CompTIA A+ Testing Centre-paper2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Maganoor
M
Maganoor
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,932
| Attempts: 70 | Questions: 90
Please wait...
Question 1 / 90
0 %
0/100
Score 0/100
1. 1. While you are working on a computer at a customer's home, theCustomer informs you that he needs to leave for about 10 minutesand that his 8-year-old son can help you with anything if you needit. What should you do? 

Explanation

The correct answer is to tell the customer that an adult must be home while you work. This is the appropriate response because it is important to prioritize the safety and well-being of the child. Leaving a child alone with a stranger, even for a short period of time, is not responsible or safe. It is necessary to have a responsible adult present to ensure the child's safety and to address any potential issues that may arise during the computer work.

Submit
Please wait...
About This Quiz
CompTIA  A+  Testing Centre-paper2 - Quiz

This CompTia A+ Testing Centre-paper2 quiz assesses knowledge on mobile device functionalities, such as GPS usage, display settings, and system configurations. It's designed for individuals preparing for A+ certification, focusing on practical skills and troubleshooting.

Personalize your quiz and earn a certificate with your name on it!
2. 4. As you are servicing a manager's PC at your company, you runacross a list of names of employees who are supposedly aboutto be let go from the company. Some of these people are coworkers.What should you do? 

Explanation

It is important to act professionally and maintain confidentiality in such situations. Sharing or discussing the list with others could lead to unnecessary panic and anxiety among the employees. It is best to ignore the list and not disclose any information to anyone.

Submit
3. You are tasked with fixing a computer that is overheating after 30 minutes of use. What is the most likely cause?  

Explanation

The most likely listed cause is internal dust buildup, especially if
the buildup is within the CPU fan. If the fan has too much dust and dirt, it will
stop spinning at the right speed, thus reducing its effective cooling ability,
and causing the CPU to overheat, shutting down the system. ACPI is the
Advanced Configuration and Power Interface, used by operating systems for configuration and management of power to the system. This can be disabled in the BIOS on some systems, but isn't recommended. Regardless, the older APM (Advanced Power Management) should take over if it is. "Incorrect input
voltage settings" is somewhat vague. Incorrect CPU voltage settings could cause the system to overheat—for example, if it was overclocked—but it is
more likely that there is dust and debris in one of the fans. Temporary
folders are folders in Windows. You can have as much data as you want in
your Windows folders; it shouldn't cause the system to overheat

Submit
4. What are two common operating systems used by mobile devices? (Select thetwo best answers.)

Explanation

Choose 2 compulsary 2 answers

Submit
5. 5. While you are working at a customer site, a friend calls you on your cell phone. What should you do?  

Explanation

When working at a customer site, it is important to prioritize the task at hand and maintain professionalism. Answering a personal call can be seen as unprofessional and may distract from the work. Ignoring the call for now is the best option as it allows you to focus on the customer and complete your tasks efficiently.

Submit
6. 7. You are running some cable from an office to a computer located in a warehouse. As you are working in the warehouse, a 55-gallon drum falls from a pallet and spills what smells like ammonia. What should you do first? 

Explanation

If there is something that is immediately hazardous to you, you must leave the area right away. Afterward, you can call 911, the building supervisor, or your manager, depending on the severity of the situation. Computers and all other technology come second after human life. Remember that. Plus, if backup systems have been implemented properly, you have nothing to lose if a computer is damaged.

Submit
7. Which of the following has compatibility with the widest range of operating systems?  

Explanation

FAT32 has compatibility with the widest range of operating systems compared to the other options. FAT16 is an older file system that is not as widely supported, while CDFS is a file system specifically designed for CDs and DVDs. NTFS, on the other hand, is a file system used primarily in Windows operating systems and is not compatible with other operating systems such as macOS or Linux. Therefore, FAT32 is the correct answer as it can be used on a variety of operating systems including Windows, macOS, and Linux.

Submit
8. A user tells you that a PC shuts down after working for only 10 minutes. When you move the PC, you hear loose parts sliding around the case. What is the most likely reason for the PC shutting down? A. B.  C.  D. 

Explanation

The most likely reason for the PC shutting down after working for only 10 minutes is that the heat sink retaining clip has broken loose. This can cause the CPU to overheat quickly, leading to a shutdown to prevent damage. The loose parts sliding around the case indicate that the heat sink is not properly secured, causing inadequate heat dissipation.

Submit
9. A user wishes to secure their tablet from unauthorized access. The BEST option is to:? 

Explanation

Setting up a strong passcode is the best option for securing a tablet from unauthorized access. A strong passcode is a combination of letters, numbers, and special characters that makes it difficult for others to guess or crack. This provides an extra layer of security to prevent unauthorized users from accessing the tablet and its contents. Enabling RFID authentication, establishing a remote wipe policy, and setting up strong email passwords are also important security measures, but setting up a strong passcode is specifically mentioned as the BEST option.

Submit
10. Of the following, which represent security vulnerabilities to mobile devices? (Select the two best answers.)  

Explanation

The correct answer is Viruses and Theft. Viruses can infect mobile devices and compromise their security, leading to data loss or unauthorized access. Theft of mobile devices can also result in security vulnerabilities as the thief may gain access to sensitive information stored on the device. Improper file permissions, phishing, and unauthorized downloads can also pose security risks, but they are not mentioned in the correct answer.

