CompTIA A+ 1001 Certification Exam Prep Test Part- I

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Themes
T
Themes
Community Contributor
Quizzes Created: 416 | Total Attempts: 713,306
Questions: 50 | Attempts: 628

SettingsSettingsSettings
CompTIA A+ 1001 Certification Exam Prep Test Part- I - Quiz

Welcome to the CompTIA A+ 1001 Certification Exam Prep Test Part- I. It has over fifty important questions about IT support, computer and operating system configuration, administer the cloud-based systems, set up IoT devices, etc. If you are preparing for the final exam, this test can be a great learning session for you.


Questions and Answers
  • 1. 

    Some users are unable to access the Internet form their workstations. A technician runs the ipconfig command on one of the workstations and sees the following:

    • A.

      There is a problem with a router in the office

    • B.

      There is a problem with a DNS server in the office

    • C.

      The users are not getting correct IP addresses from the DHCP server

    • D.

      The wireless access point in the area is down

    Correct Answer
    A. There is a problem with a router in the office
    Explanation
    Based on the given information, the correct answer is that there is a problem with a router in the office. This can be inferred because the technician ran the ipconfig command on one of the workstations, which is used to view the network configuration of a device. If users are unable to access the internet from their workstations, it suggests that there is an issue with the network connectivity, which could be caused by a problem with the router.

    Rate this question:

  • 2. 

    A systems administrator is configuring a server to host several virtual machines. The administrator configures the server and is ready to begin provisioning the virtual machines. Which of the following features should the administrator utilize to complete the task?

    • A.

      Hypervisor

    • B.

      Disk management

    • C.

      Terminal services

    • D.

      Device Manager

    • E.

      Virtual LAN

    Correct Answer
    A. Hypervisor
    Explanation
    The correct answer is Hypervisor. A hypervisor is a software or hardware platform that enables the creation and management of virtual machines. It allows multiple virtual machines to run on a single physical server, providing isolation and resource allocation for each virtual machine. By utilizing a hypervisor, the administrator can provision and manage the virtual machines on the server efficiently.

    Rate this question:

  • 3. 

    A user accidentally spills liquid on a laptop. The user wants the device to be fixed and would like to know how much it will cost. Which of the following steps should the technician take NEXT to verify if the device is repairable before committing to a price? (Choose two.)

    • A.

      Remove the case and organize the parts.

    • B.

      Document the screw locations.

    • C.

      Search the Internet for repair tutorials.

    • D.

      Consult colleagues for advice.

    • E.

      Place the device in rice for a few days.

    Correct Answer(s)
    A. Remove the case and organize the parts.
    B. Document the screw locations.
    Explanation
    The technician should first remove the case and organize the parts to assess the extent of the damage caused by the liquid spill. This will allow them to visually inspect the internal components and identify any areas that may require repair or replacement. Additionally, documenting the screw locations will ensure that the device can be reassembled correctly after the repair process. By taking these steps, the technician can determine the feasibility of repairing the device and provide an accurate cost estimate to the user.

    Rate this question:

  • 4. 

    A user is experiencing email problems and explains to a technician that all emails with graphics or images do not display the graphics. Which of the following configurations would correct this behavior?

    • A.

      Change the email settings in antivirus.

    • B.

      Change the security settings of the email client.

    • C.

      Change the firewall security settings.

    • D.

      Change the email proxy settings.

    • E.

      Change the trusted sites in the browser settings.

    Correct Answer
    B. Change the security settings of the email client.
  • 5. 

    A technician is replacing an older video card with a new high-end video card in a workstation. The installation was successful, the new card seated properly, and power is connected. However, upon booting, the computer now emits several beeps and will not boot, but shows no error messages. Which of the following is MOST likely the cause of this issue?

    • A.

      The BIOS is out-of-date

    • B.

      There is not enough PSU output

    • C.

      There is an onboard RAM mismatch

    • D.

      GPU is overlocked

    • E.

      The firmware is out-of-date

    Correct Answer
    B. There is not enough PSU output
    Explanation
    The most likely cause of the issue is that there is not enough power supply unit (PSU) output. The new high-end video card may require more power than the older video card, and if the PSU does not have enough output, it can result in the computer emitting several beeps and not booting properly. This can happen even if the installation was successful and the new card is seated properly.

    Rate this question:

  • 6. 

    A technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue?

    • A.

      Virtual security

    • B.

      Virtual storage

    • C.

      Virtual CPU

    • D.

      Virtual switch

    • E.

      Virtual RAM

    Correct Answer
    C. Virtual CPU
    Explanation
    To resolve the issue of the offline VM while the hypervisor is online, the technician should change the setting for the "Virtual CPU." This setting determines the number of virtual processors allocated to the VM, and adjusting it can help resolve the issue. By increasing the number of virtual CPUs, the VM will have more processing power, potentially resolving any performance or connectivity issues causing it to be offline.

    Rate this question:

  • 7. 

