CompTIA Advanced Final

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lauralew
L
Lauralew
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,558
Questions: 36 | Attempts: 463

SettingsSettingsSettings
CompTIA Quizzes & Trivia

Final exam


Questions and Answers
  • 1. 

    What provides the illuminattion for LCD monitors?

    • A.

      Inverters

    • B.

      LCD panel

    • C.

      Backlights

    • D.

      Lamp

    Correct Answer
    C. Backlights
    Explanation
    Backlights provide the illumination for LCD monitors. LCD panels themselves do not emit light, so they require a separate light source to display images. Backlights are typically placed behind the LCD panel and provide uniform illumination across the screen, allowing the liquid crystals in the panel to manipulate the light and create the images that we see. Inverters are used to control the brightness of the backlights, while lamps are a type of backlight technology.

    Rate this question:

  • 2. 

    What is the function of the RAMDAC?

    • A.

      To convert analog signals into digital signals

    • B.

      To convert digital signals into analog signals

    • C.

      To provide an interface between the RAM and video memory

    • D.

      To allow legacy video cards to work with modern systems

    Correct Answer
    B. To convert digital signals into analog signals
    Explanation
    The function of the RAMDAC is to convert digital signals into analog signals. This is an important process in computer graphics as it allows digital images and data stored in the computer's memory to be displayed on analog monitors or other display devices that require analog signals. By converting the digital signals into analog signals, the RAMDAC enables the computer to communicate with and display information on devices that are not compatible with digital signals.

    Rate this question:

  • 3. 

    Which of these is the most recent type of video card expansion slot to be introduced?

    • A.

      AGP

    • B.

      PCI

    • C.

      PCIe

    • D.

      SEC

    Correct Answer
    C. PCIe
    Explanation
    PCIe, also known as PCI Express, is the most recent type of video card expansion slot to be introduced. It was developed to replace the older AGP and PCI slots. PCIe offers higher bandwidth and faster data transfer speeds, allowing for better performance and more advanced graphics capabilities. It has become the standard for modern video card connections and is widely used in current computer systems.

    Rate this question:

  • 4. 

    Where can you go to update the driver for your video card?

    • A.

      Open the Display applet in Control Panel, click the Adapter tab, and then click the Driver button

    • B.

      Find your display adapter under Device Manager, double-click to open its properties dialog box, and then click the Driver tab

    • C.

      In Control Panel, doubleclick the Add Hardware applet and then select your video card from the list of installed devices

    • D.

      Select Start > All Programs > Windows Update

    Correct Answer
    B. Find your display adapter under Device Manager, double-click to open its properties dialog box, and then click the Driver tab
    Explanation
    To update the driver for your video card, you should find your display adapter under Device Manager. Double-click on it to open its properties dialog box, and then click on the Driver tab. This will allow you to update the driver for your video card.

    Rate this question:

  • 5. 

    What Microsoft API supports 3-D graphics?

    • A.

      DirectX.I

    • B.

      OpenGL

    • C.

      Active Desktop

    • D.

      Glide

    Correct Answer
    A. DirectX.I
    Explanation
    DirectX is a Microsoft API that supports 3-D graphics. It provides a set of tools and functions for developers to create and manipulate 3-D graphics in applications and games. DirectX.I is a version of DirectX specifically designed for 3-D graphics rendering. It offers advanced features and optimizations for high-performance graphics rendering on Windows platforms. OpenGL is another API that supports 3-D graphics, but it is not developed by Microsoft. Active Desktop and Glide are not related to 3-D graphics rendering.

    Rate this question:

  • 6. 

    How would you adjust your screen settings>

    • A.

      Select Start > Run and type MSCONFIG to open the Display applet

    • B.

      Select Start > Run and type DISPLAY to open the Display applet

    • C.

      Go to Start > All Programs and select the Display program icon

    • D.

      Go to Start > Control Panel and double-click the Display / Personalization applet icon

    Correct Answer
    D. Go to Start > Control Panel and double-click the Display / Personalization applet icon
    Explanation
    To adjust screen settings, you would go to Start > Control Panel and double-click the Display / Personalization applet icon. This will open the Display settings where you can make changes to the screen resolution, color calibration, and other display options.

