CompTIA A+ Exam MCQ Hardest Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Maganoor
M
Maganoor
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,932
| Attempts: 141 | Questions: 90
Please wait...
Question 1 / 90
0 %
0/100
Score 0/100
1. Which of the following can aid a mobile user in finding the nearest coffee shop?(Select the best answer.)

Explanation

GPS: global positioning system(a system by which signals are sent from satellites to a special device, used to show the position of a person or thing on the surface of the earth very accurately) : GSM : Global System For Mobile Communication : iOS : iPhone Operating System

Submit
Please wait...
About This Quiz
CompTIA A+ Exam MCQ Hardest Quiz! - Quiz

So you think you understand all there is to tell about CompTIA A+? This quiz will challenge that notion. For this quiz, you must know how to help a mobile user find a coffee shop, iPad2, and some of its advantages, assisting a user with difficulty with icons and common... see moreoperating systems used by mobile devices. This quiz is top-notch. This quiz will be useful for understanding CompTIA A+. see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Which technology would you use if you want to connect a headset to yourmobile phone?

Explanation

Bluetooth is the correct answer because it is a wireless technology that allows devices to connect and communicate with each other over short distances. It is commonly used to connect headsets to mobile phones, allowing users to make hands-free calls or listen to audio wirelessly. GSM is a mobile network technology, Wi-Fi is used for wireless internet connectivity, and Exchange is a server software for email and messaging.

Submit
3. You have determined that the USB controller is malfunctioning. What should you do first to... 

Explanation

The correct answer is to use the Windows Device Manager. The Windows Device Manager is a tool that allows you to manage and troubleshoot hardware devices connected to your computer. In this case, since the USB controller is malfunctioning, using the Windows Device Manager would be the first step to diagnose and potentially fix the issue. It allows you to view and manage the USB controller, update drivers, disable or enable the device, and check for any error messages or conflicts that may be causing the malfunction.

Submit
4. Which utility is shown in the following screen shot?  

Explanation

The utility shown in the screenshot is Windows Anytime Upgrade.

Submit
5. Which technology uses a physical characteristic to establish identity? 

Explanation

Biometrics is the correct answer because it refers to the use of physical characteristics, such as fingerprints, facial recognition, or iris scans, to establish a person's identity. This technology relies on unique biological traits that are difficult to forge or replicate, making it a secure method for identification and authentication purposes.

Submit
6. Which of the following features is not supported when you are unable to zoom in on a pictureor screen of information by placing two fingers together on the screen and spreading them? 

Explanation

Multi-touch is not supported when you are unable to zoom in on a picture or screen of information by placing two fingers together on the screen and spreading them. This feature allows the user to perform multiple touch gestures simultaneously, such as pinch-to-zoom or rotate, which enhances the user experience and provides more flexibility in interacting with the device. However, if multi-touch is not supported, the user will not be able to perform these gestures and will have to rely on other methods for zooming or interacting with the screen.

Submit
7. What kind of display would an iPad2 use?

Explanation

The correct answer is "Multitouch." The iPad2 would use a multitouch display, which allows users to interact with the screen using multiple fingers simultaneously. This technology enables various gestures such as pinch-to-zoom, swipe, and rotate, providing a more intuitive and versatile user experience compared to traditional single-touch displays.

Submit
8. What are two common operating systems used by mobile devices? (Select thetwo best answers.)

Explanation

Choose 2 compulsary 2 answers

Submit
9. What would a user need to synchronize contacts from an iPad to a PC?

Explanation

PC users need iTunes to synchronize contacts and other data from an iPad to
a PC. There are many Android sync programs, but they do not work on Apple
devices. Google Play is a place to get applications and other items. ActiveSync
is the older Microsoft sync program used to synchronize Windows CE and
Mobile to PCs.

Submit
10. As an administrator, you need to get an inventory of computers on your network and plan arollout of Windows 7. Which tool can be used for this purpose? 

Explanation

The Microsoft Assessment and Planning (MAP) Toolkit is the tool that can be used by an administrator to get an inventory of computers on the network and plan a rollout of Windows 7. This tool provides a comprehensive inventory of hardware, software, and device compatibility information, which helps in assessing the readiness of the network for a Windows 7 deployment. It also provides recommendations and reports to aid in the planning process. UDMT, USMT, and MigWiz are not specifically designed for this purpose and do not provide the same level of functionality as the MAP Toolkit.

Submit
11. Which of the following is/are performed by formatting the hard drive? (Choose four.) 

Explanation

Formatting the hard drive performs several tasks. Firstly, it scans the surface of the hard drive platter to identify and mark bad spots, designating the surrounding areas as bad sectors. Secondly, it lays down magnetic tracks in concentric circles on the hard drive. These tracks are then split into smaller segments called sectors, each containing 512 bytes of data. Lastly, formatting creates a File Allocation Table (FAT) that stores information about the location of files on the hard drive.

Submit
12. Windows XP includes a feature called a _________, which is a copy of your system configurationthat can be used to roll back the system to a previous state if a configuration error occurs. 

Explanation

Windows XP includes a feature called a restore point, which is a copy of your system configuration that can be used to roll back the system to a previous state if a configuration error occurs. This allows users to undo any changes made to the system settings or software installations and revert back to a stable state.

Submit
13. Which type of attack denies authorized users access to network resources? 

