CompTIA Practice Test #2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By LaTasha Stamps
L
LaTasha Stamps
Community Contributor
Quizzes Created: 2 | Total Attempts: 184
| Attempts: 82
SettingsSettings
Please wait...
  • 1/60 Questions

    What type of front- or top-panel connector uses a standard 3.5 mm jack to make connections?

    • USB
    • Audio
    •  FireWire
    • Thunderbolt
Please wait...
About This Quiz

CompTIA Practice Test #2 assesses key IT skills through scenario-based questions on network troubleshooting, memory upgrades, laser printer maintenance, and setup of SOHO networks. It's designed for individuals preparing for CompTIA certification to validate their technical expertise.

CompTIA Practice Test #2 - Quiz

Quiz Preview

  • 2. 

    What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource?

    • Syslog server

    • Syslog server

    • Print server

    • Authentication server

    Correct Answer
    A. Authentication server
    Explanation
    The authentication server facilitates the challenge/response service for validating someone's credentials.

    Rate this question:

  • 3. 

    You have a laser printer that is displaying the message “Perform user maintenance.” What should you do to resolve this situation?

    • Apply a maintenance kit and clear the message.

    • Use compressed air to blow out the inside of the printer and clear the message.

    • Turn the printer off and back on again to clear the message.

    • Replace the toner cartridge and clear the message.4

    Correct Answer
    A. Apply a maintenance kit and clear the message.
    Explanation
    When a laser printer requests maintenance, it's because it has reached a certain page count. Apply a proper maintenance kit (one recommended by the manufacturer) and then clear the service message.

    Rate this question:

  • 4. 

    Which of the following printer types are considered impact printers? (Choose two.)

    • Laser

    • Daisy-wheel

    • Dot-matrix

    • Thermal

    Correct Answer(s)
    A. Daisy-wheel
    A. Dot-matrix
    Explanation
    Daisy-wheel and dot-matrix printers use print heads that strike an ink ribbon, which presses up against the paper to make an image. Therefore, they are impact printers. Laser printers use a drum to create the image, and thermal printers use heat.

    Rate this question:

  • 5. 

    A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won't connect. What port do you need to ensure is open on the firewall to grant her access?

    • 143

    • 443

    • 548

    • 3389

    Correct Answer
    A. 3389
    Explanation
    The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.

    Rate this question:

  • 6. 

    Which component in a laser printer is responsible for heating up and melting the toner into the paper to create a permanent image?

    • Transfer corona assembly

    • Pickup rollers

    • Exit assembly

    • Fuser assembly

    Correct Answer
    A. Fuser assembly
    Explanation
    Laser printers incorporate a fuser assembly, which uses two rollers that apply pressure and heat to fuse the plastic toner particles to the paper.

    Rate this question:

  • 7. 

    You need to increase network security. A consultant suggests that you install a peripheral device to scan user fingerprints as a requirement to log in. What type of device will you install?

    • Scanner

    • Digitizer

    • Biometric device

    • Touch pad

    Correct Answer
    A. Biometric device
    Explanation
    Any device that measures one or more physical or behavioral features of an organism is considered a biometric device. Biometric devices include fingerprint scanners, retinal and iris scanners, voice recognition devices, facial recognition devices, and others.

    Rate this question:

  • 8. 

    Which type of printing technology uses a heating element to make images on waxy paper?

    • Laser

    •  Ink-jet

    • Thermal

    • Dye sublimation

    Correct Answer
    A. Thermal
    Explanation
    Thermal printers use a heating element. It heats up spots on special waxy, heat-sensitive paper to form the image.

    Rate this question:

  • 9. 

    Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery?

    • IP

    • TCP

    • UDP

    • ICMP

    Correct Answer
    A. TCP
    Explanation
    Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

    Rate this question:

  • 10. 

    What connectivity technique can ensure that your network traffic is encrypted from endpoint to endpoint?

