CompTIA Practice Test #2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By LaTasha Stamps
L
LaTasha Stamps
Community Contributor
Quizzes Created: 2 | Total Attempts: 187
| Attempts: 85 | Questions: 60
Please wait...
Question 1 / 60
0 %
0/100
Score 0/100
1. What type of front- or top-panel connector uses a standard 3.5 mm jack to make connections?

Explanation

The audio connector on the front or top panel will use a round, 3.5 mm connector. You can plug speakers into it. Alternatively, you could plug a headset with a boom microphone into it for additional privacy.

Submit
Please wait...
About This Quiz
CompTIA Practice Test #2 - Quiz

CompTIA Practice Test #2 assesses key IT skills through scenario-based questions on network troubleshooting, memory upgrades, laser printer maintenance, and setup of SOHO networks. It's designed for individuals preparing for CompTIA certification to validate their technical expertise.

2. What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource?

Explanation

The authentication server facilitates the challenge/response service for validating someone's credentials.

Submit
3. A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won't connect. What port do you need to ensure is open on the firewall to grant her access?

Explanation

The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.

Submit
4. Which component in a laser printer is responsible for heating up and melting the toner into the paper to create a permanent image?

Explanation

Laser printers incorporate a fuser assembly, which uses two rollers that apply pressure and heat to fuse the plastic toner particles to the paper.

Submit
5. You have a laser printer that is displaying the message "Perform user maintenance." What should you do to resolve this situation?

Explanation

When a laser printer requests maintenance, it's because it has reached a certain page count. Apply a proper maintenance kit (one recommended by the manufacturer) and then clear the service message.

Submit
6. Which of the following printer types are considered impact printers? (Choose two.)

Explanation

Daisy-wheel and dot-matrix printers use print heads that strike an ink ribbon, which presses up against the paper to make an image. Therefore, they are impact printers. Laser printers use a drum to create the image, and thermal printers use heat.

Submit
7. You need to increase network security. A consultant suggests that you install a peripheral device to scan user fingerprints as a requirement to log in. What type of device will you install?

Explanation

Any device that measures one or more physical or behavioral features of an organism is considered a biometric device. Biometric devices include fingerprint scanners, retinal and iris scanners, voice recognition devices, facial recognition devices, and others.

Submit
8. Which type of printing technology uses a heating element to make images on waxy paper?

Explanation

Thermal printers use a heating element. It heats up spots on special waxy, heat-sensitive paper to form the image.

Submit
9. What connectivity technique can ensure that your network traffic is encrypted from endpoint to endpoint?

Explanation

A virtual private network (VPN) can encrypt your network traffic, keeping your data confidential along the wire.

Submit
10. You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use?

Explanation

Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.

Submit
11. Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?

Explanation

The two host-to-host protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

Submit
12. You wish to protect your system from someone not authorized to start the OS. What is your best option?

Explanation

The system BIOS/UEFI settings include password protection to not allow system bootup unless someone enters a password. This would prohibit the OS from loading upon boot.

Submit
13. Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery?

Explanation

Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

Submit
14. What server is used to resolve domain names to IP addresses to facilitate web browsing or locating a directory resource on the network?

Explanation

If a user types www.sybex.com in a web browser, the domain name system (DNS) server will resolve the domain name to an IP address. Similarly, DNS servers will resolve a fully qualified domain named (FQDN) network directory resource on the network to make locating that resource possible.

Submit
15. You are installing network cabling in a drop ceiling of an office space. The ceiling area is used to circulate breathable air. What type of cable do you need to install?

Explanation

The cable can be any of the three major types, coaxial, twisted pair, or fiber, but it needs to be plenum rated. Normal cables have a PVC coating, which produces a poisonous gas when burned. Plenum-rated cables have a Teflon coating, which is not toxic when burned.

Submit
16. Which type of storage device is composed of a conventional hard drive and a substantial amount of solid-state storage?

Explanation

A hybrid hard drive is a combination of a conventional magnetic hard disk drive and solid-state storage. The goal is to increase access speed for commonly accessed data while still providing larger capacity similar to a conventional HDD.

Submit
17. You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose?

Explanation

Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.

Submit
18. What is the role of the server responsible for publishing information about the company's values, purpose, and available products or services to the public?

Explanation

The web server hosts and serves information available to the public (or internally as an intranet web server). Originally, files on the web server would be primarily HTML files, but today's web servers would also serve style sheets, scripts, and various media files.

Submit
19. Which Internet connection type, popular for home use, offers asymmetrical download and upload speeds and is implemented over common phone lines?