Submit
11. When placing a mobile device into airplane mode, which of the following features are typically disabled? (Select the two best answers.)   

Explanation

When placing a mobile device into airplane mode, the wireless and cellular data features are typically disabled. This is because airplane mode is designed to restrict the device's ability to connect to any wireless networks or use cellular data services. By disabling these features, the device ensures compliance with airline regulations and prevents any potential interference with aircraft communication systems.

Submit
12. What is an advantage of a PC-hosted virtual machine?  

Explanation

A PC-hosted virtual machine allows multiple virtual machines to run on a single physical PC, reducing the need for additional hardware. This means that instead of purchasing separate physical machines for different tasks or operating systems, a single PC can be used to host multiple virtual machines, saving costs and space. This advantage is particularly beneficial for businesses or organizations that need to run multiple operating systems or applications simultaneously.

Submit
13. You have been tasked with limiting computer access to certain users. Which of the following should you configure?  

Explanation

To limit computer access to certain users, you should configure the Local Security Policy. This policy allows you to define various security settings and restrictions for individual users or groups on a local computer. By configuring the Local Security Policy, you can control user rights, password policies, account lockouts, audit policies, and other security-related settings. This ensures that only authorized users have access to the computer and its resources, enhancing overall system security.

Submit
14. Newer smartphones have a feature that enables their data to be backed up to a remote location. What is this known as?  

Explanation

Newer smartphones have a feature called iCloud that enables their data to be backed up to a remote location. iCloud is a cloud storage and cloud computing service provided by Apple Inc. It allows users to store their photos, videos, documents, and other data on remote servers and access them from any device. This feature ensures that users can easily restore their data if their smartphone is lost, damaged, or replaced.

Submit
15. Which of the following application stores are compatible with iOS? 

Explanation

The App Store is compatible with iOS because it is the official application store for Apple devices, including iPhones, iPads, and iPods. It is where users can download and install apps specifically designed for iOS operating system. The other options mentioned, such as Android Market and Windows Marketplace, are not compatible with iOS as they are designed for Android and Windows devices respectively. Amazon Appstore, though available on iOS, is not the primary application store for iOS devices.

Submit
16. Which of the following can aid a mobile user in finding the nearest coffee shop?(Select the best answer.)

Explanation

GPS: global positioning system(a system by which signals are sent from satellites to a special device, used to show the position of a person or thing on the surface of the earth very accurately) : GSM : Global System For Mobile Communication : iOS : iPhone Operating System

Submit
17. Which Windows 7 command can stop a single process from the command-line?   

Explanation

Taskkill is the correct answer because it is a Windows 7 command that can be used to stop a single process from the command-line. Taskkill allows users to terminate a process by specifying its process ID or process name. This command is useful for managing running processes and can be used to forcefully end a process that is unresponsive or causing issues.

Submit
18. What would a user need to synchronize contacts from an iPad to a PC?

Explanation

PC users need iTunes to synchronize contacts and other data from an iPad to
a PC. There are many Android sync programs, but they do not work on Apple
devices. Google Play is a place to get applications and other items. ActiveSync
is the older Microsoft sync program used to synchronize Windows CE and
Mobile to PCs.

Submit
19. You need to secure only physically unused network ports on a switch. What should you do?  

Explanation

To secure physically unused network ports on a switch, the best approach is to disable the ports in the firmware. This means that the ports will be deactivated and inaccessible, preventing any unauthorized access or potential security breaches. Disabling DNS or using DHCP addressing on the network are not directly related to securing unused network ports. Similarly, powering down the router when not in use does not specifically address the issue of securing unused ports. Therefore, the most effective solution is to disable the ports in the firmware.

Submit
20. Which of the following OSes supports full usage of 8 GB of RAM?  

Explanation

Windows 7 Home Premium x64 supports full usage of 8 GB of RAM because it is a 64-bit operating system. 64-bit operating systems can utilize more RAM compared to 32-bit operating systems, which have a RAM limit of around 4 GB. Therefore, Windows 7 Home Premium x64 is able to fully utilize the 8 GB of RAM.

Submit
21. You are having issues booting a newly built PC. You notice the following jumper configurations on each IDE device: - Hard drive: Master - Optical drive: Cable Select Which of the following jumper configuration should you modify this to?  

Explanation

The correct answer is to modify the jumper configuration to HD: Cable Select, Optical drive: Cable Select. This is because both devices are currently set to different configurations, which can cause conflicts and prevent the PC from booting properly. By setting both devices to Cable Select, the system will automatically determine the appropriate configuration for each device based on their placement on the IDE cable.

Submit
22. 6. You spill an unknown chemical on your hands. What should you do? 

Explanation

If it is not life-threatening, consult the material safety data sheet (MSDS) to determine the proper first aid (if any). If it is an emergency, call 911. If you cannot get access to the MSDS, contact the facilities department of your organization or try your building supervisor. Never ignore an unknown chemical. Take action before it becomes a problem

Submit
23. Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS? 

Explanation

The correct answer is /C. This command line option is used to perform disk defragmentation on all volumes in Windows OS. This means that it will defragment all the drives and partitions present in the system, ensuring that the files are organized and stored contiguously on the disk for improved performance.

Submit
24. A technician just finished removing spyware from a computer and now they are not able to connect to any websites. Which of the following is the MOST likely cause? 

