CompTIA A+ Essentials And It Technician Exam

57 Questions

Settings
CompTIA A+ Essentials And It Technician Exam

CompTIA tests are designed to test how knowledgeable one is when it comes to computer knowledge and applications. A+ supports the ability to connect users to the data they need to do their jobs regardless of the devices being used. The quiz below is designed specifically for a person who is studying for the IT technician exam. Give it a try and better be prepared for the certification exam.


Questions and Answers
  • 1. 
    Peripheral devices use which standard for high-speed FireWire interfaces?
    • A. 

      IE 1392

    • B. 

      IEE 1391

    • C. 

      IEEE 1394

    • D. 

      IE 6.0

    • E. 

      I don't know

  • 2. 
    Computer designers develop standard interfaces between their system boards and the specific adapter cards that you install later. What is this interface called?
    • A. 

      A hard drive

    • B. 

      A bus

    • C. 

      A USB port

    • D. 

      A network card

    • E. 

      I don't know

  • 3. 
    Which of the following are true statements about data removal from a storage medium?
    • A. 

      Formatting a hard drive, tape, or floppy disk permanently erases the information that was stored on that storage device.

    • B. 

      Formatting a hard drive, tape, or floppy disk several times or bulk erasing it first permanently erases the information that was stored on that storage device.

    • C. 

      There are many recovery tools that can reconstruct data from the electronic remnants of deleted files or formatted disks.

    • D. 

      It is more secure to destroy the media.

    • E. 

      I don't know

  • 4. 
    True or False? Bluetooth is a wireless radio protocol that allows communication between devices usually more than 30 feet apart.
    • A. 

      True

    • B. 

      False

  • 5. 
    Which firewall option allows you to record information concerning unsolicited traffic on your network?
    • A. 

      Port blocking

    • B. 

      Security log

    • C. 

      Application access

    • D. 

      Global security level

  • 6. 
    True or False? To remove loose debris from a keyboard, you should shake it upside down.
    • A. 

      True

    • B. 

      False

  • 7. 
    Which of these are considered reliable troubleshooting resources when researching printer and scanner issues?
    • A. 

      Device documentation

    • B. 

      Manufacturer's websites

    • C. 

      Error logs

    • D. 

      User blogs

  • 8. 
    Which network model is described as having a host computer that controls all network communication and performs data processing and storage on behalf of clients?
    • A. 

      Client-server network

    • B. 

      Centralized network

    • C. 

      Peer-to-peer network

    • D. 

      Mode network

  • 9. 
    Which of the following are solutions for a problem with the microphone not working properly?
    • A. 

      Verify that the microphone is connected to the correct port on the sound card.

    • B. 

      Test the microphone on a computer with a properly functioning sound card and microphone.

    • C. 

      Connect a known good microphone to the computer.

    • D. 

      Install or reinstall the most current drivers for the display adapter.

  • 10. 
    True or False? Floppy disks can hold up to 1.44 MB of data.
    • A. 

      True

    • B. 

      False

  • 11. 
    True or False? Power supplies not only power the components directly connected to the system board through slots, but drives and other internal components as well.
    • A. 

      True

    • B. 

      False

  • 12. 
    Social engineering attacks can occur through which of these methods?
    • A. 

      Over the phone

    • B. 

      By using a thumb drive

    • C. 

      In person

    • D. 

      Through email

  • 13. 
    True or False? You should always check to see if the input device you are installing needs updated drivers.
    • A. 

      True

    • B. 

      False

  • 14. 
    True or False? A network address is typically composed of two parts: one identifies the portion of the network and the other identifies the specific computer.
    • A. 

      True

    • B. 

      False

  • 15. 
    Why do MIDI adapters have a DIN5 connector at one end and a 15-pin connector at the other end?
    • A. 

      So that speakers can be plugged into them.

    • B. 

      To enable video conferencing.

    • C. 

      For connecting to the game port.

    • D. 

      For optimal display image.

  • 16. 
    Which of these are considered common mobile computing device issues?
    • A. 

      External monitor does not display.

    • B. 

      Battery life is too short.

    • C. 

      The device gets very warm.

    • D. 

      Device can use an external keyboard.

  • 17. 
    Which of these are you able to do in the Recovery Console?
    • A. 

      Correct boot problems.

    • B. 

      Manage files and disks.

    • C. 

      Boot the computer into Safe Mode.

    • D. 

      Enable and disable services.

