CompTIA A+ Exam Questions

Page 8 of 50

141.

What is used to discharge and dissipate the energy from a monitor capacitor such as those in a CRT monitor?

  • High-voltage probe

  • Multimeter

  • Screwdriver

  • Punch-down tool

Correct answer: High-voltage probe

Though it is advised that you should not service monitors, if you do have to, it is important to use a high-voltage probe to discharge all the energy contained in the monitor. The electric shock potential within a CRT monitor can be enough to cause serious injury and even death.

A multimeter measures voltage. A screwdriver would not safely discharge a monitor. A punch-down tool is used to attach cables to a patch panel.

142.

If you have an electrical device that becomes unstable when other electrical components function fine, what is the MOST probable cause?

  • EMI

  • ESD

  • Power shortage

  • Power overload

Correct answer: EMI

Electromagnetic interference (EMI) is caused when an electromagnetic field from a second device affects your computer components. Hard drives, floppy disks, and flash drives are a few of the susceptible components.

Electro-static discharge (ESD) is static electricity that can harm electronic components. A power shortage or power overload would affect all other devices, too.

143.

A user's computer will only boot into VGA mode. Which solution should be attempted FIRST to fix this issue?

  • Reinstall the driver

  • Replace the video card

  • Reset the monitor

  • Reseat the video card

Correct answer: Reinstall the driver

Try reinstalling the driver while in VGA mode. If that does not work, you may need to replace the video card.

Replacing the video card should be tried after reinstalling the driver. Resetting the monitor won't affect the resolution that the video card outputs. Reseating the video card should be tried after trying software solutions.

144.

Several material manufacturers and producers are working together to create some complex rock components. They need to share information and collaborate while providing resources for various custom applications and development of those applications. They decided to create a cloud infrastructure due to these common interests and have enhanced security because only trusted parties are permitted access.

Which of the following BEST describes their cloud configuration?

  • Community cloud

  • Hybrid cloud

  • Private cloud

  • Public cloud

Correct answer: Community cloud

Community clouds are created during situations when multiple organizations want to create a cloud out of shared common interests. In this scenario, these organizations deal with classified information that they need to share securely while providing resources for their custom applications. This is best suited to a community cloud where each organization shares and manages the cloud resources.

A hybrid cloud is a combination of public and private cloud types. A private cloud is when a company runs its own virtualization software. A public cloud is when cloud services are provided by a third party.

145.

What activity ensures that you clear computer memory?

  • Restart the computer

  • Log in as a new user

  • Defragment the disk

  • End tasks in Task Manager

Correct answer: Restart the computer

The only way to completely clear memory is to reboot the computer. If you have issues with the computer, sometimes, the best way to fix it is to perform a reboot and clear the memory. With the memory clean, the computer starts like a blank slate, which often resolves many issues.

Logging in as a new user does not clear the RAM. Defragmenting makes files on the disk continguous. Ending tasks in Task Manager will not clear all the memory.

146.

During the fusing process, what is happening to the toner?

  • It's melting into the paper.

  • It's being sprayed onto the paper.

  • It's being character-impacted into the paper.

  • It's being mixed into impact dots.

Correct answer: It's melting into the paper

During the laser printing process, the fuser's job is to melt the toner into the paper. The toner is not permanently attached before fusing and could easily be wiped off with your finger. The fusing component usually contains two rollers that heat up and melt the ink into the paper.

147.

You are onsite with a customer, and he asks you if he could upgrade to Windows 10 64-bit. You begin investigating the system and find that it has a 120 GB HDD and 3 GB of RAM. What should you do?

  • Purchase a license, back up any data, and upgrade the computer

  • Upgrade the RAM, purchase a license, back up any data, and upgrade the computer

  • Back up any data, upgrade the HDD, purchase a license, and upgrade the computer

  • Upgrade both the RAM and HDD, back up any data, purchase a license, and upgrade the computer

Correct answer: Purchase a license, back up any data, and upgrade the computer

Windows 10 64-bit requires 32 GB of hard drive space and 2GB of RAM as a minimum to install. It is important before any system upgrades that the data is properly backed up to ensure that nothing is lost. Then, a license would need to be purchased before the upgrade could be properly performed.

You don't need to upgrade either the RAM or HDD based on the information given.

148.

What does the command "GPRESULT /r" do?

  • Displays the Group Policy for the local user

  • Specifies that results should be super-verbose

  • Specifies the remote system to connect to

  • Specifies the password to use

Correct answer: Displays the Group Policy for the local user

"GPRESULT" can display the Group Policies currently applied to the local computer or user as well as remote users and computers. It will also display which policies take precedence and which were actually overridden. "GPRESULT /r" specifically provides the policies applied to the current user.

The "/z" switch specifies that the result should be super-verbose. The "/s" switch specifies the remote system to connect to. The "/p" switch specifies the password.

149.

What security device/method was named after the chain that was used to hold pocket watches?

  • Key fob

  • Bollard

  • Magnetometer

  • Mantrap

Correct answer: Key fob

A key fob is a security device named after the chain used to hold a timepiece securely in one's pocket. This security device generates a random number that's synced to a server. The user must enter this number to log in to the system.

A bollard is a short post designed to be a barrier to entry. A magnetometer is used to detect metallic objects. A mantrap, also known as an access control vestibule, is a small room with two controlled doors that is used to prevent tailgating or to trap someone.

150.

A user is in the Task Manager and sees an application running that they do not recognize. They want to see which user on the system started the application. Which tab in the Task Manager will show them this information?

