CompTIA A+ Testing Centre-paper2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Maganoor
M
Maganoor
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,908
| Attempts: 70
SettingsSettings
Please wait...
  • 1/90 Questions

    1. While you are working on a computer at a customer’s home, theCustomer informs you that he needs to leave for about 10 minutesand that his 8-year-old son can help you with anything if you needit. What should you do? 

    • Tell the customer to get back home as soon as possible.
    • Tell the customer that you are not responsible for the child.
    • Tell the customer that an adult must be home while you work.
    • Tell the customer that the child must be removed.
Please wait...
About This Quiz

This CompTia A+ Testing Centre-paper2 quiz assesses knowledge on mobile device functionalities, such as GPS usage, display settings, and system configurations. It's designed for individuals preparing for A+ certification, focusing on practical skills and troubleshooting.

CompTIA  A+  Testing Centre-paper2 - Quiz

Quiz Preview

  • 2. 

    4. As you are servicing a manager’s PC at your company, you runacross a list of names of employees who are supposedly aboutto be let go from the company. Some of these people are coworkers.What should you do? 

    • Turn the sheet over

    • Act as if you never saw the list.

    • In secret, tell everyone who was on the list.

    • Yell at the manager for having that list out.

    Correct Answer
    A. Act as if you never saw the list.
    Explanation
    It is important to act professionally and maintain confidentiality in such situations. Sharing or discussing the list with others could lead to unnecessary panic and anxiety among the employees. It is best to ignore the list and not disclose any information to anyone.

    Rate this question:

  • 3. 

    What are two common operating systems used by mobile devices? (Select thetwo best answers.)

    • Blueberry OS

    • IOS

    • Google OS

    • Android OS

    Correct Answer(s)
    A. IOS
    A. Android OS
    Explanation
    Choose 2 compulsary 2 answers

    Rate this question:

  • 4. 

    A user wishes to secure their tablet from unauthorized access. The BEST option is to:? 

    • Enable RFID authentication

    • Establish a remote wipe policy

    • Setup a strong passcode

    • Establish strong email passwords.

    Correct Answer
    A. Setup a strong passcode
    Explanation
    Setting up a strong passcode is the best option for securing a tablet from unauthorized access. A strong passcode is a combination of letters, numbers, and special characters that makes it difficult for others to guess or crack. This provides an extra layer of security to prevent unauthorized users from accessing the tablet and its contents. Enabling RFID authentication, establishing a remote wipe policy, and setting up strong email passwords are also important security measures, but setting up a strong passcode is specifically mentioned as the BEST option.

    Rate this question:

  • 5. 

    Of the following, which represent security vulnerabilities to mobile devices? (Select the two best answers.)  

    • Viruses

    • Improper file permissions

    • Phishing

    • Theft

    • Unauthorized downloads

    Correct Answer(s)
    A. Viruses
    A. Theft
    Explanation
    The correct answer is Viruses and Theft. Viruses can infect mobile devices and compromise their security, leading to data loss or unauthorized access. Theft of mobile devices can also result in security vulnerabilities as the thief may gain access to sensitive information stored on the device. Improper file permissions, phishing, and unauthorized downloads can also pose security risks, but they are not mentioned in the correct answer.

    Rate this question:

  • 6. 

    You are tasked with fixing a computer that is overheating after 30 minutes of use. What is the most likely cause?  

    • ACPI is disabled

    • Incorrect input voltage settings

    • Internal dust buildup

    • Clogged temporary folders

    Correct Answer
    A. Internal dust buildup
    Explanation
    The most likely listed cause is internal dust buildup, especially if
    the buildup is within the CPU fan. If the fan has too much dust and dirt, it will
    stop spinning at the right speed, thus reducing its effective cooling ability,
    and causing the CPU to overheat, shutting down the system. ACPI is the
    Advanced Configuration and Power Interface, used by operating systems for configuration and management of power to the system. This can be disabled in the BIOS on some systems, but isn't recommended. Regardless, the older APM (Advanced Power Management) should take over if it is. "Incorrect input
    voltage settings" is somewhat vague. Incorrect CPU voltage settings could cause the system to overheat—for example, if it was overclocked—but it is
    more likely that there is dust and debris in one of the fans. Temporary
    folders are folders in Windows. You can have as much data as you want in
    your Windows folders; it shouldn't cause the system to overheat

    Rate this question:

  • 7. 