Explanation

A Denial of Service (DoS) attack is a type of attack that prevents authorized users from accessing network resources. In this attack, the attacker floods the target network or system with a large volume of traffic or requests, overwhelming its capacity and causing it to become inaccessible to legitimate users. This can result in service disruptions, downtime, and loss of productivity. DoS attacks can be launched through various methods, such as flooding the network with traffic, exploiting vulnerabilities in network protocols, or overwhelming the target's resources.

Submit
14. One of the vice presidents of the company calls a meeting with the information technologydepartment after a recent trip to competitors' sites. She reports that many of the companiesshe visited granted access to their buildings only after fingerprint scans, and she wants similartechnology employed at this company. Of the following, which technology relies on aphysical attribute of the user for authentication? 

Explanation

Biometrics is the correct answer because it refers to technology that relies on a physical attribute of the user for authentication. In this case, the vice president wants to implement fingerprint scans as a means of granting access to the company's buildings, which is a form of biometric authentication. Biometrics involves using unique physical characteristics such as fingerprints, iris patterns, or facial features to verify a person's identity.

Submit
15. Which of the following is not a type of Android passcode lock that can be set? 

Explanation

A spoken passphrase is not a type of Android passcode lock that can be set. Android passcode locks typically include options such as drawn patterns, numeric PINs, and passwords. However, a spoken passphrase is not a commonly used method for securing an Android device.

Submit
16. Which of the following do modern mobile devices most likely have? 

Explanation

Modern mobile devices most likely have SSD (Solid State Drive). SSDs are a type of storage device that are faster, more reliable, and consume less power compared to traditional hard disk drives. They are commonly used in mobile devices such as smartphones and tablets due to their compact size, durability, and ability to access data quickly. Unlike a keyboard connector, optical disc drive, or video connector, an SSD is a crucial component in modern mobile devices for storing and accessing data efficiently.

Submit
17. Which of the following are used to prevent pop-unders from appearing? 

Explanation

Pop-up blockers are used to prevent pop-unders from appearing. Pop-unders are a type of advertisement that opens in a new browser window behind the current window, making them less noticeable to the user. Pop-up blockers work by detecting and blocking these types of pop-up advertisements, ensuring a smoother browsing experience and reducing the intrusion of unwanted ads. Anti-malware utilities, phishing sites, and antivirus software are not specifically designed to prevent pop-unders from appearing.

Submit
18. Which of the following programs could be considered anti-malware? 

Explanation

Windows Defender could be considered anti-malware because it is a built-in security program provided by Microsoft for Windows operating systems. It is designed to detect, remove, and prevent malware infections, including viruses, spyware, and other malicious software. Windows Defender regularly scans the system for potential threats, provides real-time protection, and offers various security features to keep the computer safe from malware attacks. Therefore, Windows Defender is a suitable choice for protecting against malware.

Submit
19. Which of the following can you do to help eliminate security problems? (Choose four.) 

Explanation

Establishing security policies and procedures, updating operating systems, updating applications, and updating network devices are all actions that can help eliminate security problems. By establishing security policies and procedures, organizations can outline guidelines and protocols for employees to follow, ensuring that security measures are in place. Updating operating systems, applications, and network devices is crucial as it helps to patch vulnerabilities and address any security flaws that may exist in older versions. These updates often include security patches and bug fixes that help protect against potential threats and attacks.

Submit
20. The display on your laptop appears warped and fuzzy. You plug in an external monitor,and the image on it is fine. What is the most likely cause of the problem? 

Explanation

The most likely cause of the problem is the LCD display. This is because when you plug in an external monitor and the image on it is fine, it suggests that the issue is specific to the laptop's display. The warping and fuzziness indicate a problem with the LCD screen itself, such as a faulty connection or a damaged panel.

Submit
21. What type of CPU do mobile devices use?

Explanation

PhenomII : Phenom II is a family of AMD's multi-core 45 nm processors using the AMD K10 micro architecture, succeeding the original Phenom. Advanced Micro Devices : ARM : Advanced RISC Machine : Corei7 : General Microprocessors used for Desktop & Laptop

Submit
22. Which OS is considered to be closed-source?

Explanation

iOS is considered to be a closed-source operating system. This means that the source code of iOS is not freely available to the public, and only Apple has access to it. Closed-source systems are typically more secure as the source code is kept private, but it also limits the ability of users and developers to modify or customize the operating system.

Submit
23. What is the most common connection method when synchronizing data from a mobile device to a PC?

Explanation

The most common connection method when synchronizing data from a mobile device to a PC is USB. USB (Universal Serial Bus) allows for a fast and reliable connection between the two devices, enabling the transfer of data such as files, photos, and videos. It is widely supported by both mobile devices and PCs, making it a convenient and widely used method for data synchronization.

Submit
24. Which of the following printer failures is described as a condition in which the internal feed

Explanation

A paper jam is a printer failure that occurs when paper gets stuck inside the printer and cannot be properly fed through the printing mechanism. This can happen due to various reasons, such as misaligned paper, too much paper being fed at once, or foreign objects obstructing the paper path. When a paper jam occurs, the printer is unable to continue printing until the jammed paper is removed, causing a disruption in the printing process.

Submit
25. Which of the following utilities enables a Windows 7 user to edit a file offline, and then... 

Explanation

Sync Center is the correct answer because it is a utility in Windows 7 that allows users to synchronize files between their computer and other devices or network locations. It enables users to edit files offline and then automatically sync the changes when they reconnect to the network. This allows for seamless collaboration and ensures that the most up-to-date version of the file is always available. The other options listed do not provide the same functionality as Sync Center.

