Documente Academic
Documente Profesional
Documente Cultură
examcompass.com/comptia-a-plus-practice-test-1-exam-220-901
The main functionality of the Basic Input/Output System (BIOS) is to perform the initial hardware checks after the
computer is powered on and start up the operating system.
True ( Missed)
False
Which of the following resources can be used by an Operating System (OS) to communicate with hardware? (Select
2 answers)
Device Manager
Secure Shell (SSH)
Device drivers ( Missed)
System BIOS ( Missed)
Command-Line Interface (CLI)
In modern PCs, the procedure of replacing BIOS contents is sometimes referred to as:
Hard boot
Overclocking
Flashing the BIOS ( Missed)
Direct memory access (DMA)
BIOS updates are performed in order to: (Select all that apply)
Which of the following terms refer to BIOS types that can be updated without removing the BIOS chip from a
motherboard? (Select 2 answers)
EEPROM ( Missed)
ROM
Plug and Play (PnP)
EPROM
Flash Memory ( Missed)
Which Microsoft Windows OS utility can be used to view basic information about computer's BIOS?
WINVER.EXE
MSINFO32.EXE ( Missed)
1/5
Control Panel
SERVICES.MSC
Power failure during BIOS upgrade can be the cause of irreversible damage to the computer system.
True ( Missed)
False
After a normal system shutdown, when the computer is turned off, contents of the memory used to store BIOS
settings are:
Erased
Retained ( Missed)
Stored in a page file
Saved on a hard drive
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup
BIOS after the computer is powered on?
IDE
POTS
QoS
POST ( Missed)
After replacing a modular hardware component inside computer case, the updated information about specific
parameters of the new device can be stored in: (Select 2 answers)
System BIOS
Flash memory ( Missed)
Startup BIOS
Secondary storage
CMOS RAM ( Missed)
After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for
information about secondary storage devices that might contain the OS. The list of devices and the order in which
they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred
to as:
Boot record
Master Boot Record (MBR)
Partition table
Boot sequence ( Missed)
In order to work, an integrated component such as Network Interface Card (NIC) on a newly assembled computer
system may need to be first:
2/5
Updated with the latest driver in Device Manager
Checked against the Hardware Compatibility List (HCL)
Enabled in the advanced BIOS settings menu ( Missed)
After launching Windows Virtual PC application technician receives error message stating that the Hardware-
Assisted Virtualization (HAV) feature is not enabled on the computer. Which of the following steps might help in
fixing this problem?
CMOS settings can be set to factory defaults by: (Select all that apply)
Which of the following answers refers to a firmware interface designed as a replacement for BIOS?
UEFI ( Missed)
ACPI
CMOS
USMT
What kind of user permission restrictions can be set in BIOS? (Select all that apply)
3/5
Aborted BIOS update could render the computer unusable ( Missed)
root
Supervisor ( Missed)
Administrator
Power User
What is LoJack?
Loopback adapter
Security feature used for locating stolen desktops, laptops, or tablets ( Missed)
Connector standard
RJ-11 plug
Which of the following terms refers to a technology that allows for storing passwords, certificates, or encryption keys
in a hardware chip?
While trying to enable the entire drive encryption feature in Windows technician receives the following error
message: "A compatible Trusted Platform Module (TPM) Security Device must be present on this computer, but a
TPM was not found". Knowing that the system has a TPM chip installed, which of the following steps might help in
solving this problem?
Re-installation of the OS
Enabling the TPM security feature in CMOS setup menu ( Missed)
Hard drive replacement
Enabling the TPM security feature in Windows Control Panel
Which of the answers listed below describe(s) the features of UEFI? (Select all that apply)
A computer supporting LoJack technology has two main components installed: an Application Agent residing in the
operating system which sends tracking signals to the monitoring center allowing the law enforcement to locate and
4/5
recover stolen device, and Persistence Module which restores the Application Agent and allows it to survive
operating system re-installation or hard drive format. The highest level of security offered by LoJack can be
achieved when Persistence Module resides in:
Operating system
Partition gap on the hard drive
Computer's BIOS ( Missed)
USB key
A UEFI functionality designed to prevent the loading of malware and unauthorized OSs during system start-up is
known as:
LoJack
Bitlocker
Secure boot ( Missed)
Kerberos
Total marks 37
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 2 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-2-exam-220-901
Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes
equipped with this feature). Coupled with a hardware sensor mounted inside the computer case, this functionality
can be used to check if the case was opened and display a notification alert during next boot.
True ( Missed)
False
A standardized specification of a motherboard (including its dimensions, supported power supply types, and layout
of components) is known as the motherboard's:
Architecture
Blueprint
Form factor ( Missed)
Diagram
Which of the following terms are used to describe a motherboard's size and purpose? (Select all that apply)
Micro-ATX ( Missed)
PCI-X
ITX ( Missed)
ATX ( Missed)
Mini-ITX ( Missed)
ITX
LPX
ATX ( Missed)
NLX
Which of the answers listed below refers to a VIA-proprietary low-power consumption SFF type motherboard known
for industrial and embedded PC applications?
NLX
Mini-ITX ( Missed)
ATX
LPX
Mini-ATX
Low Profile Extended (LPX) and New Low profile eXtended (NLX) are motherboard form factors known for the
usage of a riser card (daughterboard) inserted into a slot near the edge of the board. The main advantage of this
type of design is that expansion cards that plug into a riser card on the LPX/NLX motherboard are parallel with the
board which saves space and allows for a smaller system case.
1/5
True ( Missed)
False
Peripheral Component Interconnect (PCI) is an example of a parallel expansion bus (and a corresponding slot type)
used for attaching hardware devices (in the form of an integrated circuit or expansion card) to the motherboard
inside the computer case.
True ( Missed)
False
What are the characteristic features of conventional PCI? (Select all that apply)
Serial interface
32-bit bus width ( Missed)
Maximum throughput of up to 1064 MB/s
64-bit bus width ( Missed)
Parallel interface ( Missed)
Maximum throughput of up to 533 MB/s ( Missed)
The Peripheral Component Interconnect eXtended (PCI-X) is an advanced version of PCI which: (Select all that
apply)
Which of the following answers describe(s) the feature(s) of the PCI-X standard? (Select all that apply)
Which of the answers listed below refers to a standard that relies on serial communication?
ISA
PCI-X
IEEE 1284
PCI
PATA
PCIe ( Missed)
Motherboard slots that enable installation of dedicated graphics controllers include: (Select 2 answers)
PGA
AGP ( Missed)
CNR slot
ATX connector
PCIe ( Missed)
Peripheral Component Interconnect Express (abbr. as PCIe) is a high-speed, serial expansion bus designed as a
replacement for: (Select all that apply)
PCI ( Missed)
SATA
USB
PCI-X ( Missed)
AGP ( Missed)
In PCIe architecture, a single full-duplex point-to-point serial communication path consisting of two pairs of wires
(where one pair is used for transmitting data and the other pair for receiving data) is known as:
Lane ( Missed)
Dual rail
Dual channel
Duplexing assembly
The PCIe labeling (×1, ×4, ×8, ×12, ×16 and ×32) refers to the number of communication links (lanes) available in
different versions of the PCIe interface. The base value (x1) relates to the speed of a single lane expressed in MB/s.
The multiplier (x) allows for easy calculation of the maximum throughput of the entire interface for a given PCIe
variant.
True ( Missed)
False
Which of the values listed below refers to the speed of a single-lane (x1) PCIe v1.x link?
3/5
125 MB/s
250 MB/s ( Missed)
500 MB/s
985 MB/s
1969 MB/s
125 MB/s
250 MB/s
500 MB/s ( Missed)
985 MB/s
1969 MB/s
Which of the following answers lists the speed of a single-lane (x1) PCIe v3.x link?
125 MB/s
250 MB/s
500 MB/s
985 MB/s ( Missed)
1969 MB/s
A type of PCI slot for expansion cards installed in laptops characterized by a much smaller form factor when
compared to its desktop counterpart is called:
miniPCI ( Missed)
PCIe
Mini-SD
PCI-X
Mini-ITX
Which of the following slot types allows for adding primary storage modules to the motherboard?
USB
SATA
RAM ( Missed)
PATA
Which of the answers listed below refer(s) to the features of a motherboard's CPU socket? (Select all that apply)
PGA ( Missed)
TPM
LGA ( Missed)
FRU
4/5
ZIF ( Missed)
PGA2 ( Missed)
Which of the following integrated circuit types defines the core functionality and capabilities of a motherboard?
Chipset ( Missed)
Northbridge
I/O Controller Hub (ICH)
Southbridge
Fusion Controller Hub (FCH)
True
False ( Missed)
The term "northbridge" refers to a part of the computer chipset that controls peripheral buses used for connecting
lower-speed I/O devices such as hard drives, keyboards, mice, PCI devices, as well as embedded hardware
including BIOS, integrated graphics/audio, USB, or Ethernet interfaces.
True
False ( Missed)
Total marks 45
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 3 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-3-exam-220-901
For CPUs without integrated memory controller, which part of the chipset manages communication between the
CPU and memory?