    Which of the following has compatibility with the widest range of operating systems?  

    • FAT16

    • FAT32

    • CDFS

    • N T FS

    Correct Answer
    A. FAT32
    Explanation
    FAT32 has compatibility with the widest range of operating systems compared to the other options. FAT16 is an older file system that is not as widely supported, while CDFS is a file system specifically designed for CDs and DVDs. NTFS, on the other hand, is a file system used primarily in Windows operating systems and is not compatible with other operating systems such as macOS or Linux. Therefore, FAT32 is the correct answer as it can be used on a variety of operating systems including Windows, macOS, and Linux.

    Rate this question:

  • 8. 

    A user tells you that a PC shuts down after working for only 10 minutes. When you move the PC, you hear loose parts sliding around the case. What is the most likely reason for the PC shutting down? A. B.  C.  D. 

    • A memory module has become unseated.

    • The heat sink retaining clip has broken loose.

    • The CMOS battery needs to be replaced.

    • A hard drive cable was disconnected.

    Correct Answer
    A. The heat sink retaining clip has broken loose.
    Explanation
    The most likely reason for the PC shutting down after working for only 10 minutes is that the heat sink retaining clip has broken loose. This can cause the CPU to overheat quickly, leading to a shutdown to prevent damage. The loose parts sliding around the case indicate that the heat sink is not properly secured, causing inadequate heat dissipation.

    Rate this question:

  • 9. 

    5. While you are working at a customer site, a friend calls you on your cell phone. What should you do?  

    • Ignore the call for now.

    • Go outside and take the call.

    • Answer the phone as quietly as possible

    • Text your friend

    Correct Answer
    A. Ignore the call for now.
    Explanation
    When working at a customer site, it is important to prioritize the task at hand and maintain professionalism. Answering a personal call can be seen as unprofessional and may distract from the work. Ignoring the call for now is the best option as it allows you to focus on the customer and complete your tasks efficiently.

    Rate this question:

  • 10. 

    7. You are running some cable from an office to a computer located in a warehouse. As you are working in the warehouse, a 55-gallon drum falls from a pallet and spills what smells like ammonia. What should you do first? 

    • Call 911

    • Call the building supervisor

    • Get out of the area

    • Save the computer

    Correct Answer
    A. Get out of the area
    Explanation
    If there is something that is immediately hazardous to you, you must leave the area right away. Afterward, you can call 911, the building supervisor, or your manager, depending on the severity of the situation. Computers and all other technology come second after human life. Remember that. Plus, if backup systems have been implemented properly, you have nothing to lose if a computer is damaged.

    Rate this question:

  • 11. 

    Which of the following can aid a mobile user in finding the nearest coffee shop?(Select the best answer.)

    • Geotracking

    • IOS

    • GPS

    • GSM

    Correct Answer
    A. GPS
    Explanation
    GPS: global positioning system(a system by which signals are sent from satellites to a special device, used to show the position of a person or thing on the surface of the earth very accurately) : GSM : Global System For Mobile Communication : iOS : iPhone Operating System

    Rate this question:

  • 12. 

    What would a user need to synchronize contacts from an iPad to a PC?

    • Android Synchronization Application

    • Google Play

    • ITunes

    • ActiveSync

    Correct Answer
    A. ITunes
    Explanation
    PC users need iTunes to synchronize contacts and other data from an iPad to
    a PC. There are many Android sync programs, but they do not work on Apple
    devices. Google Play is a place to get applications and other items. ActiveSync
    is the older Microsoft sync program used to synchronize Windows CE and
    Mobile to PCs.