    Rate this question:

  • 7. 

    What is the name for the number of characteristics of a particular sound captured when sampling?

    • A.

      Bit depth

    • B.

      Sample rate

    • C.

      Kilohertz

    • D.

      Quality rating

    Correct Answer
    A. Bit depth
    Explanation
    Bit depth refers to the number of bits used to represent the amplitude of a sound wave during sampling. It determines the dynamic range and precision of the captured sound. A higher bit depth allows for a greater range of amplitudes to be represented, resulting in a more accurate and detailed representation of the original sound. Therefore, bit depth is the correct answer for the given question.

    Rate this question:

  • 8. 

    Which of the following terms most accurately describes a speaker setup with two satelite speakers and a subwoofer?

    • A.

      Stereo

    • B.

      2.1

    • C.

      4.1

    • D.

      Dolby Digital

    Correct Answer
    B. 2.1
    Explanation
    A speaker setup with two satellite speakers and a subwoofer is most accurately described as 2.1. The "2" refers to the number of satellite speakers, while the "1" refers to the number of subwoofers. This configuration is commonly used for multimedia systems or computer speakers, where the satellite speakers handle the mid and high frequencies, while the subwoofer is responsible for producing the low frequencies, providing a more balanced and immersive audio experience.

    Rate this question:

  • 9. 

    Jane's sound card is suddenly not making any sound. She suspects that the volume is turned down. She checks the speaker volume and sees that it is turned up. What should she check next?

    • A.

      The Device Manager

    • B.

      The speaker power

    • C.

      The Volume control panel

    • D.

      The application

    Correct Answer
    C. The Volume control panel
    Explanation
    Jane should check the Volume control panel next because it is responsible for controlling the sound output on her computer. Even though she has already checked the speaker volume and confirmed that it is turned up, there may be additional settings in the Volume control panel that are causing the sound issue. By checking the Volume control panel, Jane can ensure that all the necessary settings are properly configured to enable sound output.

    Rate this question:

  • 10. 

    How should you remove a modular drive?

    • A.

      Use the Hardware Removal Tool in the System tray

    • B.

      Shut down, remove the drive, and power back on

    • C.

      Simply remove the drive with no additional actions

    • D.

      Use Device Manager to uninstall the device

    Correct Answer
    A. Use the Hardware Removal Tool in the System tray
    Explanation
    To remove a modular drive, it is recommended to use the Hardware Removal Tool in the System tray. This tool ensures that the drive is safely ejected and all necessary processes are completed before removal. Simply removing the drive without using the tool may result in data loss or damage to the drive. Shutting down, removing the drive, and powering back on is not the recommended method as it may lead to improper removal and potential system errors. Using Device Manager to uninstall the device is also not the correct approach as it is meant for uninstalling software components, not physical drives.

    Rate this question:

  • 11. 

    Which buses do ExpressCards use?

    • A.

      Hi-Speed USB and FireWire

    • B.

      Hi-Speed USB and PCI Express

    • C.

      PCI and PCI Express

    • D.

      Mini PCI and Parallel

    Correct Answer
    B. Hi-Speed USB and PCI Express
    Explanation
    ExpressCards are a type of expansion slot used in laptops to add functionality. They are designed to support high-speed data transfer and can be used for various purposes such as adding USB ports, network connectivity, or external graphics. Hi-Speed USB and PCI Express are the correct answers because these are the two bus types that ExpressCards use to communicate with the laptop's motherboard and enable the added functionality.

    Rate this question:

  • 12. 

    Which of the following devices enables you to add common PC ports to a portable computer?

    • A.

      Port replicator

    • B.

      Port duplicator

    • C.

      Port modulator

    • D.

      Port simulator

    Correct Answer
    A. Port replicator
    Explanation
    A port replicator is a device that allows you to add common PC ports to a portable computer. It essentially replicates the ports found on a desktop computer and provides them in a compact form that can be easily connected to a laptop or other portable device. This enables users to expand the connectivity options of their portable computer and connect peripherals such as monitors, keyboards, mice, and external storage devices. A port duplicator, port modulator, and port simulator are not devices commonly used for adding PC ports to a portable computer.