In order to retain its configuration data, CMOS RAM requires constant supply of electricity which is provided by the:
AC adapter
Power Supply Unit (PSU)
CMOS battery ( Missed)
Uninterruptible Power Supply (UPS)
Power inverter
Which of the answers listed below refers to a source of power for an RTC when the computer is turned off?
Power inverter
CMOS battery ( Missed)
Power Supply Unit (PSU)
AC adapter
What is the name of the most common connector type used for providing power to various hardware components
inside the computer case?
RJ-45
BNC
Molex ( Missed)
USB
A switch, button, or LED on the front/top panel of a computer case has a connector linked to it that must be attached
to the appropriate pins on the:
Riser card
Expansion slot
Power supply
Motherboard ( Missed)
Which of the memory types listed below are designed to store permanent data that cannot be changed? (Select all
that apply)
1/5
RAM
EPROM
ROM ( Missed)
PROM ( Missed)
EEPROM
Random Access Memory (RAM) falls into the category of the so-called volatile storage media. It requires a
continuous flow of electricity to preserve its contents thus all the data stored in RAM lasts only while the power is on.
True ( Missed)
False
Which of the answers listed below refer(s) to the characteristic feature(s) of Static Random Access Memory
(SRAM)? (Select all that apply)
Which of the following answers describes(s) the characteristics of Dynamic Random Access Memory (DRAM)?
(Select all that apply)
The term "Synchronous Dynamic Random Access Memory (SDRAM)" refers to a broad category of DRAM modules
that rely on the signal sent by the system clock in order to coordinate their functioning with other internal PC
components.
True ( Missed)
False
2/5
Which of the statements listed below are true? (Select all that apply)
A Single Data Rate Synchronous Dynamic Random Access Memory (SDR SDRAM) can read/write one word of data
per clock cycle.
True ( Missed)
False
144
168 ( Missed)
184
240
The placement of a notch on the RAM module contact surface allows for proper alignment of the module with the
memory bank on the motherboard and prevents the installation of incompatible memory types.
True ( Missed)
False
What are the characteristic features of the Double Data Rate Synchronous Dynamic Random Access Memory (DDR
SDRAM)? (Select 3 answers)
Which of the answers listed below refers to the industry name used for DDR-333 modules?
PC-2100
PC-2400
PC-2700 ( Missed)
3/5
PC-3200
1600 MB/s
2133 MB/s ( Missed)
2666 MB/s
3200 MB/s
What are the characteristic features of the Double Data Rate 2 Synchronous Dynamic Random Access Memory
(DDR2 SDRAM)? (Select 3 answers)
Which of the following answers refers to the industry name used for DDR2-1066 modules?
PC2-4200
PC2-5300
PC2-6400
PC2-8500 ( Missed)
3200 MB/s
4266 MB/s ( Missed)
5333 MB/s
6400 MB/s
What are the characteristic features of the Double Data Rate 3 Synchronous Dynamic Random Access Memory
(DDR3 SDRAM)? (Select 3 answers)
Which of the answers listed below refers to the industry name used for DDR3-1333 modules?
PC3-6400
4/5
PC3-8500
PC3-10600 ( Missed)
PC3-12800
What is the maximum amount of data that can be transferred each second by a DDR3-1600 module?
6400 MB/s
8533 MB/s
10667 MB/s
12800 MB/s ( Missed)
Which of the answers listed below describe(s) the characteristics of Dual In-line Memory Modules (DIMMs)? (Select
all that apply)
Printed Circuit Board (PCB) type used as a placeholder for memory chips ( Missed)
32-bit data path
Separate electrical contacts on each side of the module ( Missed)
Obsolete memory packaging type used only in legacy systems
64-bit data path ( Missed)
Unified electrical contact surface spanning both sides of the module
Used with various SDRAM memory types (SDR, DDR, DDR2, and DDR3) ( Missed)
What is the most common memory module form factor type used in laptop computers?
SO-DIMM ( Missed)
DIMM
MicroDIMM
C-RIMM
Total marks 44
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 4 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-4-exam-220-901
Which of the following answers lists the number of pins used by SO-DIMM DDR SDRAM memory modules?
168
172
200 ( Missed)
204
What is the number of contact pins used by SO-DIMM DDR3 SDRAM modules?
168
172
204 ( Missed)
214
A memory module form factor commonly used in sub-notebook devices is known as:
C-RIMM
MicroDIMM ( Missed)
SO-DIMM
DIMM
Which of the answers listed below refers to the number of pins used by MicroDIMM DDR SDRAM memory modules?
168
172 ( Missed)
204
214
What is the number of contact pins used by MicroDIMM DDR2 SDRAM modules?
200
204
214 ( Missed)
1/5
240
Can only detect errors, but does not have the capability to correct them
Refers to parity RAM (the two terms are interchangeable)
Offers better performance in terms of speed when compared to a non-ECC type of RAM
Can detect and correct errors ( Missed)
Certain types of RAM take advantage of an additional bit in order to detect whether a data error has occurred. An
extra bit is used to store information about the number of bits set to the value of one in a given string of data
(typically one byte) and by examining that information at different stages of processing it is possible to detect
whether the data has been corrupted or not. What is the name of that extra bit?
Digest
Archive bit
Hash value
Parity bit ( Missed)
Compared to a non-ECC type of memory, the ECC RAM is a less expensive option and will always perform faster.
True
False ( Missed)
The color-coded memory slots on the motherboard indicate that the system is capable of taking advantage of the
multi-channel memory architecture.
True ( Missed)
False
Which of the following characteristics apply to the type of RAM most commonly used as the main system memory in
desktop PCs? (Select 3 answers)
Buffered memory
Non-ECC memory ( Missed)
Static RAM
Unbuffered memory ( Missed)
Dynamic RAM ( Missed)
ECC memory
Taking advantage of the performance benefits offered by the multi-channel memory architecture requires: (Select all
that apply)
2/5
Installing modules in appropriate memory slots (slots of matching color) on the motherboard ( Missed)
A type of typically more expensive memory modules equipped with additional circuitry designed to ensure better
system stability and accuracy of data processing is known as: (Select all that apply)
VRAM
Buffered memory ( Missed)
RDIMM ( Missed)
Synchronous DRAM
UDIMM
Unbuffered memory
A single-sided memory module type can have memory chips placed on both sides of the module.
True ( Missed)
False
Which of the following RAM types would be the most suitable choices for a high-end server? (Select 3 answers)
UDIMM
Buffered memory ( Missed)
Non-ECC memory
RDIMM ( Missed)
Unbuffered memory
ECC memory ( Missed)
UDIMM
Registered memory
SRAM
MicroDIMM
VRAM ( Missed)
Which of the memory types listed below allows for permanent storage of data?
VRAM
DVD-RAM ( Missed)
Static RAM
Buffered memory
DRAM
A type of Printed Circuit Board (PCB) that can be installed in a motherboard slot in order to extend the system
functionality is commonly referred to as an expansion card.
True ( Missed)
3/5
False
What type of safety measures should accompany the installation of an adapter card?
If a system fails to autoconfigure the newly added adapter card through PnP, finishing the configuration process
requires manual installation of device drivers.
True ( Missed)
False
A type of daughterboard equipped with expansion slots providing the capability for attaching further expansion cards
that are placed parallel with the mainboard in order to save space inside the system case is known as:
FireWire card
Riser card ( Missed)
Storage card
Thunderbolt card
Which of the following answers list(s) example(s) of storage media type(s) that can be read, but not written to?
(Select all that apply)
BD-R
CD-ROM ( Missed)
DVD-RW
BD-RE
DVD-ROM ( Missed)
CD-RW
Which of the terms listed below refers to computer data storage systems, data storage devices, and data storage
media that can be written to once, but read from multiple times?
DVD-RW
Tape library
Floppy disk
WORM ( Missed)
Which of the following is an example of Write Once, Read Many (WORM) storage media type?
BD-R ( Missed)
Flash drive
CD-RW
4/5
Magnetic tape
CD-ROM
What are the storage limitations of a standard CD-ROM media format? (Select 2 answers)
Total marks 36
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 5 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-5-exam-220-901
Which of the following answers list(s) example(s) of storage media type(s) that can be erased and written to multiple
times? (Select all that apply)
BD-R
CD-ROM
DVD-RW ( Missed)
BD-RE ( Missed)
DVD-ROM
CD-RW ( Missed)
The capability for replacing computer system components without causing interruption to the system operation is
known as:
Multitasking
Hardware acceleration
Hot swapping ( Missed)
Cold plugging
Which of the following answers list(s) example(s) of hot-swappable drives? (Select all that apply)
A type of storage device with no moving parts that uses memory chips instead of magnetic platters is commonly
referred to as a Solid-State Drive (SSD).