Explanation

The most likely cause for the technician not being able to connect to any websites after removing spyware from the computer is the proxy settings. Spyware often modifies the proxy settings on a computer to redirect internet traffic, and when the spyware is removed, the proxy settings may not be restored to their original state, causing connectivity issues.

Submit
25. Which technology would you use if you want to connect a headset to yourmobile phone?

Explanation

Bluetooth is the correct answer because it is a wireless technology that allows for short-range communication between devices. It is commonly used for connecting peripherals such as headsets to mobile phones. GSM is a mobile network technology, Wi-Fi is a wireless networking technology, and Exchange is a messaging and collaboration server software.

Submit
26. A laser printer is producing completely blank sheets. What process should you check first?  

Explanation

The development process should be checked first when a laser printer is producing completely blank sheets. The development process is responsible for transferring toner onto the paper, so if this process is not functioning properly, no toner will be deposited on the paper, resulting in blank sheets.

Submit
27. What is the most common connection method when synchronizing data from amobile device to a PC?

Explanation

The most common connection method when synchronizing data from a mobile device to a PC is USB. USB (Universal Serial Bus) cables are widely used to connect mobile devices like smartphones and tablets to computers for data transfer and synchronization. USB connections offer a fast and reliable way to transfer files, backup data, and perform other tasks between the mobile device and the PC.

Submit
28. You have been tasked with resolving a shadowy image that is being printed from a network printer. What should you do?   

Explanation

Replacing the drum is the correct answer because a shadowy image is likely caused by a worn-out or damaged drum in the printer. The drum is responsible for transferring the toner onto the paper, and if it is not functioning properly, it can result in poor print quality with shadows or smudges. Therefore, replacing the drum should resolve the issue and improve the print quality.

Submit
29. A customer calls and reports that when they walk away from their laptop for an extended period of time they have to reconnect to wireless when they get back. Which of the following will most likely correct this issue?   

Explanation

Adjusting power settings is the most likely solution to the issue described by the customer. When a laptop is left idle for a long time, it may enter a power-saving mode that can disconnect the wireless connection. By adjusting the power settings, the laptop can be configured to maintain a stable wireless connection even during periods of inactivity. This will prevent the need for the customer to constantly reconnect to the wireless network when they return to their laptop after an extended period of time.

Submit
30. You attempt to install a legacy application on a computer running Windows 7. You receive an error that says the application cannot be installed because the OS is not supported. What should you do first to continue to try installing the application? A. Install the latest SP B. Install the application in safe mode C. Install the application in compatibility mode D. Install the latest security updates

Explanation

To continue trying to install the legacy application on a Windows 7 computer, the first step should be to install the application in compatibility mode. This mode allows older applications to run on newer operating systems by emulating the environment they were originally designed for. By installing the application in compatibility mode, it may be possible to bypass the error message stating that the OS is not supported and successfully install the application.

Submit
31. When setting up a Microsoft Exchange mail account to synchronize with an iPhone, which of the following items can be configured to synchronize besides e-mail? (Select the two best answers.)  

Explanation

When setting up a Microsoft Exchange mail account to synchronize with an iPhone, two items that can be configured to synchronize besides email are the calendar and the address book. This means that the user will be able to access and update their calendar events and contacts from their iPhone, ensuring that all their important scheduling and contact information is synchronized across devices.

Submit
32. Which CP utility is best used to remove a Windows 7 application?   

Explanation

Programs and Features is the correct answer because it is a utility in Control Panel that allows users to view and uninstall programs installed on their Windows 7 computer. It provides a list of all installed applications, making it easy for users to locate and remove the specific application they want to uninstall.

Submit
33. Which OS is considered to be closed-source?

Explanation

iOS is considered to be closed-source because Apple does not release the source code to the public. This means that only Apple can modify and distribute the operating system. Users are not allowed to view or modify the source code, limiting customization and development options.

Submit
34. In a SOHO wireless network, what prevents unauthorized users from accessing confidential data?  

Explanation

Setting encryption in a SOHO wireless network prevents unauthorized users from accessing confidential data because it ensures that the data transmitted over the network is encrypted and can only be decrypted by authorized devices with the correct encryption key. This adds a layer of security to the network and prevents unauthorized users from intercepting and accessing the confidential data.

Submit
35. 39.     Which type of user account should be disabled in order to adhere to security best practices?  

Explanation

Disabling the Guest user account is recommended in order to adhere to security best practices. The Guest account is typically used for temporary access and does not require a password to log in, making it more vulnerable to unauthorized access. By disabling the Guest account, potential security risks can be minimized as it reduces the chances of unauthorized users gaining access to the system.

Submit
36. One of your customers reports that all print jobs sent to a certain printer that require legal-size paper are not printing. However, standard size paper jobs are printing correctly. You check the paper tray and verify that it is loaded with legal-size paper. What is the most likely cause of the problem?  

Explanation

The most likely cause of the problem is that the paper size for the tray is incorrect in the printer setup. This means that the printer is not configured to recognize and print legal-size paper, which is why all print jobs requiring legal-size paper are not printing.

Submit
37. You are investigating an "NTLDR is missing" error message on a Windows XP computer. What command can possibly resolve the problem?   

Explanation

The "NTLDR is missing" error message on a Windows XP computer indicates that the boot loader file is not found or corrupted. The FIXBOOT command is used to repair or create a new boot sector on the system partition, which can help resolve this issue. It replaces the existing boot sector with a new one, allowing the computer to boot up properly.

