CompTIA A+ Exam MCQ Hardest Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Maganoor
M
Maganoor
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,908
| Attempts: 141
SettingsSettings
Please wait...
  • 1/90 Questions

    Which of the following can aid a mobile user in finding the nearest coffee shop?(Select the best answer.)

    • Geotracking
    • IOS
    • GPS
    • GSM
Please wait...
About This Quiz


So you think you understand all there is to tell about CompTIA A+? This quiz will challenge that notion. For this quiz, you must know how to help a mobile user find a coffee shop, iPad2, and some of its advantages, assisting a user with difficulty with icons and common operating systems used by mobile devices. This quiz is top-notch. This quiz will be useful for understanding CompTIA A+.

CompTIA A+ Exam MCQ Hardest Quiz! - Quiz

Quiz Preview

  • 2. 

    Which technology would you use if you want to connect a headset to yourmobile phone?

    • Bluetooth

    • GSM

    • Wi-Fi

    • Exchange

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the correct answer because it is a wireless technology that allows devices to connect and communicate with each other over short distances. It is commonly used to connect headsets to mobile phones, allowing users to make hands-free calls or listen to audio wirelessly. GSM is a mobile network technology, Wi-Fi is used for wireless internet connectivity, and Exchange is a server software for email and messaging.

    Rate this question:

  • 3. 

    You have determined that the USB controller is malfunctioning. What should you do first to... 

    • Use control application wizard

    • Use the Windows Device Manager

    • Try restoring O.S

    • None of the above

    Correct Answer
    A. Use the Windows Device Manager
    Explanation
    The correct answer is to use the Windows Device Manager. The Windows Device Manager is a tool that allows you to manage and troubleshoot hardware devices connected to your computer. In this case, since the USB controller is malfunctioning, using the Windows Device Manager would be the first step to diagnose and potentially fix the issue. It allows you to view and manage the USB controller, update drivers, disable or enable the device, and check for any error messages or conflicts that may be causing the malfunction.

    Rate this question:

  • 4. 

    Which utility is shown in the following screen shot?  

    • Windows State Mover

    • Windows Easy Transfer

    • Windows Anytime Upgrade

    • Windows Edition Roller

    Correct Answer
    A. Windows Anytime Upgrade
    Explanation
    The utility shown in the screenshot is Windows Anytime Upgrade.

    Rate this question:

  • 5. 

    Which technology uses a physical characteristic to establish identity? 

    • Surveillance

    • Smart card

    • CHAP authenticator

    • Biometrics

    Correct Answer
    A. Biometrics
    Explanation
    Biometrics is the correct answer because it refers to the use of physical characteristics, such as fingerprints, facial recognition, or iris scans, to establish a person's identity. This technology relies on unique biological traits that are difficult to forge or replicate, making it a secure method for identification and authentication purposes.

    Rate this question:

  • 6. 

    Which of the following features is not supported when you are unable to zoom in on a pictureor screen of information by placing two fingers together on the screen and spreading them? 

    • Multi-touch

    • TouchFLO

    • SuperPinch

    • Resistive touchscreen

    Correct Answer
    A. Multi-touch
    Explanation
    Multi-touch is not supported when you are unable to zoom in on a picture or screen of information by placing two fingers together on the screen and spreading them. This feature allows the user to perform multiple touch gestures simultaneously, such as pinch-to-zoom or rotate, which enhances the user experience and provides more flexibility in interacting with the device. However, if multi-touch is not supported, the user will not be able to perform these gestures and will have to rely on other methods for zooming or interacting with the screen.

    Rate this question:

  • 7. 

    What kind of display would an iPad2 use?

    • CRT

    • Multitouch

    • Tap screen

    • Singletouch

    Correct Answer
    A. Multitouch
    Explanation
    The correct answer is "Multitouch." The iPad2 would use a multitouch display, which allows users to interact with the screen using multiple fingers simultaneously. This technology enables various gestures such as pinch-to-zoom, swipe, and rotate, providing a more intuitive and versatile user experience compared to traditional single-touch displays.

    Rate this question:

  • 8. 

    What are two common operating systems used by mobile devices? (Select thetwo best answers.)

    • Blueberry OS

    • IOS

    • Google OS

    • Android OS

    Correct Answer(s)
    A. IOS
    A. Android OS
    Explanation
    Choose 2 compulsary 2 answers

    Rate this question:

  • 9. 