True ( Missed)
False
1/5
xD-Picture Card ( Missed)
SATA
CompactFlash (CF) ( Missed)
IEEE 1394
Secure Digital (SD) ( Missed)
eSATA
Which of the terms listed below refers to a proprietary flash memory card format used mainly in older digital
cameras?
xD ( Missed)
SD
SSD
Mini-SD
Micro-SD
A hybrid drive provides a combination of which of the following technologies? (Select 2 answers)
SD
HDD ( Missed)
xD
SSD ( Missed)
CF
A type of media used as a secondary system storage in tablets and mobile phones is known as:
CF
Mini-SD
eMMC ( Missed)
Micro-SD
xD
A storage technology that combines multiple disk drive components into a single logical unit to increase logical
volume size, improve performance, or reliability is known as:
RAID 5
2/5
Disk duplexing
RAID 0 ( Missed)
Disk mirroring
RAID 1
RAID Level 3
RAID Level 5
RAID Level 6
RAID Level 1 ( Missed)
2 drives
3 drives
4 drives ( Missed)
3/5
5 drives
Which of the answers listed below refer to a nested (hybrid) RAID level? (Select 2 answers)
RAID 0
RAID 1
RAID 1+0 ( Missed)
RAID 5
RAID 10 ( Missed)
Which type of RAID level creates a striped set from a series of mirrored drives?
RAID 0
RAID 1
RAID 5
RAID 10 ( Missed)
Which of the following statements describing the Blu-ray Disc (BD) technology are true? (Select 4 answers)
8.544 GB of data
4/5
4.7 GB of data
7.8 GB of data ( Missed)
15.6 GB of data
8.544 GB
4.7 GB
7.8 GB
15.6 GB ( Missed)
Which of the answers listed below describe the features of tape drives? (Select 3 answers)
Which of the following answers lists storage media types arranged from lowest to highest capacity?
Total marks 44
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 6 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-6-exam-220-901
Which of the following units is used for measuring the speed of modern CPUs?
GHz ( Missed)
rpm
Gbps
MHz
A type of CPU architecture where a single physical CPU contains more than one execution core on a single die or
chip is known as:
Parallel processing
Symmetric Multiprocessing (SMP)
Multicore ( Missed)
Hyperthreading (HTT)
The Land Grid Array (LGA) is a type of integrated circuit packaging that is notable for having pins arranged in a
regular array on the underside of the package.
True
False ( Missed)
Hardware enhancements adding support for virtualization developed by AMD for its CPUs are known as:
Hyper-V
AMD Catalyst
VT-x
AMD-V ( Missed)
Which of the following provides a CPU with the fastest access to frequently used data?
Flash memory
Multi-level cache ( Missed)
Random Access Memory (RAM)
1/5
Secondary storage
EVP
XD bit ( Missed)
VT-x
Hyper-V
Which of the answers listed below refer to the features of Socket H2? (Select 3 answers)
A CPU design based on instruction set that tries to improve speed by utilizing relatively few and simple instructions
is known as:
RISC ( Missed)
HPFS
EPIC
CISC
The Pin Grid Array (PGA) is a type of surface-mount packaging for integrated circuits (ICs) that is notable for having
pins on the socket rather than the integrated circuit.
True
False ( Missed)
Which of the following answers describe the characteristic features of Socket H/H1? (Select 3 answers)
The bus between the CPU and the internal memory cache (L2 cache) inside the CPU housing is called:
2/5
Back-side bus (BSB) ( Missed)
A set of Intel CPU hardware enhancements improving support for virtualization is known as:
EPV
VT-x ( Missed)
Catalyst
Hyper-V
An additional ATX12V power connector designed to supply dedicated power for the CPU is known as:
Mini-DIN
P4 connector ( Missed)
BNC connector
P1 connector
Which of the answers listed below describe the features of Socket H3? (Select 3 answers)
1366 contacts
LGA packaging ( Missed)
AMD CPU socket
1150 contacts ( Missed)
PGA packaging
Intel CPU socket ( Missed)
Which of the following acronyms refers to a specific feature of certain types of microprocessor sockets that facilitates
the insertion and removal of a CPU chip?
ZIF ( Missed)
TPM
3/5
ZIP
FRU
What is the name of a microprocessor component that performs all comparisons and calculations?
FRU
UART
ALU ( Missed)
LUN
Which of the following answers refer(s) to example(s) of Intel CPU(s) designed for desktop and workstation
computers? (Select all that apply)
Itanium
Celeron ( Missed)
Pentium ( Missed)
Core i3 ( Missed)
Athlon
Core i5 ( Missed)
Core i7 ( Missed)
Athlon
Opteron ( Missed)
Itanium
Phenom
Sempron
Which of the following answers refer to the characteristics of Socket R? (Select 3 answers)
Xeon ( Missed)
Celeron
Opteron
Itanium ( Missed)
4/5
Sempron
Atom
EVP ( Missed)
XD bit
VT-x
Hyper-V
The AMD CPU brands designed for desktop and workstation computers include: (Select all that apply)
Opteron
Athlon ( Missed)
Sempron ( Missed)
Phenom ( Missed)
FX ( Missed)
Total marks 45
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 7 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-7-exam-220-901
As opposed to active cooling components such as cooling fans, heat sinks fall into the category of passive cooling
components because they do not need to draw any electrical power in order to operate.
True ( Missed)
False
Which of the following answers describe the features of Socket FM2? (Select 3 answers)
LGA packaging
Intel CPU socket
905 contacts
PGA packaging
AMD CPU socket ( Missed)
PGA-ZIF packaging ( Missed)
904 contacts ( Missed)
A 64-bit CPU can be used either with a 32-bit or 64-bit version of the Microsoft Windows operating system.
True ( Missed)
False
Which of the terms listed below refers to a situation where a single CPU appears as two virtual CPUs to the
operating system?
Stepping
Multicore
Hyperthreading ( Missed)
Multitasking
PGA packaging
1/5
Intel CPU socket
PGA-ZIF packaging ( Missed)
942 contacts
AMD CPU socket ( Missed)
LGA packaging
941 contacts ( Missed)
The most notable difference between Pin Grid Array (PGA) and Land Grid Array (LGA) packaging relates to the
placement of contact pins, which in case of PGA can be found on the socket, and in case of LGA on the CPU.
True
False ( Missed)
Which of the answers listed below refer(s) to solution(s) aimed at improving CPU heat dissipation? (Select all that
apply)
Which of the following built-in functionalities allows a CPU to take over tasks normally executed by a dedicated
graphics card?
DisplayPort
Integrated GPU ( Missed)
Multicore architecture
Hyperthreading
VGA mode
In CPU cooling, thermal compound is applied to fill in the narrow space between:
Which of the answers listed below refers to the area of implementation of No-eXecute bit (NX bit)?
Parity checks
Malware protection ( Missed)
Biometric authentication
Data backup
LGA packaging
941 contacts
PGA packaging
AMD CPU socket ( Missed)
PGA-ZIF packaging ( Missed)
942 contacts ( Missed)
Intel CPU socket
A security feature used by CPUs for isolating areas of memory in order to prevent the execution of code from non-
executable memory locations is known as:
Which of the CPU models listed below are compatible with the LGA 775 socket?
Celeron, Sempron, Pentium, Core i3, Core i5, Core i7, Xeon E3, Xeon E5, Xeon E7
Athlon II X2, Athlon II X3, Athlon II X4, Phenom II, Phenom II X2, Phenom II X4, Phenom II X6, FX
Pentium 4, Pentium D, Celeron, Celeron D, Pentium XE, Core 2 Duo, Core 2 Extreme, Core 2 Quad, Xeon (
Missed)
Celeron, Pentium, Core i3, Core i5, Core i7, Xeon E3, Xeon E5, Xeon E7, Opteron
Which of the following statements list(s) data transfer rates of the USB 1.1 standard? (Select all that apply)
400 Mbps
12 Mbps ( Missed)
800 Mbps
5 Gbps
480 Mbps
3/5
1.5 Mbps ( Missed)
USB version 1.1 offers two data transfer speeds: 1.5 Mbps designed for low data rate peripherals such as joysticks
(sometimes referred to as "Low-Speed USB"), and 12 Mbps designed for higher-speed devices such as disk drives
(sometimes referred to as "Full-Speed USB").
True ( Missed)
False
USB 2.0 (aka "Hi-Speed USB") specifies the maximum data transfer rate of:
800 Mbps
480 Mbps ( Missed)
12 Mbps
400 Mbps
Which of the following statements apply to the USB 3.0 standard? (Select all that apply)
The Universal Serial Bus (USB) standard specifies that type A connectors can be attached to: (Select 2 answers)
Target devices
Devices that supply power ( Missed)
Host devices ( Missed)
Any type of device
Devices that receive power
What is the maximum number of USB devices that can be connected to a single USB host controller?
31
63
127 ( Missed)
255
The Universal Serial Bus (USB) standard specifies that type B connectors can be attached to: (Select 2 answers)
4/5
Any type of device
Devices that receive power ( Missed)
18 inches
4.5 meters
5 meters ( Missed)
1 meter
Which of the statements listed below apply to USB? (Select all that apply)
IEEE 802.11
IEEE 1284
IEEE 802.3
IEEE 1394 ( Missed)
Total marks 46
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 8 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-8-exam-220-901
Which of the following statements refer(s) to the IEEE 1394a standard? (Select all that apply)
18 inches
2 meters
4.5 meters ( Missed)
5 meters
255 devices
127 devices
15 devices
63 devices ( Missed)
Which of the following statements refer(s) to the IEEE 1394b standard? (Select all that apply)
Which types of standard FireWire connectors have the capability of supplying voltage to a device? (Select 2
answers)
2-pin connector
4-pin connector
6-pin connector ( Missed)
8-pin connector
9-pin connector ( Missed)
1/5
For optical connections, The IEEE 1394b standard extends the maximum allowable cable length to 100 meters.
