CompTIA Advanced Final

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Lauralew
L
Lauralew
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,704
| Attempts: 491 | Questions: 36
Please wait...
Question 1 / 36
0 %
0/100
Score 0/100
1. George came back from his break to discover that he'd left his computer still logged in and his e-mail running on the Desktop in plain site. What should he do when he takes his next break?

Explanation

George should press the WINDOWS LOGO KEY + L on the keyboard to lock the computer. This will ensure that his computer is secure and no one can access his e-mail or any other personal information while he is on break.

Submit
Please wait...
About This Quiz
Computer Hardware Quizzes & Trivia

The 'Comptia Advanced Final' quiz assesses knowledge on video technology and computer hardware, focusing on components like LCD monitors, video card slots, and 3-D graphics APIs. It's designed for learners aiming to enhance their technical proficiency in managing and troubleshooting computer hardware.

2. What provides the illuminattion for LCD monitors?

Explanation

Backlights provide the illumination for LCD monitors. LCD panels themselves do not emit light, so they require a separate light source to display images. Backlights are typically placed behind the LCD panel and provide uniform illumination across the screen, allowing the liquid crystals in the panel to manipulate the light and create the images that we see. Inverters are used to control the brightness of the backlights, while lamps are a type of backlight technology.

Submit
3. Which encryption method used on wireless networks is the most secure?

Explanation

WPA2 is the most secure encryption method used on wireless networks. WEP (Wired Equivalent Privacy) is an outdated and easily crackable encryption method, while Wi-Fi and WINS (Windows Internet Name Service) are not encryption methods at all. WPA2 (Wi-Fi Protected Access 2) is currently the strongest encryption protocol available for wireless networks, providing strong security measures such as AES encryption and authentication protocols to protect data transmission.

Submit
4. Which of these is the most recent type of video card expansion slot to be introduced?

Explanation

PCIe, also known as PCI Express, is the most recent type of video card expansion slot to be introduced. It was developed to replace the older AGP and PCI slots. PCIe offers higher bandwidth and faster data transfer speeds, allowing for better performance and more advanced graphics capabilities. It has become the standard for modern video card connections and is widely used in current computer systems.

Submit
5. What Microsoft API supports 3-D graphics?

Explanation

DirectX is a Microsoft API that supports 3-D graphics. It provides a set of tools and functions for developers to create and manipulate 3-D graphics in applications and games. DirectX.I is a version of DirectX specifically designed for 3-D graphics rendering. It offers advanced features and optimizations for high-performance graphics rendering on Windows platforms. OpenGL is another API that supports 3-D graphics, but it is not developed by Microsoft. Active Desktop and Glide are not related to 3-D graphics rendering.

Submit
6. What unique identifier is assigned to every NIC?

Explanation

A unique identifier assigned to every NIC is a MAC address. This address is a hardware address that is assigned to the network interface card (NIC) of a device. It is used to uniquely identify the device on a network. Unlike an IP address, which can change, the MAC address is permanent and cannot be easily altered. The MAC address is used for communication at the data link layer of the network protocol stack.

Submit
7. What tool enables you to access shared resources in a Windows-based network?

Explanation

My Network Places / Network is the correct answer because it is a tool in Windows that allows users to access shared resources on a network. It provides a graphical interface where users can browse and connect to shared folders, printers, and other network resources. This tool is commonly used in Windows-based networks to access files and resources that are shared by other computers on the network.

Submit
8. Maria's laptop's fan is making a high-pitched whine and doesn't seem to be spinning well. What's a fix for this issue?

Explanation

The correct answer is to replace the fan. If the laptop's fan is making a high-pitched whine and not spinning well, it is likely that the fan is faulty or damaged. Moving the computer to a warmer room or putting it on a soft surface will not fix the issue with the fan. Taking the computer to a repair shop might be an option, but the most effective solution would be to replace the fan altogether.

Submit
9. Cindy replaces her aging Pentium 4 computer with a new, dual-core Core 2 Duo machine. What should she do with it?

Explanation

Cindy should donate her old computer to charity, but before doing so, she should use a software like Window Washer to wipe the hard drive and remove any remaining data remnants. This is important to protect her personal information and ensure that no sensitive data can be accessed by anyone else who may use the computer in the future. Simply reformatting the hard drive may not completely erase the data, so using a specialized tool like Window Washer is recommended for secure data removal.

Submit
10. What is the function of the RAMDAC?