    • VPN

    • VLAN

    • BGP

    • EIGRP

    Correct Answer
    A. VPN
    Explanation
    A virtual private network (VPN) can encrypt your network traffic, keeping your data confidential along the wire.

    Rate this question:

  • 11. 

    You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use?

    • Fiber-optic

    • UTP

    • STP

    • Coaxial

    Correct Answer
    A. Fiber-optic
    Explanation
    Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.

    Rate this question:

  • 12. 

    Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?

    • IP

    • TCP

    • UDP

    • ICMP

    Correct Answer
    A. UDP
    Explanation
    The two host-to-host protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

    Rate this question:

  • 13. 

    You wish to protect your system from someone not authorized to start the OS. What is your best option?

    • Password protect the locked screen.

    • Password protect in the BIOS/UEFI settings.

    •  Encrypt the hard drive.

    • Use a 12-character login password.

    Correct Answer
    A. Password protect in the BIOS/UEFI settings.
    Explanation
    The system BIOS/UEFI settings include password protection to not allow system bootup unless someone enters a password. This would prohibit the OS from loading upon boot.

    Rate this question:

  • 14. 

    What server is used to resolve domain names to IP addresses to facilitate web browsing or locating a directory resource on the network?

    • Syslog server

    • DNS server

    • Print server

    • Authentication server

    Correct Answer
    A. DNS server
    Explanation
    If a user types www.sybex.com in a web browser, the domain name system (DNS) server will resolve the domain name to an IP address. Similarly, DNS servers will resolve a fully qualified domain named (FQDN) network directory resource on the network to make locating that resource possible.

    Rate this question:

  • 15. 

    Which type of storage device is composed of a conventional hard drive and a substantial amount of solid-state storage?

    • SSD

    • HDD

    • Mesh

    • Hybrid

    Correct Answer
    A. Hybrid
    Explanation
    A hybrid hard drive is a combination of a conventional magnetic hard disk drive and solid-state storage. The goal is to increase access speed for commonly accessed data while still providing larger capacity similar to a conventional HDD.

    Rate this question:

  • 16. 

    You are installing network cabling in a drop ceiling of an office space. The ceiling area is used to circulate breathable air. What type of cable do you need to install?

    • Coaxial

    • UTP

    • Fiber-optic

    • Plenum

    Correct Answer
    A. Plenum
    Explanation
    The cable can be any of the three major types, coaxial, twisted pair, or fiber, but it needs to be plenum rated. Normal cables have a PVC coating, which produces a poisonous gas when burned. Plenum-rated cables have a Teflon coating, which is not toxic when burned.

    Rate this question:

  • 17. 

    You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose?

    • WPA2

    • WPA

    • WEP

    • SSID

    Correct Answer
    A. WPA2
    Explanation
    Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.

    Rate this question:

  • 18. 

    Identify the connectors shown here, from left to right.

    • ST and SC

    • SC and ST

    • RJ-49 and RJ-11

    •  RJ-11 and RJ-45

    Correct Answer
    A.  RJ-11 and RJ-45
    Explanation
    The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.

    Rate this question:

  • 19. 

    What is the role of the server responsible for publishing information about the company's values, purpose, and available products or services to the public?

    • FTP server

    • Proxy server

    • File server

    • Web server

    Correct Answer
    A. Web server
    Explanation
    The web server hosts and serves information available to the public (or internally as an intranet web server). Originally, files on the web server would be primarily HTML files, but today's web servers would also serve style sheets, scripts, and various media files.

    Rate this question:

  • 20. 

    Which Internet connection type, popular for home use, offers asymmetrical download and upload speeds and is implemented over common phone lines?

    • POTS

    • Cable

    • DSL

    • ISDN

    Correct Answer
    A. DSL
    Explanation
    One of the most popular broadband choices for home use is Digital Subscriber Line (DSL). It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds.

    Rate this question:

  • 21. 

    Which motherboard form factor measures 6.7″ × 6.7″?