True ( Missed)
False
What is the maximum data transfer rate supported by the SATA 1.0 standard?
7 pins
34 pins
40 pins
15 pins ( Missed)
A single Serial ATA (SATA) data cable can be used to connect a motherboard slot with:
Up to 3 devices
Up to 2 devices
Only 1 device ( Missed)
Up to 4 devices
What is the maximum data transfer rate supported by the SATA 2.0 standard?
480 Mbps
3 Gbps ( Missed)
800 Mbps
6 Gbps
40 pins
34 pins
15 pins
7 pins ( Missed)
What is the maximum data transfer rate supported by the SATA 3.0 standard?
6 Gbps ( Missed)
800 Mbps
3 Gbps
480 Mbps
2/5
What is the maximum length for external SATA (eSATA) cable?
5 meters
2 meters ( Missed)
1 meter
18 inches
"DB-15", "DE-15", and "HD-15" are terms referring to the different variants of the:
RJ-45 connector
BNC connector
VGA connector ( Missed)
8P8C connector
Which of the answers listed below refers to the Video Graphics Array (VGA) connector?
Examples of interfaces providing the capability for transmission of both video and audio data include: (Select all that
apply)
S/PDIF
DVI
S-Video
VGA
HDMI ( Missed)
Which of the following answers list the characteristic features of the signal that can be carried through the VGA
connectors and cables? (Select 2 answers)
Which of the answers listed below describe the characteristic features of the signal that can be carried through the
HDMI connectors and cables? (Select 2 answers)
Analog signal
Video only
Digital signal ( Missed)
3/5
Audio only
Video and audio ( Missed)
Which of the following interfaces takes advantage of the 19-pin Type A connector?
USB
Thunderbolt
FireWire
DisplayPort
HDMI ( Missed)
Which of the Digital Visual Interface (DVI) connector types does not provide support for digital signal transmission?
DVI-D
DVI-A ( Missed)
DVI-I
DVI-A/D
Which of the following answers describes(s) the characteristic features of S/PDIF? (Select all that apply)
Twisted-pair cabling
Digital audio interface ( Missed)
Coaxial cabling ( Missed)
Video interface
Fiber-optic cabling ( Missed)
"Phono connector", "Cinch connector", and "A/V jack" are terms that refer to a popular type of electrical connector
commonly used to carry analog/digital audio and analog video signals. This type of connector is formally known as
the:
DVI connector
RCA connector ( Missed)
VGA connector
RJ-45 connector
The DVI-I connector type provides support for both digital and analog video signal transmission.
True ( Missed)
False
Examples of connector types used for carrying audio signals include: (Select all that apply)
4/5
S/PDIF connector ( Missed)
Which of the Digital Visual Interface (DVI) connector types does not provide support for analog signal transmission?
DVI-D ( Missed)
DVI-A
DVI-I
DVI-A/D
Total marks 34
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 9 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-9-exam-220-901
Which of the following connector types are used with twisted-pair copper cabling? (Select all that apply)
ST
RJ-45 ( Missed)
RG-6
RJ-11 ( Missed)
F-connector
BNC
RG-59
What are the characteristic features of the RJ-11 connector? (Select 2 answers)
Which of the connector types listed below plugs into a port of an Ethernet NIC?
DB15
S/PDIF
RCA
RJ-45 ( Missed)
What are the characteristic features of the RJ-45 connector? (Select 2 answers)
A single copper-based Thunderbolt cable provides the capability for a simultaneous transfer of: (Select all that apply)
Which of the following answers lists the maximum allowable length for Thunderbolt copper cabling?
1/5
3 meters ( Missed)
4.5 meters
5 meters
10 meters
30 meters
40 meters
50 meters
60 meters ( Missed)
Thunderbolt v2 allows for combining two physical channels into a single logical channel which results in a maximum
available throughput of up to:
10 Gbps
20 Gbps ( Missed)
30 Gbps
40 Gbps
10 Gbps
20 Gbps
30 Gbps
40 Gbps ( Missed)
USB Type-A
DVI-A
Mini DisplayPort (MDP) ( Missed)
USB Type-B
VGA connector
USB Type-C ( Missed)
2/5
Which of the following answers list(s) examples of wireless connectivity media? (Select all that apply)
RF ( Missed)
HDMI
IEEE 802.3
IR ( Missed)
NFC ( Missed)
Bluetooth ( Missed)
The 15-pin ATX PSU SATA power connector supplies electrical power at the voltage(s) of: (Select all that apply)
+3 V
+3.3 V ( Missed)
+4 V
+5 V ( Missed)
+12 V ( Missed)
Which of the auxiliary PC connectors is used for supplying dedicated power to the CPU?
Which of the following connectors would be used to increase the power consumption limit for a high-end graphics
card?
T568A
15-pin VGA
PCIe 6/8-pin ( Missed)
4/8-pin 12v
The optional 6-pin PCIe connector increases the maximum allowable power consumption of a PCIe card by
additional 75 Watts.
True ( Missed)
False
The optional 8-pin PCIe power connector increases the power consumption limit for connected device to:
75 W
150 W ( Missed)
25 W
125 W
ATX PSU connectors providing main power to the PC motherboard consist of: (Select 2 answers)
3/5
14 pins
20 pins ( Missed)
22 pins
24 pins ( Missed)
28 pins
PC Power Supply Units (PSUs) may accept an AC current of 110-120 volts (standard AC current in the United States
and Canada) or 220-240 volts (European AC standard). A PSU might have either a manual selector switch on the
back of the device for adjusting the supplied voltage (these types of PSUs are referred to as fixed-input devices), or
automatically adapt to the supplied AC voltage (auto-switching PSUs).
True ( Missed)
False
Which of the acronyms listed below refers to the type of electric current supplied to most of the internal PC
components?
AC
PFC
DC ( Missed)
A/V
PC Power Supply Units (PSUs) capable of operating with either 110-120 or 220-240 volt power input ranges are
referred to as dual rail PSUs.
True
False ( Missed)
Which of the hardware requirements listed below should be given priority while assembling a custom
graphic/CAD/CAM design workstation? (Select 3 answers)
What type of hardware components would be the most important for an A/V editing workstation? (Select all that
apply)
For best performance, a custom workstation designed for virtualization tasks requires: (Select 2 answers)
High-capacity HDD
Maximum amount of RAM ( Missed)
Specialized GPU
High-end cooling
Multicore CPU ( Missed)
Which of the following hardware requirements should be given priority while building a PC designed for computer
gaming? (Select all that apply)
Dual monitors
Multicore CPU ( Missed)
High-capacity fast HDD
Specialized GPU ( Missed)
High-end cooling ( Missed)
High definition sound card ( Missed)
Total marks 47
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 10 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-10-exam-220-901
What type of hardware components would be the most important for a custom Home Theater PC (HTPC)? (Select
all that apply)
TV tuner ( Missed)
Surround sound audio ( Missed)
HDMI output ( Missed)
Motherboard form factor ( Missed)
Specialized GPU
Multicore CPU
A computer on a network where most functions are carried out on a central server, or a software application that
uses client-server model wherein the server performs all the processing is commonly referred to as:
Thick client
Active Hub
Thin client ( Missed)
Virtual machine
Which of the following hardware components should be given priority in order to ensure optimal performance of a
home server PC? (Select 2 answers)
High-end video
Gigabit NIC ( Missed)
Multicore processor
HDD RAID setup ( Missed)
Specialized audio
Which of the LCD technologies listed below offers the fastest response time?
What are the characteristic features of the In-Plane Switching (IPS) LCD panel technology? (Select 3 answers)
Which of the following answers describe the features of the Twisted Nematic (TN) LCD panel technology? (Select 3
answers)
Which of the acronyms listed below refers to an LCD panel taking advantage of fluorescent lamps?
LED
CCFL ( Missed)
DFS
OLED
Which of the following answers describe the function of a power inverter? (Select 2 answers)
Examples of devices posing risk to electrical safety due to accumulated high voltage include: (Select all that apply)
CRTs ( Missed)
Power supplies ( Missed)
Inverters ( Missed)
CPUs
Laser printers ( Missed)
Which of the acronyms listed below refers to a new type of thin and lightweight display devices offering higher
contrast ratio and color quality in comparison to LCD without the need for a special light source to produce a visible
image?