  • 18. 
    True or False? When a computer hibernates, the computer shuts down after saving everything in memory on your hard disk.
    • A. 

      True

    • B. 

      False

  • 19. 
    Wires are color-coded as to their voltages. What color wire is a +5 voltage?
    • A. 

      Yellow wire

    • B. 

      Blue wire

    • C. 

      Red wire

    • D. 

      White wire

    • E. 

      Black wire

  • 20. 
    True or False? Privacy and security are two things that can be customized on the Internet Explorer web browser.
    • A. 

      True

    • B. 

      False

  • 21. 
    Which of these generally leaves messages on a mail server?
    • A. 

      IMAP4

    • B. 

      SMTP

    • C. 

      POP3

    • D. 

      HTTP

  • 22. 
    Which of these are ways an individual computer might connect to the Internet?
    • A. 

      Through a local network connection

    • B. 

      Through a domain controller

    • C. 

      Through an Internet Service Provider (ISP)

    • D. 

      Through workgroup membership

  • 23. 
    Which of the following are the main categories of instruction sets?
    • A. 

      Complex instruction set computer (CISC)

    • B. 

      Reduced instruction set computer (RISC)

    • C. 

      Explicitly parallel instruction computing (EPIC)

    • D. 

      Expanded instruction set computing (EISC)

  • 24. 
    True or False? Control Panel provides access to various configuration utilities for the Windows operating system.
    • A. 

      True

    • B. 

      False

  • 25. 
    In which printing process does the printer use heat to release the ink from the nozzle?
    • A. 

      Ink dispersion print process

    • B. 

      Laser printing process

    • C. 

      Thermal inkjet print process

    • D. 

      Solid ink print process

  • 26. 
    What are some common types of solid state storage?
    • A. 

      USB devices

    • B. 

      Data cards

    • C. 

      SD memory cards

    • D. 

      Flash memory cards

  • 27. 
    True or False? While troubleshooting a system board problem, if the computer displays error messages, research the messages to determine a possible cause.
    • A. 

      True

    • B. 

      False

  • 28. 
    What specification determines how many backup tapes or other media sets are needed, and the sequence in which they are used and reused?
    • A. 

      System State data

    • B. 

      Backup set

    • C. 

      Rotation method

    • D. 

      Backup schedule

  • 29. 
    What is a Windows troubleshooting tool used to test communications between two TCP/IP-based hosts?
    • A. 

      Ipconfig

    • B. 

      Ping

    • C. 

      Nslookup

    • D. 

      Tracert

  • 30. 
    Windows can manage enough memory addresses to fill how much memory?
    • A. 

      2 GB

    • B. 

      6 GB

    • C. 

      1 GB

    • D. 

      4 GB

  • 31. 
    True or False? All UNIX systems share a kernel/shell architecture.
    • A. 

      True

    • B. 

      False

  • 32. 
    True or False? When the adapter card tests fine and the slot tests fine, but services are unavailable, the possible cause is that the cables are not connected, are loose, or are damaged.
    • A. 

      True

    • B. 

      False

  • 33. 
    Printers and scanners require that appropriate software drivers are enabled. Which of these functions are controlled by the drivers?
    • A. 

      Monitor display properties

    • B. 

      Stapling

    • C. 

      Collation

    • D. 

      Color rendition

  • 34. 
    True or False? If the optical drive door won't open, the first thing you should do is open My Computer and right-click the drive icon, then choose Eject.
    • A. 

      True

    • B. 

      False

  • 35. 
    Which of these are entries in the Event Log?
    • A. 

      Category

    • B. 

      User

    • C. 

      Computer

    • D. 

      Type

  • 36. 
    True or False? If the monitor flickers, you should set the refresh rate as high as supported by the monitor and adapter card.
    • A. 

      True

    • B. 

      False

  • 37. 
    WPA is an acronym for which of these?
    • A. 

      Wireless protocol access

    • B. 

      Wireless protected account

    • C. 

      Wi-Fi protected account

    • D. 

      Wi-Fi protected access

  • 38. 
    What may be the problem if your computer boots, but the screen remains blank?
    • A. 

      Your motherboard is broken.

    • B. 

      Your processor has overheated.

    • C. 

      The system board has a short.

    • D. 

      Memory is not correct for the system.

  • 39. 
    Which of the following is true of the system BIOS?
    • A. 

      It is stored in the ROM and used to start the most basic services of a computer system.