Submit
38. Which of the following can allow a hidden backdoor to be used by remote workstations on the Internet?  

Explanation

Rootkits are used to gain privileged
access to the computer, perhaps with a hidden backdoor. A remote access
Trojan (RAT) might be used to access the backdoor, which then uses the
rootkit code to gain that privileged access. XSS stands for cross-site
scripting, a vulnerability in web applications. Hidden backdoors are usually
found in software (operating systems or applications), not in firmware
(BIOS). SQL injection is another type of attack on websites that uses code to extract confidential information from website databases.

Submit
39. Which of the following enables a user to reset their password with a series of security questions that only the user should know?  

Explanation

Authentication enables a user to reset their password with a
series of security questions that only the user should know. An example of
verification would be if you logged in to a bank with your username (or
account number) and password, are authenticated, and are then asked to
type in a code, known as a verification code. Permission propagation is when NTFS rights (permissions) are automatically copied from the parent folder to
a subfolder. The subfolder inherits the permissions when they are propagated
from the parent. Administration could mean many things, but one example would be when an administrator sets a policy where a user needs to type a verification code after logging in.

Submit
40. You are asked to fix a problem with a customer's domaincontroller that is outside the scope of your knowledge. Whataction should you take? 

Explanation

When faced with a problem that is outside of your knowledge or expertise, it is important to be honest with the customer and not attempt to fix it yourself. Instead, the best course of action is to help the customer find the appropriate channels or resources to address and resolve the problem. This ensures that the issue is handled by someone with the necessary knowledge and skills, and avoids any potential mistakes or further complications that could arise from attempting to fix the problem without the proper expertise.

Submit
41. One of your customers tells you that the computer screen is flickering at a rapid rate. Which Control Panel path should you use to fix the problem?   

Explanation

To fix the problem of a flickering computer screen, you should navigate to the Control Panel path: Display > Settings > Advanced > Adapter > Refresh. By adjusting the refresh rate of the display adapter, you can resolve the issue of flickering.

Submit
42. When dealing with Bluetooth, what best describes the purpose of discovery mode?   

Explanation

Discovery mode in Bluetooth allows a peripheral device to be contacted by a mobile device. When a peripheral device is in discovery mode, it broadcasts its availability to nearby devices, allowing them to establish a connection. This enables the mobile device to detect and connect to the peripheral device, facilitating communication and interaction between the two devices.

Submit
43. A user wants to stop his tablet from shifting horizontally when he turns it. Whichof the following should you enable?

Explanation

Enable Lock Rotation on Apple devices. On Android devices disable Autorotate.
The Accelerometer is a term used by Apple to describe the
hardware/software that controls the three axes of movement. The Gyroscope is
another term used by Apple to describe the device that measures the additional
three movements (pitch, roll, and yaw) of newer Apple devices. Screen calibration
is used to reset the device that measures the three axes

Submit
44. Which of the following allows other mobile devices to share your mobile device'sInternet connection?

Explanation

IMAP: Internet Message Access Protocol (IMAP) is a communications protocol for email retrieval and storage developed by Mark Crispin in 1986 at Stanford University . Wify tehtering : Wi-Fi tethering allows a mobile device to share its Internet connection with
other Wi-Fi capable devices. Internet pass-through is when the mobile device
connects to a PC to share the PC’s Internet connection. Locator applications are
used to find lost or stolen mobile devices through GPS. IMAP is another e-mail
protocol similar to POP3.

Submit
45. You are taking apart a laptop to replace an internal part. Which of the following is an example of a best practice?   

Explanation

Labeling the screws according to where they came from is an example of a best practice when taking apart a laptop to replace an internal part. This practice helps ensure that the screws are correctly reinstalled in their original positions, preventing any damage or misalignment during reassembly. By labeling the screws, it becomes easier to identify which screw goes where, saving time and reducing the risk of errors.

Submit
46. A customer reports to you that a file shared on their computer for another user is not accessible to that third party. The customer says that the third party was given Allow rights for Read and Write access to the file. What could be a possible reason that the third party cannot access the file?  

Explanation

The possible reason that the third party cannot access the file is that the parent folder has explicit Deny rights set for the third-party user. This means that even though the user was given Allow rights for Read and Write access to the file, the Deny rights set at the parent folder level override those permissions and prevent the third party from accessing the file.

Submit
47. You are configuring a friend's iPad. The user needs to access his work e-mail. In order to do this, you require information from the friend's IT department. What information should you ask for?  

Explanation

To configure the friend's iPad to access his work email, you would need to ask for the server and domain information from the IT department. The server information is necessary to establish a connection with the email server, while the domain information is required to correctly identify and authenticate the user's email account within the organization's network.

Submit
48. What is the correct path to determine the IP address of an iOS device?   

Explanation

The correct path to determine the IP address of an iOS device is Settings > Wi-Fi > SSID Name > IP Address. This is because the IP address of the device can be found under the Wi-Fi settings, specifically under the SSID Name of the connected network.

Submit
49. A computer has been infected with multiple viruses and spyware. What should you do first before the removal of this malware? 

Explanation

Disabling system restore is the first step that should be taken before removing malware from a computer. System restore points can contain infected files, and if system restore is enabled, the malware can easily re-infect the computer after removal. Disabling system restore ensures that the infected files are not saved in the restore points and prevents the malware from returning.

Submit
50. A customer's laptop has failed, but appears that the hard drive is still functioning. What is the best way for the user to still access and edit all of his data?  