    What would a user need to synchronize contacts from an iPad to a PC?

    • Android Synchronization Application

    • Google Play

    • ITunes

    • ActiveSync

    Correct Answer
    A. ITunes
    Explanation
    PC users need iTunes to synchronize contacts and other data from an iPad to
    a PC. There are many Android sync programs, but they do not work on Apple
    devices. Google Play is a place to get applications and other items. ActiveSync
    is the older Microsoft sync program used to synchronize Windows CE and
    Mobile to PCs.

    Rate this question:

  • 10. 

    As an administrator, you need to get an inventory of computers on your network and plan arollout of Windows 7. Which tool can be used for this purpose? 

    • UDMT

    • Microsoft Assessment and Planning (MAP) Toolkit

    • USMT

    • MigWiz

    Correct Answer
    A. Microsoft Assessment and Planning (MAP) Toolkit
    Explanation
    The Microsoft Assessment and Planning (MAP) Toolkit is the tool that can be used by an administrator to get an inventory of computers on the network and plan a rollout of Windows 7. This tool provides a comprehensive inventory of hardware, software, and device compatibility information, which helps in assessing the readiness of the network for a Windows 7 deployment. It also provides recommendations and reports to aid in the planning process. UDMT, USMT, and MigWiz are not specifically designed for this purpose and do not provide the same level of functionality as the MAP Toolkit.

    Rate this question:

  • 11. 

    Which of the following is/are performed by formatting the hard drive? (Choose four.) 

    • Formatting scans the surface of the hard drive platter to find bad spots and marks the areas surrounding a bad spot as bad sectors.

    • Formatting lays down magnetic tracks in concentric circles

    • The tracks are split into pieces of 512 bytes called sectors.

    • Formatting creates a File Allocation Table that contains information about the location of files

    • None of the above

    Correct Answer(s)
    A. Formatting scans the surface of the hard drive platter to find bad spots and marks the areas surrounding a bad spot as bad sectors.
    A. Formatting lays down magnetic tracks in concentric circles
    A. The tracks are split into pieces of 512 bytes called sectors.
    A. Formatting creates a File Allocation Table that contains information about the location of files
    Explanation
    Formatting the hard drive performs several tasks. Firstly, it scans the surface of the hard drive platter to identify and mark bad spots, designating the surrounding areas as bad sectors. Secondly, it lays down magnetic tracks in concentric circles on the hard drive. These tracks are then split into smaller segments called sectors, each containing 512 bytes of data. Lastly, formatting creates a File Allocation Table (FAT) that stores information about the location of files on the hard drive.

    Rate this question:

  • 12. 

    Windows XP includes a feature called a _________, which is a copy of your system configurationthat can be used to roll back the system to a previous state if a configuration error occurs. 

    • Restore point

    • Repair point

    • Roll back point

    • Registry

    Correct Answer
    A. Restore point
    Explanation
    Windows XP includes a feature called a restore point, which is a copy of your system configuration that can be used to roll back the system to a previous state if a configuration error occurs. This allows users to undo any changes made to the system settings or software installations and revert back to a stable state.

    Rate this question:

  • 13. 

    Which type of attack denies authorized users access to network resources? 

    • DoS

    • Worm

    • Logic bomb

    • Social engineering

    Correct Answer
    A. DoS
    Explanation
    A Denial of Service (DoS) attack is a type of attack that prevents authorized users from accessing network resources. In this attack, the attacker floods the target network or system with a large volume of traffic or requests, overwhelming its capacity and causing it to become inaccessible to legitimate users. This can result in service disruptions, downtime, and loss of productivity. DoS attacks can be launched through various methods, such as flooding the network with traffic, exploiting vulnerabilities in network protocols, or overwhelming the target's resources.

    Rate this question:

  • 14. 

    One of the vice presidents of the company calls a meeting with the information technologydepartment after a recent trip to competitors’ sites. She reports that many of the companiesshe visited granted access to their buildings only after fingerprint scans, and she wants similartechnology employed at this company. Of the following, which technology relies on aphysical attribute of the user for authentication? 

    • Smart card

    • Biometrics

    • Mutual authentication

    • Tokens

    Correct Answer
    A. Biometrics
    Explanation
    Biometrics is the correct answer because it refers to technology that relies on a physical attribute of the user for authentication. In this case, the vice president wants to implement fingerprint scans as a means of granting access to the company's buildings, which is a form of biometric authentication. Biometrics involves using unique physical characteristics such as fingerprints, iris patterns, or facial features to verify a person's identity.