    Rate this question:

  • 13. 

    Which of the following application stores are compatible with iOS? 

    • Android Market

    • Windows Marketplace

    • App Store

    • Amazon Appstore

    Correct Answer
    A. App Store
    Explanation
    The App Store is compatible with iOS because it is the official application store for Apple devices, including iPhones, iPads, and iPods. It is where users can download and install apps specifically designed for iOS operating system. The other options mentioned, such as Android Market and Windows Marketplace, are not compatible with iOS as they are designed for Android and Windows devices respectively. Amazon Appstore, though available on iOS, is not the primary application store for iOS devices.

    Rate this question:

  • 14. 

    Which of the following OSes supports full usage of 8 GB of RAM?  

    • Windows XP Professional

    • Windows Vista Home Premium x86

    • Windows 7 Professional x86

    • Windows 7 Home Premium x64

    Correct Answer
    A. Windows 7 Home Premium x64
    Explanation
    Windows 7 Home Premium x64 supports full usage of 8 GB of RAM because it is a 64-bit operating system. 64-bit operating systems can utilize more RAM compared to 32-bit operating systems, which have a RAM limit of around 4 GB. Therefore, Windows 7 Home Premium x64 is able to fully utilize the 8 GB of RAM.

    Rate this question:

  • 15. 

    What is an advantage of a PC-hosted virtual machine?  

    • It reduces the amount of physical hardware required.

    • It reduces the amount of CPU required on the host PC. C. It reduces the amount of RAM

    • Required on the host PC.

    • It reduces the amount of training required for employees.

    Correct Answer
    A. It reduces the amount of physical hardware required.
    Explanation
    A PC-hosted virtual machine allows multiple virtual machines to run on a single physical PC, reducing the need for additional hardware. This means that instead of purchasing separate physical machines for different tasks or operating systems, a single PC can be used to host multiple virtual machines, saving costs and space. This advantage is particularly beneficial for businesses or organizations that need to run multiple operating systems or applications simultaneously.

    Rate this question:

  • 16. 

    You have been tasked with limiting computer access to certain users. Which of the following should you configure?  

    • System Configuration

    • Local Security Policy

    • Boot.ini file

    • Advanced Security

    Correct Answer
    A. Local Security Policy
    Explanation
    To limit computer access to certain users, you should configure the Local Security Policy. This policy allows you to define various security settings and restrictions for individual users or groups on a local computer. By configuring the Local Security Policy, you can control user rights, password policies, account lockouts, audit policies, and other security-related settings. This ensures that only authorized users have access to the computer and its resources, enhancing overall system security.

    Rate this question:

  • 17. 

    Newer smartphones have a feature that enables their data to be backed up to a remote location. What is this known as?  

    • ICloud

    • iOS

    • App Market

    • Google Play

    Correct Answer
    A. ICloud
    Explanation
    Newer smartphones have a feature called iCloud that enables their data to be backed up to a remote location. iCloud is a cloud storage and cloud computing service provided by Apple Inc. It allows users to store their photos, videos, documents, and other data on remote servers and access them from any device. This feature ensures that users can easily restore their data if their smartphone is lost, damaged, or replaced.

    Rate this question:

  • 18. 

    Which Windows 7 command can stop a single process from the command-line?   

    • Taskkill

    • Shutdown

    • Tasklist

    • DEL

    Correct Answer
    A. Taskkill
    Explanation
    Taskkill is the correct answer because it is a Windows 7 command that can be used to stop a single process from the command-line. Taskkill allows users to terminate a process by specifying its process ID or process name. This command is useful for managing running processes and can be used to forcefully end a process that is unresponsive or causing issues.

    Rate this question:

  • 19. 

    You need to secure only physically unused network ports on a switch. What should you do?  