    •  Mini-ITX

    • Nano-ITX

    • Pico-ITX

    • Mobile-ITX

    Correct Answer
    A.  Mini-ITX
    Explanation
    A mini-ITX motherboard is a 6.7″ square. Nano-ITX motherboards are 4.7″ square, pico-ITX motherboards are 3.9″ × 2.8″, and mobile-ITX motherboards are 2.4″ square.

    Rate this question:

  • 22. 

    What 9-pin connector type was commonly used for keyboards, mice, or game controllers before USB became popular?

    • SCSI

    • PS/2

    • DB9

    • Lightning

    Correct Answer
    A. DB9
    Explanation
    DB9 was the “D” format, 9-pin connector type that was the standard format for keyboards, mice, and other small peripherals.

    Rate this question:

  • 23. 

    You have a new computer that needs to communicate with other computers on a wireless network. What type of expansion card do you need to install?

    • WAP

    • NIC

    • KVM

    • WPA

    Correct Answer
    A. NIC
    Explanation
    To communicate with other computers on a network, you need a network interface card (NIC). A wireless access point (WAP) is a wireless hub that many wireless devices communicate with, and WPA is a wireless security standard. A KVM switch allows you to have multiple systems attached to the same keyboard, video, and mouse. Other types of expansion cards (that could use the same slot as a NIC) include video cards, sound cards, storage cards, TV tuner cards, and riser cards.

    Rate this question:

  • 24. 

    You have a desktop computer that is about five years old, with a single-channel memory architecture. You want to upgrade the memory. After checking the documentation, you purchase a higher-capacity RAM module that runs at the required bus speed. After you install it, the new RAM is not recognized, but the old RAM is. The computer store tests the RAM and it's fine. What should you try next?

    •  Flash the BIOS

    • Purchase a second memory module of the same type, and install them as a pair.

    • Return the memory module and purchase a lower-capacity one.

    • Replace the motherboard.

    Correct Answer
    A.  Flash the BIOS
    Explanation
    You Answered Correctly!
    That capacity of module might not have been in existence when the motherboard's chipset was released. Sometimes flashing the BIOS is all that is required.

    Rate this question:

  • 25. 

    What type of server can host files for easy access and fetching, similar to how a web server serves web pages?

    •  FTP server

    • Proxy server

    • File server

    • Web server

    Correct Answer
    A.  FTP server
    Explanation
    The File Transfer Protocol (FTP) server hosts files for easy access, allowing users who are able to browse it to transfer and upload the files.

    Rate this question:

  • 26. 

    Which TCP/IP protocol is designed to help resolve hostnames to IP addresses?

    • ARP

    • RARP

    • DHCP

    • DNS

    Correct Answer
    A. DNS
    Explanation
    The Domain Name System (DNS) is responsible for resolving hostnames to IP addresses. This is used millions of times daily on the Internet; when someone types in a website name, such as www.sybex.com, DNS will resolve that to an IP address to enable communication.

    Rate this question:

  • 27. 

    What is the maximum data rate for a USB 2.0 connection?

    • 12 Mbps

    • 480 Mbps

    • 1 Gbps

    • 5 Gbps

    Correct Answer
    A. 480 Mbps
    Explanation
    USB 1.0 supports 12 Mbps. In following standards, USB 2.0 supports 480 Mbps, USB 3.0 supports 5 Gbps and USB 3.1 Gen 2 supports 10 Gbps.

    Rate this question:

  • 28. 

    Which CPU architecture term describes a CPU with multiple physical processor dies in the same package?

    • Multicore

    • 64-bit

    • Integrated GPU

    • Hyperthreading

    Correct Answer
    A. Multicore
    Explanation
    A processor that exhibits a multicore architecture has multiple completely separate processor dies in the same package. The operating system and applications see multiple processors in the same way that they see multiple processors in separate sockets.

    Rate this question:

  • 29. 

    Your manager is excited because he just purchased a fast USB 3.0 external hard drive for his work team. He wants to set it in the middle of the cubicles and let everyone have access to it. Some of the cubicles are about 15 feet away from each other. What is the recommended maximum cable length for this type of device?