    A user’s laptop is shutting down unexpectedly. The technician discovers the shutdowns only happen when the laptop is moved from one room to another. The technician reseated the hard drive, memory, battery, and LCD cable, but the laptop continues to shut down. Which of the following is the MOST probable cause of the issue?

    • A.

      Residual energy on the motherboard

    • B.

      System overheating

    • C.

      Distended capacitors

    • D.

      Loose battery connection

    • E.

      CMOS battery failure

    Correct Answer
    D. Loose battery connection
    Explanation
    The most probable cause of the laptop shutting down unexpectedly when moved from one room to another is a loose battery connection. This could be causing a temporary loss of power when the laptop is jostled or moved, resulting in the shutdown. Reseating the hard drive, memory, battery, and LCD cable did not resolve the issue, indicating that the problem lies elsewhere. The other options, such as residual energy on the motherboard, system overheating, distended capacitors, or CMOS battery failure, do not directly correlate with the specific scenario described.

    Rate this question:

  • 8. 

    A technician was called to check an unexpected clicking noise on a desktop that has become more frequent every time a video editing application is loaded. The system fans have been replaced, but the clicking noise remains. Diagnostics have been run on the video card. Which of the following should me the technician do FIRST?

    • A.

      Replace the hard drive.

    • B.

      Replace the video card.

    • C.

      Do a System Restore.

    • D.

      Perform a full data backup.

    • E.

      Scan the system for viruses.

    Correct Answer
    D. Perform a full data backup.
    Explanation
    Performing a full data backup should be the first step for the technician because it ensures that all important data is safely stored before any further troubleshooting or repairs are done. This is important because if any hardware replacement or system restore is required, it could potentially result in data loss. Therefore, taking a backup ensures that the data is protected and can be restored if needed.

    Rate this question:

  • 9. 

    Which of the following ports are used for secure sessions? (Select two.)

    • A.

      22

    • B.

      23

    • C.

      25

    • D.

      80

    • E.

      110

    • F.

      443

    Correct Answer(s)
    A. 22
    F. 443
    Explanation
    Ports 22 and 443 are used for secure sessions. Port 22 is used for Secure Shell (SSH), which provides secure remote access and file transfer. Port 443 is used for HTTPS (Hypertext Transfer Protocol Secure), which is the secure version of HTTP used for secure communication over the internet.

    Rate this question:

  • 10. 

    A technician has been asked to fix a problem with a projector. The projector lamp turns off for brief periods during a demonstration. After the technician replaced the lamp, the problem continued with an added message that appears just before the lamp turns off. Which of the following MOST likely need to be performed? (Choose two.)

    • A.

      Reset the lamp life counter

    • B.

      Replace the cooling fan

    • C.

      Adjust the brightness

    • D.

      Update the laptop video driver

    • E.

      Install a higher lumen lamp

    • F.

      Change the video resolution

    Correct Answer(s)
    A. Reset the lamp life counter
    B. Replace the cooling fan
    Explanation
    The technician should reset the lamp life counter because it may be incorrectly indicating that the lamp needs to be replaced when it is actually still functioning properly. Additionally, the technician should replace the cooling fan because the projector may be overheating, causing the lamp to turn off. These two actions will address both the incorrect message and the lamp turning off issue during the demonstration.

    Rate this question:

  • 11. 

    A user printed several documents to a shared network copier and noticed that they have very faint color density. A technician investigates the issue and verifies that the printer had a maintenance kit installed recently. Which of the following next steps will MOST likely resolve the issue? (Select two.)

    • A.

      Replace the toner cartridges

    • B.

      Replace the fuser module

    • C.

      Clean the paper tray rollers

    • D.

      Adjust the printer settings

    • E.

      Replace the developer

    • F.

      Empty the waste toner bottlers

    Correct Answer(s)
    A. Replace the toner cartridges
    C. Clean the paper tray rollers
    Explanation
    The faint color density in the printed documents suggests that the issue may be related to the toner cartridges. Replacing the toner cartridges can help resolve this issue. Additionally, cleaning the paper tray rollers can also improve the print quality as the rollers may be dirty or dusty, affecting the color density. Therefore, replacing the toner cartridges and cleaning the paper tray rollers are the most likely next steps to resolve the problem.

    Rate this question:

  • 12. 

    A customer wants to purchase a new home computer. The machine will mainly be used for internal browsing and streaming video, except on weekends when the customers’ son will use it to play games with friends. Which of the following should the technician focus on to meet these requirements?

    • A.

      80mm case fans

    • B.

      Four-core processor

    • C.

      RAID 5 array

    • D.

      16GB DDR2 memory

    • E.

      Dual monitors

    • F.

      Encrypted hard drive

    Correct Answer
    B. Four-core processor
    Explanation
    A four-core processor would be the most important feature to focus on in order to meet the customer's requirements. This is because a four-core processor can handle multitasking and provide sufficient processing power for both browsing and streaming video, as well as playing games. The other options, such as case fans, RAID 5 array, memory, dual monitors, and encrypted hard drive, are not directly related to the customer's specific needs for browsing, streaming, and gaming.