    Rate this question:

  • 15. 

    Which of the following is not a type of Android passcode lock that can be set? 

    • Spoken passphrase

    • Drawn pattern

    • Numeric PIN

    • Password

    Correct Answer
    A. Spoken passphrase
    Explanation
    A spoken passphrase is not a type of Android passcode lock that can be set. Android passcode locks typically include options such as drawn patterns, numeric PINs, and passwords. However, a spoken passphrase is not a commonly used method for securing an Android device.

    Rate this question:

  • 16. 

    Which of the following do modern mobile devices most likely have? 

    • SSD

    • Keyboard connector

    • Optical disc drive

    • Video connector

    Correct Answer
    A. SSD
    Explanation
    Modern mobile devices most likely have SSD (Solid State Drive). SSDs are a type of storage device that are faster, more reliable, and consume less power compared to traditional hard disk drives. They are commonly used in mobile devices such as smartphones and tablets due to their compact size, durability, and ability to access data quickly. Unlike a keyboard connector, optical disc drive, or video connector, an SSD is a crucial component in modern mobile devices for storing and accessing data efficiently.

    Rate this question:

  • 17. 

    Which of the following are used to prevent pop-unders from appearing? 

    • Anti-malware utilities

    • Pop-up blockers

    • Phishing sites

    • Antivirus software

    Correct Answer
    A. Pop-up blockers
    Explanation
    Pop-up blockers are used to prevent pop-unders from appearing. Pop-unders are a type of advertisement that opens in a new browser window behind the current window, making them less noticeable to the user. Pop-up blockers work by detecting and blocking these types of pop-up advertisements, ensuring a smoother browsing experience and reducing the intrusion of unwanted ads. Anti-malware utilities, phishing sites, and antivirus software are not specifically designed to prevent pop-unders from appearing.

    Rate this question:

  • 18. 

    Which of the following programs could be considered anti-malware? 

    • Windows Defender

    • Microsoft Monitor

    • System Watchdog

    • None of the above

    Correct Answer
    A. Windows Defender
    Explanation
    Windows Defender could be considered anti-malware because it is a built-in security program provided by Microsoft for Windows operating systems. It is designed to detect, remove, and prevent malware infections, including viruses, spyware, and other malicious software. Windows Defender regularly scans the system for potential threats, provides real-time protection, and offers various security features to keep the computer safe from malware attacks. Therefore, Windows Defender is a suitable choice for protecting against malware.

    Rate this question:

  • 19. 

    Which of the following can you do to help eliminate security problems? (Choose four.) 

    • Establish security policies and procedures

    • Update your operating systems

    • Update your applications

    • Update your network devices.

    • None of the Above

    Correct Answer(s)
    A. Establish security policies and procedures
    A. Update your operating systems
    A. Update your applications
    A. Update your network devices.
    Explanation
    Establishing security policies and procedures, updating operating systems, updating applications, and updating network devices are all actions that can help eliminate security problems. By establishing security policies and procedures, organizations can outline guidelines and protocols for employees to follow, ensuring that security measures are in place. Updating operating systems, applications, and network devices is crucial as it helps to patch vulnerabilities and address any security flaws that may exist in older versions. These updates often include security patches and bug fixes that help protect against potential threats and attacks.

    Rate this question:

  • 20. 

    The display on your laptop appears warped and fuzzy. You plug in an external monitor,and the image on it is fine. What is the most likely cause of the problem? 

    • The video card

    • The LCD display

    • The motherboard

    • The video driver

    Correct Answer
    A. The LCD display
    Explanation
    The most likely cause of the problem is the LCD display. This is because when you plug in an external monitor and the image on it is fine, it suggests that the issue is specific to the laptop's display. The warping and fuzziness indicate a problem with the LCD screen itself, such as a faulty connection or a damaged panel.

    Rate this question:

  • 21. 

    What type of CPU do mobile devices use?

    • Core i7

    • Phenom II

    • ARM

    • Pentium

    Correct Answer
    A. ARM
    Explanation
    PhenomII : Phenom II is a family of AMD's multi-core 45 nm processors using the AMD K10 micro architecture, succeeding the original Phenom. Advanced Micro Devices : ARM : Advanced RISC Machine : Corei7 : General Microprocessors used for Desktop & Laptop

    Rate this question:

  • 22. 