    Rate this question:

  • 13. 

    Whic of the following APM power levels writes information from RAM to the hard drive and then copies the data back to RAM when the computer is activated again?

    • A.

      Full On

    • B.

      APM Enabled

    • C.

      APM Standby

    • D.

      Hibernation

    Correct Answer
    D. Hibernation
    Explanation
    Hibernation is the correct answer because it is a power level that writes information from RAM to the hard drive and then copies the data back to RAM when the computer is activated again. This feature allows the computer to save its current state and power off, conserving energy while still allowing for a quick startup and the restoration of all open programs and documents.

    Rate this question:

  • 14. 

    Which battery technology is susceptible to heat and memory issues?

    • A.

      Li-Ion

    • B.

      Ni-Cd

    • C.

      NiMH

    • D.

      PbA

    Correct Answer
    B. Ni-Cd
    Explanation
    Ni-Cd batteries are susceptible to heat and memory issues. When exposed to high temperatures, Ni-Cd batteries can experience thermal runaway, leading to overheating and potential damage. Additionally, Ni-Cd batteries are prone to memory effect, which reduces their overall capacity over time if not fully discharged before recharging. This memory effect can result in decreased battery performance and shortened lifespan.

    Rate this question:

  • 15. 

    Maria's laptop's fan is making a high-pitched whine and doesn't seem to be spinning well. What's a fix for this issue?

    • A.

      Move the computer to a warmer room

    • B.

      Put the laptop on a soft surface, such as a pillow

    • C.

      Replace the fan

    • D.

      Take the computer to the repair shop

    Correct Answer
    C. Replace the fan
    Explanation
    The correct answer is to replace the fan. If the laptop's fan is making a high-pitched whine and not spinning well, it is likely that the fan is faulty or damaged. Moving the computer to a warmer room or putting it on a soft surface will not fix the issue with the fan. Taking the computer to a repair shop might be an option, but the most effective solution would be to replace the fan altogether.

    Rate this question:

  • 16. 

    What unique identifier is assigned to every NIC?

    • A.

      IP address

    • B.

      MAC address

    • C.

      Packet address

    • D.

      ZIP address

    Correct Answer
    B. MAC address
    Explanation
    A unique identifier assigned to every NIC is a MAC address. This address is a hardware address that is assigned to the network interface card (NIC) of a device. It is used to uniquely identify the device on a network. Unlike an IP address, which can change, the MAC address is permanent and cannot be easily altered. The MAC address is used for communication at the data link layer of the network protocol stack.

    Rate this question:

  • 17. 

    Everything worked fine on your 100BaseT star bus topology network yesterday, but today, no on can connect to the server. The server seems to be in good running order. Which of the following is the most likely problem?

    • A.

      A switch is malfunctioning

    • B.

      Someone changed all the passwords for server access

    • C.

      Someone's T connector has come loose on the bus

    • D.

      The server's cable is wired as TIA/EIA 568A, and all the others are wired as TIA/EIA 568B

    Correct Answer
    A. A switch is malfunctioning
    Explanation
    A switch is malfunctioning. If everything was working fine on the network yesterday but no one can connect to the server today, it suggests that there might be an issue with the switch. The switch is responsible for connecting devices on a network and if it malfunctions, it can cause connectivity problems for all the devices connected to it. Therefore, a malfunctioning switch is the most likely problem in this scenario.

    Rate this question:

  • 18. 

    What sort of cabling do most fiber networks use?

    • A.

      62./125 multimode

    • B.

      100Base multimode

    • C.

      CAT 5

    • D.

      CAT 6

    Correct Answer
    A. 62./125 multimode
    Explanation
    Most fiber networks use 62.5/125 multimode cabling. This type of cabling consists of a core with a diameter of 62.5 microns and a cladding with a diameter of 125 microns. It is commonly used for short-distance applications and supports lower data rates compared to single-mode fiber.

    Rate this question:

  • 19. 

    Which encryption method used on wireless networks is the most secure?

    • A.

      WEP

    • B.

      Wi-Fi

    • C.

      WINS

    • D.

