CompTIA Practice Test #3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By LaTasha Stamps
L
LaTasha Stamps
Community Contributor
Quizzes Created: 2 | Total Attempts: 187
| Attempts: 102 | Questions: 60
Please wait...
Question 1 / 60
0 %
0/100
Score 0/100
1. You are installing two new RAM modules into a single channel of a dual-channel motherboard. Which of the following is true?

Explanation

When installing dual-channel RAM, be sure that the RAM modules both have the same parameters. In some cases, you might even need to make sure they come from the same manufacturer.

Submit
Please wait...
About This Quiz
CompTIA Practice Test #3 - Quiz

CompTIA Practice Test #3 assesses knowledge in configuring and troubleshooting computer systems and networks. It covers topics such as IPv6 addressing, RAM installation, network cabling, and performance troubleshooting, aimed at enhancing practical IT skills.

2. You have just installed a new HP LaserJet printer on your network. You've plugged it directly into a CAT6a network cable. You try to install the printer on a client using the printer's IP address, but you are unable to connect. The printer is in Ready state. What should you do next?

Explanation

For network-enabled laser printers, no connectivity can be a sign of improperly configured IP settings such as the IP address. While each printer is somewhat different, you can manually configure most laser printers’ IP settings through the LCD control panel.

Submit
3. Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?

Explanation

Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.

Submit
4. Your Windows 7 workstation is having intermittent video issues. The manufacturer's website suggests you install the latest driver. Which utility should you use to check the driver version installed on your computer?

Explanation

Device Manager has been present in every version of Windows since Windows 95. It allows you to manage all of your hardware devices, including updating drivers and disabling the device. It is found within the Computer Management console.

Submit
5. Which type of coaxial cable connector locks by twisting the connector one-quarter turn?

Explanation

The BNC connector locks by twisting one-quarter turn. F-connectors are threaded and screw into place. SC and ST connectors are for fiber-optic cable.

Submit
6. Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?

Explanation

The two host-to-host protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

Submit
7. Which of the following wireless communication types has a maximum distance of 1 meter and requires line of sight?

Explanation

Infrared (IR) is a short-distance, line-of-sight, point-to-point communication method. It's usually used to transfer small amounts of data from one device to another. The maximum functional distance of IR in mobile devices is about 1 meter, with a viewing angle of about 30 degrees.

Submit
8. A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won't connect. What port do you need to ensure is open on the firewall to grant her access?

Explanation

The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.

Submit
9. Data transfers for which wireless connection type will be interrupted if someone walks between the sending and receiving devices?

Explanation

Infrared is a short-distance, line-of-sight wireless communication method. If line of sight is broken, the communication will end.

Submit
10. Which type of laptop monitor technology uses a current of electricity to stimulate a sealed panel of inert gas?

Explanation

Plasma displays place electrodes in front of and behind sealed chambers full of inert gas (such as neon) and vaporized mercury. Current is run through the gas to ionize it and cause it to light up.

Submit
11. Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client computers?

Explanation

Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and other IP configuration information to network clients.

Submit
12. A user calls the help desk to report that she has no network connectivity. She had connectivity yesterday, but when she booted up her desktop computer this morning, she could not connect. She does not use the wireless network. No other users have reported issues. What is the first thing you should do?

Explanation

Rule #1 of troubleshooting is to always check your connections first. The most common issue that prevents network connectivity on a wired network is a bad or unplugged patch cable.

Submit
13. A user reports the wireless Internet connection will randomly shut down in the afternoon. You check the Internet router by the window to find it still has power. What is the most likely cause of this problem?

Explanation

The most likely explanation is that the wireless router is overheating. If it randomly shuts down in the afternoon, being in the sun may contribute to overheating.

Submit
14. What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource?

Explanation

The authentication server facilitates the challenge/response service for validating someone's credentials.

Submit
15. You have just installed a second and third hard drive into a Windows 8.1 workstation. Each drive is 500 GB. The user wants to combine her space into one 1 TB volume. What should you create to accomplish this and also give the user a disk read and write performance boost?  