    • Disable DNS on the network

    • Use DHCP addressing on the network

    • Power down the router when it is not being used

    • Disable the ports in the firmware

    Correct Answer
    A. Disable the ports in the firmware
    Explanation
    To secure physically unused network ports on a switch, the best approach is to disable the ports in the firmware. This means that the ports will be deactivated and inaccessible, preventing any unauthorized access or potential security breaches. Disabling DNS or using DHCP addressing on the network are not directly related to securing unused network ports. Similarly, powering down the router when not in use does not specifically address the issue of securing unused ports. Therefore, the most effective solution is to disable the ports in the firmware.

    Rate this question:

  • 20. 

    When placing a mobile device into airplane mode, which of the following features are typically disabled? (Select the two best answers.)   

    • Wireless

    • Cellular data

    • Multi-touch ability

    • Data encryption

    Correct Answer(s)
    A. Wireless
    A. Cellular data
    Explanation
    When placing a mobile device into airplane mode, the wireless and cellular data features are typically disabled. This is because airplane mode is designed to restrict the device's ability to connect to any wireless networks or use cellular data services. By disabling these features, the device ensures compliance with airline regulations and prevents any potential interference with aircraft communication systems.

    Rate this question:

  • 21. 

    You are having issues booting a newly built PC. You notice the following jumper configurations on each IDE device: - Hard drive: Master - Optical drive: Cable Select Which of the following jumper configuration should you modify this to?  

    • HD: Slave, Optical Drive: Slave

    • HD: Cable Select, Optical drive: Master

    • HD: Cable Select, Optical drive: Cable Select

    • HD: Master, Optical drive: Master

    Correct Answer
    A. HD: Cable Select, Optical drive: Cable Select
    Explanation
    The correct answer is to modify the jumper configuration to HD: Cable Select, Optical drive: Cable Select. This is because both devices are currently set to different configurations, which can cause conflicts and prevent the PC from booting properly. By setting both devices to Cable Select, the system will automatically determine the appropriate configuration for each device based on their placement on the IDE cable.

    Rate this question:

  • 22. 

    What is the most common connection method when synchronizing data from amobile device to a PC?

    • Wi-Fi

    • Bluetooth

    • USB

    • FireWire

    Correct Answer
    A. USB
    Explanation
    The most common connection method when synchronizing data from a mobile device to a PC is USB. USB (Universal Serial Bus) cables are widely used to connect mobile devices like smartphones and tablets to computers for data transfer and synchronization. USB connections offer a fast and reliable way to transfer files, backup data, and perform other tasks between the mobile device and the PC.

    Rate this question:

  • 23. 

    Which technology would you use if you want to connect a headset to yourmobile phone?

    • Bluetooth

    • GSM

    • Wi-Fi

    • Exchange

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the correct answer because it is a wireless technology that allows for short-range communication between devices. It is commonly used for connecting peripherals such as headsets to mobile phones. GSM is a mobile network technology, Wi-Fi is a wireless networking technology, and Exchange is a messaging and collaboration server software.

    Rate this question:

  • 24. 

    Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS? 

    • /A

    • /C

    • /H

    • /E

    Correct Answer
    A. /C
    Explanation
    The correct answer is /C. This command line option is used to perform disk defragmentation on all volumes in Windows OS. This means that it will defragment all the drives and partitions present in the system, ensuring that the files are organized and stored contiguously on the disk for improved performance.

    Rate this question:

  • 25. 

    A technician just finished removing spyware from a computer and now they are not able to connect to any websites. Which of the following is the MOST likely cause? 

    • Automatic configuration

    • Network card driver is damaged

    • Proxy settings

    • The Internet is not functioning

    Correct Answer
    A. Proxy settings
    Explanation
    The most likely cause for the technician not being able to connect to any websites after removing spyware from the computer is the proxy settings. Spyware often modifies the proxy settings on a computer to redirect internet traffic, and when the spyware is removed, the proxy settings may not be restored to their original state, causing connectivity issues.