Explanation

One of the most popular broadband choices for home use is Digital Subscriber Line (DSL). It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds.

Submit
20. Identify the connectors shown here, from left to right.

Explanation

The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.

Submit
21. What 9-pin connector type was commonly used for keyboards, mice, or game controllers before USB became popular?

Explanation

DB9 was the “D” format, 9-pin connector type that was the standard format for keyboards, mice, and other small peripherals.

Submit
22. You have a new computer that needs to communicate with other computers on a wireless network. What type of expansion card do you need to install?

Explanation

To communicate with other computers on a network, you need a network interface card (NIC). A wireless access point (WAP) is a wireless hub that many wireless devices communicate with, and WPA is a wireless security standard. A KVM switch allows you to have multiple systems attached to the same keyboard, video, and mouse. Other types of expansion cards (that could use the same slot as a NIC) include video cards, sound cards, storage cards, TV tuner cards, and riser cards.

Submit
23. Which motherboard form factor measures 6.7″ m 6.7″?

Explanation

A mini-ITX motherboard is a 6.7″ square. Nano-ITX motherboards are 4.7″ square, pico-ITX motherboards are 3.9″ × 2.8″, and mobile-ITX motherboards are 2.4″ square.

Submit
24. You have a desktop computer that is about five years old, with a single-channel memory architecture. You want to upgrade the memory. After checking the documentation, you purchase a higher-capacity RAM module that runs at the required bus speed. After you install it, the new RAM is not recognized, but the old RAM is. The computer store tests the RAM and it's fine. What should you try next?

Explanation

You Answered Correctly!
That capacity of module might not have been in existence when the motherboard's chipset was released. Sometimes flashing the BIOS is all that is required.

Submit
25. What type of server can host files for easy access and fetching, similar to how a web server serves web pages?

Explanation

The File Transfer Protocol (FTP) server hosts files for easy access, allowing users who are able to browse it to transfer and upload the files.

Submit
26. Which TCP/IP protocol is designed to help resolve hostnames to IP addresses?

Explanation

The Domain Name System (DNS) is responsible for resolving hostnames to IP addresses. This is used millions of times daily on the Internet; when someone types in a website name, such as www.sybex.com, DNS will resolve that to an IP address to enable communication.

Submit
27. What is the maximum data rate for a USB 2.0 connection?

Explanation

USB 1.0 supports 12 Mbps. In following standards, USB 2.0 supports 480 Mbps, USB 3.0 supports 5 Gbps and USB 3.1 Gen 2 supports 10 Gbps.

Submit
28. Which CPU architecture term describes a CPU with multiple physical processor dies in the same package?

Explanation

A processor that exhibits a multicore architecture has multiple completely separate processor dies in the same package. The operating system and applications see multiple processors in the same way that they see multiple processors in separate sockets.

Submit
29. Your manager is excited because he just purchased a fast USB 3.0 external hard drive for his work team. He wants to set it in the middle of the cubicles and let everyone have access to it. Some of the cubicles are about 15 feet away from each other. What is the recommended maximum cable length for this type of device?

Explanation

USB 3.0 has a cable length limitation of 3 meters. USB 2.0 cables can be up to 5 meters in length.

Submit
30. You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?

Explanation

Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.

Submit
31. Which of the following statements accurately explains what happens during the exposing step in the laser printer printing process?

Explanation

In the exposing step, the image is written to the photosensitive imaging drum. Wherever the laser beam touches, the photosensitive drum's charge is severely reduced from –600 VDC to a slight negative charge (around –100 VDC). As the drum rotates, a pattern of exposed areas is formed, representing the image to be printed.

Submit
32. Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?

Explanation

Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.

Submit
33. When printing, which component is responsible for converting the data being printed into the format that the printer can understand?

Explanation

The printer driver uses a page-description language (PDL) to convert the data being printed into the format that the printer can understand. The driver also ensures that the printer is ready to print.

Submit
34. What networking protocol allows systems to discover local systems and other devices?

Explanation

Service Location Protocol (SLP) enables a computer to discover local systems and other devices, if it is not already preconfigured with their location.

Submit
35. A company wanting to monitor network traffic or host system behavior to identify suspect activity will install what type of service?

Explanation

An intrusion detection system (IDS) will monitor and alert you on suspect behavior. The IDS can be a network-based device or host-based, meaning it runs as a process in the background.

Submit
36. Which step immediately follows the fusing step in the laser printer imaging process?

Explanation

The order of steps is processing, charging, exposing, developing, transferring, fusing, and cleaning.

Submit
37. You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?

