Pre-Assessment

The following questions are designed to areas of the CompTIA A+ Certified Professional exams that you may need to focus on when reading through this book. Take time to review each question and come up with the best answer for each question. Be sure to verify your work with the pre-assessment answers that follow, and use the chapter reference given to learn more about the topic related to the question.

Questions

1. Which of the following drive types can benefit from periodic disk defragmentation?

(A) HDD

(B) DVD-RW

(C) CompactFlash

(D) SSD

2. You are assisting a customer in an upgrade from Windows 7 to Windows 8.1. Which upgrade method would you recommend if the user states that the computer has been infected by malware in the near past?

(A) Unattended installation

(B) Clean install

(C) Repair installation

(D) System reset

3. The appearance of a proprietary crash screen is likely an indicator of:

(A) Improperly disconnected USB drive

(B) Corrupted Windows Update

(C) Hardware incompatibility

(D) Missing GRUB loader

4. Which of the following Windows 8.1 features restores the entire system to its state at a previous point in time?

(A) Windows RE

(B) System Restore

(C) System Refresh

(D) System Image Recovery

5. Which of the following devices should you use if you need to share one keyboard and mouse with multiple computers?

(A) KVM

(B) Port replicator

(C) Set-top box

(D) Riser card

6. You plan to secure a network printer for a customer by implementing the WPA2 encryption protocol. Which connectivity method for the printer should you use?

(A) Bluetooth

(B) 802.11

(C) Infrared

(D) USB 3.0

7. You are helping a customer who needs a second wired Ethernet interface on her laptop computer. Which of the following is the recommended option?

(A) Install a PCI Ethernet card

(B) Use a USB to RJ-11 dongle

(C) Use a USB-to-RJ-45 dongle

(D) Disable the on-board WiFi adapter

8. Which of the following file systems is common on Linux systems?

(A) HFS

(B) FAT32

(C) NTFS

(D) EXT3

9. A customer has dropped off a system to have the processor upgraded. Which of the following features of CPU sockets make replacement of the CPU easier?

(A) XD-bit

(B) Virtualization

(C) Cores

(D) ZIF

10. You are a service technician for an accounting firm and need to upgrade the RAM on a high-end desktop workstation. You grab an 8GB SODIMM module from inventory and are having trouble installing it. Which of the following represents the reason for the installation problem?

(A) The workstation only takes 4GB modules

(B) The module is not compatible

(C) High-end workstations use flash memory

(D) High-end workstations use solid state memory

11. You are installing a new motherboard for a workstation within your office. When connecting the power to the motherboard, you notice a 6-pin power connector. What component does this typically supply power to?

(A) Graphics card

(B) CPU

(C) SATA drives

(D) EIDE drives

12. You are configuring the security for a customer’s wireless network. Which of the following identifies the least secure wireless encryption protocol?

(A) WPA

(B) WPA2

(C) WEP

(D) TKIP

13. You are configuring a small LAN for one of your customers. You would like to implement NAT. Which of the following devices would you use?

(A) Hub

(B) Switch

(C) Modem

(D) Router

14. You are configuring the security on a folder that resides on an NTFS volume and has been shared as Data. The NTFS permissions give Bob the modify permission to the folder, but the folder has been shared giving Bob the read permission. What are Bob’s effective permissions when he connects to the shared folder?

(A) Full control

(B) Read

(C) Modify

(D) No permission

15. You have installed virtualization software on the computer and are trying to create a virtual machine but you continue to receive an error. What is most likely the cause?

(A) Disable cache memory in the BIOS

(B) Enable XD-bit in the BIOS

(C) Change the boot order in the BIOS

(D) Enable virtualization in the BIOS

16. You have been noticing that your server has been performing slowly over the last few days and now all of a sudden no one can make a connection to the server. Looking at server log files you have determined that the server was under attack. What type of attack likely occurred?

(A) DoS

(B) MTM

(C) Dumpster dive

(D) Dictionary

17. You are troubleshooting Bob’s workstations to determine why he cannot get access to the Internet. You use the ipconfig command and get the following output. What is likely the cause?

