Comptia A+ 901: Part 1 Flashcards Preview

Technology > Comptia A+ 901: Part 1 > Flashcards

Flashcards in Comptia A+ 901: Part 1 Deck (72)
Loading flashcards...
1

What type of components might you find inside a PC?
A. RAM
B. CPU
C. Mouse
D. Printer
E. Cable modem
F. Motherboard

A, B, and F.

Common components found inside a PC are RAM, Motherboards, hard drives, CPUs, adapter cards and power supplies.

You would not find keyboards, mice, cable modems or printers. These are output devices which are located outside of a PC.

2

Which of the following will be the first to receive heat leaving a processor?

A) Case Fan
B) CPU FAN
C) Heat Sink
D) Thermal Paste

D) Thermal Paste

Thermal paste (or Thermal grease) is designed to conduct heat traveling between two elements. In this case, Thermal paste allows heat to efficiently leave the processor and travel to the heat sink.

3

Select the option that could properly be used to describe the characteristics of a VGA cable?

A) VGA supports both audio and video
B) VGA uses analog signals
C) VGA uses the standard db-9 connector
D) VGA uses digital signals

B) VGA uses analog signals

Video Graphics Array (VGA) cables use analog signals and a 15 pin connector.

4

You are an IT Support Technician for a large office building. A user is complaining their laptop often does not charge or stops charging if they move it. What is most likely the issue?

A) CMOS Battery
B) Laptop's DC Jack
C) The wall outlet nearest to the client's desk
D) Laptop's AC Jack

B) Laptop's DC Jack

The DC jack is where the power adapter feeds power to the laptops power supply, and can often break due to heat or become loose over time.

5

A supervisor has asked you to update the BIOS on a customer's laptop. Where is the best place to find the correct BIOS firmware?

A) Third party website
B) BIOS developer website
C) Microsoft
D) Manufacturer's website

D) Manufacturer's website

The best place to find any firmware or software upgrade for a device is through manufacture support. Although it may be possible to find the correct software elsewhere, the manufacture is likely to have tested each version prior to release.

6

You need to configure a SOHO network to provide IP Addresses to devices on the network. Which feature should be enabled?

A) DNS
B) MAC Filtering
C) SSID BCST
D) DHCP

D) DHCP

Dynamic Host Configuration Protocol (DHCP) is the protocol responsible for assigning IP addresses.

7

Of the following choices, which is an industry standard protocol used by computer networks to assign IP Addresses to network nodes and devices?

A) DNS
B) ARP
C) RARP
D) DHCP

D) DHCP

Dynamic Host Configuration Protocol (DHCP) assigns IP's to network devices. Domain Name Service (DNS) translates between IP Addresses and Domain names. Address Resolution Protocol translates between IP Addresses and MAC Addresses (Reverse-ARP, RARP does the opposite)

8

You are trying to use RDP to control a Windows computer from your office to an accountant's computer in the corporate office building. What port should be opened in the firewalls between the two locations?

A) 21
B) 22
C) 3389
D) 143

C) 3389

Remote Desktop Protocol (RDP) uses port 3389 to communicate.

9

You are a Desktop Technician in a company's IT Department. You need to find the hardware specifications of a desktop, however the device does not have an operating system installed. Which of the following options will display this information?

A) MBR
B) BIOS
C) TPM
D) None of the above

B) BIOS

The BIOS (Basic Input Output System) firmware application will display information like the CPU, RAM and hard drive information. It is not necessary to have an operating system installed to utilize the BIOS.

10

Which of the following is the default TCP/IP port for the standard HTTP protocol?

A) TCP 80
B) TCP 22
C) TCP 23
D) TCP 443

A) TCP 80

The Hyper Text Transfer Protocol (HTTP) uses port TCP 80 by default. The encrypted version (HTTPS) uses TCP 443.

11

What CAT version is RATED to provide a transmission speed of 1000 Mbps?

A) CAT3
B) CAT5e
C) CAT6
D) None of the above

B) CAT5e

CAT5e is rated at 1000 megabits per second.

12

Which of the following properly describes the basic operating of a layer 2 network switch?

A) Transmits packets it receives to specific connections, based on MAC address.
B) Enables packets to be sent from one network to another
C) Determines if a packet is safe for a network
D) Broadcasts packets it receives to all connections

A) Transmits packets it receives to specific connections, based on MAC address.

A switch will route packets to one connection, based on the destination MAC Address.

13

Which of the following network standards can operate at two different channel widths on the same spectrum simultaneously?

A) 802.11g
B) 802.11n
C) 802.11b
D) 802.11a

B) 802.11n

Using "channel bonding" the 802.11n wireless standard is capable of operating on two separate channels at the same time. This feature allows 802.11n networks to double their bandwidth, however it can result in increases interference and power usage.

14

Which of the following options would typically be associated with encryption?

A) Memory
B) CPU
C) TPM
D) UEFI

C) TPM

TPM (Trusted Platform Module) is a standard cryptoprocessor used to store cryptographic keys

15

A customer is explaining their PC's symptoms, but you already know what the issue is. Which is the most appropriate action?

A) Continue listening to the customer's explanation, when they are done refer them to a website to find a solution
B) Ask the customer to repeat the problem and all the symptoms several times, for clarity.
C) Finish listening to their explanation and then explain the solutions
D) Politely interrupt them and tell them your solutions.

C) Finish listening to their explanation and then explain the solutions

You should always do your best not to interrupt a customer while they are speaking, unless it going to take an excessive amount of time.

16

Which of the following is a GUI based BIOS software application?