Explanation

The best way for the user to still access and edit all of his data is by using a USB hard drive enclosure. This allows the user to connect the functioning hard drive to another computer via a USB connection, effectively turning it into an external hard drive. This way, the user can access and edit all of his data as if it were still on his laptop's hard drive.

Submit
51. You are working on a client computer and receive a message that says the trust relationship to the domain has been broken. What should you do to resolve this problem from the client computer?   

Explanation

To resolve the issue of a broken trust relationship to the domain from the client computer, the best course of action is to re-join the computer to the domain. This involves removing the computer from the domain and then adding it back again. By doing so, the trust relationship between the client computer and the domain will be reestablished, allowing the computer to authenticate and access domain resources properly.

Submit
52. You are troubleshooting a RAID 6 array on a high-end computer. Two disk drives have their fault lights on. What is the best action for you to take?  

Explanation

The best action to take in this situation is to replace the failed drives and verify that the RAID rebuilds completely. This is because the fault lights indicate that the drives have failed, and simply reseating them may not resolve the issue. Monitoring the RAID status over a few days may not be sufficient to ensure that the array is fully rebuilt. Restoring the data from a backup should only be done if the RAID rebuild is unsuccessful.

Submit
53. A client of yours just purchased a high-end video card and wants to run existing games through an LCD TV at 1080p. When you finish installing the card, the games do not display correctly. What is most likely causing this?  

Explanation

The most likely cause for the games not displaying correctly when running through an LCD TV at 1080p is that the games do not support a 1920 x 1080 resolution. This means that the games are not designed to be played at that specific resolution, causing them to appear distorted or not fit properly on the screen.

Submit
54. You want to prevent a person from accessing your phone while you step awayfrom your desk. What should you do?

Explanation

To prevent a person from accessing your phone while you step away from your desk, you should configure a screen lock. This is a security feature that requires a password, PIN, pattern, or fingerprint to unlock the phone and access its contents. By setting up a screen lock, you ensure that even if someone gains physical access to your phone, they won't be able to use it without the correct authentication. This helps protect your personal and sensitive information from unauthorized access.

Submit
55. You are troubleshooting a printer. What are common symptoms of printer failure or other printer issues? (Select the two best answers.)   

Explanation

The common symptoms of printer failure or other printer issues include vertical lines on the page and being unable to install the printer. Vertical lines on the page indicate a problem with the printer's print head or ink cartridges, which may need to be cleaned or replaced. Being unable to install the printer suggests a problem with the printer driver or compatibility issues with the computer's operating system.

Submit
56. What type of CPU do mobile devices use?

Explanation

PhenomII : Phenom II is a family of AMD's multi-core 45 nm processors using the AMD K10 micro architecture, succeeding the original Phenom. Advanced Micro Devices : ARM : Advanced RISC Machine : Corei7 : General Microprocessors used for Desktop & Laptop

Submit
57. What kind of display would an iPad2 use?

Explanation

The correct answer is Multitouch. The iPad2 uses a multitouch display, which means it can detect and respond to multiple simultaneous touch inputs. This allows users to perform various gestures, such as pinching to zoom or swiping to scroll, making the device more intuitive and user-friendly. Multitouch technology has become a standard feature in modern touchscreen devices, providing a more interactive and versatile user experience.

Submit
58. What does the iOS Simple Passcode allow a person to enter?

Explanation

The iOS Simple Passcode allows a person to enter a 4-digit passcode. This means that the passcode consists of four numbers, allowing for a relatively simple and easy-to-remember code for accessing the iOS device. This passcode provides a basic level of security for the device, preventing unauthorized access.

Submit
59. You are placing a computer back into service that has not been turned on in several months. It was healthy when taken out of service and boots quickly without any problems. What actions would be best practices to begin computer maintenance? (Select the two best answers.)  

Explanation

Running AV updates is important to ensure that the computer has the latest virus definitions and protection against any new threats that may have emerged during the time it was not in use. Running Windows updates is also crucial as it ensures that the computer has the latest security patches and updates for the operating system, which helps to protect against vulnerabilities and improve overall system performance.

Submit
60. What are a couple of differences between a tablet computer and a laptop?(Select the two best answers.)

Explanation

Tablets have little or no field serviceable parts, meaning that they are not easily repairable or replaceable. On the other hand, laptops can often be repaired or upgraded by replacing individual components. Additionally, tablets use flash memory as the hard drive, while laptops typically use traditional hard drives. Flash memory is faster and more durable than traditional hard drives, making it a common choice for tablets.

Submit
61. You are required to remove the ability for standard users to shut down or restart a shared computer. Which command should be used to accomplish this task?  

Explanation

Using the "gpedit.msc" command will allow you to access the Group Policy Editor, which is a tool used to manage various settings on a Windows computer. Within the Group Policy Editor, you can navigate to the appropriate policy setting that controls the ability for standard users to shut down or restart a shared computer. By modifying this policy setting, you can remove the ability for standard users to perform these actions, effectively accomplishing the desired task.

Submit
62. Which command in Windows can initiate CHKDSK at boot time ?

Explanation

CHKNTFS is the correct answer because it is the command in Windows that can initiate CHKDSK at boot time. CHKNTFS is a utility that checks the file system integrity of a volume and automatically schedules CHKDSK to run at the next system restart if any issues are found. This command is useful for fixing disk errors that cannot be repaired while the operating system is running.