OLED ( Missed)
LED
HDMI
HTPC
Aspect ratio
2/6
Interlacing
Refresh rate ( Missed)
Screen resolution
Which of the following statements are true? (Select all that apply)
A digital image displayed on the graphics monitor screen consists of pixels arranged in rows and columns (
Missed)
The term "screen resolution" refers to the maximum number of pixels in each dimension (horizontal and
vertical) that can be addressed by a digital display device ( Missed)
In order to ensure the sharpest text and image displayed by a CRT monitor it is usually recommended to set
the monitor to run only at a specific resolution (which is also referred to as the CRT's native resolution)
The term "screen resolution" refers to the relative horizontal and vertical size of a digital image displayed on
the graphics monitor screen
The smallest unit of a digital image represented on the digital display device is known as pixel ( Missed)
In order to ensure the sharpest text and image displayed by a LCD monitor it is usually recommended to set
the monitor to run only at a specific resolution (which is also referred to as the LCD's native resolution) (
Missed)
What type of unit is used to describe the refresh rate of a computer screen?
Hz ( Missed)
cd/m2
MHz
Lumen
KHz
Which of the following units is used for measuring the brightness of an image rendered by an image projector?
dB
cd/m2
Lumen ( Missed)
Hz
Hz
Lumens
dB
cd/m2 ( Missed)
Cable locks
Video surveillance
Privacy filters ( Missed)
3/6
Security guards
Screensavers
A monitor filter used to reduce reflection from the surface of a CRT or LCD display is called:
Widescreen
Antiglare ( Missed)
Flat panel
Privacy filter
The relative horizontal and vertical size of a digital image displayed on the graphics monitor screen is referred to as:
Frame rate
Screen resolution
Aspect ratio ( Missed)
Native resolution
Which of the answers listed below refer to the characteristics of the Extended Graphics Array (XGA) display
standard? (Select 2 answers)
Display devices with aspect ratios of 16:10 and 16:9 are commonly referred to as:
UXGA displays
Fullscreen displays
Widescreen displays ( Missed)
WUXGA displays
The Super Extended Graphics Array (SXGA) display standard features: (Select 2 answers)
Which of the following answers refers to the standard display format for HDTV?
What are the characteristic features of the Ultra Extended Graphics Array (UXGA) display standard? (Select 2
answers)
Which of the answers listed below refer to the Widescreen Ultra Extended Graphics Array (WUXGA) display
standard (Select 2 answers)
Which of the following display standards use(s) the 4:3 aspect ratio? (Select all that apply)
XGA ( Missed)
SXGA
UXGA ( Missed)
WUXGA
Total marks 45
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/6
6/6
CompTIA A+ Certification Practice Test 11 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-11-exam-220-901
Which of the display standards listed below uses the 16:10 aspect ratio?
XGA
SXGA
UXGA
WUXGA ( Missed)
Examples of connectors providing the capability for carrying both video and audio signals include: (Select 2
answers)
S-Video
S/PDIF
DVI-I
DisplayPort ( Missed)
HDMI ( Missed)
Which of the connector types listed below are used with coaxial cabling? (Select 2 answers)
ST
MT-RJ
BNC ( Missed)
LC
F-connector ( Missed)
The PS/2 connector is a 6-pin Mini-DIN connector used for connecting: (Select all that apply)
Modem
Sound card
Mouse ( Missed)
Hard drive
Keyboard ( Missed)
In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for
1/5
identification and access control purposes.
True ( Missed)
False
Which of the following are biometric devices? (Select all that apply)
Which of the answers listed below refer(s) to the function of digitizer? (Select all that apply)
Translates analog data into a format suitable for computer processing ( Missed)
Output device
An example of motion detector device
Component of a mobile device's screen that allows to control the device with a fingertip ( Missed)
An example of media converter device
Input device ( Missed)
Common areas of implementation of smart card reader devices include: (Select 2 answers)
Which of the following answers refer to the examples of output devices? (Select 3 answers)
Printer ( Missed)
Barcode reader
Display device ( Missed)
Smart card reader
Motion sensor
Speaker ( Missed)
What is the name of a hardware device that allows for administering multiple hosts with the use of a single mouse,
keyboard, and computer screen?
Device Manager
KVM switch ( Missed)
Set-top box
2/5
Port replicator
UTM appliance
The term "Smart TV" refers to a type of advanced television set that enables more interactive user experience by
offering additional features such as web browsing or video streaming.
True ( Missed)
False
A standalone appliance connected to a TV set or other display device that enables receiving television signal and/or
Internet data is commonly referred to as:
Smart TV
Thick client
Set-Top Box ( Missed)
UTM appliance
Which of the acronyms listed below refers to a technical standard for digital representation and transmission of
sound?
MAPI
MIDI ( Missed)
MIME
MIMO
Which of the following answers refer(s) to device(s) capable of providing both input and output functions? (Select all
that apply)
In printing, the term "Collation" refers to a configuration setting for organizing printer output in a specific order.
True ( Missed)
3/5
False
Network printer sharing through a wired connection can be implemented with the use of which of the following
interfaces? (Select all that apply)
Parallel ( Missed)
USB ( Missed)
Bluetooth
Serial ( Missed)
802.11x
Ethernet ( Missed)
An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to
as:
Demarc
Access Point (AP) ( Missed)
Intermediate Distribution Frame (IDF)
Active hub
A wireless networking topology in which client devices communicate directly with each other without the use of a
controlling Access Point (AP) is known as: (Select 3 answers)
Mesh topology
Ad hoc mode ( Missed)
Independent Basic Service Set (IBSS) ( Missed)
Peer-to-peer mode ( Missed)
Infrastructure mode
Wireless interfaces that can be used for the purpose of network device sharing include: (Select 2 answers)
802.11x ( Missed)
Serial
USB
Bluetooth ( Missed)
Ethernet
A common network communication protocol used for enabling two hosts to establish a network connection and
exchange data is known as:
STP
WPS
UTP
TCP ( Missed)
Which of the answers listed below refers to an Apple technology that allows for automatic discovery of services and
4/5
network-enabled devices on a local network?
iCloud
Bonjour ( Missed)
Spotlight
Boot Camp
An Apple technology built into most popular printer models enabling network printing service without the need for
manual configuration from the user side is called:
AirPort
TCP/IP
AirPrint ( Missed)
Bonjour
Which of the following answers refers to a laser printer component responsible for transferring the toner and image
or text to the paper?
Feeder
Print head
Duplexing assembly
Imaging drum ( Missed)
Total marks 45
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 12 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-12-exam-220-901
A laser printer component applying high temperature and pressure to bond the toner to the paper is called:
Print head
Transfer roller
Fuser assembly ( Missed)
Imaging drum
Which of the answers listed below refers to the correct sequence of steps in the laser printing process?
In impact printing, calibration helps to ensure that the colors and layout represented on the monitor display match
the colors and layout of the printed image.
True
False ( Missed)
Which of the printer types are used in Point of Sale (PoS) systems?
Inkjet
Laser
Thermal ( Missed)
Impact
Which of the following printer types fall(s) into the category of impact printers? (Select all that apply)
Laser
Inkjet
Daisy wheel ( Missed)
Thermal
Dot matrix ( Missed)
Which type of printer takes advantage of tractor feed during printing process?
Inkjet
Laser
Impact ( Missed)
Thermal
1/5
Which of the printer types listed below provide(s) the capability to produce duplicate pages (multipart forms) during
printing process? (Select all that apply)
Inkjet
Thermal
Impact ( Missed)
Dot matrix ( Missed)
Laser
Which of the following printer types use inked ribbon to produce an imprint on paper? (Select 2 answers)
Inkjet
Daisy wheel ( Missed)
Dot matrix ( Missed)
Thermal
Laser
A single sheet or roll of printing paper with holes punched along each side is designed for use with:
Laser printers
Dot-matrix printers ( Missed)
Inkjet printers
Thermal printers
Laser printing
Inkjet printing
Thermal printing
Virtual printing ( Missed)
XPS ( Missed)
GDI
PCL
PDF ( Missed)
TXT
RS-232
LPT ( Missed)
COM
USB
2/5
A language used for describing the appearance of a printed page is called:
DLT
CCFL
SSL
PCL ( Missed)
A Microsoft Windows OS component responsible for representing graphical objects and transmitting them to output
devices such as monitors and printers is called:
GDI ( Missed)
IDS
PostScript
PCL
Which of the following allow(s) for print device sharing over a wired connection? (Select all that apply)
USB ( Missed)
Parallel ( Missed)
802.11x
Bluetooth
Ethernet ( Missed)
Infrared (IR)
Serial ( Missed)
Which of the answers listed below refer to parallel printer port operation modes? (Select 2 answers)
ECP ( Missed)
EFS
ERD
EPP ( Missed)
ECC
Examples of network protocols designed to enable remote printing include: (Select 2 answers)
IMAP
RDP
3/5
Telnet
IPP ( Missed)
LPD/LPR ( Missed)
Which of the following allow(s) for print device sharing over a wireless connection? (Select all that apply)
Bluetooth ( Missed)
Ethernet
802.11x ( Missed)
Parallel
USB
Infrared (IR) ( Missed)
Which of the answers listed below refer(s) to connector type(s) used with fiber-optic cabling? (Select all that apply)
ST ( Missed)
DB-25
SC ( Missed)
RG-59
LC ( Missed)
RG-6
4/5
Which of the following connector types are used with coaxial cabling? (Select 2 answers)
ST
MT-RJ
BNC ( Missed)
LC
F-connector ( Missed)
The advantages of multi-mode fiber-optic cabling over single-mode cabling include data transfer rates over longer
distances, higher speed, and lower cost.
