Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Erica Corcoran
Erica Corcoran, Communication
Erica Corcoran is a versatile professional working as an All-Rounder at Kilkenny Cheese, contributing her skills across various aspects of the business.
Quizzes Created: 3 | Total Attempts: 828
| Attempts: 255 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT? 

Explanation

The next step after identifying a malware infection would be to quarantine the infected system. This involves isolating the infected system from the network and other devices to prevent the malware from spreading further. Quarantining the system also allows for further analysis and investigation to determine the extent of the infection and the necessary steps to remove the malware. It is an important step in containing and mitigating the effects of the malware on the network and other systems.

Submit
Please wait...
About This Quiz
CompTIA A+ 902 (3) - Quiz

This CompTIA A+ 902 (3) quiz assesses skills in diagnosing and resolving common issues related to malware infection, system recovery, and software problems in computer systems. It is designed for individuals preparing for A+ certification, focusing on practical troubleshooting and security.

Personalize your quiz and earn a certificate with your name on it!
2. Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the fast battery drain?

Explanation

The reason for the fast battery drain is a weak signal. When Ann is in the office basement, her smartphone is likely struggling to maintain a strong connection with the cellular network. As a result, the phone has to work harder to search for and maintain a signal, which drains the battery faster. Additionally, the weak signal also affects the cellular reception, resulting in poor network connectivity.

Submit
3. A customer has made several trouble calls to the help desk and is very irate. The technician that receives the call has learned that the issue has not yet been resolved. The technician politely asks the customer to explain the issue, and learns that the problem needs to be escalated. Which of the following should the technician do once the problem has been escalated? 

Explanation

Once the problem has been escalated, the technician should communicate the status with the customer and ensure a successful call transfer. This is important to keep the customer updated about the progress of their issue and to ensure that their call is transferred to the appropriate person or department who can resolve the problem. By doing so, the technician is providing good customer service and ensuring that the customer's issue is being addressed effectively.

Submit
4. A customer is experiencing issues with email and calls the help desk. The technician determines it would help clarify the issue if the customer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to: 

Explanation

Before establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to close any items of a personal nature. This is important to ensure the privacy and security of the customer's personal information. By closing any personal items, the customer can prevent the technician from accessing or viewing any sensitive or confidential data on their desktop during the remote session.

Submit
5. A technician opens a customer's computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer? 

Explanation

The best method of removing dust from a computer is to use compressed air to free the dust from the components and then remove it with an ESD vacuum. This method ensures that the dust is effectively removed without causing any damage to the sensitive electronic components. Using an ESD vacuum also helps to prevent any static electricity buildup, which can be harmful to the computer.

Submit
6. A technician has just fixed a user's PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do? 

Explanation

After successfully removing the virus and malware from the user's PC, the technician should prioritize educating the user regarding Internet browsing best practices. This is important because it will help the user understand how to avoid future infections and maintain a secure browsing experience. By providing the user with knowledge about safe browsing habits, such as avoiding suspicious websites and not clicking on unknown links or attachments, the technician can empower the user to take proactive measures in preventing future virus and malware infections.

Submit
7. A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician? 

Explanation

The technician should acknowledge the customer's input to show respect and empathy, but should also follow another course of action since they know from the description that the problem is not hardware related. By doing so, the technician can effectively address the issue and provide a solution that is more appropriate and relevant to the actual problem.

Submit
8. When dealing with a difficult customer, which of the following is the BEST way to handle the situation?

Explanation

When dealing with a difficult customer, it is important to avoid arguing or being defensive. Engaging in an argument or becoming defensive can escalate the situation further and worsen the customer's experience. Instead, it is best to remain calm and composed, listen attentively to the customer's concerns, and demonstrate empathy towards their issue. This approach can help in de-escalating the situation and finding a resolution that satisfies the customer.

Submit
9. Joe, a user, has connected a tablet to his personal mobile hotspot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO). 

Explanation

Joe can prevent unauthorized access to the device immediately by changing the SSID to a different broadcast name. This will make it difficult for the intruder to connect to the device. Additionally, he can add the intruding device to a blocked access list, which will prevent it from connecting to the device in the future. These actions will help ensure the security of Joe's personal mobile hotspot device and prevent unauthorized access.

Submit
10. In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?

Explanation

The first safety step that should be performed when installing additional memory modules in a computer is to disconnect the power. This is important to prevent any electrical shocks or damage to the computer components. By disconnecting the power, the technician ensures that there is no electricity flowing through the system, reducing the risk of accidents or damage. Once the power is disconnected, the technician can safely proceed with the installation process without any potential hazards.

Submit
11. A technician receives a call regarding a PC's slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT? 