    • 3 meters

    • 5 meters

    • 10 meters

    • 15 meters

    Correct Answer
    A. 3 meters
    Explanation
    USB 3.0 has a cable length limitation of 3 meters. USB 2.0 cables can be up to 5 meters in length.

    Rate this question:

  • 30. 

    You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?

    • Multimeter

    • Tone generator and probe

    • Loopback plug

    • Cable tester

    Correct Answer
    A. Loopback plug
    Explanation
    A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.

    Rate this question:

  • 31. 

    Which of the following statements accurately explains what happens during the exposing step in the laser printer printing process?

    • A laser reduces areas of the drum from a strong negative charge to a slight positive charge.

    • A laser reduces areas of the drum from a strong negative charge to a slight negative charge.

    • A laser increases areas of the drum from a slight negative charge to a strong negative charge.

    • A laser increases areas of the drum from a slight positive charge to a strong positive charge.

    Correct Answer
    A. A laser reduces areas of the drum from a strong negative charge to a slight negative charge.
    Explanation
    In the exposing step, the image is written to the photosensitive imaging drum. Wherever the laser beam touches, the photosensitive drum's charge is severely reduced from –600 VDC to a slight negative charge (around –100 VDC). As the drum rotates, a pattern of exposed areas is formed, representing the image to be printed.

    Rate this question:

  • 32. 

    Which step immediately follows the fusing step in the laser printer imaging process?

    • Processing

    • Transferring

    • Exposing

    • Cleaning

    Correct Answer
    A. Cleaning
    Explanation
    The order of steps is processing, charging, exposing, developing, transferring, fusing, and cleaning.

    Rate this question:

  • 33. 

    You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?

    • DHCP

    • NAT

    • NAT

    • UPnP

    Correct Answer
    A. UPnP
    Explanation
    Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.

    Rate this question:

  • 34. 

    Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?

    • Hub

    • Switch

    • Bridge

    •  Router

    Correct Answer
    A.  Router
    Explanation
    Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.

    Rate this question:

  • 35. 

    When printing, which component is responsible for converting the data being printed into the format that the printer can understand?

    • PDL

    • Printer driver

    • Print feeder

    • Print spooler

    Correct Answer
    A. Printer driver
    Explanation
    The printer driver uses a page-description language (PDL) to convert the data being printed into the format that the printer can understand. The driver also ensures that the printer is ready to print.

    Rate this question:

  • 36. 

    What networking protocol allows systems to discover local systems and other devices?

    • DHCP

    • DNS

    • HTTP

    • SLP

    Correct Answer
    A. SLP
    Explanation
    Service Location Protocol (SLP) enables a computer to discover local systems and other devices, if it is not already preconfigured with their location.

    Rate this question:

  • 37. 

    A company wanting to monitor network traffic or host system behavior to identify suspect activity will install what type of service?

    • Proxy server

    • IDS

    • UTM

    • Email

    Correct Answer
    A. IDS
    Explanation
    An intrusion detection system (IDS) will monitor and alert you on suspect behavior. The IDS can be a network-based device or host-based, meaning it runs as a process in the background.

    Rate this question:

  • 38. 

    You are installing UTP network cable for a client. The client's policies require that network cables do not produce poisonous gas when burned. What type of cable do you need to install?

    • Plenum

    • PVC

    • STP

    • CAT5e or higher

    Correct Answer
    A. Plenum
    Explanation
    Most network cables are coated with a plastic PVC coating, which produces toxic gas when burned. Plenum-rated cables are coated with a Teflon-like material that is not poisonous when burned.

    Rate this question:

  • 39. 

    You are setting up a small network in your neighbor's house. She is concerned about wireless security, so she doesn't want to use wireless networking at all. She needs to connect two computers to each other, but it will be impossible to run a network cable between them. Which technology can help her network these computers?