Explanation

To combine both hard drives into one volume, you need to create a spanned, striped, or mirrored volume. A mirrored volume, like a RAID-1 array, will make one of the disks redundant, so in this case it would not give the user 1 TB of storage. A striped volume is like RAID-0 and will give you a slight performance boost.

Submit
16. What serial connection standard was first developed in 1960 and had been the standard for microsystems for a few decades?

Explanation

RS-232 was introduced in 1960 and was very common in 25-pin format for connecting printers and other peripherals as well as the 9-pin for connecting to network devices.

Submit
17. You have a user who needs recommendations for installing a home server PC. She wants her family to be able to share files and videos on their home network. She also wants her data to be protected in the event of a hard drive failure. Which two components do you recommend she include?

Explanation

A home server PC should be able to handle media streaming as well as file and printer sharing. A dedicated print server is not likely needed, though, as the operating system can function as a print server. A gigabit NIC will be helpful to manage the network traffic, and a RAID array can help protect against hard drive failure.

Submit
18. What type of network is most commonly associated with Bluetooth devices and covers a small area?

Explanation

A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.

Submit
19. Several Bluetooth devices are connected in an ad hoc network. Which acronym best describes this type of network?

Explanation

A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.

Submit
20. Which type of flash memory is capable of being embedded on the circuit board of mobile devices?

Explanation

Embedded MultiMediaCard (eMMC) can be permanently embedded on the circuit board of a cheaper or smaller mobile device. All of the other flash memory standards, such as CompactFlash, xD, miniMMC, and microMMC, are designed to be removable.

Submit
21. A client needs to connect to the Internet using telephone lines. What type of expansion card should you configure in his computer?

Explanation

A modem allows computers to connect to a remote network (such as an ISP) via telephone lines. Modems were the most common Internet connection method in the 1990s but are uncommon today. NICs are expansion cards for network connections. USB and cellular are not expansion cards. Other types of expansion cards include video cards, sound cards, storage cards, TV tuner cards, and riser cards.

Submit
22. Which of the following wireless communication methods are the least susceptible to hacking? (Choose two.)

Explanation

Of the wireless communication methods, infrared (IR) and near-field communication (NFC) are the hardest to hack. IR communication is limited to about 1 meter, with a viewing angle of about 30 degrees. You would know if someone was trying to intercept the signal. NFC is limited to about 4" (10 cm). It would be pretty obvious if someone were trying to intercept that signal.

Submit
23. You have a desktop computer with three PCI expansion slots. What will happen when you mix cards of different speeds on the same motherboard?

Explanation

PCI is a shared-bus topology, so mixing 33 MHz and 66 MHz adapters in a 66 MHz system will slow all adapters to 33 MHz.

Submit
24. What is the maximum data rate for a USB 2.0 connection?

Explanation

USB 1.0 supports 12 Mbps. In following standards, USB 2.0 supports 480 Mbps, USB 3.0 supports 5 Gbps and USB 3.1 Gen 2 supports 10 Gbps.

Submit
25. Your client is now looking at improving control over all the user devices. Particularly, the client wants resource access controlled based on policy and the users meeting a few criteria. What device would you suggest?

Explanation

The end-point management server can be a policy-based or directory-based technique toward controlling access to network resources.

Submit
26. A user complains that sometimes his computer will not open files, and it happens in different programs. Which component is most likely to cause this problem?

Explanation

Failure to open files means that the computer can't properly read those files. In most cases, this indicates an issue with the hard drive.

Submit
27. A technician is troubleshooting a computer configured for wired network connection that can't connect to the network. He verified that the cable is plugged in, but there are no lights lit on the network card. The computer could connect yesterday, and no other users report an issue. Which of the following are most likely to be causing this problem? (Choose two.)

Explanation

If the network card doesn't have any lights, it doesn't have a connection. It could be that the cable is bad or that it's not plugged in on the other side, or it could also be a problem with the NIC or the connectivity device on the other side. If nobody else in the same area is having the same problem, that points to an issue with this computer or cable.