Explanation

A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.

Submit
38. You are installing UTP network cable for a client. The client's policies require that network cables do not produce poisonous gas when burned. What type of cable do you need to install?

Explanation

Most network cables are coated with a plastic PVC coating, which produces toxic gas when burned. Plenum-rated cables are coated with a Teflon-like material that is not poisonous when burned.

Submit
39. You are setting up a small network in your neighbor's house. She is concerned about wireless security, so she doesn't want to use wireless networking at all. She needs to connect two computers to each other, but it will be impossible to run a network cable between them. Which technology can help her network these computers?

Explanation

Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.

Submit
40. If you are connecting to a website that encrypts its connection using TLS, what port does that traffic travel on?

Explanation

To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443.

Submit
41. Which CPU technology allows for the assignment of two logical cores for every physical core present?

Explanation

Hyperthreading-capable processors appear to the operating system to be two processors. As a result, the operating system can schedule two processes at the same time on each physical core.

Submit
42. Which of the following IP addresses is not a private address and therefore is routable on the Internet?

Explanation

The private IP address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The address 172.168.38.155 is outside the private IP address range and is a public address.

Submit
43. Which RAM feature can detect and possibly fix errors within memory?

Explanation

If memory supports ECC, check bits are generated and stored with the data. If one of the eight memory bits is in error, ECC can correct the error.

Submit
44. Identify the type of cable connector shown here.

Explanation

The connector pictured is a BNC connector. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.

Submit
45. A technician needs to purchase a new laptop for a manager. The manager has had several laptops fail and wants her new one to have as few components as possible to reduce the risk of failure. Which type of light source technology does not require an inverter and therefore is a better choice?

Explanation

There is no need for laptops with LED displays to convert the DC power coming into the laptop to the AC needed to power traditional fluorescent backlights because LEDs operate on DC power just like the rest of the laptop. Therefore, systems with LED backlights have no inverter board.

Submit
46. You are installing network cable that will support digital cable television signals. What type of cable should you install?

Explanation

Cable television installations typically use either RG-6 or RG-59 cable. RG-6 is slightly thicker, can run longer distances, and supports digital signals. RG-59 is suited only for analog TV signals.

Submit
47. Which TCP/IP port will an email client use to push email to its email server?

Explanation

Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.

Submit
48. When setting up a small office, home office (SOHO) network, how do the end-user devices known how to connect?

Explanation

The end-user devices are configured to at least request a DHCP-assigned IP address or be preconfigured with a static IP, gateway and DNS information.

Submit
49. What form factor for solid-state hard drives has dimensions that mirror the older, platter-type drives?

Explanation

Solid-state drives (SSDs) come in multiple form factors, such as, for example, a “stick” resembling a memory module or a 2.5″ box housed in metal. SSDs also come in 3.5″ form factor.

Submit
50. Which of the following statements are not true regarding CPUs and operating systems? (Choose two.)

Explanation

A 32-bit OS can run on either a 32-bit or 64-bit processor, although you will not be able to fully utilize the 64-bit processor's capabilities with a 32-bit OS. A 64-bit OS will run only on a 64-bit processor.

Submit
51. A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?

Explanation

An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100 Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.

Submit
52. Your company just hired a video producer to create exciting videos for the sales team. For her custom computer, which two upgrades are the most useful? (Choose two.)

Explanation

For an audio/video editing workstation, you should maximize the audio and video capabilities, including having at least two large monitors. Videos also take a lot of disk space, so significant storage space is required.

Submit
53. During which step of the laser printer imaging process does a fluorescent lamp discharge the photosensitive drum?

Explanation

During the cleaning step, a rubber blade inside the toner cartridge scrapes any toner left on the drum into a used toner receptacle, and a fluorescent lamp discharges any remaining charge on the imaging drum. (Remember that the drum, being photosensitive, loses its charge when exposed to light.).

Submit
54. A technician is looking to buy a new LCD monitor. Which type of LCD monitor has faster response times and is less expensive than others?

Explanation

The TN will have the fastest response time for this list. The IPS is quick enough for someone interested in gaming, but the LED and plasma monitors would show significant blur or lag when pushed to their limits by fast-moving gameplay.

Submit
55. Which of the following connectors transmit analog signals? (Choose two.)

Explanation

VGA is an analog video connector, and RJ-11 connectors are used with modems. Modems receive a digital signal from the computer but then modulate that signal to analog to transmit over common phone lines.

Submit
56. Your business employs four graphic designers who need new computers. These designers create graphical content such as advertisements, posters, and full-color brochures. Which of the following components is the least important to enhance in their custom-configured machines?