True
False ( Missed)
Total marks 42
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 13 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-13-exam-220-901
Which of the cabling types listed below provide(s) protection against an outside signal interference? (Select all that
apply)
UTP
Coaxial ( Missed)
Fiber-optic ( Missed)
STP ( Missed)
One of the differences between the UTP and STP cabling is that the STP cable takes advantage of additional
protective cover reducing signal interference from outside sources.
True ( Missed)
False
In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each other in order to
reduce:
Cross-talk ( Missed)
Cable diameter
Collisions
Bend radius
What is the typical cable segment length for a copper twisted-pair Ethernet cable?
33 meters
55 meters
100 meters ( Missed)
250 meters
Category 3 (CAT3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring.
True ( Missed)
False
Which of the following twisted-pair copper cabling types is most commonly used in modern Ethernet networks?
CAT3
CAT4
CAT5
CAT5e ( Missed)
25 meters
1/5
50 meters
100 meters ( Missed)
250 meters
Which of the answers listed below refer(s) to the characteristics of a Category 5e (CAT5e) cabling? (Select all that
apply)
10 Gbps Ethernet
RJ-11 connector
Twisted-pair cabling ( Missed)
RJ-45 connector ( Missed)
Fiber-optic cabling
Copper cabling ( Missed)
1 Gbps Ethernet ( Missed)
What is the minimum cabling requirement for a 10 Gbps connection over copper twisted-pair?
CAT5
CAT5e
CAT6 ( Missed)
CAT6A
The Category 6 (CAT6) cabling supports 10 Gbps data transfer rate at a limited range of up to 55 meters, whereas
CAT6A (Augmented) cabling allows for 10 Gbps data transfer rate over a standard cable segment length of 100
meters.
True ( Missed)
False
The term "Plenum" refers to an enclosed space used for airflow, such as the one between dropped ceiling and
structural ceiling in a building. Cabling coated with a fire-retardant jacket placed in this space is referred to as
plenum-rated cabling. Plenum-rated cabling must meet special requirements so that it doesn't catch on fire easily.
True ( Missed)
False
Materials from which the plenum-rated cable's cover is made include: (Select 2 answers)
FPM
PVC ( Missed)
EPP
FEP ( Missed)
ECP
Which of the following answers list examples of coaxial cabling types? (Select 2 answers)
STP
2/5
RG-59 ( Missed)
Multi-mode fiber
UTP
RG-6 ( Missed)
Single-mode fiber
Which of the terms listed below refers to a loss in signal strength during transmission caused by increasing distance
and obstacles encountered on the signal path?
Amplitude
Cross-talk
Attenuation ( Missed)
Brownout
32 bits ( Missed)
48 bits
64 bits
128 bits
Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address
space? (Select 2 answers)
Which of the answers listed below refer to the 172.16.0.0 - 172.31.255.255 IPv4 address space? (Select 2 answers)
Class A range
Public IP address range
Class B range ( Missed)
Non-routable (private) IP address range ( Missed)
Class C range
What are the characteristic features of the 192.168.0.0 - 192.168.255.255 IP address space? (Select 2 answers)
Class A range
Public IP address range
Class B range
Non-routable (private) IP address range ( Missed)
3/5
Class C range ( Missed)
An IPv4 address in the range 169.254.0.1 through 169.254.255.254 indicates problem with what type of service?
SMTP
DNS
DHCP ( Missed)
SNMP
32 bits
48 bits
64 bits
128 bits ( Missed)
Octagonal numbers
Binary numbers
Hexadecimal numbers ( Missed)
Decimal numbers
A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to
make the address notation shorter.
True ( Missed)
False
2002::/16
FE80::/64 ( Missed)
2001::/32
::1/128
An IP address assigned permanently to a computer by an Internet Service Provider (ISP) is known as:
A system containing mappings of domain names to various types of data, such as for example numerical IP
addresses is known as:
IDS
4/5
DNS ( Missed)
SQL
DFS
Total marks 35
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 14 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-14-exam-220-901
255.255.225.0
255.255.191.0
255.255.127.0
255.255.64.0
None of the above is a valid subnet mask ( Missed)
Which of the answers listed below refers to a CIDR notation for 255.255.224.0 subnet mask?
/19 ( Missed)
/20
/21
/22
11111111.11111111.10000000.00000000 ( Missed)
11111111.11111111.11000000.00000000
11111111.11111111.11100000.00000000
11111111.11111111.11110000.00000000
Which of the following answers lists a CIDR notation for 255.255.128.0 subnet mask?
/16
/17 ( Missed)
/18
/19
Information required for manual configuration of network adapter settings in MS Windows includes: (Select all that
apply)
IP address ( Missed)
Subnet mask ( Missed)
Default gateway ( Missed)
MAC address
DNS server address ( Missed)
SSID (aka network name)
The File Transfer Protocol (FTP) Control Connection for administering a session is established through port number:
20
1/5
22
21 ( Missed)
25
The File Transfer Protocol (FTP) Data Connection for sending file data is established through port number:
23
25
20 ( Missed)
21
Port 23
Port 25
Port 21
Port 22 ( Missed)
Simple Mail Transfer Protocol (SMTP) operates with the use of port:
110
25 ( Missed)
143
23
Which of the following port numbers is used by Domain Name System (DNS)?
25
23
53 ( Missed)
67
2/5
Post Office Protocol v3 (POP3) runs on port:
110 ( Missed)
143
123
443
Which of the port numbers listed below is used by Hypertext Transfer Protocol over TLS/SSL (HTTPS)?
80
443 ( Missed)
53
143
A network technician uses a Remote Desktop Protocol (RDP) client on their Windows OS in order to remotely
troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-
in Windows RDP server to allow this type of network connection?
1701
139
3389 ( Missed)
548
Which of the following port numbers are reserved for NetBIOS services? (Select all that apply)
136
161
137 ( Missed)
162
138 ( Missed)
139 ( Missed)
3/5
Internet Message Access Protocol (IMAP)
143
427 ( Missed)
548
443
Which of the port numbers listed below is used by an Apple-proprietary file sharing protocol?
427
443
445
548 ( Missed)
A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply)
HSPA
HTTP over SSL ( Missed)
HSRP
HTTP over TLS ( Missed)
HTTPS ( Missed)
A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over
a network is known as:
RDP ( Missed)
IPP
RIP
WAP
4/5
Which of the following would be in use when a WINS server tries to resolve a host name into an IP address on a
Windows-based LAN?
TCP/IP
NetBIOS ( Missed)
Telnet
DNS
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 15 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-15-exam-220-901
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
True ( Missed)
False
Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks
(LANs)?
SMB
AFP
CIFS
SLP ( Missed)
Which of the following answers refer(s) to file sharing network protocol(s)? (Select all that apply)
RIP
FTP ( Missed)
NNTP
AFP ( Missed)
SNMP
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DNS
SNMP
NAT
DHCP ( Missed)
Authentication protocol
Address resolution protocol
Directory access protocol ( Missed)
File exchange protocol
A protocol used in network management systems for monitoring network-attached devices is known as:
SMTP
ICMP
SNMP ( Missed)
IPsec
1/5
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for
providing shared access to files, directories, and devices.
True ( Missed)
False
Examples of secure network protocols offering traffic encryption include: (Select 3 answers)
FTP
HTTPS ( Missed)
Telnet
HTTP
IPsec ( Missed)
SSH ( Missed)
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote
command-line login, remote command execution, and other secure network services between two networked
computers?
Telnet
SSH ( Missed)
Bcrypt
TFTP
Which of the protocols listed below was designed as a secure replacement for Telnet?
CHAP
FTP
SNMP
SSH ( Missed)
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way
handshake (thus it is also referred to as unreliable or best-effort protocol).
True
False ( Missed)
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to
establish connection (three-way handshake), supports retransmission of lost packets, flow control (managing the
amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
True
False ( Missed)
Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard
amendment? (Select all that apply)
2/5
5.0 GHz frequency band ( Missed)
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method ( Missed)
2.4 GHz frequency band
Maximum data signaling rate of 11 Mbps
Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment? (Select all
that apply)
What are the characteristics of the IEEE 802.11g wireless standard amendment? (Select all that apply)
Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
Maximum data signaling rate of 54 Mbps ( Missed)
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method ( Missed)
2.4 GHz frequency range ( Missed)
Maximum data signaling rate of 11 Mbps
5.0 GHz frequency range
The characteristic features of the IEEE 802.11n wireless standard amendment include: (Select all that apply)
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment?
(Select all that apply)
3/5
Multi-User Multiple Input / Multiple Output (MU-MIMO) ( Missed)
2.4 GHz frequency band
Which of the wireless security standards listed below has been deprecated in favor of newer standards due to known
vulnerabilities resulting from implementation flaws?