    Rate this question:

  • 13. 

    Which of the following features will save the battery life of a laptop significantly if they are disabled? (Choose two.)

    • A.

      Touchpad

    • B.

      Volume

    • C.

      Screen orientation

    • D.

      Cellular

    • E.

      Bluetooth

    • F.

      Fingerprint reader

    Correct Answer(s)
    D. Cellular
    E. Bluetooth
    Explanation
    Disabling the cellular and Bluetooth features on a laptop can significantly save its battery life. Cellular connectivity consumes a significant amount of power as it constantly searches for and maintains a connection to a network. Similarly, Bluetooth consumes power when it is actively searching for or connected to other devices. By disabling these features, the laptop can conserve battery power and extend its overall battery life.

    Rate this question:

  • 14. 

    Which of the following peripherals would a company use to take inventory quickly and update price tags for products? (Choose two.)

    • A.

      Barcode scanner

    • B.

      Label printer

    • C.

      Magnetic reader

    • D.

      KVM switch

    • E.

      NFC device

    • F.

      Flatted scanner

    Correct Answer(s)
    A. Barcode scanner
    C. Magnetic reader
    Explanation
    A company would use a barcode scanner to quickly scan the barcodes of products and gather information about them, such as their stock levels. This helps in taking inventory quickly and accurately. A magnetic reader, on the other hand, would be used to update price tags for products. It can read and update magnetic strips or cards that are commonly used for pricing and inventory purposes. Both of these peripherals are essential for efficient inventory management and price updating in a company.

    Rate this question:

  • 15. 

    A technician needs to routinely run scripting commands in Linux but does not want to walk over the server room every time to perform the task. The technician also travels between buildings and has a Windows 10 laptop with 4GB of memory and a fully partitioned 500GB hard drive. Which of the following steps should the technician take to resolve this issue? (Choose two.)

    • A.

      Increase the memory to 8GB.

    • B.

      Install a Linux guest VM.

    • C.

      Add another 500GB hard drive.

    • D.

       Create a Linux LiveBoot CD.

    • E.

      Repartition the hard drive.

    • F.

      Install Linux on a new ext3 partition.

    Correct Answer(s)
    E. Repartition the hard drive.
    F. Install Linux on a new ext3 partition.
    Explanation
    The technician should repartition the hard drive to create space for a new ext3 partition, and then install Linux on this new partition. By repartitioning the hard drive, the technician can allocate a portion of the hard drive specifically for Linux, allowing them to run scripting commands without the need to physically access the server room. Installing Linux on a new ext3 partition will provide the necessary environment for running scripting commands in Linux on the technician's Windows 10 laptop.

    Rate this question:

  • 16. 

    A server administrator set up a VM to be used in a lab setting. A technician is setting up thin-client computers to access this VM. Which of the following tasks are required to complete the project? (Choose three.)

    • A.

      Connect the device to a printer.

    • B.

      Install the operating system.

    • C.

      Install a USB keyboard and mouse.

    • D.

      Connect the device to the network.

    • E.

      Install the latest system updates.

    • F.

      Install the latest device drivers.

    • G.

      Connect the device to a monitor.

    • H.

      Install the necessary applications.

    Correct Answer(s)
    D. Connect the device to the network.
    E. Install the latest system updates.
    H. Install the necessary applications.
    Explanation
    The technician needs to connect the thin-client computers to the network in order to access the VM. Installing the latest system updates is necessary to ensure that the VM and the thin-client computers have the latest security patches and bug fixes. Installing the necessary applications is required to provide the thin-client computers with the software needed to access and interact with the VM.

    Rate this question:

  • 17. 

    A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.)

    • A.

      LCD power inverter

    • B.

      AC adapter

    • C.

      Battery

    • D.

      Processor

    • E.

      VGA card

    • F.

      Motherboard

    • G.

      Backlit keyboard

    • H.

      Wireless antenna

    Correct Answer(s)
    A. LCD power inverter
    B. AC adapter
    C. Battery
    Explanation
    The LCD power inverter, AC adapter, and battery are the most likely causes of the issue. The LCD power inverter is responsible for providing power to the laptop screen, so if it is malfunctioning, it could be draining the battery quickly. The AC adapter is responsible for charging the battery, so if it is not working properly, the battery may not be getting charged fully. Finally, if the battery itself is old or damaged, it may not hold a charge for very long.

    Rate this question:

  • 18. 

    A customer asks a technician to help set up a specialized computing system for video editing. Which of the following should the technician install on the workstation to BEST meet the customer’s specifications? (Choose two.)

    • A.

      SSD

    • B.

      Dual monitors

    • C.

      Gigabit NIC

    • D.

      Hypervisor

    • E.

      Docking station

    • F.