Submit
28. You have a network installation that requires transmission speeds of 10 Gbps at a distance of 85 meters. Among the UTP standards listed, which one is the oldest one that meets the requirements for this network?

Explanation



CAT7 UTP can handle 10 Gbps transmissions over 100 meters. CAT6 will transmit at 10 Gbps, but only for 55 meters, while CAT6A can handle the same transmission speed up to 100 meters. CAT5 has a maximum speed of 100 Mbps, and CAT5e has a maximum of 1 Gbps.
Submit
29. Identify the cable connector in the picture.

Explanation



F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.
Submit
30. Which of the following wireless communication types has a maximum distance of about 4″?

Explanation

The Near-field communication (NFC) is a wireless technology that uses radio frequency (RF) signals with limited range, about 4" (10 cm).

Submit
31. You have installed an internal RAID controller and configured a RAID-5 array on it with four hard disks. It has been operating normally. Today when you boot up, you receive an error message saying, "RAID not found." Which component is likely causing this issue?

Explanation

If the system had been operating normally but now tells you RAID not found, it's likely something is wrong with the RAID controller. Double-check to ensure that the RAID controller BIOS is configured properly and everything is connected as it should be.

Submit
32. What 9-pin connector type was commonly used for keyboards, mice, or game controllers before USB became popular?

Explanation

DB9 was the “D” format, 9-pin connector type that was the standard format for keyboards, mice, and other small peripherals.

Submit
33. You have been asked to design a new network that requires 10 Gbps transmission speeds. Which cable types will meet the minimum specifications? (Choose two.)

Explanation

Multimode fiber (MMF) and UTP CAT6 and newer support 10 Gbps transmission speeds.

Submit
34. On an IPv6 network, if you want to send a single message to a group of computers at the same time, what type of address class do you need to use?

Explanation

There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts. IPv6 does not use broadcasts.

Submit
35. You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the Internet. Which port can you disable on the firewall to immediately stop access to these websites?

Explanation

Normal (unsecured) websites are accessed on port 80, which is the port that Hypertext Transfer Protocol (HTTP) uses. Shut it down, and no one will be able to access websites, except secure sites that use HTTPS, which is on port 443.

Submit
36. You are troubleshooting a computer with a RAID-10 array using four disks. One of the disks fails. What can you do to recover the array?

Explanation

RAID-10 is a mirrored striped set. As long as one drive in each mirrored pair is functional (just as in RAID-1), you shouldn't lose any data. Simply replace the failed disk and rebuild the array.

Submit
37. One of your friends complains that when he plays action games on his computer, the screen is slow to refresh and the motion is often jerky. What should he do to resolve this problem?

Explanation

Certain unacceptable video-quality issues (such as jerky refresh speeds or lags) can be remedied by adding memory to a video card. Doing so generally results in an increase in both quality and performance. If you can't add memory to the video card, you can upgrade to a new one.

Submit
38. You are troubleshooting a laptop with an integrated wireless networking card. The user reports that the laptop will not connect to the Internet. When you look at the network card, the connection and activity lights alternate blinking, in a steady pattern. What is the most likely cause of the problem?

Explanation

Some wireless cards will have their connection and activity lights alternatively blink if there is no network connection. If the card had failed, there likely would be no lights on it at all.

Submit
39. A technician has been asked to install and configure a RAID-5 array in a working computer that contains one hard drive. How many additional hard drives, at a minimum, does he need to bring with him to the job?

Explanation

RAID-5 arrays require a minimum of three hard drives. Since the computer already has one, he therefore needs two more.

Submit
40. You need to install a memory upgrade in a laptop computer. The computer's documentation says that the laptop uses DDR3 SODIMMs. How many pins will be on the SODIMM?

Explanation

DDR3 SODIMMs have 204 pins. DDR and DDR2 SODIMMS have 200 pins each, and older SDDRAM has 144 pins.

Submit
41. Which TCP/IP protocol is used to provide shared access to files and printers on the network?

Explanation

Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP, only with a few more options, such as the ability to connect to printers and more management commands.

Submit
42. For IPv6, which of the following statements are not true? (Choose two.)