Explanation

The function of the RAMDAC is to convert digital signals into analog signals. This is an important process in computer graphics as it allows digital images and data stored in the computer's memory to be displayed on analog monitors or other display devices that require analog signals. By converting the digital signals into analog signals, the RAMDAC enables the computer to communicate with and display information on devices that are not compatible with digital signals.

Submit
11. How would you adjust your screen settings>

Explanation

To adjust screen settings, you would go to Start > Control Panel and double-click the Display / Personalization applet icon. This will open the Display settings where you can make changes to the screen resolution, color calibration, and other display options.

Submit
12. Which of the following terms most accurately describes a speaker setup with two satelite speakers and a subwoofer?

Explanation

A speaker setup with two satellite speakers and a subwoofer is most accurately described as 2.1. The "2" refers to the number of satellite speakers, while the "1" refers to the number of subwoofers. This configuration is commonly used for multimedia systems or computer speakers, where the satellite speakers handle the mid and high frequencies, while the subwoofer is responsible for producing the low frequencies, providing a more balanced and immersive audio experience.

Submit
13. A new client lives in a rural area, outside the connectivity radius of the local cable company and definitely more than 20,000 feet away from the nearest switching center for the phone company. Which Internet option offers him the best performance?

Explanation

In this scenario, where the client lives in a rural area and is far away from the nearest switching center, the best internet option for them would be satellite internet. Satellite internet does not require physical infrastructure like cables or phone lines, making it accessible even in remote areas. It provides a reliable and high-speed internet connection by transmitting data through satellites in space. Therefore, satellite internet would offer the best performance for the client in this situation.

Submit
14. Which of the following is a good example of social engineering?

Explanation

Infiltration is a good example of social engineering because it involves gaining unauthorized access to a system or network by manipulating individuals through psychological manipulation or deception. Social engineers typically exploit human vulnerabilities, such as trust or fear, to trick people into divulging sensitive information or granting access to restricted areas. Infiltration can be done through methods like impersonation, phishing, or tailgating, and it is a common tactic used by hackers to gain unauthorized access to systems and networks.

Submit
15. You ae solving a problem on Kate's computer which requires you to reboot several times. Upon each reboot, the logon screen appears and prompts you for a username and password before you can continue working. Kate has gone to another office to continue her work on another computer. How do you proceed?

Explanation

not-available-via-ai

Submit
16. What server handles incoming e-mail messages?

Explanation

POP3 (Post Office Protocol version 3) is a protocol that is used by email clients to retrieve emails from a mail server. It is specifically designed for handling incoming email messages. SMTP (Simple Mail Transfer Protocol) is used for sending email messages, NNTP (Network News Transfer Protocol) is used for accessing newsgroups, and Outlook Express is an email client software. Therefore, POP3 is the correct answer for the server that handles incoming email messages.

Submit
17. Which wireless networking standard uses the MIMO (multiple in / multiple out)?

Explanation

802.11n is the correct answer because it is a wireless networking standard that uses MIMO (multiple in / multiple out) technology. MIMO allows for multiple antennas to transmit and receive data simultaneously, resulting in improved signal strength, increased data throughput, and better overall performance compared to previous standards such as 802.11b and 802.11g. The other options, 802.11, 802.11b, and 802.11g, do not specifically mention MIMO technology.

Submit
18. Where can you go to update the driver for your video card?

Explanation

To update the driver for your video card, you should find your display adapter under Device Manager. Double-click on it to open its properties dialog box, and then click on the Driver tab. This will allow you to update the driver for your video card.

Submit
19. Which of the following offers a fast connection for an external modem?

Explanation

USB offers a fast connection for an external modem. USB (Universal Serial Bus) is a widely used interface for connecting devices to a computer. It provides high-speed data transfer rates, making it suitable for connecting peripherals such as modems. CNR (Communication and Networking Riser) is a slot on the motherboard for audio and network cards, not specifically designed for modems. PCI (Peripheral Component Interconnect) is a bus for connecting internal hardware components, not external modems. Serial Port is a slower connection compared to USB and is not typically used for modems anymore.

Submit
20. Everything worked fine on your 100BaseT star bus topology network yesterday, but today, no on can connect to the server. The server seems to be in good running order. Which of the following is the most likely problem?

Explanation

A switch is malfunctioning. If everything was working fine on the network yesterday but no one can connect to the server today, it suggests that there might be an issue with the switch. The switch is responsible for connecting devices on a network and if it malfunctions, it can cause connectivity problems for all the devices connected to it. Therefore, a malfunctioning switch is the most likely problem in this scenario.