Explanation

The technician should run chkdsk with the /r switch and reboot the PC. The error messages in the event viewer indicating a corrupt file system suggest that there may be issues with the hard drive. Running chkdsk with the /r switch will scan for and repair any errors on the hard drive. Rebooting the PC after running chkdsk will ensure that any repaired files are properly loaded. This is the appropriate next step to address the slow performance and file system corruption.

Submit
12. Which of the following explains why it is important to secure Personally Identifiable Information (PII)? 

Explanation

Securing Personally Identifiable Information (PII) is important to prevent sensitive information, such as social security numbers, from being stolen. PII includes any data that can be used to identify an individual, and if it falls into the wrong hands, it can lead to identity theft and financial fraud. Protecting PII ensures the privacy and security of individuals, preventing potential harm and financial loss.

Submit
13. A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to "click here for help." The user has clicked on the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase software. Which of the following should be performed FIRST to resolve the issue? 

Explanation

The user's computer is likely infected with malware, which is causing the slow internet browsing and the redirection to a website to purchase software. By identifying the type of malware, the appropriate steps can be taken to remove it from the computer and resolve the issue.

Submit
14. A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs? 

Explanation

The technician should use System Recovery to resolve the issue without losing any vital files or programs. System Recovery allows the computer to revert back to a previous state before the video driver update, which may be causing the issue. This will restore the computer's settings and configuration to a working state without affecting any files or programs.

Submit
15. Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment?

Explanation

The BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment is an Enterprise license. This type of license is specifically designed for organizations and allows them to use the software across multiple users and devices within their corporate network. It typically includes additional features and benefits, such as centralized management and support for large-scale deployments, making it the most suitable option for commercial software in a corporate environment.

Submit
16. A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue? 

Explanation

The most likely cause of the issue is that the PC's Windows firewall is misconfigured. The firewall may be blocking the connection to the antivirus server, while still allowing connections to other file servers and printers. By adjusting the firewall settings to allow connections to the antivirus server, the issue should be resolved.

Submit
17. Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the battery is rapidly draining. Which of the following can Joe MOST likely do to resolve the issue without a loss of data? 

Explanation

Joe can most likely resolve the issue of rapid battery draining by readjusting the location settings on his mobile device. This is because the GPS function uses a significant amount of battery power, and readjusting the location settings can help optimize the GPS usage and reduce battery consumption. By doing so, Joe can resolve the issue without losing any data.

Submit
18. A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card? 

Explanation

The technician should unplug the computer power cable before connecting a cable TV line to a TV tuner card in order to prevent any potential damage or electrical shock. This is because a properly grounded electrical system is essential for the safe operation of electronic devices, and if the electrical system is not properly grounded, there is a risk of electrical surges or other issues that could harm the computer or the technician. By unplugging the power cable, the technician ensures that there is no power flowing through the computer and eliminates the risk of electrical damage.

Submit
19. A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part? 

Explanation

To prevent damaging the new video card, the technician should self ground and handle the new card by the edges. This is because static electricity can easily damage sensitive electronic components, such as the video card. By self grounding, the technician ensures that any static electricity is discharged from their body before handling the card. Handling the card by the edges further minimizes the risk of static electricity transfer to the card. Grounding the computer, placing it on an ESD mat, or attaching an ESD strap to the new card are also good safety procedures, but they are not specifically mentioned in the given explanation.

Submit
20. A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector's features safeguard the connected equipment by directing surges to the: 

Explanation

The surge protector's features are designed to direct surges to the path of least resistance. This means that when a surge occurs, the surge protector will provide a low-resistance pathway for the excess electrical energy to flow, effectively diverting it away from the connected equipment. By doing so, the surge protector helps to protect the equipment from potential damage caused by voltage spikes or surges.

Submit
21. A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to: 

Explanation

The first course of action for the technician should be to ask the customer if they would mind holding for no more than two minutes to check resources. This is because the technician is unfamiliar with the issue and needs time to gather information and resources to effectively troubleshoot the problem. By asking the customer to hold, the technician can ensure that they have the necessary tools and knowledge to address the issue properly.

Submit
22. A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT? 

Explanation

Researching the DLL file to identify the application it corresponds to before continuing is the best course of action because it will help the technician understand which application is causing the issue and find the appropriate solution. Simply copying the DLL file from a working PC and using the regsvr32 command may not solve the underlying problem. Running the Windows Update utility may not reinstall the specific DLL file needed. Running the defrag utility is unlikely to fix the issue related to a missing DLL file. Therefore, researching the DLL file is the most logical next step.

Submit
23. Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue?