      NAS

    Correct Answer(s)
    A. SSD
    B. Dual monitors
    Explanation
    To meet the customer's specifications for a specialized computing system for video editing, the technician should install an SSD (Solid State Drive) and dual monitors. An SSD will provide faster and more efficient storage, allowing for quicker access to large video files and improved overall system performance. Dual monitors will provide the customer with more screen real estate, enhancing their ability to multitask and work with multiple video editing tools and windows simultaneously.

    Rate this question:

  • 19. 

    A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)

    • A.

      Documents findings, actions, and outcomes.

    • B.

      Reboot the device to verify the fix.

    • C.

      Reconnect the device to the network.

    • D.

      Verify the settings in IPConfig.

    • E.

      Research the problem based on symptoms.

    • F.

      Run a virus scan.

    Correct Answer(s)
    A. Documents findings, actions, and outcomes.
    F. Run a virus scan.
    Explanation
    After removing the malware and successfully pinging the router and accessing websites, the technician should document their findings, actions, and outcomes. This is important for record-keeping and future reference. Additionally, the technician should run a virus scan to ensure that all malware has been completely removed from the device. This will help to prevent any further connectivity issues or pop-ups on the screen.

    Rate this question:

  • 20. 

    A technician replaced a broken LED screen on a mobile computer. The operating system can be seen perfectly on screen, but the touch screen is non-responsive. Which of the following are the MOST probable root causes for the given failure? (Choose three.)

    • A.

      The hardware replacement used is a non-touch-screen.

    • B.

      The touch screen must be calibrated after a replacement.

    • C.

      The digitizer cable is not seated properly on the motherboard.

    • D.

      The new touch-screen drivers must be installed.

    • E.

      The replacement part is dead-on-arrival.

    • F.

      The LCD panel firmware must be updated.

    • G.

      The grounding screws are not securely attached.

    Correct Answer(s)
    A. The hardware replacement used is a non-touch-screen.
    C. The digitizer cable is not seated properly on the motherboard.
    D. The new touch-screen drivers must be installed.
    Explanation
    The first probable root cause is that the hardware replacement used is a non-touch-screen, which means it does not have the capability to respond to touch inputs. The second probable root cause is that the digitizer cable is not seated properly on the motherboard, which can result in a lack of connection between the touch screen and the device. The third probable root cause is that the new touch-screen drivers must be installed, as the operating system may not have the necessary software to recognize and interact with the touch screen.

    Rate this question:

  • 21. 

    A technician is setting up a WiFi-enabled thermostat for a customer, but the customer is concerned about IoT devices getting hacked. Which of the following BEST address the customer’s concerns? (Choose two.)

    • A.

      Use the latest encryption standard on the wireless network and set a strong password.

    • B.

      Enable two-factor authentication for the IoT device’s cloud account, if it is available.

    • C.

      Separate the IoT thermostat by segregating it in a DMZ network.

    • D.

      Disable wireless access on the thermostat to make it unshakable.

    • E.

      Upgrade the customer’s router to the latest version to improve network security.

    • F.

      Upgrade the customer’s wireless network encryption to WPA.

    Correct Answer(s)
    A. Use the latest encryption standard on the wireless network and set a strong password.
    C. Separate the IoT thermostat by segregating it in a DMZ network.
    Explanation
    To address the customer's concerns about IoT devices getting hacked, it is recommended to use the latest encryption standard on the wireless network and set a strong password. This will ensure that the communication between the thermostat and the network is secure. Additionally, segregating the IoT thermostat in a DMZ network will provide an extra layer of protection by isolating it from the main network, making it more difficult for hackers to gain access to other devices.

    Rate this question:

  • 22. 

    A client has three locations within city limits that need to be networked. Vendor network requirements for all three locations are a minimum of 1GB. Which of the following are the types of networks that will MOST likely be used for internal office and office-to-office networking? (Choose two.)

    • A.

      MAN

    • B.

      LAN

    • C.

      WAN

    • D.

      PAN

    • E.

      SAN

    • F.

      WLAN

    Correct Answer(s)
    A. MAN
    B. LAN
    Explanation
    The client needs to network three locations within the city limits. The options provided are MAN (Metropolitan Area Network), LAN (Local Area Network), WAN (Wide Area Network), PAN (Personal Area Network), SAN (Storage Area Network), and WLAN (Wireless Local Area Network). MAN and LAN are the most likely types of networks to be used for internal office and office-to-office networking. A MAN covers a larger geographical area than a LAN, typically spanning across a city or metropolitan area, making it suitable for connecting the client's locations within the city limits. A LAN, on the other hand, is designed for a smaller area, such as an office building or campus, and would be used to connect devices within each location.

    Rate this question:

  • 23. 

    Which of the following channels would commonly be used on an 802.11 wireless network?

    • A.

      6

    • B.

      17

    • C.

      802

    • D.