Submit
21. Which of the following devices enables you to add common PC ports to a portable computer?

Explanation

A port replicator is a device that allows you to add common PC ports to a portable computer. It essentially replicates the ports found on a desktop computer and provides them in a compact form that can be easily connected to a laptop or other portable device. This enables users to expand the connectivity options of their portable computer and connect peripherals such as monitors, keyboards, mice, and external storage devices. A port duplicator, port modulator, and port simulator are not devices commonly used for adding PC ports to a portable computer.

Submit
22. What tool in Windows XP SP2 and later protects an internal network from unauthorized access from the Internet?

Explanation

Windows Firewall is a tool in Windows XP SP2 and later versions that protects an internal network from unauthorized access from the Internet. It acts as a barrier between the internal network and the Internet, monitoring and controlling incoming and outgoing network traffic based on predefined security rules. It helps prevent unauthorized access to the network by blocking potentially harmful or suspicious connections, thus enhancing the overall security of the internal network.

Submit
23. Which battery technology is susceptible to heat and memory issues?

Explanation

Ni-Cd batteries are susceptible to heat and memory issues. When exposed to high temperatures, Ni-Cd batteries can experience thermal runaway, leading to overheating and potential damage. Additionally, Ni-Cd batteries are prone to memory effect, which reduces their overall capacity over time if not fully discharged before recharging. This memory effect can result in decreased battery performance and shortened lifespan.

Submit
24. How to you change the TCP/IP settings for a Local Area Connection NIC in Windows XP?

Explanation

To change the TCP/IP settings for a Local Area Connection NIC in Windows XP, you need to right-click My Network Places and select Properties. This will open the Network Connections dialog box, where you can select the specific Local Area Connection that you want to change. This option allows you to access and modify the TCP/IP settings for that particular network connection.

Submit
25. To enable two devices to communicate wirelessley in ad hoc mode, what configuration is required?

Explanation

For two devices to communicate wirelessly in ad hoc mode, they need to have the same SSID (Service Set Identifier). The SSID is a unique identifier that allows devices to connect to the same wireless network. By having the same SSID, the devices can recognize and communicate with each other, forming a direct connection without the need for a central access point or router. This allows for a direct peer-to-peer connection between the devices, enabling wireless communication.

Submit
26. What kind of malware changes its signature to avoid detection?

Explanation

Polymorph is a type of malware that changes its signature to avoid detection. Unlike other types of malware that have a fixed signature, polymorph malware constantly modifies its code and appearance, making it difficult for antivirus programs to recognize and detect. By changing its signature, polymorph malware can evade detection and continue to infect systems without being detected by traditional security measures. This allows the malware to remain undetected and potentially cause significant damage to the targeted system.

Submit
27. What is the name for the number of characteristics of a particular sound captured when sampling?

Explanation

Bit depth refers to the number of bits used to represent the amplitude of a sound wave during sampling. It determines the dynamic range and precision of the captured sound. A higher bit depth allows for a greater range of amplitudes to be represented, resulting in a more accurate and detailed representation of the original sound. Therefore, bit depth is the correct answer for the given question.

Submit
28. Whic of the following APM power levels writes information from RAM to the hard drive and then copies the data back to RAM when the computer is activated again?

Explanation

Hibernation is the correct answer because it is a power level that writes information from RAM to the hard drive and then copies the data back to RAM when the computer is activated again. This feature allows the computer to save its current state and power off, conserving energy while still allowing for a quick startup and the restoration of all open programs and documents.

Submit
29. Which buses do ExpressCards use?

Explanation

ExpressCards are a type of expansion slot used in laptops to add functionality. They are designed to support high-speed data transfer and can be used for various purposes such as adding USB ports, network connectivity, or external graphics. Hi-Speed USB and PCI Express are the correct answers because these are the two bus types that ExpressCards use to communicate with the laptop's motherboard and enable the added functionality.

Submit
30. Jane's sound card is suddenly not making any sound. She suspects that the volume is turned down. She checks the speaker volume and sees that it is turned up. What should she check next?

Explanation

Jane should check the Volume control panel next because it is responsible for controlling the sound output on her computer. Even though she has already checked the speaker volume and confirmed that it is turned up, there may be additional settings in the Volume control panel that are causing the sound issue. By checking the Volume control panel, Jane can ensure that all the necessary settings are properly configured to enable sound output.