    Which OS is considered to be closed-source?

    • Android OS

    • Bluetooth

    • Linux

    • IOS

    Correct Answer
    A. IOS
    Explanation
    iOS is considered to be a closed-source operating system. This means that the source code of iOS is not freely available to the public, and only Apple has access to it. Closed-source systems are typically more secure as the source code is kept private, but it also limits the ability of users and developers to modify or customize the operating system.

    Rate this question:

  • 23. 

    What is the most common connection method when synchronizing data from a mobile device to a PC?

    • Wi-Fi

    • Bluetooth

    • USB

    • FireWire

    Correct Answer
    A. USB
    Explanation
    The most common connection method when synchronizing data from a mobile device to a PC is USB. USB (Universal Serial Bus) allows for a fast and reliable connection between the two devices, enabling the transfer of data such as files, photos, and videos. It is widely supported by both mobile devices and PCs, making it a convenient and widely used method for data synchronization.

    Rate this question:

  • 24. 

    Which of the following printer failures is described as a condition in which the internal feed

    • Paper try

    • Paper jam

    • Track feeder

    • Duplexer

    Correct Answer
    A. Paper jam
    Explanation
    A paper jam is a printer failure that occurs when paper gets stuck inside the printer and cannot be properly fed through the printing mechanism. This can happen due to various reasons, such as misaligned paper, too much paper being fed at once, or foreign objects obstructing the paper path. When a paper jam occurs, the printer is unable to continue printing until the jammed paper is removed, causing a disruption in the printing process.

    Rate this question:

  • 25. 

    Which of the following utilities enables a Windows 7 user to edit a file offline, and then... 

    • Sync Center

    • Manually upload the files

    • Update the file then copy the updating folder

    • None of the above

    Correct Answer
    A. Sync Center
    Explanation
    Sync Center is the correct answer because it is a utility in Windows 7 that allows users to synchronize files between their computer and other devices or network locations. It enables users to edit files offline and then automatically sync the changes when they reconnect to the network. This allows for seamless collaboration and ensures that the most up-to-date version of the file is always available. The other options listed do not provide the same functionality as Sync Center.

    Rate this question:

  • 26. 

    19. Which of the following is the name of the graphical interface included with Windows Vista? 

    • Start

    • Aero

    • KDE

    • GNOME

    Correct Answer
    A. Aero
    Explanation
    Aero is the correct answer because it is the name of the graphical interface included with Windows Vista. Aero was introduced in Windows Vista and it featured a sleek and modern design with transparent window borders, animated effects, and a new taskbar. It provided users with a visually appealing and user-friendly interface for navigating and interacting with the operating system.

    Rate this question:

  • 27. 

    You have been told to use the /FIXBOOT switch to write a new boot sector on a Windows 7machine. Which command does this switch work with? 

    • SFC

    • BOOTREC

    • BCEDIT

    • ROBOCOPY

    Correct Answer
    A. BOOTREC
    Explanation
    The /FIXBOOT switch is used with the BOOTREC command to write a new boot sector on a Windows 7 machine. The BOOTREC command is a Windows Recovery Environment tool that can fix various boot-related issues. By using the /FIXBOOT switch with the BOOTREC command, you can repair or replace the boot sector, which is essential for the computer to start up properly.

    Rate this question:

  • 28. 

    Which feature allows you to use free space on an SD card to speed up a system? 

    • ReadyDrive

    • Shadow Copy

    • BitLocker to Go

    • ReadyBoost

    Correct Answer
    A. ReadyBoost
    Explanation
    ReadyBoost is the feature that allows you to use free space on an SD card to speed up a system. ReadyBoost works by using the flash memory on the SD card as a cache, which can improve the system's performance by providing faster access to frequently used data. By utilizing the additional memory provided by the SD card, ReadyBoost can reduce the reliance on the slower hard drive for accessing data, resulting in faster overall system performance.

    Rate this question:

  • 29. 

    Which Windows Vista feature allows you to recover from an accidental deletion or overwrite? 

    • BitLocker

    • User Account Control

    • Security Center

    • Shadow Copy

    Correct Answer
    A. Shadow Copy
    Explanation
    Shadow Copy is a Windows Vista feature that allows users to recover from accidental deletion or overwrite. It creates copies or snapshots of files and folders on a regular basis, allowing users to restore previous versions of their files if needed. This feature is especially useful in situations where important files are accidentally modified or deleted, providing a way to revert back to a previous state and recover the data.