Submit
63. Which of the following can be described as removing limitations on iOS?

Explanation

Jailbreaking is the process of removing the limitations of an iOS-based device
so that the user gets superuser abilities. Rooting is a similar technique used on
Android mobile devices. Geotracking is the practice of tracking a device over
time. AV software is antivirus software, used to combat malware.
5. C. If you’ve already tried to stop the application within Running Services,

Submit
64. You are configuring a SOHO wireless network for a customer. The customer wants only five authorized computers to connect to the network within a defined IP range. What should you configure on the router? (Select the two best answers.)   

Explanation

SSID: Service Set Identifier DMZ: (DeMilitarized Zone) A middle ground between an organization's trusted internal network and an untrusted, external network such as the Internet. Also called a "perimeter network," the DMZ is a subnetwork (subnet) that may sit between firewalls or off one leg of a firewall. Organizations typically place their Web, mail and authentication servers in the DMZ. DMZ is a military term that refers to the area between two enemies DHCP: Dynamic Host Configuration Protocol

Submit
65. 8. While you are upgrading a customer's server hard drives, you notice looped network cables lying all over the server room floor. What should you do? 

Explanation

In this scenario, it is important to address the issue of looped network cables lying on the server room floor. Ignoring the problem could lead to potential accidents or damage to the cables. Calling the building supervisor may not be necessary as it is the responsibility of the IT technician to handle such issues. Notifying the administrator is a good step, but it may not directly solve the problem. The best course of action would be to tell the customer about safer alternatives, such as organizing and securing the network cables to prevent any mishaps or disruptions to the server room environment.

Submit
66. 9. Which of the following statements is not assertive communication? 

Explanation

Asking a customer if employees always cause issues is just plain rude; this type of communication should be avoided. However, the other three statements are positive and helpful, or at least consoling. Stay away from being judgmental of the customer

Submit
67. Question 12 Which of the following is a common type of biometric authentication on a laptop? (Select TWO).? 

Explanation

Facial recognition and fingerprint authentication are common types of biometric authentication on a laptop. Facial recognition uses the unique characteristics of a person's face to verify their identity, while fingerprint authentication uses the unique patterns and ridges on a person's fingertip. Both methods provide a secure and convenient way to access a laptop, as they require the physical presence of the user and cannot be easily duplicated or stolen.

Submit
68. You need to set up an alert that will be sent to an administrator when the CPU stays above 90% for an extended period of time. Which tool will allow you to accomplish this?   

Explanation

Performance Monitor is the correct answer because it is a tool that allows you to monitor the performance of your system, including CPU usage. It can be configured to set up alerts that will be sent to an administrator when the CPU stays above a certain threshold, such as 90%, for an extended period of time. This allows the administrator to take appropriate action to address the high CPU usage and prevent any potential issues or performance degradation.

Submit
69. A customer reports that their computer crashes during usage. Which of the following is a common acronym used to describe this condition? 

Explanation

RAID: Redundant Array Of Inexpensive Disk : VPN: Virtual Private Network BSOD : Blue Screen of Death : LAN : Local Area Network

Submit
70. A customer tells you that it takes a long time to load the Windows desktop after logon. What tool can help with this problem?  

Explanation

Sergeant First Class

Submit
71. You are working with a virtual machine (VM) when you discover that it has been infected with malware. Which of the following will apply?   

Explanation

not-available-via-ai

Submit
72. Which one do you like?

Explanation

not-available-via-ai

Submit
73. A user calls about their workstation not powering on in the morning. According to the troubleshooting theory, which of the following steps should the technician perform NEXT?? 

Explanation

After troubleshooting the issue and determining that the workstation is not powering on, the next logical step would be to ask the user about any previous changes. This step is important as it can provide valuable information about any recent modifications or updates that may have caused the problem. By gathering this information, the technician can narrow down the potential causes and proceed with the appropriate solution.

Submit
74. A company would like to increase the security on their company's smart phones. Which of the following should be configured to ensure information stored on a smart phone can be removed if it is lost or stolen? 

Explanation

To increase the security on their company's smart phones, configuring the remote wipe feature is essential. This feature allows the company to remotely erase all the information stored on the smart phone if it is lost or stolen. By enabling remote wipe, the company can ensure that sensitive data does not fall into the wrong hands, safeguarding their information and preventing any potential security breaches.

Submit
75. What do third-party apps such as Find iPhone rely on?

Explanation

Third-party locator apps such as Find iPhone and Where’s my Droid rely on
GPS to locate the device. Passcodes are used to prevent unauthorized users
from accessing the mobile device. Google Apps Device Policy can initiate a
remote wipe on a mobile device. Bluetooth is used so the mobile device can
communicate with other devices over short range.

Submit
76. A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. What is the cause of the issue?    

Explanation

The issue is caused by the fact that the application was not programmed to respond to changes in the gyroscope. The gyroscope is responsible for detecting the orientation of the device, so when the user turns the tablet to landscape mode, the gyroscope sends a signal to the application to adjust accordingly. However, if the application does not have the necessary code to interpret this signal and adjust its display, it will not automatically switch to landscape mode.

Submit
77. Your organization is concerned about a scenario where a mobile device withconfidential data is stolen. What should you recommend first? (Select the bestanswer.)