Submit
31. Once you figure out what can be causing a computer to malfunction, what's your next step?

Explanation

The next step after identifying the potential cause of a computer malfunction is to test the theory by checking for power and connectivity. This involves verifying if the computer is receiving adequate power supply and if all the necessary cables and connections are properly connected. By doing so, it helps to rule out any issues related to power failure or loose connections, which are common culprits for computer malfunctions. This step is crucial in the troubleshooting process as it allows for a systematic approach to narrow down the cause of the problem and potentially resolve it.

Submit
32. What sort of cabling do most fiber networks use?

Explanation

Most fiber networks use 62.5/125 multimode cabling. This type of cabling consists of a core with a diameter of 62.5 microns and a cladding with a diameter of 125 microns. It is commonly used for short-distance applications and supports lower data rates compared to single-mode fiber.

Submit
33. How should you remove a modular drive?

Explanation

To remove a modular drive, it is recommended to use the Hardware Removal Tool in the System tray. This tool ensures that the drive is safely ejected and all necessary processes are completed before removal. Simply removing the drive without using the tool may result in data loss or damage to the drive. Shutting down, removing the drive, and powering back on is not the recommended method as it may lead to improper removal and potential system errors. Using Device Manager to uninstall the device is also not the correct approach as it is meant for uninstalling software components, not physical drives.

Submit
34. Which network type enables you to log into a single machine and then access machines across the network without logging into each of them?

Explanation

A domain-based network enables users to log into a single machine and then access other machines across the network without having to log into each one individually. In a domain-based network, all user accounts and security policies are managed centrally by a domain controller. This allows for centralized authentication and authorization, making it easier for users to access resources on different machines without the need for multiple logins.

Submit
35. In Windows 2000, what permissions apply to the Everyone group by default?

Explanation

By default, in Windows 2000, the Everyone group is granted Full Control permissions. This means that all users, regardless of their specific group membership, have the ability to perform any action on the resource, including reading, writing, modifying, and deleting files or folders. This level of access provides the highest level of control and can potentially pose a security risk if not properly managed.

Submit
36. After replacing a keyboard a user has spilled coffee on for the fifth time, what should you say to the user?

Explanation

The correct answer suggests that the user should be aware that the new keyboard may not function properly if it becomes dirty. This implies that the user should take precautions to keep the keyboard clean and avoid spilling coffee on it in the future.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 23, 2010
    Quiz Created by
    Lauralew
Cancel
  • All
    All (36)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
George came back from his break to discover that he'd left his...
What provides the illuminattion for LCD monitors?
Which encryption method used on wireless networks is the most secure?
Which of these is the most recent type of video card expansion slot to...
What Microsoft API supports 3-D graphics?
What unique identifier is assigned to every NIC?
What tool enables you to access shared resources in a Windows-based...
Maria's laptop's fan is making a high-pitched whine and doesn't seem...
Cindy replaces her aging Pentium 4 computer with a new, dual-core Core...
What is the function of the RAMDAC?
How would you adjust your screen settings>
Which of the following terms most accurately describes a speaker setup...
A new client lives in a rural area, outside the connectivity radius of...
Which of the following is a good example of social engineering?
You ae solving a problem on Kate's computer which requires you to...
What server handles incoming e-mail messages?
Which wireless networking standard uses the MIMO (multiple in /...
Where can you go to update the driver for your video card?
Which of the following offers a fast connection for an external modem?
Everything worked fine on your 100BaseT star bus topology network...
Which of the following devices enables you to add common PC ports to a...
What tool in Windows XP SP2 and later protects an internal network...
Which battery technology is susceptible to heat and memory issues?
How to you change the TCP/IP settings for a Local Area Connection NIC...
To enable two devices to communicate wirelessley in ad hoc mode, what...
What kind of malware changes its signature to avoid detection?
What is the name for the number of characteristics of a particular...
Whic of the following APM power levels writes information from RAM to...
Which buses do ExpressCards use?
Jane's sound card is suddenly not making any sound. She suspects that...
Once you figure out what can be causing a computer to malfunction,...
What sort of cabling do most fiber networks use?
How should you remove a modular drive?
Which network type enables you to log into a single machine and then...
In Windows 2000, what permissions apply to the Everyone group by...
After replacing a keyboard a user has spilled coffee on for the fifth...
Alert!

Advertisement