      8080

    Correct Answer
    A. 6
    Explanation
    The number 6 is the only option that could potentially represent a channel commonly used on an 802.11 wireless network. In this context, "channel" refers to the frequency range that the network operates on. The 802.11 standard specifies several channels that can be used for wireless communication, and these channels are typically represented by numbers. Therefore, option 6 is the most likely choice for a channel commonly used on an 802.11 wireless network.

    Rate this question:

  • 24. 

    Which of the following wireless standards is only capable of 5GHz frequencies?

    • A.

      802.11a

    • B.

      802.11ac

    • C.

      802.11b

    • D.

      D. 802.11g

    Correct Answer
    A. 802.11a
    Explanation
    802.11a is the correct answer because it is a wireless standard that operates only on the 5GHz frequency band. This standard was developed before the more commonly known 802.11b and 802.11g, which operate on both the 2.4GHz and 5GHz bands. The newer 802.11ac standard also operates on both bands, but 802.11a is the only option listed that is limited to the 5GHz frequency.

    Rate this question:

  • 25. 

    Ann, a user, reports that after setting up a new WAP in her kitchen she is experiencing intermittent connectivity issues. Which of the following should a technician check FIRST?

    • A.

      Channels

    • B.

      Frequency

    • C.

      Antenna power level

    • D.

      SSID

    Correct Answer
    A. Channels
    Explanation
    The technician should check the channels first because the intermittent connectivity issues could be caused by interference from other nearby wireless networks. By checking the channels, the technician can ensure that the WAP is operating on a channel with minimal interference, which can improve the overall connectivity.

    Rate this question:

  • 26. 

    A workstation was just moved to a new work location without a surge protector. It was working the day before, but now the PC will not power on, the fans will not spin, and there are no signs of activity. Which of the following should the technician do FIRST?

    • A.

      Check the power cable connection

    • B.

      Check the voltage of the PSU with a tester

    • C.

      Test for distended capacitors

    • D.

      Check the voltage switch

    Correct Answer
    A. Check the power cable connection
    Explanation
    The technician should first check the power cable connection because it is possible that the cable may have become loose or disconnected during the workstation's move. This is a simple and quick step that can potentially solve the issue and power on the PC.

    Rate this question:

  • 27. 

    An employee’s mobile device no longer charges, and the employee believes the battery is bad. A technician tests the mobile device and finds it will charge on a wireless charging pad but not when it is connected to a charging cable. Other devices charge without issue when the cable is used. Which of the following should the technician perform FIRST to resolve the issue?

    • A.

      Clean out the charging port on the device

    • B.

      Replace the mobile device’s battery

    • C.

      Issue a new charging cable to the employee

    • D.

      Send the device for service and give the employee a loaner

    Correct Answer
    A. Clean out the charging port on the device
    Explanation
    The technician should clean out the charging port on the device first. This is because the mobile device charges on a wireless charging pad, indicating that the battery is not the issue. Since other devices charge without issue when using the charging cable, it suggests that the problem lies with the charging port on the employee's mobile device. Cleaning out the charging port can help remove any dirt, debris, or lint that may be obstructing the connection between the charging cable and the device, allowing it to charge properly.

    Rate this question:

  • 28. 

    Joe, a user, sets up an IMAP connection on his smartphone to connect to webmail. Joe is able to view email, but he receives an error message when trying to send a message. When viewing the mail client’s configuration, Joe sees a valid SMTP server and port. Which of the following should Joe check NEXT to resolve the issue?

    • A.

      Configure the email account as a POP3 connection

    • B.

      Ensure the SSL/TLS option is being used

    • C.

      Check that the account password is still valid

    • D.

      Make sure the smartphone is not in airplane mode

    Correct Answer
    A. Configure the email account as a POP3 connection
    Explanation
    Joe should check that the account password is still valid next to resolve the issue. This is because even though Joe is able to view emails, he receives an error message when trying to send a message. This indicates that there may be an issue with the account password, which is required for authentication when sending emails. By checking the validity of the account password, Joe can ensure that it is correct and resolve the issue.

    Rate this question:

  • 29. 

    Which of the following is the MOST likely cause for a network PC to have an APIPA address?

    • A.

      DHCP failure

    • B.

      DNS resolution

    • C.

      Duplicate IP address

    • D.

      Cleared ARP cache

    Correct Answer
    A. DHCP failure
    Explanation
    A network PC having an APIPA (Automatic Private IP Addressing) address is most likely caused by a DHCP (Dynamic Host Configuration Protocol) failure. This means that the PC was unable to obtain an IP address automatically from the DHCP server. APIPA is a feature in Windows operating systems that assigns a unique IP address in the range of 169.254.0.0 to 169.254.255.255 when DHCP fails. This allows the PC to have a self-assigned IP address and still communicate with other devices on the local network.

    Rate this question:

  • 30. 

    The ability for new computers to be automatically connected to the network is provided by the:

    • A.

      DHCP server

    • B.

      DNS server

    • C.

      Proxy server

    • D.

