Quiz Review Timeline (Updated): Mar 13, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 13, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 30, 2012
    Quiz Created by
    Tmede212
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.