Explanation

Graphic design (or CAD/CAM) workstations require solid CPU power, RAM, and a high-end video card. Hard drive storage is the least important upgrade for these types of users.

Submit
57. What is an advantage of using double-sided memory over single-sided memory?

Explanation

Double-sided memory has chips on both sides of the RAM module instead of just on one side. It allows for doubling the amount of RAM on the module, so you get twice as much memory on one stick. This contrasts with “dual rank,” a term seen when describing memory modules. The “dual rank” module may have two sets of chips but only one rank or channel is accessible by the system at one time.

Submit
58. You are consulting with a small field office that needs a dedicated, digital point-to-point network connection to its parent office. Which Internet connection type will meet this requirement?

Explanation

Integrated Services Digital Network (ISDN) is a digital, point-to-point network capable of maximum transmission speeds of about 2 Mbps, although speeds of 128 Kbps are more common.

Submit
59. Which of the following statements regarding IPv4 configuration is true?

Explanation

All hosts on a network must have a unique IP address. The subnet mask should be the same for all computers on a local network. The network ID can't be set to all 1s; otherwise, it replicates the subnet mask. Default gateways, or router addresses, are needed only if hosts will communicate with hosts outside their local network.

Submit
60. Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?

Explanation

Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 21, 2020
    Quiz Created by
    LaTasha Stamps
Cancel
  • All
    All (60)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What type of front- or top-panel connector uses a standard 3.5 mm jack...
What server is accessed each time it's necessary to challenge and...
A senior administrator calls you and tells you that she is working...
Which component in a laser printer is responsible for heating up and...
You have a laser printer that is displaying the message "Perform user...
Which of the following printer types are considered impact printers?...
You need to increase network security. A consultant suggests that you...
Which type of printing technology uses a heating element to make...
What connectivity technique can ensure that your network traffic is...
You are installing network cabling in a highly secure facility. The...
Which TCP/IP host-to-host protocol makes its best effort to deliver...
You wish to protect your system from someone not authorized to start...
Which of the following TCP/IP protocols is connection oriented and...
What server is used to resolve domain names to IP addresses to...
You are installing network cabling in a drop ceiling of an office...
Which type of storage device is composed of a conventional hard drive...
You are configuring a wireless 802.11n router for a small network....
What is the role of the server responsible for publishing information...
Which Internet connection type, popular for home use, offers...
Identify the connectors shown here, from left to right.
What 9-pin connector type was commonly used for keyboards, mice, or...
You have a new computer that needs to communicate with other computers...
Which motherboard form factor measures 6.7″ m 6.7″?
You have a desktop computer that is about five years old, with a...
What type of server can host files for easy access and fetching,...
Which TCP/IP protocol is designed to help resolve hostnames to IP...
What is the maximum data rate for a USB 2.0 connection?
Which CPU architecture term describes a CPU with multiple physical...
Your manager is excited because he just purchased a fast USB 3.0...
You need to configure a wireless router for an office network. The...
Which of the following statements accurately explains what happens...
Which networking device is capable of reading IP addresses and...
When printing, which component is responsible for converting the data...
What networking protocol allows systems to discover local systems and...
A company wanting to monitor network traffic or host system behavior...
Which step immediately follows the fusing step in the laser printer...
You have a desktop computer that is behaving erratically on the...
You are installing UTP network cable for a client. The client's...
You are setting up a small network in your neighbor's house. She...
If you are connecting to a website that encrypts its connection using...
Which CPU technology allows for the assignment of two logical cores...
Which of the following IP addresses is not a private address and...
Which RAM feature can detect and possibly fix errors within memory?
Identify the type of cable connector shown here.
A technician needs to purchase a new laptop for a manager. The manager...
You are installing network cable that will support digital cable...
Which TCP/IP port will an email client use to push email to its email...
When setting up a small office, home office (SOHO) network, how do the...
What form factor for solid-state hard drives has dimensions that...
Which of the following statements are not true regarding CPUs and...
A technician installed a UTP splitter on one of your network segments...
Your company just hired a video producer to create exciting videos for...
During which step of the laser printer imaging process does a...
A technician is looking to buy a new LCD monitor. Which type of LCD...
Which of the following connectors transmit analog signals? (Choose...
Your business employs four graphic designers who need new computers....
What is an advantage of using double-sided memory over single-sided...
You are consulting with a small field office that needs a dedicated,...
Which of the following statements regarding IPv4 configuration is...
Which of the following network devices receives network traffic and...
Alert!

Advertisement