Submit
26. 19. Which of the following is the name of the graphical interface included with Windows Vista? 

Explanation

Aero is the correct answer because it is the name of the graphical interface included with Windows Vista. Aero was introduced in Windows Vista and it featured a sleek and modern design with transparent window borders, animated effects, and a new taskbar. It provided users with a visually appealing and user-friendly interface for navigating and interacting with the operating system.

Submit
27. You have been told to use the /FIXBOOT switch to write a new boot sector on a Windows 7machine. Which command does this switch work with? 

Explanation

The /FIXBOOT switch is used with the BOOTREC command to write a new boot sector on a Windows 7 machine. The BOOTREC command is a Windows Recovery Environment tool that can fix various boot-related issues. By using the /FIXBOOT switch with the BOOTREC command, you can repair or replace the boot sector, which is essential for the computer to start up properly.

Submit
28. Which feature allows you to use free space on an SD card to speed up a system? 

Explanation

ReadyBoost is the feature that allows you to use free space on an SD card to speed up a system. ReadyBoost works by using the flash memory on the SD card as a cache, which can improve the system's performance by providing faster access to frequently used data. By utilizing the additional memory provided by the SD card, ReadyBoost can reduce the reliance on the slower hard drive for accessing data, resulting in faster overall system performance.

Submit
29. Which Windows Vista feature allows you to recover from an accidental deletion or overwrite? 

Explanation

Shadow Copy is a Windows Vista feature that allows users to recover from accidental deletion or overwrite. It creates copies or snapshots of files and folders on a regular basis, allowing users to restore previous versions of their files if needed. This feature is especially useful in situations where important files are accidentally modified or deleted, providing a way to revert back to a previous state and recover the data.

Submit
30. You are migrating one stand-alone machine from Windows XP to Window Vista. Which ofthe following tools should you consider for transferring user state data and application files? 

Explanation

Windows Easy Transfer is the correct tool to consider for transferring user state data and application files when migrating from Windows XP to Windows Vista. Windows Easy Transfer is a utility provided by Microsoft that allows users to transfer files, folders, program settings, user accounts, and other data from one computer running Windows to another. It simplifies the migration process by providing a user-friendly interface and automating the transfer of data and settings.

Submit
31. As the security administrator for your organization, you must be aware of all types of attacksthat can occur and plan for them. Which type of attack uses more than one computer toattack the victim? 

Explanation

A DDoS (Distributed Denial of Service) attack is a type of attack that uses multiple computers to overwhelm a target system or network with a flood of traffic, rendering it unable to function properly. By distributing the attack across multiple computers, the attacker can amplify the impact and make it more difficult to mitigate. This type of attack can be carried out by botnets, which are networks of compromised computers controlled by the attacker.

Submit
32. Which media is susceptible to viruses? 

Explanation

All of the mentioned media (tape, memory stick, and CD-R) are susceptible to viruses. Viruses can infect and corrupt data on all types of storage media, including tapes, memory sticks, and CD-Rs. Therefore, all of the above options are correct as they can be potential carriers of viruses.

Submit
33. Which one do you like?

Explanation

not-available-via-ai

Submit
34. Bob's iPhone 4S cannot detect when he turns his device to the left and right like it's asteering wheel. Games and other apps that require this motion will not work correctly asa result. Which component has failed in Bob's phone? 

Explanation

Bob's iPhone 4S cannot detect when he turns his device to the left and right like it's a steering wheel, indicating that the gyroscope component has failed. The gyroscope is responsible for measuring the device's orientation and angular velocity, allowing it to detect rotational movements. Without a functioning gyroscope, the phone is unable to accurately detect and respond to the user's motion, leading to the inability to play games and use apps that require this motion detection.

Submit
35. Which of the following is not a valid reason to disable cellular data networking? 

Explanation

Disabling cellular data networking is not a valid reason because phone calls are not dependent on cellular data. Phone calls use the cellular network for communication, regardless of whether cellular data is enabled or disabled.

Submit
36. If you do not have your iPhone 4S set to erase data after too many failed login attempts butyour phone still locks you out after making the maximum allowable attempts, how can youunlock the phone? 

Explanation

If you have made the maximum allowable login attempts on your iPhone 4S and it locks you out, you can unlock the phone by plugging it into the last computer that it synced with in iTunes. When connected to the computer, iTunes will recognize the device and allow you to unlock it by entering the correct passcode. This method bypasses the need for erasing data or visiting an Apple Store.

Submit
37. One of your users claims that their hard drive seems to be running slowly. What tool canyou use to check to see how fragmented the hard drive is? 

Explanation

Disk Defragmenter is the correct tool to use in order to check how fragmented a hard drive is. Fragmentation occurs when files are divided into smaller pieces and stored in different locations on the hard drive. This can slow down the performance of the hard drive as it takes longer to access and read the fragmented files. Disk Defragmenter reorganizes the fragmented files on the hard drive, placing them in contiguous sectors, which improves the overall performance and speed of the hard drive.

Submit
38. Which of the following allows you to register and unregister modules and controls fortroubleshooting purposes? 

Explanation

RegSvr32 allows you to register and unregister modules and controls for troubleshooting purposes. It is a command-line tool used to register and unregister DLL files as COM (Component Object Model) servers. This is often done when troubleshooting issues related to missing or corrupted DLL files. By registering and unregistering modules and controls, you can resolve issues with the functionality of these components and ensure proper operation of the associated software or system.

Submit
39. What are a couple of differences between a tablet computer and a laptop?(Select the two best answers.)