      WPA2

    Correct Answer
    D. WPA2
    Explanation
    WPA2 is the most secure encryption method used on wireless networks. WEP (Wired Equivalent Privacy) is an outdated and easily crackable encryption method, while Wi-Fi and WINS (Windows Internet Name Service) are not encryption methods at all. WPA2 (Wi-Fi Protected Access 2) is currently the strongest encryption protocol available for wireless networks, providing strong security measures such as AES encryption and authentication protocols to protect data transmission.

    Rate this question:

  • 20. 

    Which wireless networking standard uses the MIMO (multiple in / multiple out)?

    • A.

      802.11

    • B.

      802.11n

    • C.

      802.11b

    • D.

      802.11g

    Correct Answer
    B. 802.11n
    Explanation
    802.11n is the correct answer because it is a wireless networking standard that uses MIMO (multiple in / multiple out) technology. MIMO allows for multiple antennas to transmit and receive data simultaneously, resulting in improved signal strength, increased data throughput, and better overall performance compared to previous standards such as 802.11b and 802.11g. The other options, 802.11, 802.11b, and 802.11g, do not specifically mention MIMO technology.

    Rate this question:

  • 21. 

    To enable two devices to communicate wirelessley in ad hoc mode, what configuration is required?

    • A.

      Both devices need to have the same IP address

    • B.

      Both devices need to have the same SSID

    • C.

      Both devices need to plug into the same WAP

    • D.

      No additional configuration is requred

    Correct Answer
    B. Both devices need to have the same SSID
    Explanation
    For two devices to communicate wirelessly in ad hoc mode, they need to have the same SSID (Service Set Identifier). The SSID is a unique identifier that allows devices to connect to the same wireless network. By having the same SSID, the devices can recognize and communicate with each other, forming a direct connection without the need for a central access point or router. This allows for a direct peer-to-peer connection between the devices, enabling wireless communication.

    Rate this question:

  • 22. 

    Which network type enables you to log into a single machine and then access machines across the network without logging into each of them?

    • A.

      Client / Server

    • B.

      Domain-based

    • C.

      Peer-to-peer

    • D.

      Windows-based

    Correct Answer
    B. Domain-based
    Explanation
    A domain-based network enables users to log into a single machine and then access other machines across the network without having to log into each one individually. In a domain-based network, all user accounts and security policies are managed centrally by a domain controller. This allows for centralized authentication and authorization, making it easier for users to access resources on different machines without the need for multiple logins.

    Rate this question:

  • 23. 

    How to you change the TCP/IP settings for a Local Area Connection NIC in Windows XP?

    • A.

      Right-click My Computer and select Properties to open the System Properties dialog box. Select the Network tab and select the Local Area Connection you wish to change

    • B.

      Right-click My Network Places and select Properties to open the Network Connections dialog box. Select the Local Area Connection you wish to change.

    • C.

      Go to Start > Run and type CMD to open a command prompt. Type NSLOOKUP. Select the Local Area Connection you wish to change.

    • D.

      Go to Start > Run and type CMD to open a command prompt. Type IPCONFIG. Select the Local Area Connection you wish to change.

    Correct Answer
    B. Right-click My Network Places and select Properties to open the Network Connections dialog box. Select the Local Area Connection you wish to change.
    Explanation
    To change the TCP/IP settings for a Local Area Connection NIC in Windows XP, you need to right-click My Network Places and select Properties. This will open the Network Connections dialog box, where you can select the specific Local Area Connection that you want to change. This option allows you to access and modify the TCP/IP settings for that particular network connection.

    Rate this question:

  • 24. 

    What tool enables you to access shared resources in a Windows-based network?

    • A.

      Internet Explorer

    • B.

      My Computer

    • C.

      My Network Places / Network

    • D.

      UNC

    Correct Answer
    C. My Network Places / Network
    Explanation
    My Network Places / Network is the correct answer because it is a tool in Windows that allows users to access shared resources on a network. It provides a graphical interface where users can browse and connect to shared folders, printers, and other network resources. This tool is commonly used in Windows-based networks to access files and resources that are shared by other computers on the network.

    Rate this question:

  • 25. 

    Which of the following offers a fast connection for an external modem?

    • A.

      CNR

    • B.

      PCI

    • C.

      Serial Port

    • D.

