The following questions are designed to areas of the CompTIA A+ Certified Professional exams that you may need to focus on when reading through this book. Take time to review each question and come up with the best answer for each question. Be sure to verify your work with the pre-assessment answers that follow, and use the chapter reference given to learn more about the topic related to the question.
1. Which of the following drive types can benefit from periodic disk defragmentation?
(A) HDD
(B) DVD-RW
(C) CompactFlash
(D) SSD
2. You are assisting a customer in an upgrade from Windows 7 to Windows 8.1. Which upgrade method would you recommend if the user states that the computer has been infected by malware in the near past?
(A) Unattended installation
(B) Clean install
(C) Repair installation
(D) System reset
3. The appearance of a proprietary crash screen is likely an indicator of:
(A) Improperly disconnected USB drive
(B) Corrupted Windows Update
(C) Hardware incompatibility
(D) Missing GRUB loader
4. Which of the following Windows 8.1 features restores the entire system to its state at a previous point in time?
(A) Windows RE
(B) System Restore
(C) System Refresh
(D) System Image Recovery
5. Which of the following devices should you use if you need to share one keyboard and mouse with multiple computers?
(A) KVM
(B) Port replicator
(C) Set-top box
(D) Riser card
6. You plan to secure a network printer for a customer by implementing the WPA2 encryption protocol. Which connectivity method for the printer should you use?
(A) Bluetooth
(B) 802.11
(C) Infrared
(D) USB 3.0
7. You are helping a customer who needs a second wired Ethernet interface on her laptop computer. Which of the following is the recommended option?
(A) Install a PCI Ethernet card
(B) Use a USB to RJ-11 dongle
(C) Use a USB-to-RJ-45 dongle
(D) Disable the on-board WiFi adapter
8. Which of the following file systems is common on Linux systems?
(A) HFS
(B) FAT32
(C) NTFS
(D) EXT3
9. A customer has dropped off a system to have the processor upgraded. Which of the following features of CPU sockets make replacement of the CPU easier?
(A) XD-bit
(B) Virtualization
(C) Cores
(D) ZIF
10. You are a service technician for an accounting firm and need to upgrade the RAM on a high-end desktop workstation. You grab an 8GB SODIMM module from inventory and are having trouble installing it. Which of the following represents the reason for the installation problem?
(A) The workstation only takes 4GB modules
(B) The module is not compatible
(C) High-end workstations use flash memory
(D) High-end workstations use solid state memory
11. You are installing a new motherboard for a workstation within your office. When connecting the power to the motherboard, you notice a 6-pin power connector. What component does this typically supply power to?
(A) Graphics card
(B) CPU
(C) SATA drives
(D) EIDE drives
12. You are configuring the security for a customer’s wireless network. Which of the following identifies the least secure wireless encryption protocol?
(A) WPA
(B) WPA2
(C) WEP
(D) TKIP
13. You are configuring a small LAN for one of your customers. You would like to implement NAT. Which of the following devices would you use?
(A) Hub
(B) Switch
(C) Modem
(D) Router
14. You are configuring the security on a folder that resides on an NTFS volume and has been shared as Data. The NTFS permissions give Bob the modify permission to the folder, but the folder has been shared giving Bob the read permission. What are Bob’s effective permissions when he connects to the shared folder?
(A) Full control
(B) Read
(C) Modify
(D) No permission
15. You have installed virtualization software on the computer and are trying to create a virtual machine but you continue to receive an error. What is most likely the cause?
(A) Disable cache memory in the BIOS
(B) Enable XD-bit in the BIOS
(C) Change the boot order in the BIOS
(D) Enable virtualization in the BIOS
16. You have been noticing that your server has been performing slowly over the last few days and now all of a sudden no one can make a connection to the server. Looking at server log files you have determined that the server was under attack. What type of attack likely occurred?
(A) DoS
(B) MTM
(C) Dumpster dive
(D) Dictionary
17. You are troubleshooting Bob’s workstations to determine why he cannot get access to the Internet. You use the ipconfig command and get the following output. What is likely the cause?