    Rate this question:

  • 30. 

    You are migrating one stand-alone machine from Windows XP to Window Vista. Which ofthe following tools should you consider for transferring user state data and application files? 

    • Windows State Mover

    • UDMT

    • Windows Easy Transfer

    • USMT

    Correct Answer
    A. Windows Easy Transfer
    Explanation
    Windows Easy Transfer is the correct tool to consider for transferring user state data and application files when migrating from Windows XP to Windows Vista. Windows Easy Transfer is a utility provided by Microsoft that allows users to transfer files, folders, program settings, user accounts, and other data from one computer running Windows to another. It simplifies the migration process by providing a user-friendly interface and automating the transfer of data and settings.

    Rate this question:

  • 31. 

    As the security administrator for your organization, you must be aware of all types of attacksthat can occur and plan for them. Which type of attack uses more than one computer toattack the victim? 

    • DoS

    • DDoS

    • Worm

    • UDP attack

    Correct Answer
    A. DDoS
    Explanation
    A DDoS (Distributed Denial of Service) attack is a type of attack that uses multiple computers to overwhelm a target system or network with a flood of traffic, rendering it unable to function properly. By distributing the attack across multiple computers, the attacker can amplify the impact and make it more difficult to mitigate. This type of attack can be carried out by botnets, which are networks of compromised computers controlled by the attacker.

    Rate this question:

  • 32. 

    Which media is susceptible to viruses? 

    • Tape

    • Memory stick

    • CD-R

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    All of the mentioned media (tape, memory stick, and CD-R) are susceptible to viruses. Viruses can infect and corrupt data on all types of storage media, including tapes, memory sticks, and CD-Rs. Therefore, all of the above options are correct as they can be potential carriers of viruses.

    Rate this question:

  • 33. 

    Which one do you like?

    • Option 1

    • Option 2

    • Option 3

    • Option 4

    Correct Answer
    A. Option 1
  • 34. 

    Bob’s iPhone 4S cannot detect when he turns his device to the left and right like it’s asteering wheel. Games and other apps that require this motion will not work correctly asa result. Which component has failed in Bob’s phone? 

    • Gyroscope

    • Accelerometer

    • Magnetometer

    • GPS

    Correct Answer
    A. Gyroscope
    Explanation
    Bob's iPhone 4S cannot detect when he turns his device to the left and right like it's a steering wheel, indicating that the gyroscope component has failed. The gyroscope is responsible for measuring the device's orientation and angular velocity, allowing it to detect rotational movements. Without a functioning gyroscope, the phone is unable to accurately detect and respond to the user's motion, leading to the inability to play games and use apps that require this motion detection.

    Rate this question:

  • 35. 

    Which of the following is not a valid reason to disable cellular data networking? 

    • You have a limited amount of data in your monthly plan.

    • You have access to a reliable WiFi signal.

    • You are about to download an update to your phone.

    • Your phone calls are going out over your carrier’s cellular network.

    Correct Answer
    A. Your phone calls are going out over your carrier’s cellular network.
    Explanation
    Disabling cellular data networking is not a valid reason because phone calls are not dependent on cellular data. Phone calls use the cellular network for communication, regardless of whether cellular data is enabled or disabled.

    Rate this question:

  • 36. 

    If you do not have your iPhone 4S set to erase data after too many failed login attempts butyour phone still locks you out after making the maximum allowable attempts, how can youunlock the phone? 

    • By having it send you an email with the passcode

    • Only by taking into an Apple Store

    • By plugging it into the last computer that it synced with in iTunes

    • By holding down the sleep/wake and home buttons simultaneously

    Correct Answer
    A. By plugging it into the last computer that it synced with in iTunes
    Explanation
    If you have made the maximum allowable login attempts on your iPhone 4S and it locks you out, you can unlock the phone by plugging it into the last computer that it synced with in iTunes. When connected to the computer, iTunes will recognize the device and allow you to unlock it by entering the correct passcode. This method bypasses the need for erasing data or visiting an Apple Store.

    Rate this question:

  • 37. 

    One of your users claims that their hard drive seems to be running slowly. What tool canyou use to check to see how fragmented the hard drive is? 