Explanation

A remote wipe program is recommended as the first measure to take in the scenario where a mobile device with confidential data is stolen. This program allows the organization to remotely erase all data on the stolen device, ensuring that sensitive information does not fall into the wrong hands. It is a proactive and effective solution to protect the confidentiality of the data and prevent any potential misuse or unauthorized access.

Submit
78. You have been tasked with diagnosing a laptop that is experiencing heavy artifact corruption along with random loss of video during operation. What are the most likely causes to the problem? (Select the two best answers.)  

Explanation

The heavy artifact corruption and random loss of video during operation are indicative of hardware and software issues. The integrated system video chip failing could cause these problems as it is responsible for rendering the video. Additionally, incompatible or untested video drivers could also lead to these issues as they may not be properly optimized for the laptop's hardware.

Submit
79. You previously installed a new application for a customer that has added three new services. Today, the customer informs you that the application will not start. You find out that one of the three new services has failed to start, and manual attempts to start it fail. Where should you look next for information? (Select the two best answers.)   

Explanation

You should look in the Registry and the Log files for the new application for information. The Registry contains important configuration settings for the application and can provide insights into any issues that may be causing it to fail. The Log files for the new application can also provide valuable information about any errors or failures that occurred during the startup process.

Submit
80. You are installing Windows 7 to a PC with a RAID card. All cables are connected properly, but the install DVD does not detect any hard drives. What should you do next?   

Explanation

When installing Windows 7 to a PC with a RAID card, if the install DVD does not detect any hard drives, the next step would be to select load driver. This is because RAID cards often require specific drivers to be loaded during the installation process in order for the hard drives to be recognized. By selecting load driver, you can provide the necessary drivers for the RAID card, allowing the install DVD to detect the hard drives and proceed with the installation.

Submit
81.  When configuring a Wi-Fi connection what step occurs after successfully enteringthe SSID?

Explanation

After successfully entering the SSID, the next step in configuring a Wi-Fi connection is to enter a passcode for the network. This passcode, also known as the Wi-Fi password, is required to authenticate and gain access to the network. It ensures that only authorized users can connect to the Wi-Fi network and helps to secure the connection from unauthorized access.

Submit
82. Which of the following connections requires a username, password, and SMTPserver? (Select the two best answers.)

Explanation

POP3 and IMAP connections require a username, password, and SMTP server. POP3 (Post Office Protocol version 3) is an email retrieval protocol that allows users to access and download their emails from a remote server to their local device. IMAP (Internet Message Access Protocol) is another email retrieval protocol that allows users to access and manage their emails stored on a remote server. Both protocols require authentication with a username and password, and the SMTP (Simple Mail Transfer Protocol) server is used for sending outgoing emails.

Submit
83. What is the best way of maintaining data security for a mobile device that has been lost or stolen?   

Explanation

The best way of maintaining data security for a lost or stolen mobile device is by using remote wipe. Remote wipe allows the user to erase all the data on the device remotely, ensuring that sensitive information does not fall into the wrong hands. This feature is particularly important in preventing unauthorized access to personal or confidential data stored on the device. Passcode lock, GPS, and login attempt restrictions are also important security measures, but remote wipe provides the most effective solution in case of a lost or stolen device.

Submit
84. Which of the following should be performed regularly in order to help restore a computer's data after a hard drive failure?? 

Explanation

Read the question 2 times , then answer

Submit
85. Which of the following are valid Wi-Fi troubleshooting methods? (Select the twobest answers.)

Explanation

Power cycling the device is a valid Wi-Fi troubleshooting method because it can help reset the network connection and resolve any temporary issues. Making sure the device is within range is also a valid method as being out of range can cause a weak or no Wi-Fi signal, resulting in connection problems. Restarting Bluetooth, using a static IP, and renaming the SSID are not relevant to Wi-Fi troubleshooting and therefore not valid methods.

Submit
86. You are concerned with the possibility of jailbreaks on your organization'siPhones, and viruses on the Android-based devices. What should you implement?

Explanation

You should implement antivirus (AV) software. This can protect against viruses
and other malware as well as jailbreaks on Apple devices. As of the writing of
this book, firewalls for mobile devices are not common, but that could change in
the future. Mobile Device Management (MDM) is software that runs at a central
computer enabling a user to configure and monitor multiple mobile devices.
Device resets are used to restart the mobile device, or to reset it to factor condition
depending on the type of reset, and the manufacturer of the device.

Submit
87. An application won't close on an Android smartphone. You've tried to ForceStop it to no avail. What should you do?

Explanation

If you’ve already tried to stop the application within Running Services,
attempt a soft reset. Pull the battery if the application is frozen. Hard resets on
Android devices should be used only as a last resort as they will return the
device to factory condition—wiping all the data. The question said that the application
won’t close, not a service, though you could try finding an underlying
service that might be the culprit. But try resetting the device before doing this or
bringing it to an authorized service center.
6. B. The remote wipe application is the most important one listed. This will

Submit
88. One of your customers has set up a perimeter firewall and has implemented up-to-date AV software. She asks you what else she can do to improve on security. What will have the greatest impact on her network security? (Select the two best answers.)   

Explanation

Using strong passwords and disabling screen savers will have the greatest impact on network security. Strong passwords help prevent unauthorized access to accounts and systems, while disabling screen savers reduces the risk of unauthorized access when the user is away from their computer. Conducting a daily security audit and installing additional antivirus software are also important security measures, but they may not have as significant an impact as using strong passwords and disabling screen savers.