Explanation

Tablets have little or no field serviceable parts, meaning that they are not designed to be easily repaired or have their components replaced. This is in contrast to laptops, which often have easily accessible and replaceable parts. Additionally, tablets use flash memory as the hard drive, while laptops typically use traditional hard drives. Flash memory is faster and more durable than traditional hard drives, making it a common choice for tablets.

Submit
40. Which of the following allows other mobile devices to share your mobile device's Internet connection?

Explanation

IMAP: Internet Message Access Protocol (IMAP) is a communications protocol for email retrieval and storage developed by Mark Crispin in 1986 at Stanford University . Wify tehtering : Wi-Fi tethering allows a mobile device to share its Internet connection with other Wi-Fi capable devices. Internet pass-through is when the mobile device connects to a PC to share the PC’s Internet connection. Locator applications are used to find lost or stolen mobile devices through GPS. IMAP is another e-mail protocol similar to POP3.

Submit
41. What does the iOS Simple Passcode allow a person to enter?

Explanation

The iOS Simple Passcode allows a person to enter a 4-digit passcode. This passcode is used as a security measure to unlock the device and protect the user's personal information. It is a quick and convenient way to secure the device without the need for a longer or more complex passcode.

Submit
42. Which of the following is used by BitLocker to provide an encryption key and to protect data?  

Explanation

TPM: On computers that have a Trusted Platform Module (TPM) version 1.2, BitLocker uses the enhanced security capabilities of the TPM to help ensure that your data is accessible only if the computer's boot components appear unaltered and the encrypted disk is located in the original computer.TKIP:TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol. TKIP is the encryption method used in Wi-Fi Protected Access (WPA), which replaced WEP in WLAN products :

Submit
43. How would you secure a smartphone and its data? 

Explanation

Securing a smartphone and its data can be done by implementing a passcode lock and enabling the remote wipe feature. A passcode lock adds an extra layer of security by requiring a password or PIN to access the device, preventing unauthorized access. Remote wipe allows the user to remotely erase all the data on the smartphone in case it is lost or stolen, ensuring that sensitive information does not fall into the wrong hands. By combining these two measures, the smartphone and its data can be effectively protected from unauthorized access and potential data breaches.

Submit
44. Which command should you use to fid out the intergrity of a hard drive? 

Explanation

CHKDSK is the correct command to use in order to check the integrity of a hard drive. CHKDSK stands for "Check Disk" and it is a command-line utility in Windows that scans the file system and file system metadata of a disk for errors and fixes them if possible. It also checks for bad sectors and attempts to recover any readable information. By running CHKDSK, you can ensure the integrity and health of your hard drive.

Submit
45. Which of the following partitions is specifically the partition from which the operatingsystem boots? 

Explanation

The primary partition is specifically the partition from which the operating system boots. This is because the primary partition contains the necessary boot files and the operating system itself. The active partition, on the other hand, is the partition that the computer boots from initially, but it may not necessarily contain the operating system. The extended partition and logical partition are used for creating additional partitions within a primary partition, but they are not directly involved in the boot process.

Submit
46. What is the first file used in the boot-up of Windows Vista? 

Explanation

BOOTMGR is the first file used in the boot-up of Windows Vista. It is responsible for locating the operating system and loading it into memory. BOOTMGR is a crucial component of the Windows boot process and is essential for the system to start up successfully. It is responsible for initiating the Windows Boot Manager, which then loads the necessary files and drivers to start the operating system.

Submit
47. As part of your training program, you're trying to educate users on the importance of security.You explain to them that not every attack depends on implementing advanced technologicalmethods. Some attacks, you explain, take advantage of human shortcomings to gain accessthat should otherwise be denied. What term do you use to describe attacks of this type? 

Explanation

Social engineering refers to the manipulation of individuals to gain unauthorized access to sensitive information or systems. It involves exploiting human weaknesses, such as trust, curiosity, or fear, rather than relying on advanced technological methods. By educating users about the importance of security and the existence of social engineering attacks, they can become more aware and cautious, reducing the risk of falling victim to such attacks.

Submit
48. A junior administrator comes to you in a panic. After looking at the log files, he hasbecome convinced that an attacker is attempting to use a duplicate IP address to replaceanother system in the network to gain access. Which type of attack is this? 

Explanation

TCP/IP hijacking refers to an attack where an attacker intercepts and takes control of a TCP/IP connection between two systems. In this scenario, the junior administrator believes that an attacker is attempting to use a duplicate IP address to replace another system in the network. This would allow the attacker to hijack the TCP/IP connection and potentially gain unauthorized access to the network. Therefore, the correct answer is TCP/IP hijacking.

Submit
49. Which of the following are text-messaging services used with mobile devices? (Choose two.) 

Explanation

SMS and iMessage are both text-messaging services used with mobile devices. SMS stands for Short Message Service and is a standard messaging service that allows users to send and receive text messages. iMessage, on the other hand, is a messaging service exclusive to Apple devices that allows users to send text messages, photos, videos, and other media over Wi-Fi or cellular data. Both SMS and iMessage are widely used and popular text-messaging services among mobile device users.

Submit
50. What is the default TCP port number for SMTP? 

Explanation

The default TCP port number for SMTP is 25. SMTP stands for Simple Mail Transfer Protocol and is used for sending email messages between servers. Port 25 is the standard port used for SMTP communication.

Submit
51. A user wants to stop his tablet from shifting horizontally when he turns it. Whichof the following should you enable?