PS C:> ipconfig /all

Ethernet adapter Ethernet:

Connection-specific DNS Suffix . : dcatt.ca

Description … … … . . : Qualcomm Atheros PCI-E Fast Ethernet

Physical Address… … … : 20-1A-06-34-2B-66

DHCP Enabled… … … . . : No

IPv4 Address… … … . . : 192.168.1.138

Subnet Mask … … … . . : 255.255.255.0

Default Gateway … … … : 192.168.2.1

DNS Servers … … … . . : 192.168.1.1

(A) There is no MAC address assigned to the system

(B) The DNS suffix is incorrect

(C) The default gateway address is incorrect

(D) The DNS server is incorrect

18. CompTIA has a six-step problem resolution process. What is the third step in the process?

(A) Identify the problem

(B) Test the theory to determine cause

(C) Establish a plan of action to resolve the problem and implement the solution

(D) Document findings, actions, and outcomes

19. You are working with a computer that is having a problem loading the user profile and the Windows Explorer interface. You have access to the command prompt window. What command will terminate the runaway process named RunAway.exe with a PID of 3375?

(A) Tasklist /Fl RunAway.exe

(B) Taskkill /FI RunAway

(C) Tasklist /PID 3375

(D) Taskkill /PID 3375

20. You are planning to move from your old office due to issues with power in the neighborhood. Within the neighborhood you are constantly being exposed to blackout, brownout, spikes, and voltage drops. Which device will protect you from all of these issues?

(A) Surge suppressor

(B) UPS

(C) Line conditioner

(D) Power tester

21. You have been called to a customer's computer to help her deal with a recent problem she has developed when starting an application. You think it may be due to components that are loading automatically when Windows boots and loads. Which tool can you use to disable services or perform a selective startup of Windows?

(A) diskpart.exe

(B) chkdsk.exe

(C) msconfig.exe

(D) defrag.exe

22. While managing a group of workers servicing computers in your repair shop, you have received complaints from them that they are seeing a lot of incidents of static discharge. They are worried about the components that they are working with. What steps can you take to reduce the chance of static discharge or ESD?

(A) Increase the relative humidity

(B) Decrease the relative humidity

(C) Increase the temperature

(D) Decrease the temperature

23. A user has called you while you are working on the support desk. He has an issue with power management settings that are being pushed out to users via Active Directory Group Policy Objects (GPO). After adjusting the GPO to correct the issue, you would like to have the client computer process the GPO changes immediately. What tool will you use to process the GPO changes?

(A) attrib

(B) gpresult

(C) expand

(D) gpupdate

24. You are working with a member of your IT administration team to set permissions on a Linux server on your network. You need to change the permissions granted to a group of users who will be accessing a directory. What command will you be using to change the permissions?

(A) chmod

(B) chown

(C) grep

(D) iwconfig

25. Your local IT administrator has made changes to C:oot.ini to change the loading process for his Windows 8.1 computer, but this does not seem to have had any effect on the boot process. What component controls the boot configuration and thereby the boot process on a Windows 8.1 computer?