  • Details

  • Services

  • Processes

  • Performance

Correct answer: Details

In the Details tab, you can see details about each process such as the name, process id, memory allocation, and user who started it. You can also end the task by clicking the End Task button.

The Services tab lists services and their status. The Processes tab shows the processes and their resource usage. The Performance tab shows the system's resource usage.

151.

What does OSHA stand for?

  • Occupational Safety and Health Administration

  • Orienting Special Homing Address

  • Occupational Special Hazard Agency

  • Operational Safety and Health Administration

Correct answer: Occupational Safety and Health Administration

The Occupational Safety and Health Administration (OSHA) is an important government agency that provides regulations and standards for the U.S. workforce, ensuring that all workers have the ability to work in relative safety and health. Essentially, the administration works to ensure that all employers minimize as many risks to their workers as is physically possible.

152.

A customer wants to be able to securely communicate with their office network while they are traveling. The customer is concerned that when accessing the network in public places like a coffee shop, their data won't be secure. 

Which of the following would solve this issue?

  • VPN

  • DDoS

  • HTTPS

  • DHCP

Correct answer: VPN

A virtual private network (VPN) is a private network connection that occurs through a public network. A private network provides security over an otherwise non-secure network. VPNs can be used to connect remote ends to the network to make it appear as one unified network with secure tunnels built into the communication.

A distributed denial-of-service (DDoS) is an attack that sends excessive traffic to take down a server. HTTPS is used to secure web browser traffic. DHCP assigns IP addresses to users.

153.

What icon do you tap to find and install a new app on an Android?

  • Play Store

  • App Store

  • Microsoft Store

  • Settings

Correct answer: Play Store

The Play Store is a Google-maintained repository to install a new app. It is Google's official app market. Just tap "Install" on the app, and the Android device does the rest. 

The App Store is for iOS. The Microsoft Store is for Windows. The Settings button is for changing Android settings.

154.

Which IPv6 address range is for link local unicast addresses?

  • FE80::/10

  • FF00::/8

  • FC00::/7

  • 2000::/3

Correct answer: FE80::/10

The FE80::/10 range is for link local addresses. This has the same functionality as automatic addresses (APIPA) on IPv4 networks.

The FF00::/8 range is for multicast. The FC00::/7 range is for unique local unicasts. The 2000::/3 range is for global unicast addresses to be used on the internet.

155.

What wireless technology standard is used to implement most modern wireless Ethernet networks?

  • 802.11

  • 803.11

  • 804.11

  • 801

Correct answer: 802.11

IEEE 802.11 defines standards for implementing a Wireless Local Area Network (WLAN). There are many different protocols within the 802.11 standard, some of which are very familiar, such as 802.11b/g/n/a, which is used by routers to provide Wi-Fi with speeds up to about 1300 Mbit/s. 

803.11, 804.11, and 801 are not wireless technology standards.

156.

MIDI stands for which of the following?

  • Musical Instrument Digital Interface

  • My Installed Data (Integrated)

  • Media Integrated Digital Interface

  • Music Input Data Interface

Correct answer: Musical Instrument Digital Interface

Musical Instrument Digital Interface (MIDI) files contain music, but they are not strictly music files like an MP3 or WAV file. A MIDI device synthesizes musical instrumentation and stores the information to a text file. These text files take advantage of sound processing hardware to produce musical sounds that you hear through speakers.

157.

A user reports that one of their applications is crashing frequently. What tool can an administrator use to see when the crashes occur and what applications are involved?

  • Reliability Monitor

  • Windows Recovery Console

  • Task Manager

  • Device Manager

Correct answer: Reliability Monitor

The Reliability Monitor can be used to identify the conditions surrounding a crash. The application version, as well as other applications running at the time, can be seen.

The Windows Recovery Console is used during system startup. The Task Manager is used to monitor system processes and resources. The Device Manager is used to configure hardware.

158.

A user reports that unusual files have appeared on their hard drive. They have also noticed that some files have disappeared. 

What could be the cause of this?

  • Virus

  • Outdated driver

  • Fragmented hard drive

  • Corrupt BCD

Correct answer: Virus

One symptom of a virus is having unusual files show up or having others disappear. When a virus is suspected, that system should be quarantined.

Outdated drivers would not remove files. A fragmented hard drive would slow down file operations. A corrupt BCD would impact the computer booting up.

159.

You should NOT wear an antistatic wrist strap when repairing which of the following computer components?

  • Power supply

  • Mouse

  • Hard drive

  • Motherboard

Correct answer: Power supply

A power supply discharges high levels of electricity, which transfers to you when you wear an ESD wrist strap. You should also avoid wearing it when repairing a monitor. Wearing an ESD strap while repairing either one of these devices can lead to serious injury or death.

An antistatic wrist strap is useful for repairing a mouse, hard drive, or motherboard because it will keep static from damaging the components.

160.

You determine that the yellow cartridge in an inkjet printer has run out of ink. What should you do?

  • Replace just the yellow cartridge

  • Replace the whole cartridge set

  • Replace the yellow cartridge and the black cartridge

  • Replace the cyan cartridge and the yellow cartridge

Correct answer: Replace just the yellow cartridge

In many cases, color inkjet printers use separate color cartridges, so you only need to replace one color instead of the whole cartridge when one color runs out. However, this is not always the case, so be sure to check the printer manufacturer's documentation. 

Inkjet printers do not have print drums. Inkjet printers have replaceable ink cartridges, so the printer does not have to be replaced if the ink runs out.