    • Ethernet over power

    • Power over Ethernet

    • Firewall

    • Access point

    Correct Answer
    A. Ethernet over power
    Explanation
    Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.

    Rate this question:

  • 40. 

    Which CPU technology allows for the assignment of two logical cores for every physical core present?

    • Multicore

    • 32-bit vs. 64-bit

    • Integrated GPU

    • Hyperthreading

    Correct Answer
    A. Hyperthreading
    Explanation
    Hyperthreading-capable processors appear to the operating system to be two processors. As a result, the operating system can schedule two processes at the same time on each physical core.

    Rate this question:

  • 41. 

    Which of the following IP addresses is not a private address and therefore is routable on the Internet?

    • 10.1.2.3

    • 172.18.31.54

    • 172.168.38.155

    • 192.168.38.155

    Correct Answer
    A. 172.168.38.155
    Explanation
    The private IP address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The address 172.168.38.155 is outside the private IP address range and is a public address.

    Rate this question:

  • 42. 

    If you are connecting to a website that encrypts its connection using TLS, what port does that traffic travel on?

    • 21

    • 80

    • 143

    • 443

    Correct Answer
    A. 443
    Explanation
    To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443.

    Rate this question:

  • 43. 

    Which RAM feature can detect and possibly fix errors within memory?

    • Parity

    • Non-parity

    • ECC

    • Non-ECC

    Correct Answer
    A. ECC
    Explanation
    If memory supports ECC, check bits are generated and stored with the data. If one of the eight memory bits is in error, ECC can correct the error.

    Rate this question:

  • 44. 

    A technician needs to purchase a new laptop for a manager. The manager has had several laptops fail and wants her new one to have as few components as possible to reduce the risk of failure. Which type of light source technology does not require an inverter and therefore is a better choice?

    • OLED

    • Plasma

    • Fluorescent

    • LED

    Correct Answer
    A. LED
    Explanation
    There is no need for laptops with LED displays to convert the DC power coming into the laptop to the AC needed to power traditional fluorescent backlights because LEDs operate on DC power just like the rest of the laptop. Therefore, systems with LED backlights have no inverter board.

    Rate this question:

  • 45. 

    Identify the type of cable connector shown here.

    • F-connector

    • BNC

    • SC

    • ST

    Correct Answer
    A. BNC
    Explanation
    The connector pictured is a BNC connector. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.

    Rate this question:

  • 46. 

    You are installing network cable that will support digital cable television signals. What type of cable should you install?

    • RG-6

    • RG-8

    • RG-58 A/U

    • RG-59

    Correct Answer
    A. RG-6
    Explanation
    Cable television installations typically use either RG-6 or RG-59 cable. RG-6 is slightly thicker, can run longer distances, and supports digital signals. RG-59 is suited only for analog TV signals.

    Rate this question:

  • 47. 

    Which TCP/IP port will an email client use to push email to its email server?

    • 23

    • 25

    • 110

    • 143

    Correct Answer
    A. 25
    Explanation
    Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.

    Rate this question:

  • 48. 

    When setting up a small office, home office (SOHO) network, how do the end-user devices known how to connect?

    • Network switch broadcasts configuration settings.

    • Devices utilize service location protocol.

    • NIC set with static address or be DHCP-served.

    • End users configure as needed.

    Correct Answer
    A. NIC set with static address or be DHCP-served.
    Explanation
    The end-user devices are configured to at least request a DHCP-assigned IP address or be preconfigured with a static IP, gateway and DNS information.

    Rate this question:

  • 49. 

    What form factor for solid-state hard drives has dimensions that mirror the older, platter-type drives?

    • M.2

    • PCIe

    • RPM

    • 2.5"

    Correct Answer
    A. 2.5"
    Explanation
    Solid-state drives (SSDs) come in multiple form factors, such as, for example, a “stick” resembling a memory module or a 2.5″ box housed in metal. SSDs also come in 3.5″ form factor.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 21, 2020
    Quiz Created by
    LaTasha Stamps
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.