(A) ntoskrnl.exe

(B) winload.exe

(C) ntdetect.com

(D) BCD

Answers

  1. A. The magnetic hard disk drive (HDD) definitely benefits from periodic disk defragmentation because its mechanical operation lends itself to fragmentation. See Book 2, Chapter 5.
  2. B. Personally, I wouldn't take a chance on an upgrade if the system is suspect. Instead, I recommend backing up the user state, performing a clean Windows 8.1 installation, and restoring the user state (which doesn't include program files) to the upgraded system. See Book 5, Chapter 3.
  3. C. Normally, the appearance of the “Blue Screen of Death” in Windows or the “Spinning Beach Ball of Death” (OS X) signifies a hardware incompatibility. For instance, you may have inadvertently installed the wrong RAM type in the system. See Book 7, Chapter 2.
  4. D. System Image Recovery involves creating an image of the entire system drive. Therefore, restoring a computer with a previously created recovery image restores the entire operating system environment to its state at the previous point in time. See Book 7, Chapter 3.
  5. A. A keyboard-video-mouse (KVM) switch is exactly what you need in this situation. You’ll often find KVMs in data centers so that engineers can easily manage several systems located in the same server rack. See Book 3, Chapter 2.
  6. B. WiFi Protected Access 2 (WPA2) encryption is available on IEEE 802.11 WiFi networks only. While we're on the subject, be sure never to use Wired Equivalent Privacy (WEP), which is a fundamentally broken WiFi security protocol. See Book 3, Chapter 4.
  7. C. If you remember that Ethernet uses the RJ-45 connector type, then you’ll answer this question correctly every time. Recall that RJ-11 is used for traditional telephones and (yuck) analog modem connections. See Book 3, Chapter 6.
  8. D. Linux computers typically use the EXT3 or EXT4 file systems, although they can support other file systems for compatibility with other operating system platforms. See Book 5, Chapter 3.
  9. D. A zero insertion force (ZIF) socket is a type of socket used with PGA and LGA chips to allow easy removal and installation of the processor chip. A ZIF socket has a lever that allows releases the processor and allows it to be lifted out of the socket. See Book 2, Chapter 2.
  10. B. Desktop computers use DIMM when installing RAM into the computer. SODIMM are used by laptop computers. See Book 2, Chapter 3.
  11. A. The 6-pin power connector is typically used to supply power to the PCIe graphics card. See Book 2, Chapter 1.
  12. C. In today’s day and age, you should avoid the WEP encryption protocol when configuring wireless security because the encryption with WEP is easy to crack. When encrypting wireless traffic, always use the newer protocols such as WPA2. See Book 8, Chapter 2.
  13. D. Network address translation, or NAT, is a network service that allows multiple systems and devices on the network to access the Internet using a single IP address. NAT is typically a service provided with routers. See Book 8, Chapter 1.
  14. B. When NTFS permissions conflict with shared folder permissions, the most restrictive permission will be the effective permission. In this case, read is more restrictive than modify. See Book 8, Chapter 3.
  15. D. Before trying to configure virtual machines on the system, you should verify that virtualization support has been enable within the BIOS. See Book 2, Chapter 4.
  16. A. A denial of service attack (DoS) is when a system is overloaded with requests from a hacker, which causes the server to be unresponsive to valid requests from clients, or eventually crashes the server. See Book 9, Chapter 1.
  17. C. The default gateway address is incorrect. The default gateway address must reference the same network ID as your client system; in this case, the address should start with the network ID of 192.168.1.x instead of 192.168.2.x. See Book 8, Chapter 3.
  18. B. The third step in the CompTIA problem is Test the theory to determine cause. You can review all six steps in Book 1, Chapter 2.
  19. D. Taskkill.exe supports several options to terminate a task either by name or by PID. To terminate a task by PID, you would use taskkill.exe /PID 3375 and to terminate by name, you would use taskkill.exe /IM notepad.exe. Read through Book 6, Chapter 3.
  20. B. The only device which protects against a blackout is a UPS. See Book 2, Chapter 6.
  21. C. The System Configuration Utility (msconfig.exe) can be used to perform a selective startup of Windows to assist in troubleshooting issues. Defrag.exe is used to defragment the disk; diskpart.exe is used to partition a disk; and chkdisk.exe is used to check your disks for errors. See Book 6, Chapter 4.
  22. A. To reduce the chance of ESD, you should increase the relative humidity. ESD risks are increased in dry air. Locate this information in Book 4, Chapter 1.
  23. D. The command gpupdate is used to trigger the processing of Activity Directory GPOs, while gpresult will display the effective results of GPOs. The command attrib is used to adjust file attributes, such as read-only and archive, while expand is used to expand compressed system files. See Book 5, Chapter 5.
  24. A. The command to change permissions is chmod, while chown will change the owner and group who has access to the resource. The grep command will display and filter contents of files or output from commands, and iwconfig is used to manage wireless configurations. Review Book 5, Chapter 1.
  25. D. The BCD or Boot Configuration Database stores boot configuration settings which are used during the boot process. The file ntoskrnl.exe is the operating system kernel; winload.exe is the operating system loader; and ntdetect.com was an OS load file from older Windows OSes. Review Book 5, Chapter 6.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.201.95