CompTIA A+ Testing Centre-paper2

90 Questions | Total Attempts: 54

SettingsSettingsSettings
CompTIA  A+  Testing Centre-paper2 - Quiz

.


Questions and Answers
  • 1. 
    Which of the following can aid a mobile user in finding the nearest coffee shop?(Select the best answer.)
    • A. 

      Geotracking

    • B. 

      IOS

    • C. 

      GPS

    • D. 

      GSM

  • 2. 
    A user wants to stop his tablet from shifting horizontally when he turns it. Whichof the following should you enable?
    • A. 

      Lock Rotation

    • B. 

      Accelerometer

    • C. 

      Gyroscope

    • D. 

      Screen Calibration

  • 3. 
    What kind of display would an iPad2 use?
    • A. 

      CRT

    • B. 

      Multitouch

    • C. 

      Tap screen

    • D. 

      Singletouch

  • 4. 
     A user is having difficulty tapping on icons. What should you do to help theuser? (Select the two best answers.)
    • A. 

      Clean the display.

    • B. 

      Tap the Home button

    • C. 

      Install a screen protector.

    • D. 

      Initiate a soft reset.

    • E. 

      Initiate a hard reset.

  • 5. 
    What are two common operating systems used by mobile devices? (Select thetwo best answers.)
    • A. 

      Blueberry OS

    • B. 

      IOS

    • C. 

      Google OS

    • D. 

      Android OS

  • 6. 
    What type of CPU do mobile devices use?
    • A. 

      Core i7

    • B. 

      Phenom II

    • C. 

      ARM

    • D. 

      Pentium

  • 7. 
    Which OS is considered to be closed-source?
    • A. 

      Android OS

    • B. 

      Bluetooth

    • C. 

      Linux

    • D. 

      IOS

  • 8. 
    What are a couple of differences between a tablet computer and a laptop?(Select the two best answers.)
    • A. 

      Tablets have little or no field serviceable parts.

    • B. 

      Tablets are upgradeable.

    • C. 

      Laptops don’t use touch screens.

    • D. 

      Tablets use flash memory as the hard drive.

    • E. 

      Tablets use RAM.

  • 9. 
    Which of the following are valid Wi-Fi troubleshooting methods? (Select the twobest answers.)
    • A. 

      Power cycle the device.

    • B. 

      Restart Bluetooth.

    • C. 

      Use a static IP.

    • D. 

      Make sure the device is within range.

    • E. 

      Rename the SSID.

  • 10. 
    Which of the following connections requires a username, password, and SMTPserver? (Select the two best answers.)
    • A. 

      Bluetooth connection

    • B. 

      Wi-Fi connection

    • C. 

      POP3 connection

    • D. 

      Exchange connection

    • E. 

      IMAP connection

  • 11. 
    What is the most common connection method when synchronizing data from amobile device to a PC?
    • A. 

      Wi-Fi

    • B. 

      Bluetooth

    • C. 

      USB

    • D. 

      FireWire

  • 12. 
     When configuring a Wi-Fi connection what step occurs after successfully enteringthe SSID?
    • A. 

      Select POP3.

    • B. 

      Check if the device is within range of the WAP.

    • C. 

      Enter a passcode for the network.

    • D. 

      Scan for networks.

  • 13. 
    Which technology would you use if you want to connect a headset to yourmobile phone?
    • A. 

      Bluetooth

    • B. 

      GSM

    • C. 

      Wi-Fi

    • D. 

      Exchange

  • 14. 
    Which of the following allows other mobile devices to share your mobile device’sInternet connection?
    • A. 

      Internet pass-through

    • B. 

      Locator application

    • C. 

      IMAP

    • D. 

      Wi-Fi tethering

  • 15. 
    What would a user need to synchronize contacts from an iPad to a PC?
    • A. 

      Android Synchronization Application

    • B. 

      Google Play

    • C. 

      ITunes

    • D. 

      ActiveSync

  • 16. 
    You want to prevent a person from accessing your phone while you step awayfrom your desk. What should you do?
    • A. 

      Implement remote backup

    • B. 

      Set up a remote wipe program

    • C. 

      Configure a screen lock.

    • D. 

      Install a locator application.

  • 17. 
    What does the iOS Simple Passcode allow a person to enter?
    • A. 

      4-letter code

    • B. 

      6-number PIN

    • C. 

      4-digit passcode

    • D. 

      Alpha-numeric passcode

  • 18. 
    What do third-party apps such as Find iPhone rely on?
    • A. 

      Passcode

    • B. 

      Google Apps Device Policy

    • C. 

      Bluetooth

    • D. 

      GPS

  • 19. 
    Which of the following can be described as removing limitations on iOS?
    • A. 

      Rooting

    • B. 

      Jailbreaking

    • C. 

      Geotracking

    • D. 

      AV software

  • 20. 
    An application won’t close on an Android smartphone. You’ve tried to ForceStop it to no avail. What should you do?
    • A. 

      Hard reset the device.

    • B. 

      Stop the service in Running Services.

    • C. 

      Soft reset the device.

    • D. 

      Bring the device to an authorized service center.

  • 21. 
    Your organization is concerned about a scenario where a mobile device withconfidential data is stolen. What should you recommend first? (Select the bestanswer.)
    • A. 

      Remote backup application

    • B. 

      Remote wipe program

    • C. 

      Passcode locks

    • D. 

      Locator application

  • 22. 
    You are concerned with the possibility of jailbreaks on your organization’siPhones, and viruses on the Android-based devices. What should you implement?
    • A. 

      AV software

    • B. 

      Firewall

    • C. 

      Mobile Device Management

    • D. 

      Device reset

  • 23. 
    Which of the following application stores are compatible with iOS? 
    • A. 

      Android Market

    • B. 

      Windows Marketplace

    • C. 

      App Store

    • D. 

      Amazon Appstore

  • 24. 
    A company would like to increase the security on their company’s smart phones. Which of the following should be configured to ensure information stored on a smart phone can be removed if it is lost or stolen? 
    • A. 

      Username and passwords

    • B. 

      Remote wipe

    • C. 

      Strong password complexity

    • D. 

      Failed login attempts restrictions

  • 25. 
    Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS? 
    • A. 

      /A

    • B. 

      /C

    • C. 

      /H

    • D. 

      /E

Back to Top Back to top