AES
WPA2
PEAP
WEP ( Missed)
CCMP
Which of the following wireless encryption schemes offers the highest level of protection?
WEP
WPA2 ( Missed)
WAP
WPA
A security protocol introduced in order to strengthen existing WEP implementations without requiring the
replacement of legacy hardware is known as:
PEAP
TKIP ( Missed)
CCMP
WPA2
WEP
WPA2 ( Missed)
PAP
WPA
A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as:
Scope
Channel ( Missed)
Service set
Layer
A situation in which multiple channels share the frequency band causing interference and performance degradation
for devices operating on channels that are too close to each other is known as:
Cross-talk
Channel overlapping ( Missed)
4/5
Collision
Channel bonding
A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11,
802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11
channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a
non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without
causing interference.
True ( Missed)
False
A server with private IP address has been set up to handle requests from an outside (public) network. Which of the
solutions listed below would enable its function?
Port triggering
Port bonding
Port forwarding ( Missed)
Port mirroring
Total marks 40
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 16 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-16-exam-220-901
A router configuration feature that allows for opening an inbound port temporarily based on the outbound requests
made by hosts placed inside a private network is called:
A lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall is
commonly referred to as:
VPN
Bridge
VLAN
DMZ ( Missed)
Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP
packet headers while in transit across a traffic routing device?
NAC
ACL
NAT ( Missed)
DMZ
A solution that alleviates the problem of depleting IPv4 address space by allowing multiple hosts on the same private
LAN to share a single public IP address is known as:
DNS
APIPA
NAT ( Missed)
DHCP
Dynamic Network Address Translation (DNAT) provides a permanent mapping between a private IP address and a
public IP address on a one-to-one basis.
True
False ( Missed)
Static Network Address Translation (SNAT) provides a mapping between private IP address and any of the IP
addresses belonging to the available public IP address pool.
True
False ( Missed)
1/5
Which of the following solutions allows network administrators to prioritize certain types of network traffic?
NAC
UAC
NAT
QoS ( Missed)
Adware
Shareware
Malware
Firmware ( Missed)
A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure,
and learn about the presence and capabilities of other devices is known as:
DHCP
UPnP ( Missed)
S.M.A.R.T
UEFI
WAP
UPnP ( Missed)
TKIP
PnP
Which of the following technologies simplifies configuration of new wireless networks by providing non-technical
users with a capability to easily configure network security settings and add new devices to an existing network?
WPA
WPS ( Missed)
UPnP
WAP
Examples of technologies that are not recommended and should be disabled due to their known vulnerabilities or
other security risks they might pose include: (Select 3 answers)
WPS ( Missed)
WAP
UPnP ( Missed)
WEP ( Missed)
TKIP
2/5
The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred
to as:
Which of the following enables broadband Internet access based on the cable television infrastructure?
SONET
GBIC
DOCSIS ( Missed)
SCADA
VDSL
ADSL ( Missed)
SDSL
UDSL
Which of the following Internet access types takes advantage of the traditional PSTN lines?
Fiber-optic
Mobile broadband
Dial-up ( Missed)
WiMAX
Which of the Internet connection types listed below types is the slowest?
Dial-up ( Missed)
Cable
Satellite
DSL
Fiber
Which of the following choices refers to an Internet connection type that offers the highest data signaling rate?
DSL
Dial-up
Cable
Satellite
Fiber ( Missed)
What are the characteristic features of satellite Internet connections? (Select all that apply)
3/5
Lack of signal interference
Signal latency ( Missed)
High connection speed
Interference (weather dependent) ( Missed)
Relatively low connection speed ( Missed)
High connection speed
Which of the following solutions allows for simultaneous digital transmission of voice, video, data, and other network
services over a PSTN?
WiMAX
PoE
ISDN ( Missed)
HSPA+
A network connecting computers within a small geographical area such as a building or group of buildings is
commonly referred to as a:
PAN
LAN ( Missed)
MAN
WAN
A computer network connecting multiple smaller networks over very large geographical areas is known as:
PAN
LAN
MAN
WAN ( Missed)
True ( Missed)
False
A type of limited-range computer network used for data transmission among various types of personal devices
centered around a single workstation is called:
PAN ( Missed)
LAN
SAN
MAN
A computer network connecting multiple LANs over an area of a city or campus is called:
PAN
4/5
LAN
MAN ( Missed)
WAN
Total marks 29
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 17 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-17-exam-220-901
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to
communicate with each other is commonly referred to as:
MAN
WLAN ( Missed)
LAN
VLAN
The disadvantage from using this device results from a fact that any incoming signal on any of its ports is re-created
and sent out on any connected ports, which in turn forces all the connected devices to share the total amount of
available bandwidth.
Hub ( Missed)
Switch
Access point
Bridge
Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between
Local Area Network (LAN) segments?
Router
Hub
Switch ( Missed)
Firewall
A device designed to filter and transfer IP packets between dissimilar types of computer networks is called:
Hub
Switch
Load balancer
Router ( Missed)
An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to
as:
Captive portal
Access Point (AP) ( Missed)
Intermediate Distribution Frame (IDF)
Active hub
What type of device would be the most convenient for interconnecting two or more physically separated network
segments?
1/5
Wireless bridge ( Missed)
Layer 3 switch
Wireless Access Point (WAP)
Cable modem
Which of the devices listed below allows for establishing a communication channel over a PSTN?
A software or hardware that checks information coming from the Internet and depending on the applied configuration
settings either blocks it or allows it to pass through is called:
Antivirus
Firewall ( Missed)
Antispyware
Malware
A simple device consisting of multiple computer ports arranged in rows used for the purpose of cable management is
known as:
F-connector
Media converter
Main Distribution Frame (MDF)
Patch panel ( Missed)
A type of network device that amplifies received signal so it can be transmitted over greater distance without loss in
quality is called:
Patch panel
Multiplexer
Repeater ( Missed)
Passive hub
Which of the answers listed below refers to a network device that allows to overcome limitations related to the
maximum allowable cable segment length?
2/5
Passive hub
Extender ( Missed)
Patch panel
Multiplexer
A computer networking technology that enables sending data over wiring used for transmission of electrical power is
called:
PLC ( Missed)
ECP
PoE
EPP
Which of the following acronyms refers to a solution that allows for carrying both data and electrical power over a
single twisted-pair Ethernet cable?
EPP
PoE ( Missed)
ECP
PLC
Which of the following tools would be used for attaching RJ-45 connectors to a twisted-pair Ethernet cable?
Cable tester
Needle-nose pliers
Punchdown tool
Crimper ( Missed)
What is the name of a tool used for removing electrical insulation cover from electric wires?
Cable crimper
Snips
Wire stripper ( Missed)
Punchdown tool
Which of the tools listed below would be used for testing power supply voltage output?
Torx screwdriver
Toner and probe kit
Loopback plug
Multimeter ( Missed)
What is the name of a networking tool used for locating a cable in a cabling bundle or tracing individual wires in a
cable?
Spectrum analyzer
3/5
Toner and probe kit ( Missed)
Time Domain Reflectometer (TDR)
Multimeter
A type of tool used for verifying correct electrical connections of wires in a cable is known as:
Loopback plug
Tone generator
Cable tester ( Missed)
Multimeter
While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's port can be tested
with the use of:
POST card
Cable tester
Multimeter
Loopback plug ( Missed)
Which of the networking tools listed below is used for attaching wires to a patch panel?
Cable crimper
Punchdown tool ( Missed)
Cable stripper
Needle-nose pliers
Which of the following networking tools would be of help in determining the optimal placement of a WAP?
Pentest
Vulnerability scanner
Proximity reader
Wi-Fi analyzer ( Missed)
A hardware solution designed to extend the functionality of a laptop computer by providing the capability to add
various types of devices on an external expansion card is called:
xD card
ExpressCard ( Missed)
SD card
CompactFlash (CF)
PC Card
CompactFlash (CF)
CardBus
4/5
ExpressCard ( Missed)
ExpressCard /34 and ExpressCard /54 are two form factors specified by the ExpressCard standard. Numbers after
slash in these two form factors refer to the card's:
Width ( Missed)
Length
Thickness
Speed
Total marks 25
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 18 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-18-exam-220-901
A type of memory module form factor most commonly used for extending the capacity of primary storage in laptop
computers is called:
SO-DIMM ( Missed)
SRAM
MicroDIMM
RDIMM
Which of the answers listed below refers to a memory type commonly used as an additional external storage in
laptops?
ROM
Flash ( Missed)
USB
Magnetic drive
What is the most common type of laptop port used for the purpose of connecting peripheral devices?
eSATA
USB ( Missed)
FireWire
PS/2
Which of the following functionalities allows to overcome standard keyboard size restrictions in laptops?
Touchpad
Numeric keypad
Fn key ( Missed)
Digitizer
Internal hard drive types used in laptop computers include: (Select all that apply)
Flash drives
SSHDs ( Missed)
USB drives
Magnetic disks ( Missed)
SSDs ( Missed)
Which of the following answers describe the features of Solid-State Drives (SSDs)? (Select 3 answers)
Low performance
High device cost ( Missed)
1/5
Lower capacity compared to magnetic drives ( Missed)
High performance ( Missed)
Low device cost
Higher capacity compared to magnetic drives
What is the name of an HDD type that combines high performance and capacity at a relatively low device cost?