Explanation

Enable Lock Rotation on Apple devices. On Android devices disable Autorotate.
The Accelerometer is a term used by Apple to describe the
hardware/software that controls the three axes of movement. The Gyroscope is
another term used by Apple to describe the device that measures the additional
three movements (pitch, roll, and yaw) of newer Apple devices. Screen calibration
is used to reset the device that measures the three axes

Submit
52. You work at a PC bench and receive a laptop that has a dim display. You confirm that it is... 

Explanation

The correct answer is LCD Inverter. The LCD Inverter is responsible for providing power to the backlight of the LCD panel, which in turn illuminates the display. If the laptop has a dim display, it indicates a problem with the LCD Inverter, as it is not supplying enough power to the backlight. This can be resolved by replacing the faulty LCD Inverter.

Submit
53. Which of the following answers can be the cause of a blue screen error? 

Explanation

A bad device driver can be the cause of a blue screen error. Device drivers are software programs that allow the operating system to communicate with hardware devices. If a device driver is poorly designed or incompatible with the operating system, it can cause system instability and lead to a blue screen error. This error occurs when the operating system encounters a critical error that it cannot recover from, resulting in a blue screen being displayed on the computer screen.

Submit
54. 13. What is the minimum amount of free hard drive space recommended for the installation ofWindows Vista Home Basic? 

Explanation

The minimum amount of free hard drive space recommended for the installation of Windows Vista Home Basic is 15GB. This is because the operating system requires a certain amount of space to install and function properly. Having at least 15GB of free space ensures that there is enough room for the installation process and any additional files or updates that may be required.

Submit
55. 19. Which of the following switches can be used with ROBOCOPY to mirror a completedirectory tree? 

Explanation

The /MIR switch can be used with ROBOCOPY to mirror a complete directory tree. This switch will copy all files and subdirectories, including empty ones, and will also delete any files and subdirectories in the destination that do not exist in the source. It essentially creates an exact replica of the source directory in the destination directory.

Submit
56. Which editions of Windows 7 can create a HomeGroup? (Choose four.) 

Explanation

Windows 7 Home Premium, Windows 7 Professional, Windows 7 Enterprise, and Windows 7 Ultimate can create a HomeGroup.

Submit
57. What do you use in Windows XP to create a recovery disk? 

Explanation

Automated System Recovery (ASR) is the correct answer because it is a feature in Windows XP that allows users to create a recovery disk. This recovery disk can be used to restore the system to a previously saved state in case of system failure or other issues. ASR creates a backup of the system's critical files, system state, and disk configuration, making it an effective tool for recovering a Windows XP system.

Submit
58. During what type of installation must a user be present to choose all options as they appear? 

Explanation

During an attended installation, a user must be present to choose all options as they appear. This means that the user is actively involved in the installation process and has the ability to make decisions and select the desired options at each step. This type of installation is typically used when customization or user input is required during the installation process.

Submit
59. Setup Manager is used to create answer files for automatically providing computer or userinformation during setup. These files are also known as what? 

Explanation

UDF: User-defined functions (frequently abbreviated as UDFs) let you code your own application logic for processing column values during an Impala query : DLL :Stands for "Dynamic Link Library." A DLL (.dll) file contains a library of functions and other information that can be accessed by a Windows program

Submit
60. A smurf attack attempts to use a broadcast ping on a network; the return address of theping may be that of a valid system in your network. Which protocol does a smurf attack useto conduct the attack? 

Explanation

A smurf attack uses the ICMP (Internet Control Message Protocol) to conduct the attack. In this attack, the attacker sends a large number of ICMP echo request packets (ping) to a network's broadcast address. The packets are addressed to the victim's IP address, causing all devices on the network to respond to the victim's IP address with ICMP echo reply packets. This flood of replies overwhelms the victim's system, causing it to become unresponsive or crash. The return address of the ping may be that of a valid system in the network, making it difficult to trace the attacker.

Submit
61. Your system log files report an ongoing attempt to gain access to a single account. Thisattempt has been unsuccessful to this point. What type of attack are you most likely experiencing? 

Explanation

Based on the information provided, the ongoing attempt to gain access to a single account suggests that someone is repeatedly trying different passwords in order to gain unauthorized access. This aligns with a password-guessing attack, where an attacker systematically tries different combinations of passwords until they find the correct one. The fact that the attempt has been unsuccessful so far indicates that the attacker has not yet been able to guess the correct password.

Submit
62. You're working late one night, and you notice that the hard disk on your new computer isvery active even though you aren't doing anything on the computer and it isn't connected tothe Internet. What is the most likely suspect? 

Explanation

The most likely suspect for the hard disk being very active even when the computer is not being used and not connected to the internet is that a virus is spreading in the system. Viruses can cause excessive disk activity as they replicate and spread throughout the computer's files and processes. This can result in a slowdown of the system and increased disk usage. It is important to run a thorough antivirus scan to detect and remove any potential viruses from the system.

Submit
63. Which of the following can Apple's Find My iPhone application not do? 

Explanation

Apple's Find My iPhone application can remotely lock the device, remotely wipe the device, and locate the device. However, it does not have the capability to directly alert the authorities. This means that if a user wants to report a lost or stolen device to the authorities, they would need to do so separately, outside of the Find My iPhone application.

Submit
64. Which of the following are universally common items that are synced between a mobiledevice and a larger computer? (Choose three.)  