      USB

    Correct Answer
    D. USB
    Explanation
    USB offers a fast connection for an external modem. USB (Universal Serial Bus) is a widely used interface for connecting devices to a computer. It provides high-speed data transfer rates, making it suitable for connecting peripherals such as modems. CNR (Communication and Networking Riser) is a slot on the motherboard for audio and network cards, not specifically designed for modems. PCI (Peripheral Component Interconnect) is a bus for connecting internal hardware components, not external modems. Serial Port is a slower connection compared to USB and is not typically used for modems anymore.

    Rate this question:

  • 26. 

    A new client lives in a rural area, outside the connectivity radius of the local cable company and definitely more than 20,000 feet away from the nearest switching center for the phone company. Which Internet option offers him the best performance?

    • A.

      Cable

    • B.

      Dial-Up

    • C.

      DSL

    • D.

      Satelite

    Correct Answer
    D. Satelite
    Explanation
    In this scenario, where the client lives in a rural area and is far away from the nearest switching center, the best internet option for them would be satellite internet. Satellite internet does not require physical infrastructure like cables or phone lines, making it accessible even in remote areas. It provides a reliable and high-speed internet connection by transmitting data through satellites in space. Therefore, satellite internet would offer the best performance for the client in this situation.

    Rate this question:

  • 27. 

    What server handles incoming e-mail messages?

    • A.

      NNTP

    • B.

      Outlook Express

    • C.

      POP3

    • D.

      SMTP

    Correct Answer
    C. POP3
    Explanation
    POP3 (Post Office Protocol version 3) is a protocol that is used by email clients to retrieve emails from a mail server. It is specifically designed for handling incoming email messages. SMTP (Simple Mail Transfer Protocol) is used for sending email messages, NNTP (Network News Transfer Protocol) is used for accessing newsgroups, and Outlook Express is an email client software. Therefore, POP3 is the correct answer for the server that handles incoming email messages.

    Rate this question:

  • 28. 

    Which of the following is a good example of social engineering?

    • A.

      Data backup

    • B.

      Data destruction

    • C.

      Infiltration

    • D.

      System crash

    Correct Answer
    C. Infiltration
    Explanation
    Infiltration is a good example of social engineering because it involves gaining unauthorized access to a system or network by manipulating individuals through psychological manipulation or deception. Social engineers typically exploit human vulnerabilities, such as trust or fear, to trick people into divulging sensitive information or granting access to restricted areas. Infiltration can be done through methods like impersonation, phishing, or tailgating, and it is a common tactic used by hackers to gain unauthorized access to systems and networks.

    Rate this question:

  • 29. 

    Cindy replaces her aging Pentium 4 computer with a new, dual-core Core 2 Duo machine. What should she do with it?

    • A.

      Donate it to charity

    • B.

      Donate it to charity, but only after reformatting the hard drive

    • C.

      Donate it to charity, but only after using something like Window Washer to wipe the hard drive and remove data remnants

    • D.

      Toss it in the trash; it's too old to be worth anything

    Correct Answer
    C. Donate it to charity, but only after using something like Window Washer to wipe the hard drive and remove data remnants
    Explanation
    Cindy should donate her old computer to charity, but before doing so, she should use a software like Window Washer to wipe the hard drive and remove any remaining data remnants. This is important to protect her personal information and ensure that no sensitive data can be accessed by anyone else who may use the computer in the future. Simply reformatting the hard drive may not completely erase the data, so using a specialized tool like Window Washer is recommended for secure data removal.

    Rate this question:

  • 30. 

    George came back from his break to discover that he'd left his computer still logged in and his e-mail running on the Desktop in plain site. What should he do when he takes his next break?

    • A.

      Press WINDOWS LOGO KEY + L on the keyboard to lock the computer

    • B.

      Shut down the computer

    • C.

      Take the opportunity to read his e-mail

    • D.

      Just get up and leave his machine on and logged in, just like before

    Correct Answer
    A. Press WINDOWS LOGO KEY + L on the keyboard to lock the computer
    Explanation
    George should press the WINDOWS LOGO KEY + L on the keyboard to lock the computer. This will ensure that his computer is secure and no one can access his e-mail or any other personal information while he is on break.