      TACACS server

    Correct Answer
    A. DHCP server
    Explanation
    The DHCP server is responsible for automatically assigning IP addresses and other network configuration information to computers when they connect to the network. This allows new computers to easily join the network without the need for manual configuration. The DHCP server dynamically manages the IP address pool and leases out addresses to connected devices, ensuring efficient and automatic network connectivity.

    Rate this question:

  • 31. 

    Which of the following services provides the ability to resolve UNC to appropriate IP addresses?

    • A.

      DNS

    • B.

      DHCP

    • C.

      Proxy

    • D.

      Web server

    Correct Answer
    A. DNS
    Explanation
    DNS (Domain Name System) is the correct answer because it is a service that translates domain names into IP addresses. In this case, it resolves UNC (Universal Naming Convention) to appropriate IP addresses. UNC is a naming convention used to specify the location of resources on a network, such as file shares. DNS allows users to access these resources by translating the UNC path to the corresponding IP address, enabling communication between devices on the network.

    Rate this question:

  • 32. 

    Which of the following devices is used to implement network security policies for an environment?

    • A.

      Firewall

    • B.

      Managed switch

    • C.

      Repeater

    • D.

      Gateway

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a device used to implement network security policies for an environment. It acts as a barrier between a trusted internal network and an untrusted external network, filtering incoming and outgoing network traffic based on predetermined security rules. Firewalls can monitor and control network traffic, block unauthorized access, and protect against various types of cyber threats, such as malware, hacking attempts, and unauthorized access to sensitive data. By enforcing security policies, firewalls help to maintain the integrity, confidentiality, and availability of a network.

    Rate this question:

  • 33. 

    A technician receives a cellular from a manager. The technician is instructed to download a service manual directly from the Internet to a laptop. However, there is no WiFi signal or wired Ethernet. Which of the following would be the MOST appropriate connections for the technician to use?

    • A.

      Hotspot

    • B.

      NFC

    • C.

      Bluetooth

    • D.

      VPN

    Correct Answer
    A. Hotspot
    Explanation
    The most appropriate connection for the technician to use in this situation would be a hotspot. A hotspot allows the technician to connect to the internet using their cellular data plan. Since there is no WiFi signal or wired Ethernet available, using a hotspot would provide the technician with a reliable internet connection to download the service manual directly to the laptop. NFC and Bluetooth are not suitable in this scenario as they are typically used for short-range communication between devices, and VPN is a network security measure rather than a method of connecting to the internet.

    Rate this question:

  • 34. 

    The cloud model that represents a company maintaining some data in on-premise storage and some data in cloud-based storage is known as:

    • A.

      Hybrid

    • B.

      Private

    • C.

      Public

    • D.

      Community

    Correct Answer
    A. Hybrid
    Explanation
    The correct answer is hybrid. A hybrid cloud model refers to a combination of both on-premise storage and cloud-based storage. In this model, a company can choose to keep some of its data on its own servers (on-premise) and store some data in the cloud. This allows for greater flexibility and control over sensitive or critical data, while also taking advantage of the scalability and cost-effectiveness of cloud storage for non-sensitive data.

    Rate this question:

  • 35. 

    Which of the following is the main purpose of the +5VSB output of a power supply?

    • A.

      It allows peripherals to draw power when the machine is off

    • B.

      It provides power to the audio and sound boards of the machine

    • C.

      It acts as the main voltage supply to the motherboard and processor

    • D.

      It powers all expansion cards and external device hubs

    Correct Answer
    A. It allows peripherals to draw power when the machine is off
    Explanation
    The +5VSB output of a power supply is designed to provide power to peripherals even when the machine is turned off. This allows devices such as USB chargers, keyboard and mouse, and other peripherals to draw power and remain operational even when the computer is not in use. This is useful for charging devices, powering external hard drives, or any other peripherals that may require power even when the computer is not actively running.

    Rate this question:

  • 36. 

    A network administrator is attempting to access the firewall while inside the datacenter. Which of the following peripherals must be connected to do so?

    • A.

      KVM

    • B.

      Touchpad

    • C.

      Mouse

    • D.

      Keyboard

    Correct Answer
    A. KVM
    Explanation
    In order to access the firewall while inside the datacenter, the network administrator must have a KVM (Keyboard, Video, Mouse) peripheral connected. A KVM allows the administrator to control multiple servers or devices from a single console, including accessing the firewall. It provides the necessary input and output capabilities, allowing the administrator to use a keyboard, mouse, and monitor to interact with the firewall and perform necessary tasks.

    Rate this question:

  • 37. 

    A technician needs to call a user’s cellular provider to troubleshoot a network speed issue with the user’s mobile device. Which of the following technologies is the technician troubleshooting?

    • A.

      Long-term evolution

    • B.

      Near-field communication

    • C.

      Radio frequency ID

    • D.

      Z-wave

    Correct Answer
    A. Long-term evolution
    Explanation
    The technician is troubleshooting the Long-term evolution (LTE) technology. This is because LTE is a standard for wireless broadband communication for mobile devices. It provides high-speed data transmission and is commonly used for cellular networks. Therefore, if the technician needs to call the user's cellular provider to troubleshoot a network speed issue, it is likely related to the LTE technology.