    • Disk Analyzer

    • Disk Cleanup

    • Disk Defragmenter

    • Chkdsk

    Correct Answer
    A. Disk Defragmenter
    Explanation
    Disk Defragmenter is the correct tool to use in order to check how fragmented a hard drive is. Fragmentation occurs when files are divided into smaller pieces and stored in different locations on the hard drive. This can slow down the performance of the hard drive as it takes longer to access and read the fragmented files. Disk Defragmenter reorganizes the fragmented files on the hard drive, placing them in contiguous sectors, which improves the overall performance and speed of the hard drive.

    Rate this question:

  • 38. 

    Which of the following allows you to register and unregister modules and controls fortroubleshooting purposes? 

    • RegSvr32

    • SFC

    • Fixboot

    • Fixmbr

    Correct Answer
    A. RegSvr32
    Explanation
    RegSvr32 allows you to register and unregister modules and controls for troubleshooting purposes. It is a command-line tool used to register and unregister DLL files as COM (Component Object Model) servers. This is often done when troubleshooting issues related to missing or corrupted DLL files. By registering and unregistering modules and controls, you can resolve issues with the functionality of these components and ensure proper operation of the associated software or system.

    Rate this question:

  • 39. 

    What are a couple of differences between a tablet computer and a laptop?(Select the two best answers.)

    • Tablets have little or no field serviceable parts.

    • Tablets are upgradeable.

    • Laptops don’t use touch screens.

    • Tablets use flash memory as the hard drive.

    • Tablets use RAM.

    Correct Answer(s)
    A. Tablets have little or no field serviceable parts.
    A. Tablets use flash memory as the hard drive.
    Explanation
    Tablets have little or no field serviceable parts, meaning that they are not designed to be easily repaired or have their components replaced. This is in contrast to laptops, which often have easily accessible and replaceable parts. Additionally, tablets use flash memory as the hard drive, while laptops typically use traditional hard drives. Flash memory is faster and more durable than traditional hard drives, making it a common choice for tablets.

    Rate this question:

  • 40. 

    Which of the following allows other mobile devices to share your mobile device’s Internet connection?

    • Internet pass-through

    • Locator application

    • IMAP

    • Wi-Fi tethering

    Correct Answer
    A. Wi-Fi tethering
    Explanation
    IMAP: Internet Message Access Protocol (IMAP) is a communications protocol for email retrieval and storage developed by Mark Crispin in 1986 at Stanford University . Wify tehtering : Wi-Fi tethering allows a mobile device to share its Internet connection with other Wi-Fi capable devices. Internet pass-through is when the mobile device connects to a PC to share the PC’s Internet connection. Locator applications are used to find lost or stolen mobile devices through GPS. IMAP is another e-mail protocol similar to POP3.

    Rate this question:

  • 41. 

    What does the iOS Simple Passcode allow a person to enter?

    • 4-letter code

    • 6-number PIN

    • 4-digit passcode

    • Alpha-numeric passcode

    Correct Answer
    A. 4-digit passcode
    Explanation
    The iOS Simple Passcode allows a person to enter a 4-digit passcode. This passcode is used as a security measure to unlock the device and protect the user's personal information. It is a quick and convenient way to secure the device without the need for a longer or more complex passcode.

    Rate this question:

  • 42. 

    Which of the following is used by BitLocker to provide an encryption key and to protect data?  

    • TPM

    • TKIP

    • TIP

    • None of the above

    Correct Answer
    A. TPM
    Explanation
    TPM: On computers that have a Trusted Platform Module (TPM) version 1.2, BitLocker uses the enhanced security capabilities of the TPM to help ensure that your data is accessible only if the computer's boot components appear unaltered and the encrypted disk is located in the original computer.TKIP:TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol. TKIP is the encryption method used in Wi-Fi Protected Access (WPA), which replaced WEP in WLAN products :

    Rate this question:

  • 43. 

    How would you secure a smartphone and its data? 

    • Passcode lock Remote wipe

    • Passcode lock

    • Passcode lock Remote wipe along with voice bade

    • Remote wipe

    Correct Answer
    A. Passcode lock Remote wipe
    Explanation
    Securing a smartphone and its data can be done by implementing a passcode lock and enabling the remote wipe feature. A passcode lock adds an extra layer of security by requiring a password or PIN to access the device, preventing unauthorized access. Remote wipe allows the user to remotely erase all the data on the smartphone in case it is lost or stolen, ensuring that sensitive information does not fall into the wrong hands. By combining these two measures, the smartphone and its data can be effectively protected from unauthorized access and potential data breaches.