A) UEFI
B) POST
C) Grub
D) MBR

A) UEFI

UEFI (Unified Extensible Firmware Interface) is a GUI based BIOS application that has replaced many Legacy BIOS systems.

17

ECC type memory would be most commonly found in which type of device?

A) Tablet
B) Desktop
C) Gaming laptop
D) Server

D) Server

ECC memory is most commonly found in servers because a server has a much higher load and fault tolerance requirement than an average computer or device.

18

Which of the following wireless communication standards requires LOS in order to operate?

A) Bluetooth
B) IR
C) RF
D) WiFi

B) IR

Infrared is a wireless technology that requires a clear path between communication devices. A good example of this, is a TV Remote.

19

Why would you use plenum rated cables when installing new cabling in a data-center?

A) Efficiently reduces EMI and cross talk in STP cabling
B) Allows cabling to be easily bent without snapping
C) Reduction in hazardous fumes in the event of a fire
D) Ensures an intruder cannot wire tap your cabling

C) Reduction in hazardous fumes in the event of a fire

Plenum is a special material used to jacket a cable, this jacket is fire retardant and will reduce the amount of hazardous fumes in the air if the cable is subject to a fire.

20

Which of the following properly describes the purpose of a KVM?

A) Allows for touch screen interaction
B) Allows for one set of peripherals to control multiple computers
C) Allows for one computer to be viewed on many monitors at once
D) Enhanced graphics for video games

B) Allows for one set of peripherals to control multiple computers

A KVM (Keyboard Video Mouse) Switch is used to use a single set of peripherals with multiple physical machines.

21

You are a Server Administrator at a small company. Company policy dictates that all remote connections must be encrypted and accessed using some form of authentication. Which of the following will allow a user to upload a large file from home, while adhering to company policy?

A) SSH
B) SMTP
C) SFTP
D) FTP

C) SFTP

Secure-FTP (or SSH-FTP) uses Secure Shell (SSH) to encrypt a File Transfer Protocol (FTP) connection. This allows you to upload files to a SFTP server on a secure connection. FTP servers can also be configured to require a username/password as authentication.

22

Which of the following network topologies provides the most redundancy to protect against network outages?

A) Mesh
B) Ring
C) Bus
D) Star

A) Mesh

In a Mesh network topology every network node (router, switch, hub, etc) is connected to every other network node. If a connection breaks, the node can easily communicate with another through multiple existing connections. In reality this is too complex to implement in a large network, but it is still very common to see a hybrid network with several mesh style layers.

23

When should a static IP Address be used?

A) User workstations
B) When using CIDR addressing
C) Thin clients
D) Servers

D) Servers

Servers should always be given a static IP Address to ensure it can be quickly resolved and any applications using the IP address do not need to be reconfigured.

24

You are a network technician for a consulting company. A small company with several wireless access points has been experiencing intermittent outages for employees near the break room. What is most likely the cause?

A) Line of Sight
B) Cross talk
C) Infrared radiation
D) Microwave causing interference

D) Microwave causing interference

Microwave ovens operate on the 2.4 Ghz frequency, same as most WiFi networks. The intermittent outages are likely being caused by people using the microwave oven in the break room.

25

Which TCP port number is used by Post Office Protocol 3?

A) 110
B) 143
C) 125
D) 25

A) 110

POP3 (Post Office Protocol) uses TCP 110 to communicate.

In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP has been developed through several versions, with version 3 (POP3) being the last standard in common use before largely being made obsolete by the more advanced …

26

You are a Desktop and Laptop Technician for a small computer repair shop. A customer on a limit budget has asked you to upgrade their laptop in order to increase performance. Which of the following components can be easily replaced or upgraded?

A) Video Card
B) Processor
C) Motherboard
D) RAM

D) RAM

Laptop designs often make it difficult to upgrade or change components like video cards, processors and motherboards. RAM and Hard drives are typically easily accessible and cost effective to upgrade in a laptop.

27

How many pins are present in SATA data and power cables?

A) 15 for power and 7 for data
B) 8 for data and 12 for power
C) 40 for data and 4 for power
D) 15 for both power and data

A) 15 for power and 7 for data

SATA (Serial Advanced Technology Attachment) has two main connector types. The power connector is larger with 15 pins, while the data connector is 7 pins. Both are an L shape to avoid inserting a connector incorrectly.

28

While troubleshooting a hardware issue on the laptop you have come to the conclusion that there is a physical issue with one of the laptop's components. The laptop is not plugged into an external power source, what is the next step before opening the laptop's case?

A) Pop the keyboard off
B) Unhinge the LCD Screen
C) Unplug the laptop from the power souce
D) Remove battery

D) Remove battery

All power sources should be disconnected from the laptop before accessing any internal components. This includes the power supply or charging cable as well as the device's battery.

29

Your supervisor has asked you to record the IP version 6 addresses of several SUSE Linux systems into a spreadsheet. Which command can you use to obtain this information?

A) IPCONFIG
B) Echo || ip -6
C) IFCONFIG
D) NETSTAT

C) IFCONFIG

IFCONFIG (Interface Configuration) is a command line tool on Unix-like systems to display network configuration details. The Windows equivalent is IPCONFIG. Unix-like systems typically refers to Unix, Linux, BSD and OSX operating systems.

30

Which protocol uses the well known TCP port 443?

A) Telnet
B) HTTPS
C) SLP
D) SSH

B) HTTPS

Hyper Text Transfer Protocol Secure (HTTPS), sometimes referred to as HTTP-SSL uses port 443 to communicate.