Explanation

Contacts, email, and apps are universally common items that are synced between a mobile device and a larger computer. Contacts are often synced to ensure that the user has access to their contact list on both devices. Email is commonly synced to allow users to access their emails from either device. Apps can also be synced to ensure that the user has the same apps installed on both devices, allowing for a seamless experience.

Submit
65. In Windows 7, which utility is responsible for finding, downloading, and installing Windowsservice packs? 

Explanation

Windows Update is the correct answer because it is the utility in Windows 7 that is responsible for finding, downloading, and installing Windows service packs. It is a built-in feature that allows users to keep their operating system up to date by automatically downloading and installing the latest updates, including service packs, from Microsoft's servers. Windows Update also provides security updates, bug fixes, and other important patches to enhance the performance and stability of the operating system.

Submit
66. You want to prevent a person from accessing your phone while you step away from your desk. What should you do?

Explanation

To prevent unauthorized access to your phone while you step away from your desk, configuring a screen lock is the most effective solution. A screen lock adds an extra layer of security by requiring a password, PIN, pattern, or biometric authentication (such as fingerprint or face recognition) to unlock the device. This ensures that even if someone gains physical access to your phone, they won't be able to access your personal data without the correct credentials. Remote backup, remote wipe programs, and locator applications are useful for different purposes, but they do not directly address the issue of preventing access to your phone in your absence.

Submit
67. Your computer's laptop's LCD is being scratched by the keyboard when the lid is closed.... 

Explanation

Cleaning the LCD with a wet cloth is the correct answer because using a wet cloth can help remove any dirt or debris that may be causing the scratches. However, it is important to use a soft, non-abrasive cloth and to ensure that it is only slightly damp, as excessive moisture can damage the screen.

Submit
68. You are upgrading a computer from Windows Vista to Windows 7. What is the best tool to use... 

Explanation

Easy Transfer is the best tool to use when upgrading a computer from Windows Vista to Windows 7. This tool allows users to transfer files, settings, and user accounts from one computer to another. It simplifies the migration process and ensures that important data is not lost during the upgrade. Easy Transfer is specifically designed to facilitate the transition between different versions of Windows, making it the most suitable option for this scenario.

Submit
69. What is the minimum recommended memory for a 64-bit installation of Windows 7? 

Explanation

The minimum recommended memory for a 64-bit installation of Windows 7 is 2GB. This is because 64-bit operating systems require more memory to run efficiently compared to 32-bit systems. With 2GB of memory, the system will have enough resources to handle the demands of running Windows 7 and any associated programs without experiencing significant slowdowns or performance issues.

Submit
70. 14. You believe that your system files are corrupted in Windows XP. You run System FileChecker. What do you do to make System File Checker automatically repair your systemfiles if repair is needed? 

Explanation

Running "SFC /SCANNOW" command in Windows XP will initiate the System File Checker tool to scan the system files for any corruption or errors. If any issues are found, the tool will automatically attempt to repair the corrupted files. Therefore, running "SFC /SCANNOW" will make the System File Checker automatically repair the system files if repair is needed.

Submit
71. What is the maximum amount of RAM supported in the 64-bit Enterprise edition ofWindows 7? 

Explanation

The maximum amount of RAM supported in the 64-bit Enterprise edition of Windows 7 is 192GB. This means that the operating system can handle and utilize up to 192 gigabytes of RAM for improved performance and multitasking capabilities. Having a higher amount of RAM allows for smoother and faster operations, especially when running resource-intensive applications or performing complex tasks.

Submit
72. Which of the following network locations disables network discovery in Windows Vista? 

Explanation

The Public network location in Windows Vista disables network discovery. This means that devices on the network cannot find or communicate with each other, providing a more secure environment for public networks such as those found in coffee shops or airports. In the Public network location, network sharing and file sharing are also turned off by default to prevent unauthorized access to files and resources.

Submit
73. Your company provides medical data to doctors from a worldwide database. Because of thesensitive nature of the data you work with, it's imperative that authentication be establishedon each session and be valid only for that session. Which of the following authenticationmethods provides credentials that are valid only during a single session? 

Explanation

Tokens provide credentials that are valid only during a single session. Tokens are temporary and are generated for each session, providing a unique identifier that is used for authentication. Once the session ends, the token expires and cannot be reused for authentication. This ensures that the authentication credentials are valid only for that specific session and cannot be used for unauthorized access later on.

Submit
74. Which mail protocol commonly uses TCP port 587? 

Explanation

SMTP with TLS commonly uses TCP port 587. TLS (Transport Layer Security) is a cryptographic protocol that provides secure communication over a computer network. SMTP (Simple Mail Transfer Protocol) is the standard protocol used for sending email messages between servers. By using TLS, SMTP ensures that the communication between the email client and the email server is encrypted and secure. TCP port 587 is specifically designated for email message submission, which includes the use of SMTP with TLS.

Submit
75. Your help desk has informed you that they received an urgent call from the vice presidentlast night requesting his logon ID and password. When talking with the VP today, he sayshe never made that call. What type of attack is this? 

Explanation

This scenario describes a case of social engineering. Social engineering is a type of attack where the attacker manipulates individuals into divulging sensitive information or performing actions that they normally wouldn't. In this case, the attacker impersonated the vice president and called the help desk to obtain his logon ID and password. The fact that the VP denies making the call indicates that it was a social engineering attack, as the attacker successfully deceived the help desk into providing the requested information.

Submit
76. Which of the following is a replacement for RIS? 

Explanation

WDS is a replacement for RIS.