    Rate this question:

  • 31. 

    In Windows 2000, what permissions apply to the Everyone group by default?

    • A.

      Read Only

    • B.

      Read and Write

    • C.

      Full Control

    • D.

      Deny Access

    Correct Answer
    C. Full Control
    Explanation
    By default, in Windows 2000, the Everyone group is granted Full Control permissions. This means that all users, regardless of their specific group membership, have the ability to perform any action on the resource, including reading, writing, modifying, and deleting files or folders. This level of access provides the highest level of control and can potentially pose a security risk if not properly managed.

    Rate this question:

  • 32. 

    What kind of malware changes its signature to avoid detection?

    • A.

      Polymorph

    • B.

      Spyware

    • C.

      Trojan

    • D.

      Worm

    Correct Answer
    A. Polymorph
    Explanation
    Polymorph is a type of malware that changes its signature to avoid detection. Unlike other types of malware that have a fixed signature, polymorph malware constantly modifies its code and appearance, making it difficult for antivirus programs to recognize and detect. By changing its signature, polymorph malware can evade detection and continue to infect systems without being detected by traditional security measures. This allows the malware to remain undetected and potentially cause significant damage to the targeted system.

    Rate this question:

  • 33. 

    What tool in Windows XP SP2 and later protects an internal network from unauthorized access from the Internet?

    • A.

      Kerberos

    • B.

      MS-CHAP

    • C.

      Windows Defender

    • D.

      Windows Firewall

    Correct Answer
    D. Windows Firewall
    Explanation
    Windows Firewall is a tool in Windows XP SP2 and later versions that protects an internal network from unauthorized access from the Internet. It acts as a barrier between the internal network and the Internet, monitoring and controlling incoming and outgoing network traffic based on predefined security rules. It helps prevent unauthorized access to the network by blocking potentially harmful or suspicious connections, thus enhancing the overall security of the internal network.

    Rate this question:

  • 34. 

    You ae solving a problem on Kate's computer which requires you to reboot several times. Upon each reboot, the logon screen appears and prompts you for a username and password before you can continue working. Kate has gone to another office to continue her work on another computer. How do you proceed?

    • A.

      Call Kate, ask her for her password, type it in, and continue working on the problem

    • B.

      Insist that Kate stay with you and have her type the password each time it is needed

    • C.

      Call Kate and have her come in to type the password each time it is needed.

    • D.

      Have Kate temporarily change her password for you to use as you work, then have her change it back when you're through.

    Correct Answer
    D. Have Kate temporarily change her password for you to use as you work, then have her change it back when you're through.
  • 35. 

    After replacing a keyboard a user has spilled coffee on for the fifth time, what should you say to the user?

    • A.

      I can't guarantee the new keyboard will work if it gets dirty.

    • B.

      I can't guarantee the new keyboard will work if you continue to spill coffee on it.

    • C.

      These keyboards are expensive. Next time we replace one because you spilled coffee it's coming out of your paycheck.

    • D.

      You need to be more careful with your coffee.

    Correct Answer
    A. I can't guarantee the new keyboard will work if it gets dirty.
    Explanation
    The correct answer suggests that the user should be aware that the new keyboard may not function properly if it becomes dirty. This implies that the user should take precautions to keep the keyboard clean and avoid spilling coffee on it in the future.

    Rate this question:

  • 36. 

    Once you figure out what can be causing a computer to malfunction, what's your next step?

    • A.

      Escalae the problem to a higher-level tech

    • B.

      Talk to the user about stream loading and other geeky things because your knowledge will put him or her at ease

    • C.

      Test your theory by checking for power and connectivity

    • D.

      Write an incident report to document the problem

    Correct Answer
    C. Test your theory by checking for power and connectivity
    Explanation
    The next step after identifying the potential cause of a computer malfunction is to test the theory by checking for power and connectivity. This involves verifying if the computer is receiving adequate power supply and if all the necessary cables and connections are properly connected. By doing so, it helps to rule out any issues related to power failure or loose connections, which are common culprits for computer malfunctions. This step is crucial in the troubleshooting process as it allows for a systematic approach to narrow down the cause of the problem and potentially resolve it.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.