    Rate this question:

  • 38. 

    Which of the following technologies can be used for wireless payments?

    • A.

      NFC

    • B.

      Bluetooth

    • C.

      IR

    • D.

      LTE

    Correct Answer
    A. NFC
    Explanation
    NFC (Near Field Communication) can be used for wireless payments. NFC technology allows for secure communication between devices in close proximity, typically within a few centimeters. It enables contactless payments by allowing a smartphone or other NFC-enabled device to communicate with a payment terminal when they are brought close together. This technology is widely used for mobile payment services like Apple Pay, Google Pay, and Samsung Pay, making it a suitable option for wireless payments. Bluetooth, IR (Infrared), and LTE (Long-Term Evolution) are not typically used for wireless payments.

    Rate this question:

  • 39. 

    The feature that allows users to store files in cloud-based when necessary, but can be removed when space is freed up, is known as:

    • A.

      On-demand

    • B.

      Resource pool

    • C.

      Synchronization application

    • D.

      Shared resources

    Correct Answer
    A. On-demand
    Explanation
    On-demand refers to a feature that allows users to store files in the cloud-based storage when needed, but these files can be removed or deleted when space is freed up. This feature provides flexibility and convenience to users as they can easily access and store their files without worrying about running out of storage space. It also helps in optimizing storage resources by removing unnecessary files when they are no longer needed.

    Rate this question:

  • 40. 

    Joe, a user, reports that his new smart wearable device is not synchronizing to his mobile device. Both devices are powered on, but the mobile device fails to read the data from the wearable. Which of the following will MOST likely fix this issue?

    • A.

      Pair the devices

    • B.

      Set the SSID

    • C.

      Update the smart wearable device firmware

    • D.

      Enable NFC

    Correct Answer
    A. Pair the devices
    Explanation
    Pairing the devices is the most likely solution to fix the issue. Pairing involves establishing a wireless connection between the smart wearable device and the mobile device, allowing them to communicate and exchange data. By pairing the devices, Joe will be able to synchronize the smart wearable device with his mobile device, resolving the problem of the mobile device failing to read data from the wearable.

    Rate this question:

  • 41. 

    A user wants to build a computer with a high-end CPU, plenty of RAM, and a high-end graphics card for online gaming. The user wants to verify that the graphics card is compatible with the motherboard. Which of the following connection types would the user MOST likely utilize to connect the video card to the motherboard?

    • A.

      PCle

    • B.

      ISA

    • C.

      AGP

    • D.

      USB

    Correct Answer
    A. PCle
    Explanation
    The user would most likely utilize the PCle (Peripheral Component Interconnect express) connection type to connect the high-end graphics card to the motherboard. PCle is a high-speed connection that is commonly used for graphics cards and provides faster data transfer rates compared to other connection types like ISA, AGP, or USB. This ensures that the graphics card can communicate effectively with the motherboard, allowing for optimal performance during online gaming.

    Rate this question:

  • 42. 

    A technician is hired to install network cable in a crawl space running the length of a hallway. To do so without a fire code violation, which of the following types of cable should the technician run?

    • A.

      Plenum

    • B.

      Fiber

    • C.

      Shielded

    • D.

      Coaxial

    Correct Answer
    A. Plenum
    Explanation
    To install network cable in a crawl space without violating fire codes, the technician should run plenum cable. Plenum cables are specifically designed to be installed in spaces such as air ducts, plenum spaces, and other areas where fire regulations are strict. These cables have a special coating that is fire-resistant and low-smoke producing, ensuring that they will not contribute to the spread of fire or emit toxic fumes in the event of a fire. Therefore, using plenum cable in this scenario would be the safest and code-compliant option.

    Rate this question:

  • 43. 

    A customer recently moved a high-end graphics card from a known-working computer to a different computer. The computer works without issue when viewing email and web pages or when using certain applications. However, when a game with high-end graphics requirements is opened, the program will run for a few minutes before the computer shuts down. Which of the following is MOST likely causing the problem?

    • A.

      Power supply wattage

    • B.

      Video RAM

    • C.

      CPU frequency

    • D.

      Monitor resolution

    Correct Answer
    A. Power supply wattage
    Explanation
    The most likely cause of the problem is the power supply wattage. When running high-end graphics games, the graphics card requires a significant amount of power. If the power supply does not have enough wattage to support the graphics card, it can cause the computer to shut down. This is because the power supply is not able to provide enough power to meet the demands of the graphics card, leading to a shutdown to protect the system from damage.

    Rate this question:

  • 44. 

    About one week ago, access to files on a network server became significantly slower. Today, network files are completely unavailable. A technician is able to make a remote connection to the server. Which of the following should the technician check NEXT?

    • A.

      RAID 5 array

    • B.