    Rate this question:

  • 26. 

    A laser printer is producing completely blank sheets. What process should you check first?  

    • Fusing

    • Paper handling

    • Transfer

    • Development

    Correct Answer
    A. Development
    Explanation
    The development process should be checked first when a laser printer is producing completely blank sheets. The development process is responsible for transferring toner onto the paper, so if this process is not functioning properly, no toner will be deposited on the paper, resulting in blank sheets.

    Rate this question:

  • 27. 

    6. You spill an unknown chemical on your hands. What should you do? 

    • Call 911

    • Call the building supervisor

    • Consult the MSDS for the chemical

    • Ignore it

    Correct Answer
    A. Consult the MSDS for the chemical
    Explanation
    If it is not life-threatening, consult the material safety data sheet (MSDS) to determine the proper first aid (if any). If it is an emergency, call 911. If you cannot get access to the MSDS, contact the facilities department of your organization or try your building supervisor. Never ignore an unknown chemical. Take action before it becomes a problem

    Rate this question:

  • 28. 

    Which OS is considered to be closed-source?

    • Android OS

    • Bluetooth

    • Linux

    • IOS

    Correct Answer
    A. IOS
    Explanation
    iOS is considered to be closed-source because Apple does not release the source code to the public. This means that only Apple can modify and distribute the operating system. Users are not allowed to view or modify the source code, limiting customization and development options.

    Rate this question:

  • 29. 

    When setting up a Microsoft Exchange mail account to synchronize with an iPhone, which of the following items can be configured to synchronize besides e-mail? (Select the two best answers.)  

    • Shared calendars

    • Archives

    • Global address list

    • Calendar

    • Address book

    Correct Answer(s)
    A. Calendar
    A. Address book
    Explanation
    When setting up a Microsoft Exchange mail account to synchronize with an iPhone, two items that can be configured to synchronize besides email are the calendar and the address book. This means that the user will be able to access and update their calendar events and contacts from their iPhone, ensuring that all their important scheduling and contact information is synchronized across devices.

    Rate this question:

  • 30. 

    Which CP utility is best used to remove a Windows 7 application?   

    • Add/Remove Programs

    • Administrator Tools

    • Folder Options

    • Programs and Features

    Correct Answer
    A. Programs and Features
    Explanation
    Programs and Features is the correct answer because it is a utility in Control Panel that allows users to view and uninstall programs installed on their Windows 7 computer. It provides a list of all installed applications, making it easy for users to locate and remove the specific application they want to uninstall.

    Rate this question:

  • 31. 

    In a SOHO wireless network, what prevents unauthorized users from accessing confidential data?  

    • Enable MAC filtering

    • Change the SSID name

    • Set encryption

    • Reduce broadcast power

    Correct Answer
    A. Set encryption
    Explanation
    Setting encryption in a SOHO wireless network prevents unauthorized users from accessing confidential data because it ensures that the data transmitted over the network is encrypted and can only be decrypted by authorized devices with the correct encryption key. This adds a layer of security to the network and prevents unauthorized users from intercepting and accessing the confidential data.

    Rate this question:

  • 32. 

    39.     Which type of user account should be disabled in order to adhere to security best practices?  

    • Guest

    • Administrator

    • Standard user

    • Power user

    Correct Answer
    A. Guest
    Explanation
    Disabling the Guest user account is recommended in order to adhere to security best practices. The Guest account is typically used for temporary access and does not require a password to log in, making it more vulnerable to unauthorized access. By disabling the Guest account, potential security risks can be minimized as it reduces the chances of unauthorized users gaining access to the system.

    Rate this question:

  • 33. 

    One of your customers reports that all print jobs sent to a certain printer that require legal-size paper are not printing. However, standard size paper jobs are printing correctly. You check the paper tray and verify that it is loaded with legal-size paper. What is the most likely cause of the problem?  