PS C:> ipconfig /all
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . : dcatt.ca
Description … … … . . : Qualcomm Atheros PCI-E Fast Ethernet
Physical Address… … … : 20-1A-06-34-2B-66
DHCP Enabled… … … . . : No
IPv4 Address… … … . . : 192.168.1.138
Subnet Mask … … … . . : 255.255.255.0
Default Gateway … … … : 192.168.2.1
DNS Servers … … … . . : 192.168.1.1
(A) There is no MAC address assigned to the system
(B) The DNS suffix is incorrect
(C) The default gateway address is incorrect
(D) The DNS server is incorrect
18. CompTIA has a six-step problem resolution process. What is the third step in the process?
(A) Identify the problem
(B) Test the theory to determine cause
(C) Establish a plan of action to resolve the problem and implement the solution
(D) Document findings, actions, and outcomes
19. You are working with a computer that is having a problem loading the user profile and the Windows Explorer interface. You have access to the command prompt window. What command will terminate the runaway process named RunAway.exe
with a PID of 3375?
(A) Tasklist /Fl RunAway.exe
(B) Taskkill /FI RunAway
(C) Tasklist /PID 3375
(D) Taskkill /PID 3375
20. You are planning to move from your old office due to issues with power in the neighborhood. Within the neighborhood you are constantly being exposed to blackout, brownout, spikes, and voltage drops. Which device will protect you from all of these issues?
(A) Surge suppressor
(B) UPS
(C) Line conditioner
(D) Power tester
21. You have been called to a customer's computer to help her deal with a recent problem she has developed when starting an application. You think it may be due to components that are loading automatically when Windows boots and loads. Which tool can you use to disable services or perform a selective startup of Windows?
(A) diskpart.exe
(B) chkdsk.exe
(C) msconfig.exe
(D) defrag.exe
22. While managing a group of workers servicing computers in your repair shop, you have received complaints from them that they are seeing a lot of incidents of static discharge. They are worried about the components that they are working with. What steps can you take to reduce the chance of static discharge or ESD?
(A) Increase the relative humidity
(B) Decrease the relative humidity
(C) Increase the temperature
(D) Decrease the temperature
23. A user has called you while you are working on the support desk. He has an issue with power management settings that are being pushed out to users via Active Directory Group Policy Objects (GPO). After adjusting the GPO to correct the issue, you would like to have the client computer process the GPO changes immediately. What tool will you use to process the GPO changes?
(A) attrib
(B) gpresult
(C) expand
(D) gpupdate
24. You are working with a member of your IT administration team to set permissions on a Linux server on your network. You need to change the permissions granted to a group of users who will be accessing a directory. What command will you be using to change the permissions?
(A) chmod
(B) chown
(C) grep
(D) iwconfig
25. Your local IT administrator has made changes to C:oot.ini
to change the loading process for his Windows 8.1 computer, but this does not seem to have had any effect on the boot process. What component controls the boot configuration and thereby the boot process on a Windows 8.1 computer?
(A) ntoskrnl.exe
(B) winload.exe
(C) ntdetect.com
(D) BCD
Taskkill.exe
supports several options to terminate a task either by name or by PID. To terminate a task by PID, you would use taskkill.exe
/PID 3375 and to terminate by name, you would use taskkill.exe
/IM notepad.exe. Read through Book 6, Chapter 3.msconfig.exe
) can be used to perform a selective startup of Windows to assist in troubleshooting issues. Defrag.exe
is used to defragment the disk; diskpart.exe
is used to partition a disk; and chkdisk.exe
is used to check your disks for errors. See Book 6, Chapter 4.gpupdate
is used to trigger the processing of Activity Directory GPOs, while gpresult
will display the effective results of GPOs. The command attrib
is used to adjust file attributes, such as read-only and archive, while expand
is used to expand compressed system files. See Book 5, Chapter 5.chmod
, while chown
will change the owner and group who has access to the resource. The grep
command will display and filter contents of files or output from commands, and iwconfig
is used to manage wireless configurations. Review Book 5, Chapter 1.ntoskrnl.exe
is the operating system kernel; winload.exe
is the operating system loader; and ntdetect.com
was an OS load file from older Windows OSes. Review Book 5, Chapter 6.18.191.201.95