Submit
89. 3. A customer experiences a server crash. When you arrive, themanager is upset about this problem. What should you do in thisscenario? 

Explanation

not-available-via-ai

Submit
90.  A user is having difficulty tapping on icons. What should you do to help theuser? (Select the two best answers.)

Explanation

To help the user who is having difficulty tapping on icons, you should clean the display to remove any dirt or smudges that may be affecting the touch sensitivity. Additionally, initiating a soft reset can help resolve any software-related issues that may be causing the problem. This can be done by restarting the device or performing a soft reboot. Installing a screen protector or tapping the Home button may not directly address the issue of difficulty tapping on icons, so they are not the best answers in this scenario. A hard reset should be avoided as it can potentially erase data and should only be used as a last resort.

Submit
View My Results

Quiz Review Timeline (Updated): Jun 26, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 26, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 30, 2015
    Quiz Created by
    Maganoor
Cancel
  • All
    All (90)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
1. While you are working on a computer at a customer's home,...
4. As you are servicing a manager's PC at your company, you runacross...
You are tasked with fixing a computer that is overheating after...
What are two common operating systems used by mobile devices? (Select...
5. While you are working at a customer site, a friend calls you on...
7. You are running some cable from an office to a computer located in...
Which of the following has compatibility with the widest range...
A user tells you that a PC shuts down after working for only...
A user wishes to secure their tablet from unauthorized access. The...
Of the following, which represent security vulnerabilities to...
When placing a mobile device into airplane mode, which of...
What is an advantage of a PC-hosted virtual machine?  
You have been tasked with limiting computer access to certain...
Newer smartphones have a feature that enables their data to...
Which of the following application stores are compatible with...
Which of the following can aid a mobile user in finding the nearest...
Which Windows 7 command can stop a single process from...
What would a user need to synchronize contacts from an iPad to a PC?
You need to secure only physically unused network ports on a...
Which of the following OSes supports full usage of 8 GB of...
You are having issues booting a newly built PC. You notice...
6. You spill an unknown chemical on your hands. What should you...
Which of the following disk defragmentation command line options is...
A technician just finished removing spyware from a computer and now...
Which technology would you use if you want to connect a headset to...
A laser printer is producing completely blank sheets. What...
What is the most common connection method when synchronizing data from...
You have been tasked with resolving a shadowy image that is...
A customer calls and reports that when they walk away from...
You attempt to install a legacy application on a computer...
When setting up a Microsoft Exchange mail account to...
Which CP utility is best used to remove a Windows 7...
Which OS is considered to be closed-source?
In a SOHO wireless network, what prevents unauthorized users...
39.     Which type of user account should be disabled...
One of your customers reports that all print jobs sent to a...
You are investigating an "NTLDR is missing" error message on...
Which of the following can allow a hidden backdoor to be used...
Which of the following enables a user to reset their password with...
You are asked to fix a problem with a customer's domaincontroller that...
One of your customers tells you that the computer screen is...
When dealing with Bluetooth, what best describes the purpose...
A user wants to stop his tablet from shifting horizontally when he...
Which of the following allows other mobile devices to share your...
You are taking apart a laptop to replace an internal part. Which of...
A customer reports to you that a file shared on their computer...
You are configuring a friend's iPad. The user needs to access his...
What is the correct path to determine the IP address of an iOS...
A computer has been infected with multiple viruses and spyware....
A customer's laptop has failed, but appears that the hard drive is...
You are working on a client computer and receive a message that...
You are troubleshooting a RAID 6 array on a high-end computer....
A client of yours just purchased a high-end video card and wants...
You want to prevent a person from accessing your phone while you step...
You are troubleshooting a printer. What are common symptoms...
What type of CPU do mobile devices use?
What kind of display would an iPad2 use?
What does the iOS Simple Passcode allow a person to enter?
You are placing a computer back into service that has not been...
What are a couple of differences between a tablet computer and a...
You are required to remove the ability for standard users to shut...
Which command in Windows can initiate CHKDSK at boot time ?
Which of the following can be described as removing limitations on...
You are configuring a SOHO wireless network for a customer....
8. While you are upgrading a customer's server hard drives, you notice...
9. Which of the following statements is not assertive...
Question 12 Which of the following is a common type of biometric...
You need to set up an alert that will be sent to an administrator...
A customer reports that their computer crashes during usage. Which of...
A customer tells you that it takes a long time to load the...
You are working with a virtual machine (VM) when you discover that...
Which one do you like?
A user calls about their workstation not powering on in the morning....
A company would like to increase the security on their company's smart...
What do third-party apps such as Find iPhone rely on?
A user launches an application on an Android device. Once...
Your organization is concerned about a scenario where a mobile device...
You have been tasked with diagnosing a laptop that is...
You previously installed a new application for a customer that...
You are installing Windows 7 to a PC with a RAID card. All cables...
 When configuring a Wi-Fi connection what step occurs after...
Which of the following connections requires a username, password, and...
What is the best way of maintaining data security for a mobile...
Which of the following should be performed regularly in order to help...
Which of the following are valid Wi-Fi troubleshooting methods?...
You are concerned with the possibility of jailbreaks on your...
An application won't close on an Android smartphone. You've tried to...
One of your customers has set up a perimeter firewall and...
3. A customer experiences a server crash. When you arrive, themanager...
 A user is having difficulty tapping on icons. What should you do...
Alert!

Advertisement