Submit
77. Which of the following is not a requirement for installing iTunes on a Windows machine? 

Explanation

The correct answer is 512MB of RAM or higher. This is not a requirement for installing iTunes on a Windows machine. The other options are all requirements for installing iTunes, such as having a 1GHz processor or better, 200MB of available disk space, and the x64 versions of Windows.

Submit
78. A server in your network has a program running on it that bypasses authentication.Which type of attack has occurred? 

Explanation

The correct answer is "Back door." A back door attack occurs when a program or code is installed on a server or system that allows unauthorized access, bypassing authentication measures. This allows attackers to gain control over the system and potentially exploit it for malicious purposes. In this case, the program running on the server bypasses authentication, indicating a back door attack.

Submit
79. Your customer has a computer (called comp_science that has been infected by a worm. The worm has...  

Explanation

Disconnecting the network cable from the infected computer is the correct answer because it will effectively isolate the computer from the network. By disconnecting the network cable, the worm will not be able to spread further or communicate with other devices on the network. This will prevent any potential damage or unauthorized access caused by the worm.

Submit
80. You are setting up a SOHO wireless network. Which of the following provides the best security?

Explanation

Enabling SSID and configuring WPA2 provides the best security for a SOHO wireless network. SSID stands for Service Set Identifier, which is the name of the wireless network. Enabling it allows devices to easily identify and connect to the network. WPA2 (Wi-Fi Protected Access 2) is a security protocol that encrypts the data transmitted over the network, making it more difficult for unauthorized users to access and intercept the information. By combining both the enablement of SSID and the configuration of WPA2, the network is not only easily identifiable but also protected with strong encryption, ensuring the highest level of security for the SOHO wireless network.

Submit
81. You want to ensure that your Windows XP computer receives automatic updates toWindows and Microsoft Office. Which tool will take care of this for you? 

Explanation

Microsoft Update is the tool that will take care of automatic updates for both Windows and Microsoft Office on a Windows XP computer. Windows Update only covers updates for the Windows operating system, while System Update is not a tool for managing updates on a Windows XP computer.

Submit
82. Internal users are seeing repeated attempts to infect their systems as reported to them bypop-up messages from their virus scanning software. According to the pop-up messages,the virus seems to be the same in every case. What is the most likely culprit? 

Explanation

The most likely culprit is that a server is acting as a carrier for a virus. This is indicated by the fact that internal users are seeing repeated attempts to infect their systems, as reported by pop-up messages from their virus scanning software. The fact that the virus seems to be the same in every case suggests that it is being distributed from a common source, which could be a server.

Submit
83. Where would you configure a workstation to boot from the USB drive first and the harddrive only if there is not a bootable USB device attached? 

Explanation

The correct answer is "None of the above." This is because the options provided (NTLDR, C:\WINDOWS\TEMP\1st.txt, and BOOT.INI) do not pertain to configuring the boot order on a workstation. The option "None of the above" indicates that there is another location or method to configure the boot order, but it is not specified in the given options.

Submit
84. Which of the following are you most likely to be able to do to a larger mobile device, suchas Apple's iPad? 

Explanation

You are most likely to be able to print over WiFi or Bluetooth to a larger mobile device, such as Apple's iPad. This means that you can wirelessly connect your iPad to a printer and print documents or images directly from the device without the need for any physical connections. This feature is commonly available on larger mobile devices like tablets, as they have more processing power and capabilities compared to smaller devices like smartphones.

Submit
85. Which of the following statements about configuring email access on a mobile device is true? 

Explanation

The correct answer is that the TCP ports used for configuring access are usually standard port numbers. This means that when setting up email access on a mobile device, the TCP ports that need to be configured typically follow standard port numbers that are commonly used for email protocols such as POP3 (Port 110), IMAP (Port 143), and SMTP (Port 25 or 587). These standard port numbers ensure compatibility and ease of configuration across different email services and devices.

Submit
86. You're the administrator for a large bottling company. At the end of each month, youroutinely view all logs and look for discrepancies. This month, your email system errorlog reports a large number of unsuccessful attempts to log on. It's apparent that the emailserver is being targeted. Which type of attack is most likely occurring? 

Explanation

The correct answer is a software exploitation attack. This type of attack involves exploiting vulnerabilities in software to gain unauthorized access or control over a system. In this scenario, the large number of unsuccessful attempts to log on to the email server indicates that someone is trying to exploit vulnerabilities in the server's software to gain unauthorized access. This could potentially lead to data breaches or other malicious activities.

Submit
87. Which BOOTREC option can be used in Windows 7 to rebuild the boot configuration file? 

Explanation

The correct answer is /REBUILDBCD. This option can be used in Windows 7 to rebuild the boot configuration file. The boot configuration file contains important information about the operating system and how it should be started. If this file becomes corrupted or missing, using the /REBUILDBCD option can help to recreate it and fix any boot-related issues.

Submit
88.  A user is having difficulty tapping on icons. What should you do to help theuser? (Select the two best answers.)

Explanation

To help the user having difficulty tapping on icons, cleaning the display is a good solution as it may remove any dirt or smudges that could be interfering with the touch sensitivity. Initiating a soft reset is also a good option as it can resolve any temporary software issues that may be affecting the touch functionality. Both of these actions can potentially improve the user's ability to tap on icons effectively.

Submit
89. Which of the following connections requires a username, password, and SMTPserver? (Select the two best answers.)