    • The print queue is holding jobs from printing. B. The paperweight is too heavy for the printer

    • The print queue is holding jobs from printing

    • The paper size for the tray is incorrect in the printer setup

    • The printer is not designed to print legal-size pages.

    Correct Answer
    A. The paper size for the tray is incorrect in the printer setup
    Explanation
    The most likely cause of the problem is that the paper size for the tray is incorrect in the printer setup. This means that the printer is not configured to recognize and print legal-size paper, which is why all print jobs requiring legal-size paper are not printing.

    Rate this question:

  • 34. 

    You have been tasked with resolving a shadowy image that is being printed from a network printer. What should you do?   

    • Replace the drum

    • Replace the fuser

    • Run a calibration

    • Replace the network cable

    Correct Answer
    A. Replace the drum
    Explanation
    Replacing the drum is the correct answer because a shadowy image is likely caused by a worn-out or damaged drum in the printer. The drum is responsible for transferring the toner onto the paper, and if it is not functioning properly, it can result in poor print quality with shadows or smudges. Therefore, replacing the drum should resolve the issue and improve the print quality.

    Rate this question:

  • 35. 

    A customer calls and reports that when they walk away from their laptop for an extended period of time they have to reconnect to wireless when they get back. Which of the following will most likely correct this issue?   

    • Replace the wireless card

    • Install a higher capacity battery

    • Adjusts power settings

    • Disable screensaver

    Correct Answer
    A. Adjusts power settings
    Explanation
    Adjusting power settings is the most likely solution to the issue described by the customer. When a laptop is left idle for a long time, it may enter a power-saving mode that can disconnect the wireless connection. By adjusting the power settings, the laptop can be configured to maintain a stable wireless connection even during periods of inactivity. This will prevent the need for the customer to constantly reconnect to the wireless network when they return to their laptop after an extended period of time.

    Rate this question:

  • 36. 

    You attempt to install a legacy application on a computer running Windows 7. You receive an error that says the application cannot be installed because the OS is not supported. What should you do first to continue to try installing the application? A. Install the latest SP B. Install the application in safe mode C. Install the application in compatibility mode D. Install the latest security updates

    • Install the latest SP

    • Install the application in safe mode

    • Install the application in compatibility mode

    • Install the latest security updates

    Correct Answer
    A. Install the application in compatibility mode
    Explanation
    To continue trying to install the legacy application on a Windows 7 computer, the first step should be to install the application in compatibility mode. This mode allows older applications to run on newer operating systems by emulating the environment they were originally designed for. By installing the application in compatibility mode, it may be possible to bypass the error message stating that the OS is not supported and successfully install the application.

    Rate this question:

  • 37. 

    A user wants to stop his tablet from shifting horizontally when he turns it. Whichof the following should you enable?

    • Lock Rotation

    • Accelerometer

    • Gyroscope

    • Screen Calibration

    Correct Answer
    A. Lock Rotation
    Explanation
    Enable Lock Rotation on Apple devices. On Android devices disable Autorotate.
    The Accelerometer is a term used by Apple to describe the
    hardware/software that controls the three axes of movement. The Gyroscope is
    another term used by Apple to describe the device that measures the additional
    three movements (pitch, roll, and yaw) of newer Apple devices. Screen calibration
    is used to reset the device that measures the three axes

    Rate this question:

  • 38. 

    Which of the following allows other mobile devices to share your mobile device’sInternet connection?

    • Internet pass-through

    • Locator application

    • IMAP

    • Wi-Fi tethering

    Correct Answer
    A. Wi-Fi tethering
    Explanation
    IMAP: Internet Message Access Protocol (IMAP) is a communications protocol for email retrieval and storage developed by Mark Crispin in 1986 at Stanford University . Wify tehtering : Wi-Fi tethering allows a mobile device to share its Internet connection with
    other Wi-Fi capable devices. Internet pass-through is when the mobile device
    connects to a PC to share the PC’s Internet connection. Locator applications are
    used to find lost or stolen mobile devices through GPS. IMAP is another e-mail
    protocol similar to POP3.