    • B. 

      Every computer has a system BIOS that sets the computer's configuration and environment when the system is powered on.

    • C. 

      Computers can have more than one BIOS to control other system functions.

    • D. 

      On all computer models, you must press the F12 key at startup to enter into the system BIOS.

  • 40. 
    What are the four primary categories of components in a typical personal computer?
    • A. 

      System unit

    • B. 

      Display device

    • C. 

      Input devices

    • D. 

      External devices

    • E. 

      Software

  • 41. 
    True or False? Disk Defragmenter arranges stored data on a disk in discontiguous blocks.
    • A. 

      True

    • B. 

      False

  • 42. 
    After determining that the computer hardware meets requirements for an upgrade, what should you do next?
    • A. 

      Install the new operating system.

    • B. 

      Restart the computer.

    • C. 

      Download the update files.

    • D. 

      Back up existing data files.

  • 43. 
    True or False? The registry is divided into five sections called subsections.
    • A. 

      True

    • B. 

      False

  • 44. 
    Newer Intel systems employ the Intel Hub Architecture (IHA) chipset. What are the two main chips found on that chipset?
    • A. 

      Northbridge

    • B. 

      Southbridge

    • C. 

      Graphics and AGP Memory Controller Hub (GMCH)

    • D. 

      I/O Controller Hub (ICH)

  • 45. 
    True or False? Laser printers use a laser beam, toner, and an electrophotographic drum to create images.
    • A. 

      True

    • B. 

      False

  • 46. 
    True or False? You should avoid using jargon, abbreviations, and acronyms when speaking with users.
    • A. 

      True

    • B. 

      False

  • 47. 
    True or False? The power supply converts DC power from an electrical outlet to the AC power needed by system components.
    • A. 

      True

    • B. 

      False

  • 48. 
    What is Novell's object-oriented database organized as a hierarchical tree called?
    • A. 

      LDAP

    • B. 

      EDirectory or NDS

    • C. 

      SAM

    • D. 

      Active Directory

  • 49. 
    Fingerprint scanners scan the fingerprints on a user’s hand. Which of the following are advantages of fingerprint scanners?
    • A. 

      Fingerprint collection is simple and inexpensive.

    • B. 

      Fingerprint scanners are common.

    • C. 

      Fingerprint scanners are accurate and stable.

    • D. 

      Fingerprint scanners work regardless of the cleanliness of the user's hands.

  • 50. 
    As an A+ technician, which of these would most likely cause damage to muscles, tendons, and nerves?
    • A. 

      Electromagnetic radiation

    • B. 

      Noise

    • C. 

      Repetitive strain

    • D. 

      Office environments

  • 51. 
    Which of the following statements about antivirus software is false?
    • A. 

      Antivirus software should be deployed on individual computers but not on network servers.

    • B. 

      Antivirus software is an application that scans files for common viruses.

    • C. 

      Antivirus software can also monitor boot sector access.

    • D. 

      Antivirus software does not usually protect against spam.

  • 52. 
    As an A+ technician, what is the first step to installing and configuring a display device?
    • A. 

      Locate the monitor port on the computer.

    • B. 

      Turn off the computer.

    • C. 

      Align the pins on the monitor cable with the adapter port.

    • D. 

      Plug in the monitor power cord.

  • 53. 
    Once you have discovered and implemented a solution, what should you do next?
    • A. 

      Verify that you have reconnected everything properly.

    • B. 

      Test the computer logged in as a user.

    • C. 

      Restart the computer.

    • D. 

      Document your findings.

  • 54. 
    Which of these PC cards has a thickness of 10.5 mm?
    • A. 

      Memory

    • B. 

      Modem

    • C. 

      Miniature hard drive

    • D. 

      Wireless network adapter

  • 55. 
    Which of these is the most basic preventative maintenance technique for most computer components?
    • A. 

      Visual and audio inspection

    • B. 

      Ensuring proper airflow

    • C. 

      Driver/firmware updates

    • D. 

      Keeping them clean

  • 56. 
    Which of these are components of the print spooler?
    • A. 

      Internet uniform resource locator

    • B. 

      Graphics device interface (GDI)

    • C. 

      Print processor

    • D. 

      Universal Naming Convention path

  • 57. 
    True or False? The most common types of events to audit are access attempts on objects, such as files or folders and user logons and logoffs.
    • A. 

      True

    • B. 

      False