    Rate this question:

  • 44. 

    Which command should you use to fid out the intergrity of a hard drive? 

    • FDISK/MBR

    • FDISK/ACTIVE

    • FORMAT/S/U/V/Q

    • CHKDSK

    Correct Answer
    A. CHKDSK
    Explanation
    CHKDSK is the correct command to use in order to check the integrity of a hard drive. CHKDSK stands for "Check Disk" and it is a command-line utility in Windows that scans the file system and file system metadata of a disk for errors and fixes them if possible. It also checks for bad sectors and attempts to recover any readable information. By running CHKDSK, you can ensure the integrity and health of your hard drive.

    Rate this question:

  • 45. 

    Which of the following partitions is specifically the partition from which the operatingsystem boots? 

    • Extended partition

    • Primary partition

    • Active partition

    • Logical partition

    Correct Answer
    A. Primary partition
    Explanation
    The primary partition is specifically the partition from which the operating system boots. This is because the primary partition contains the necessary boot files and the operating system itself. The active partition, on the other hand, is the partition that the computer boots from initially, but it may not necessarily contain the operating system. The extended partition and logical partition are used for creating additional partitions within a primary partition, but they are not directly involved in the boot process.

    Rate this question:

  • 46. 

    What is the first file used in the boot-up of Windows Vista? 

    • NTOSKRNL.EXE

    • CONFIG.SYS

    • AUTOEXEC.BAT

    • BOOTMGR

    Correct Answer
    A. BOOTMGR
    Explanation
    BOOTMGR is the first file used in the boot-up of Windows Vista. It is responsible for locating the operating system and loading it into memory. BOOTMGR is a crucial component of the Windows boot process and is essential for the system to start up successfully. It is responsible for initiating the Windows Boot Manager, which then loads the necessary files and drivers to start the operating system.

    Rate this question:

  • 47. 

    As part of your training program, you’re trying to educate users on the importance of security.You explain to them that not every attack depends on implementing advanced technologicalmethods. Some attacks, you explain, take advantage of human shortcomings to gain accessthat should otherwise be denied. What term do you use to describe attacks of this type? 

    • Social engineering

    • IDS system

    • Perimeter security

    • Biometrics

    Correct Answer
    A. Social engineering
    Explanation
    Social engineering refers to the manipulation of individuals to gain unauthorized access to sensitive information or systems. It involves exploiting human weaknesses, such as trust, curiosity, or fear, rather than relying on advanced technological methods. By educating users about the importance of security and the existence of social engineering attacks, they can become more aware and cautious, reducing the risk of falling victim to such attacks.

    Rate this question:

  • 48. 

    A junior administrator comes to you in a panic. After looking at the log files, he hasbecome convinced that an attacker is attempting to use a duplicate IP address to replaceanother system in the network to gain access. Which type of attack is this? 

    • Man-in-the-middle attack

    • Back door attack

    • Worm

    • TCP/IP hijacking

    Correct Answer
    A. TCP/IP hijacking
    Explanation
    TCP/IP hijacking refers to an attack where an attacker intercepts and takes control of a TCP/IP connection between two systems. In this scenario, the junior administrator believes that an attacker is attempting to use a duplicate IP address to replace another system in the network. This would allow the attacker to hijack the TCP/IP connection and potentially gain unauthorized access to the network. Therefore, the correct answer is TCP/IP hijacking.

    Rate this question:

  • 49. 

    Which of the following are text-messaging services used with mobile devices? (Choose two.) 

    • SMS

    • SIP

    • Androtext

    • IOS Messaging

    • IMessage

    Correct Answer(s)
    A. SMS
    A. IMessage
    Explanation
    SMS and iMessage are both text-messaging services used with mobile devices. SMS stands for Short Message Service and is a standard messaging service that allows users to send and receive text messages. iMessage, on the other hand, is a messaging service exclusive to Apple devices that allows users to send text messages, photos, videos, and other media over Wi-Fi or cellular data. Both SMS and iMessage are widely used and popular text-messaging services among mobile device users.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 03, 2015
    Quiz Created by
    Maganoor
Back to Top Back to top
Advertisement