    Rate this question:

  • 39. 

    Which of the following can allow a hidden backdoor to be used by remote workstations on the Internet?  

    • XS S

    • Rootkit

    • Firmware

    • SQL injection

    Correct Answer
    A. Rootkit
    Explanation
    Rootkits are used to gain privileged
    access to the computer, perhaps with a hidden backdoor. A remote access
    Trojan (RAT) might be used to access the backdoor, which then uses the
    rootkit code to gain that privileged access. XSS stands for cross-site
    scripting, a vulnerability in web applications. Hidden backdoors are usually
    found in software (operating systems or applications), not in firmware
    (BIOS). SQL injection is another type of attack on websites that uses code to extract confidential information from website databases.

    Rate this question:

  • 40. 

    Which of the following enables a user to reset their password with a series of security questions that only the user should know?  

    • Permission propagation

    • Administration

    • Verification

    • Authentication

    Correct Answer
    A. Authentication
    Explanation
    Authentication enables a user to reset their password with a
    series of security questions that only the user should know. An example of
    verification would be if you logged in to a bank with your username (or
    account number) and password, are authenticated, and are then asked to
    type in a code, known as a verification code. Permission propagation is when NTFS rights (permissions) are automatically copied from the parent folder to
    a subfolder. The subfolder inherits the permissions when they are propagated
    from the parent. Administration could mean many things, but one example would be when an administrator sets a policy where a user needs to type a verification code after logging in.

    Rate this question:

  • 41. 

    One of your customers tells you that the computer screen is flickering at a rapid rate. Which Control Panel path should you use to fix the problem?   

    • Display > Settings > Resolution

    • Display > Settings > Advanced > General > DPI

    • Display > Appearance > Effects > Transition

    • Display > Settings > Advanced > Adapter > Refresh

    Correct Answer
    A. Display > Settings > Advanced > Adapter > Refresh
    Explanation
    To fix the problem of a flickering computer screen, you should navigate to the Control Panel path: Display > Settings > Advanced > Adapter > Refresh. By adjusting the refresh rate of the display adapter, you can resolve the issue of flickering.

    Rate this question:

  • 42. 

    When dealing with Bluetooth, what best describes the purpose of discovery mode?   

    • Disconnects all devices and connects the closest powered on device

    • Allows a peripheral to be contacted by the mobile device

    • Instructs the phone to seek out all nearby devices and connect to them

    • Allows two Bluetooth devices to connect to each other without a mobile device

    Correct Answer
    A. Allows a peripheral to be contacted by the mobile device
    Explanation
    Discovery mode in Bluetooth allows a peripheral device to be contacted by a mobile device. When a peripheral device is in discovery mode, it broadcasts its availability to nearby devices, allowing them to establish a connection. This enables the mobile device to detect and connect to the peripheral device, facilitating communication and interaction between the two devices.

    Rate this question:

  • 43. 

    You are taking apart a laptop to replace an internal part. Which of the following is an example of a best practice?   

    • Never use a power tool to remove screws from the case

    • Only perform the work on a plastic counter top

    • When working on the bottom of a laptop, always leave the screen open

    • Label the screws according to where they came from

    Correct Answer
    A. Label the screws according to where they came from
    Explanation
    Labeling the screws according to where they came from is an example of a best practice when taking apart a laptop to replace an internal part. This practice helps ensure that the screws are correctly reinstalled in their original positions, preventing any damage or misalignment during reassembly. By labeling the screws, it becomes easier to identify which screw goes where, saving time and reducing the risk of errors.

    Rate this question:

  • 44. 

    A customer reports to you that a file shared on their computer for another user is not accessible to that third party. The customer says that the third party was given Allow rights for Read and Write access to the file. What could be a possible reason that the third party cannot access the file?  