      NIC configuration

    • C.

      Available storage space

    • D.

      RAM utilization

    Correct Answer
    A. RAID 5 array
    Explanation
    The technician should check the RAID 5 array next. RAID 5 is a type of data storage technology that uses striping with parity to provide fault tolerance and data protection. If there is an issue with the RAID 5 array, it could be causing the slowdown in file access and the unavailability of network files. By checking the RAID 5 array, the technician can identify any potential issues with the storage system and take appropriate actions to resolve the problem.

    Rate this question:

  • 45. 

    In a virtual environment, which of the following allows all the VMs to have RAM allocated for use?

    • A.

      Resource pooling

    • B.

      Measured service

    • C.

      Virtual application streaming

    • D.

      Synchronization

    Correct Answer
    A. Resource pooling
    Explanation
    Resource pooling allows all the VMs in a virtual environment to have RAM allocated for use. Resource pooling is a technique where resources such as CPU, RAM, and storage are shared among multiple virtual machines. This allows for efficient utilization of resources and ensures that each VM has access to the necessary amount of RAM required for its operations. By pooling resources, the virtual environment can optimize resource allocation and provide a flexible and scalable infrastructure for running multiple VMs.

    Rate this question:

  • 46. 

    A systems administrator receives a notification from the RAID controller that the RAID 5 array is degraded. Upon logging into the server, the administrator sees that on local disk 0, physical disk 2 has failed. Which of the following is the BEST course of action to take to resolve the problem?

    • A.

      Schedule system downtime and replace physical disk 2. Wait until the array is rebuilt and confirm in the RAID controller that the system is no longer degraded.

    • B.

      Immediately replace physical disk 2. Wait until the arrays is rebuilt and confirm in the RAID controller that the system is no longer degraded.

    • C.

      Delete logical disk 0 and manually configure a new RAID array only using the known-good working drives. Wait until the array is rebuilt and confirm in the RAID controller that the system is no longer degraded.

    • D.

      In the controller, convert the RAID 5 array to RAID 0 array to avoid system downtime. Wait until the array is rebuilt and confirm in the RAID controller that the system is no longer degraded.

    Correct Answer
    A. Schedule system downtime and replace physical disk 2. Wait until the array is rebuilt and confirm in the RAID controller that the system is no longer degraded.
    Explanation
    The best course of action is to schedule system downtime and replace physical disk 2. This is because in a RAID 5 array, the failure of a single disk does not result in data loss, but it does degrade the array's performance. By replacing the failed disk and allowing the array to rebuild, the system will return to its normal state without any data loss. Confirming in the RAID controller that the system is no longer degraded ensures that the rebuild process was successful.

    Rate this question:

  • 47. 

    A technician is setting up a printer for a small office that does not have an RJ-45 jack. The users’ computers are all in the same workgroup and are connected physically to the same network switch. The technician needs to make sure all users can print to the new printer through the switch. Which of the following should the technician configure?

    • A.

      Shared printer

    • B.

      Print server

    • C.

      Bluetooth printing

    • D.

      Cloud printing

    Correct Answer
    A. Shared printer
    Explanation
    The technician should configure a shared printer. By setting up a shared printer, all users in the same workgroup can access and print to the printer through the network switch. This allows for easy printing and sharing of the printer among multiple users in the small office without the need for individual printer connections.

    Rate this question:

  • 48. 

    Which of the following devices performs forwarding decisions based on MAC addresses?

    • A.

      Switch

    • B.

      Router

    • C.

      Hub

    • D.

      Repeater

    Correct Answer
    A. Switch
    Explanation
    A switch is a networking device that operates at the data link layer of the OSI model. It uses MAC addresses to forward data packets within a local area network (LAN). When a switch receives a data packet, it examines the MAC address in the packet's header and determines which port to forward it to based on the destination MAC address. This allows for efficient and targeted forwarding of data within a network, making the switch the correct answer in this case.

    Rate this question:

  • 49. 

    Which of the following devices can utilize VLANs to secure networks?

    • A.

      Switch

    • B.

      Hub

    • C.

      Repeater

    • D.

      Bridge

    Correct Answer
    A. Switch
    Explanation
    Switches can utilize VLANs (Virtual Local Area Networks) to secure networks. VLANs allow for the segmentation of a network into smaller, isolated virtual networks, which enhances security by separating traffic and controlling access. By assigning different devices or groups of devices to different VLANs, network administrators can control communication and restrict access between devices, increasing network security. Switches are capable of creating and managing VLANs, making them an effective device for securing networks.

    Rate this question:

  • 50. 

    A user is connected to a docking station with an optical drive and is trying to back up personal files to removable media, but is encountering write errors. Which of the following is MOST likely cause of the errors?

    • A.

      The disk has already been finalized

    • B.

      The files are encrypted

    • C.

      There is a corrupt file on the hard drive

    • D.

      The files are not compatible with the type of disk used

    Correct Answer
    A. The disk has already been finalized

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.