Explanation

The PRAM (Parameter Random Access Memory) stores various settings on a Mac, including network settings. Resetting the PRAM can help resolve issues related to network connectivity. In this case, Ann's iPhone is experiencing WiFi connectivity problems after installing an update. Resetting the PRAM can potentially resolve any network settings conflicts caused by the update, allowing the WiFi to function properly again.

Submit
24. A customer is reporting a burning smell coming from a CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customer's issue? 

Explanation

Before attempting to resolve the customer's issue of a burning smell coming from a CRT monitor, it is important to consider that CRT monitors should be serviced by qualified personnel. This implies that the issue may require technical expertise and specialized knowledge to diagnose and fix. It is crucial to avoid attempting any repairs or inspections without the necessary qualifications to ensure the safety of both the customer and the equipment.

Submit
25. A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem? 

Explanation

Performing a soft reset is a basic troubleshooting step to fix minor issues with a mobile phone. However, since the problem still persists after performing a soft reset, the best step the user can take is to reset the phone to factory default. This will restore the phone to its original settings, removing any software glitches or conflicts that may be causing the slow and erratic response. It is important to note that resetting to factory default will erase all data and settings on the phone, so it is advisable to backup important data before proceeding with this step.

Submit
26. A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the "Prior Versions" tab. According to the theory of troubleshooting, which of the following is the technician's NEXT step? 

Explanation

The technician's next step would be to establish a theory of probable cause. This means that they need to analyze the situation and come up with a hypothesis or a possible explanation for why the folder is missing. By considering factors such as recent changes to the system, potential user error, or technical issues, the technician can narrow down the possible causes and determine the most likely explanation for the problem. This will help guide their subsequent actions in resolving the issue.

Submit
27. A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?

Explanation

The technician should test the theory to determine the cause. This step involves conducting tests or experiments to confirm whether the failed NIC is indeed the cause of the computer issue. By testing the theory, the technician can gather more evidence and data to support their hypothesis and make an informed decision on how to proceed with resolving the problem.

Submit
28. A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair? 

Explanation

The technician should remove jewelry because working on electronic devices, especially when replacing components like a power supply, can pose a risk of electrical shock. Removing jewelry reduces the chances of accidental contact with electrical components and helps ensure the technician's safety while performing the repair.

Submit
29. A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform? 

Explanation

The next best step for the incident response technician would be to secure the workstation in a limited access facility. This step is important to prevent further unauthorized access or tampering with the evidence. By securing the workstation in a limited access facility, the technician can ensure that only authorized personnel can access the workstation and investigate the incident further, preserving the integrity of the evidence. This step also helps to protect any sensitive information or data on the workstation from being compromised.

Submit
30. A user, Ann, receives a phone call from the company's mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced? 

Explanation

The user has experienced a virus infection. This is indicated by the fact that her email account was disabled due to high volumes of emails being sent in a very short period of time. A virus can infect a user's computer and cause it to send out large amounts of spam emails without the user's knowledge or consent. This can result in the user's email account being disabled by the company's mail administrator to prevent further damage or inconvenience.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 08, 2017
    Quiz Created by
    Erica Corcoran
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A user reports unexpected icons appearing on the desktop. The...
Ann, a customer, reports that when she occasionally works in the...
A customer has made several trouble calls to the help desk and is very...
A customer is experiencing issues with email and calls the help desk....
A technician opens a customer's computer and sees large amounts of...
A technician has just fixed a user's PC and successfully removed a...
A customer calls the help desk to report an issue. The customer...
When dealing with a difficult customer, which of the following is the...
Joe, a user, has connected a tablet to his personal mobile hotspot...
In preparation for an operating system upgrade, a technician is tasked...
A technician receives a call regarding a PC's slow performance. The...
Which of the following explains why it is important to secure...
A user reports browsing the Internet is slow and an icon with a...
A user updates the video driver on the computer and it requests a...
Which of the following is the BEST license type to comply with end...
A newly deployed Windows PC cannot connect to the antivirus server on...
Joe, a user, returned yesterday from a trip where he utilized the GPS...
A technician is working on a home theater PC in a location where the...
A technician troubleshooting a computer finds a faulty video card and...
A technician has purchased a new surge protector to protect equipment...
A new help desk technician receives a trouble call from a user. The...
A user is having issues with a Windows computer. Upon loading the...
Ann, a user, states that after installing an update on her iPhone, the...
A customer is reporting a burning smell coming from a CRT monitor....
A mobile phone has started to respond slowly and erratically. The user...
A user calls the help desk because a folder containing critical...
A technician suspects that a computer issue is caused by a failed NIC....
A technician has been given a PC that is not powering up. After brief...
A manager suspects a user has obtained movies protected by copyright...
A user, Ann, receives a phone call from the company's mail...
Alert!

Advertisement