    • The parent folder has explicit Allow rights set for the third- party user.

    • The parent folder has explicit Deny rights set for the third- party user

    • The user forgot to share the parent folder and only shared the specific file

    • The parent folder likely has the archive attribute enabled

    Correct Answer
    A. The parent folder has explicit Deny rights set for the third- party user
    Explanation
    The possible reason that the third party cannot access the file is that the parent folder has explicit Deny rights set for the third-party user. This means that even though the user was given Allow rights for Read and Write access to the file, the Deny rights set at the parent folder level override those permissions and prevent the third party from accessing the file.

    Rate this question:

  • 45. 

    You are configuring a friend's iPad. The user needs to access his work e-mail. In order to do this, you require information from the friend's IT department. What information should you ask for?  

    • Server and gateway

    • IP address and domain

    • IP address and DNS

    • Server and domain

    Correct Answer
    A. Server and domain
    Explanation
    To configure the friend's iPad to access his work email, you would need to ask for the server and domain information from the IT department. The server information is necessary to establish a connection with the email server, while the domain information is required to correctly identify and authenticate the user's email account within the organization's network.

    Rate this question:

  • 46. 

    You are investigating an "NTLDR is missing" error message on a Windows XP computer. What command can possibly resolve the problem?   

    • CHKDSK

    • DEFRAG

    • SCANDISK

    • FIXBOOT

    Correct Answer
    A. FIXBOOT
    Explanation
    The "NTLDR is missing" error message on a Windows XP computer indicates that the boot loader file is not found or corrupted. The FIXBOOT command is used to repair or create a new boot sector on the system partition, which can help resolve this issue. It replaces the existing boot sector with a new one, allowing the computer to boot up properly.

    Rate this question:

  • 47. 

    You are asked to fix a problem with a customer’s domaincontroller that is outside the scope of your knowledge. Whataction should you take? 

    • Learn on the job by trying to fix the problem

    • Tell the customer that the problem should be reported to another technician

    • Assure the customer that the problem will be fixed very soon

    • Help the customer find the appropriate channels to fix the problem

    Correct Answer
    A. Help the customer find the appropriate channels to fix the problem
    Explanation
    When faced with a problem that is outside of your knowledge or expertise, it is important to be honest with the customer and not attempt to fix it yourself. Instead, the best course of action is to help the customer find the appropriate channels or resources to address and resolve the problem. This ensures that the issue is handled by someone with the necessary knowledge and skills, and avoids any potential mistakes or further complications that could arise from attempting to fix the problem without the proper expertise.

    Rate this question:

  • 48. 

    A computer has been infected with multiple viruses and spyware. What should you do first before the removal of this malware? 

    • Disable system restore

    • Disable network cards

    • Run Windows Update

    • Run the CHKDSK /R command

    Correct Answer
    A. Disable system restore
    Explanation
    Disabling system restore is the first step that should be taken before removing malware from a computer. System restore points can contain infected files, and if system restore is enabled, the malware can easily re-infect the computer after removal. Disabling system restore ensures that the infected files are not saved in the restore points and prevents the malware from returning.

    Rate this question:

  • 49. 

    A customer's laptop has failed, but appears that the hard drive is still functioning. What is the best way for the user to still access and edit all of his data?  

    • USB hard drive enclosure

    • Copy the data to a USB flash drive

    • Burn the data to DVDs

    • Use a SCSI to USB adapter

    Correct Answer
    A. USB hard drive enclosure
    Explanation
    The best way for the user to still access and edit all of his data is by using a USB hard drive enclosure. This allows the user to connect the functioning hard drive to another computer via a USB connection, effectively turning it into an external hard drive. This way, the user can access and edit all of his data as if it were still on his laptop's hard drive.

    Rate this question:

Quiz Review Timeline (Updated): Jun 26, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 26, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 30, 2015
    Quiz Created by
    Maganoor
Back to Top Back to top
Advertisement