Explanation

The POP3 and IMAP connections require a username, password, and SMTP server. POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) are both email retrieval protocols that require authentication with a username and password to access the email server. Additionally, both protocols require an SMTP (Simple Mail Transfer Protocol) server for sending emails. Therefore, these two options are the best answers.

Submit
90. Which of the following are valid Wi-Fi troubleshooting methods? (Select the twobest answers.)

Explanation

Power cycling the device is a valid Wi-Fi troubleshooting method because it can help resolve temporary connectivity issues by resetting the device's network settings. Making sure the device is within range is also a valid method as Wi-Fi signals have limited range, and being out of range can cause connection problems. Restarting Bluetooth, using a static IP, and renaming the SSID are not valid Wi-Fi troubleshooting methods as they are unrelated to Wi-Fi connectivity issues.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 03, 2015
    Quiz Created by
    Maganoor
Cancel
  • All
    All (90)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following can aid a mobile user in finding the nearest...
Which technology would you use if you want to connect a headset to...
You have determined that the USB controller is malfunctioning. What...
Which utility is shown in the following screen shot?  
Which technology uses a physical characteristic to establish...
Which of the following features is not supported when you are unable...
What kind of display would an iPad2 use?
What are two common operating systems used by mobile devices? (Select...
What would a user need to synchronize contacts from an iPad to a PC?
As an administrator, you need to get an inventory of computers on your...
Which of the following is/are performed by formatting the hard drive?...
Windows XP includes a feature called a _________, which is a copy of...
Which type of attack denies authorized users access to network...
One of the vice presidents of the company calls a meeting with the...
Which of the following is not a type of Android passcode lock that can...
Which of the following do modern mobile devices most likely...
Which of the following are used to prevent pop-unders from...
Which of the following programs could be considered...
Which of the following can you do to help eliminate security problems?...
The display on your laptop appears warped and fuzzy. You plug in an...
What type of CPU do mobile devices use?
Which OS is considered to be closed-source?
What is the most common connection method when synchronizing data from...
Which of the following printer failures is described as a condition in...
Which of the following utilities enables a Windows 7 user to edit a...
19. Which of the following is the name of the graphical interface...
You have been told to use the /FIXBOOT switch to write a new boot...
Which feature allows you to use free space on an SD card to speed up a...
Which Windows Vista feature allows you to recover from an accidental...
You are migrating one stand-alone machine from Windows XP to Window...
As the security administrator for your organization, you must be aware...
Which media is susceptible to viruses? 
Which one do you like?
Bob's iPhone 4S cannot detect when he turns his device to the left and...
Which of the following is not a valid reason to disable cellular data...
If you do not have your iPhone 4S set to erase data after too many...
One of your users claims that their hard drive seems to be running...
Which of the following allows you to register and unregister modules...
What are a couple of differences between a tablet computer and a...
Which of the following allows other mobile devices to share your...
What does the iOS Simple Passcode allow a person to enter?
Which of the following is used by BitLocker to provide an encryption...
How would you secure a smartphone and its data? 
Which command should you use to fid out the intergrity of a hard...
Which of the following partitions is specifically the partition from...
What is the first file used in the boot-up of Windows Vista? 
As part of your training program, you're trying to educate users on...
A junior administrator comes to you in a panic. After looking at the...
Which of the following are text-messaging services used with mobile...
What is the default TCP port number for SMTP? 
A user wants to stop his tablet from shifting horizontally when he...
You work at a PC bench and receive a laptop that has a dim display....
Which of the following answers can be the cause of a blue screen...
13. What is the minimum amount of free hard drive space recommended...
19. Which of the following switches can be used with ROBOCOPY to...
Which editions of Windows 7 can create a HomeGroup? (Choose...
What do you use in Windows XP to create a recovery disk? 
During what type of installation must a user be present to choose all...
Setup Manager is used to create answer files for automatically...
A smurf attack attempts to use a broadcast ping on a network; the...
Your system log files report an ongoing attempt to gain access to a...
You're working late one night, and you notice that the hard disk on...
Which of the following can Apple's Find My iPhone application not...
Which of the following are universally common items that are synced...
In Windows 7, which utility is responsible for finding, downloading,...
You want to prevent a person from accessing your phone while you step...
Your computer's laptop's LCD is being scratched by the...
You are upgrading a computer from Windows Vista to Windows 7. What is...
What is the minimum recommended memory for a 64-bit installation of...
14. You believe that your system files are corrupted in Windows XP....
What is the maximum amount of RAM supported in the 64-bit Enterprise...
Which of the following network locations disables network discovery in...
Your company provides medical data to doctors from a worldwide...
Which mail protocol commonly uses TCP port 587? 
Your help desk has informed you that they received an urgent call from...
Which of the following is a replacement for RIS? 
Which of the following is not a requirement for installing iTunes on a...
A server in your network has a program running on it that bypasses...
Your customer has a computer (called comp_science that has been...
You are setting up a SOHO wireless network. Which of the following...
You want to ensure that your Windows XP computer receives automatic...
Internal users are seeing repeated attempts to infect their systems as...
Where would you configure a workstation to boot from the USB drive...
Which of the following are you most likely to be able to do to a...
Which of the following statements about configuring email access on a...
You're the administrator for a large bottling company. At the end of...
Which BOOTREC option can be used in Windows 7 to rebuild the boot...
 A user is having difficulty tapping on icons. What should you do...
Which of the following connections requires a username, password, and...
Which of the following are valid Wi-Fi troubleshooting methods?...
Alert!

Advertisement