Explanation

Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4.

Submit
43. You are connecting a laptop to a printer on the network using Wi-Fi. The user will need to use the printer frequently when they are in the office. What type of wireless connection will you establish with the printer?

Explanation

Wi-Fi (802.11a, b, g, n, or ac) and Bluetooth can be used to connect a printer temporarily to a single computer (or mobile device), and the connection does not have permanent status. This type of configuration is known as an ad hoc network connection. When Wi-Fi is used to connect printers to a network on a more permanent basis, it is known as infrastructure mode.

Submit
44. Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?

Explanation

At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses.

Submit
45. Which type of DIMM has 184 pins?

Explanation

DDR has 184 pins, DDR2 and DDR3 have 240 pins, and SODIMMs can have 72, 100, 144, 200, or 204 pins. DDR4 has 288 pins while DDR4 SODIMMs have 260 pins. Last, MicroDIMMs and MiniDIMMs at 240 pins.

Submit
46. A technician is recommending that his company use removable memory cards. Which of the following should he tell his manager?

Explanation

MiniSD and microSD cards are smaller than standard SD memory cards. Adapters are available to allow them to work in standard SD slots.

Submit
47. The AES security algorithm was introduced with which Wi-Fi encryption standard?

Explanation

Wi-Fi Protected Access 2 (WPA2) is a huge improvement over WEP and WPA. It uses Counter Mode CBC-MAC Protocol (CCMP), which is a protocol based on the Advanced Encryption Standard (AES) security algorithm. CCMP-AES was created to address the shortcomings of TKIP, so consequently it's much stronger than TKIP.

Submit
48. After enabling your device for communication using the IEEE 802.15.1 standard, what is the next step?

Explanation

The IEEE standard 802.15.1 is commonly known as Bluetooth. The first step in using Bluetooth after enabling the protocol is finding a device with which to pair.

Submit
49. What email configuration settings are commonly used when setting up email on a device?

Explanation

The port and SSL settings are used to first configure email on a device. The correct port will depend largely on whether you are using the IMAP or POP3 protocol. The SSL settings are not required but should be filled in to permit encrypted email.

Submit
50. Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key?

Explanation

Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent.

Submit
51. Which network device comes in two types: active, which is powered, and passive, which is not?

Explanation

Hubs can be either active or passive. Passive hubs connect all ports electrically but do not have their own power source. Active hubs use electronics to amplify and clean up the signal before it is broadcast to the other ports.

Submit
52. You are configuring hosts on a network running IPv4. Which elements are required for the computer to connect to the network?

Explanation

To communicate on an IPv4 network, a host must be configured with a valid IP address and a subnet mask. A default gateway is needed only if the host will connect to a remote network. DNS servers are optional but useful, because they resolve hostnames to IP addresses.

Submit
53. Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4?

Explanation

127.0.0.1 is the loopback address, used to ping the local network interface. The IPv6 equivalent is ::1.

Submit
54. Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.)

Explanation

Switches and bridges work at Layer 2. Switches are multi-port bridges.

Submit
55. You are configuring a wireless 802.11ac router for its first use. Which of the following configuration options is recommended?

Explanation

When configuring a router, you should take five steps. Change the router's SSID, change the administrator username and password, select strong encryption such as AES or WPA2, choose a high-quality security passphrase, and connect the clients using the passphrase.

Submit
56. You have been asked to purchase new RAM for three workstations. The workstations call for DDR3 1600 chips. What throughput will these modules support?

Explanation

The number designation of 1600 in DDR3–1600 indicates an FSB speed of 1600 MHz. To find the throughput, multiply the FSB speed by 8.

Submit
57. A technician is going to set up a Wi-Fi network using standard omnidirectional antennae. Because of the building configuration, transmitting signals for the greatest distance is his primary criterion. Which standard should he choose?

Explanation

Of the Wi-Fi standards, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5 GHz range, which restricts its functional distance.

Submit
58. The hard drive in your manager's desktop has failed, and you need to replace it. Your manager asks about the benefits of replacing it with an SSD instead of an HDD. What should you tell her? (Choose two.)

Explanation

SSDs have several advantages over magnetic HDDs. They include faster startup and read times, less power consumption, silent operation, and higher reliability because of lack of moving parts, and they are less susceptible to damage from physical shock and heat production.

Submit
59. Which Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58 characters long?

Explanation

Wired Equivalent Privacy (WEP) was one of the first security standards for wireless devices. It uses a static key; the keys are commonly 10, 26, or 58 hexadecimal characters long.

Submit
60. What type of server can host files for easy access and fetching, similar to how a web server serves web pages?

Explanation

The File Transfer Protocol (FTP) server hosts files for easy access, allowing users who are able to browse it to transfer and upload the files.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 29, 2020
    Quiz Created by
    LaTasha Stamps
Cancel
  • All
    All (60)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You are installing two new RAM modules into a single channel of a...
You have just installed a new HP LaserJet printer on your network....
Which TCP/IP protocol, designed to download email, allows for multiple...
Your Windows 7 workstation is having intermittent video issues. The...
Which type of coaxial cable connector locks by twisting the connector...
Which TCP/IP host-to-host protocol makes its best effort to deliver...
Which of the following wireless communication types has a maximum...
A senior administrator calls you and tells you that she is working...
Data transfers for which wireless connection type will be interrupted...
Which type of laptop monitor technology uses a current of electricity...
Which TCP/IP protocol is responsible for dynamically assigning IP...
A user calls the help desk to report that she has no network...
A user reports the wireless Internet connection will randomly shut...
What server is accessed each time it's necessary to challenge and...
You have just installed a second and third hard drive into a Windows...
What serial connection standard was first developed in 1960 and had...
You have a user who needs recommendations for installing a home server...
What type of network is most commonly associated with Bluetooth...
Several Bluetooth devices are connected in an ad hoc network. Which...
Which type of flash memory is capable of being embedded on the circuit...
A client needs to connect to the Internet using telephone lines. What...
Which of the following wireless communication methods are the least...
You have a desktop computer with three PCI expansion slots. What will...
What is the maximum data rate for a USB 2.0 connection?
Your client is now looking at improving control over all the user...
A user complains that sometimes his computer will not open files, and...
A technician is troubleshooting a computer configured for wired...
You have a network installation that requires transmission speeds of...
Identify the cable connector in the picture.
Which of the following wireless communication types has a maximum...
You have installed an internal RAID controller and configured a RAID-5...
What 9-pin connector type was commonly used for keyboards, mice, or...
You have been asked to design a new network that requires 10 Gbps...
On an IPv6 network, if you want to send a single message to a group of...
You have reason to believe that several network users are actively...
You are troubleshooting a computer with a RAID-10 array using four...
One of your friends complains that when he plays action games on his...
You are troubleshooting a laptop with an integrated wireless...
A technician has been asked to install and configure a RAID-5 array in...
You need to install a memory upgrade in a laptop computer. The...
Which TCP/IP protocol is used to provide shared access to files and...
For IPv6, which of the following statements are not true? (Choose...
You are connecting a laptop to a printer on the network using Wi-Fi....
Which TCP/IP Internet layer protocol is responsible for resolving...
Which type of DIMM has 184 pins?
A technician is recommending that his company use removable memory...
The AES security algorithm was introduced with which Wi-Fi encryption...
After enabling your device for communication using the IEEE 802.15.1...
What email configuration settings are commonly used when setting up...
Which Wi-Fi encryption standard was the first to include the use of a...
Which network device comes in two types: active, which is powered, and...
You are configuring hosts on a network running IPv4. Which elements...
Which of the following IPv6 addresses is equivalent to 127.0.0.1 in...
Which of the following network connectivity devices operate at Layer 2...
You are configuring a wireless 802.11ac router for its first use....
You have been asked to purchase new RAM for three workstations. The...
A technician is going to set up a Wi-Fi network using standard...
The hard drive in your manager's desktop has failed, and you need...
Which Wi-Fi encryption standard uses a static key, which is commonly...
What type of server can host files for easy access and fetching,...
Alert!

Advertisement