SSD
Flash drive
Magnetic drive
USB drive
SSHD ( Missed)
Which of the statements listed below refer to the characteristic features of traditional magnetic drives? (Select 3
answers)
Which of the following answers lists the most common magnetic drive form factor used in laptops?
3.5-inch
5.25-inch
1.8-inch
2.5-inch ( Missed)
1.5-inch
5.25-inch
1.8-inch ( Missed)
2.5-inch ( Missed)
1.3-inch
What is the most common battery type that can be found in modern portable devices?
Alkaline
Nickel–metal hydride
Lithium-ion ( Missed)
Nickel-cadmium
2/5
Compared to port replicators, docking stations:
Which of the devices listed below offers the least amount of options when it comes to hardware upgrades that can be
performed by the device user?
Laptop
Workstation
Desktop
Tablet ( Missed)
Portable devices combining the capabilities of mobile phones and handheld PCs are commonly referred to as:
Phablets
Smartphones ( Missed)
PDAs
Thick clients
The term "Phablet" refers to a type of mobile device designed to combine the format of smartphones and tablet
computers.
True ( Missed)
False
Which of the following answers refers to a portable device type designed primarily for the purpose of reading books
in digital format?
Phablet
E-reader ( Missed)
Subnotebook
Digitizer
Which of the answers listed below refers to a technology that enables carrying out mobile payment transactions with
the use of the physical phone device?
WAP
NFC ( Missed)
IR
RFC
Which of the following technologies can be used by devices communicating in a WPAN? (Select all that apply)
Bluetooth ( Missed)
3/5
IEEE 802.3
Near Field Communication (NFC) ( Missed)
Infrared (IR) ( Missed)
100BASE-T
8P8C connector
Lightning connector ( Missed)
BNC connector
Lucent Connector (LC)
A Wireless Access Point (WAP) or site offering public wireless Internet access is commonly referred to as:
Hotspot ( Missed)
Proxy
Hub
Gateway
Which of the following terms refers a mobile device's capability to share its Internet connection with other devices?
Pairing
Clustering
Tethering ( Missed)
Bonding
The CMOS setup utility can be accessed by pressing: (Select best answer)
The Advanced Boot Options screen allows for starting Windows in advanced troubleshooting modes. The Advanced
Boot Options menu can be accessed by turning on the PC and pressing a function key before Windows starts.
Which of the following keys provides access to that menu?
F1
Del
F8 ( Missed)
Esc
Unexpected system shutdowns and reboots can be caused by overheating of the PC's internal components.
True ( Missed)
False
4/5
Which of the answers listed below refers to launching Windows only with default settings and basic device drivers?
Standby mode
System restore
Safe mode ( Missed)
Guest account
Total marks 34
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 19 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-19-exam-220-901
Which of the following acronyms refers to a series of basic hardware diagnostic tests performed by the startup BIOS
after the computer is powered on?
EIDE
POTS
ACPI
POST ( Missed)
A POST card:
Which of the following POST beep codes indicates video adapter card failure?
Which of the following answers lists a common solution for random time and date resets in Windows?
Windows Update
Primary storage module replacement
Safe mode troubleshooting
CMOS battery replacement ( Missed)
Which of the following could be of help in troubleshooting the "Invalid boot disk" error message? (Select all that
apply)
1/5
Removing floppy disk from the Floppy Disk Drive (FDD) ( Missed)
Administrative Tools
Overheating
Hardware failure
Corrupted OS installation
Misconfigured OS
All of the above ( Missed)
Continuous reboots of a Windows host upon encountering a persistent stop error might be caused by Startup and
Recovery configuration settings in the Control Panel System applet (System -> Advanced system settings ->
Advanced -> Startup and Recovery -> Settings... -> System failure).
True ( Missed)
False
A feature that can be found in some types of PC Power Supply Units (PSUs) that allows the PSU to automatically
adapt to the AC voltage supplied from the power socket is called:
Fixed-input
Inverter
Auto-switching ( Missed)
Hot plugging
Common fixes for PC components not getting enough power include disconnecting all extraneous peripheral
devices that might be putting too much load on the Power Supply Unit (PSU), reseating the PSU cable connectors
inside the computer case if necessary, and applying the PSU tester to check if the power supply is working properly.
True ( Missed)
False
Excessive dust buildup inside the computer case might be the cause of:
Overheating
Unexpected shutdowns
Intermittent device failure
Continuous reboots
All of the above ( Missed)
Which of the PC components listed below would be the most probable source of problems when the issue symptoms
on a failing system include loud noise from the inside of the computer case? (Select 3 answers)
RAM modules
Magnetic Hard Disk Drive (HDD) ( Missed)
Cooling fans ( Missed)
2/5
Solid-State Drive (SDD)
Analog modem
Power Supply Unit (PSU) ( Missed)
Which of the CPU connectors on the motherboard should be checked/reseated in order to ensure that the CPU is
receiving power? (Select all that apply)
The Blue Screen of Death (BSoD) in MS Windows provides technical information that might be of help for advanced
users in solving the problem that caused the stop error. The information displayed on the screen when Windows
encounters this type of error typically includes error code, memory address where it occurred, and the name of the
driver that caused it.
True ( Missed)
False
Android
Linux
Mac OS ( Missed)
Windows
Which of the following actions would solve the problem of leaking/burst/bulged capacitors inside the computer case?
(Select 2 answers)
Which of the tools listed below can be used to isolate a failing hardware component inside the PC case? (Select all
that apply)
Which of the following could cause slow performance of a hard drive? (Select 2 answers)
Disk striping
File fragmentation ( Missed)
Disk mirroring
Insufficient amount of RAM ( Missed)
Disk duplexing
An actuator arm assembly failure manifested by loud clicking noise emitted from the inside of the computer case is a
problem symptom that should prompt for:
Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T.) allows for monitoring system for anticipated:
Replacing a faulty mechanical component of a magnetic drive requires specialized environment and diagnostic
tools.
True ( Missed)
False
For a newly added hard drive, this command allows to configure the drive with a file system so that Windows can
store information on the disk.
FORMAT ( Missed)
NBTSTAT
MSTS
4/5
DEFRAG
Windows Recovery Environment (WinRE) offers a set of tools and utilities to troubleshoot Windows startup issues.
Which of the command-line commands launches a tool for manual troubleshooting of problems related to master
boot record (MBR), boot sector, and Boot Configuration Data (BCD) store in Windows RE Command Prompt?
DISKPART
BOOTREC.EXE ( Missed)
CHKDSK
FIXBOOT
REGSVR32
CHKDSK
DEFRAG
DISKPART ( Missed)
Total marks 36
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 20 (Exam 220-901)
examcompass.com/comptia-a-plus-practice-test-20-exam-220-901
Disk Defragmenter is a software tool used for rearranging data on magnetic drives in order to improve system
performance. Defragmentation results in faster read/write operations of the magnetic hard drive's read/write heads
as they can access the data sequentially without seeking data fragments in different areas of the disk
(defragmentation consolidates data into smallest contiguous regions).
True ( Missed)
False
Similarly to magnetic drives, Solid State-Drives (SSDs) require periodic defragmentation in order to improve system
performance.
True
False ( Missed)
When a computer monitor is unable to display image on the screen, the most common causes (and the easiest ones
to fix) for this problem include: (Select 2 answers)
Inverter failure
Loose cable connections ( Missed)
Bad LCD display
Wrong input selection ( Missed)
Backlight failure
A tiny spot on an LCD monitor display screen that permanently remains black when it should be activated and
displaying color is commonly referred to as stuck pixel.
True
False ( Missed)
A dim display on a laptop LCD screen might indicate a problem related to: (Select 2 answers)
Stuck pixels
Backlight ( Missed)
Dead pixels
Incorrect color patterns
Inverter ( Missed)
A permanent computer display screen discoloration caused by displaying the same static image for extended
periods of time is known as:
Artifact
Stuck pixel
Burn-in ( Missed)
1/5
Dead pixel
APIPA-assigned addresses are valid only for communications within a network segment that a given host is
connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and
169.254.255.254) cannot connect to the Internet. The assignment of such address, which can be checked with the
IPCONFIG command-line utility, typically indicates a DHCP-related problem.
True ( Missed)
False
Which of the following command-line utilities allows to test the reachability of a host across an IP network?
NETSTAT
IPCONFIG
TRACERT
PING ( Missed)
Which of the Windows Command Prompt tools listed below allows to display IP addresses, subnet mask, and
default gateway for all adapters?
NETSTAT
IFCONFIG
TRACERT
IPCONFIG ( Missed)
A Linux command-line utility used for displaying and modifying network interface configuration settings is called:
IFCONFIG ( Missed)
NET CONFIG
IPCONFIG
NETWORKSETUP
Microsoft Windows OS command-line command for displaying intermediary points on the packet route is called:
TRACERT ( Missed)
ROUTE PRINT
TRACEROUTE
NETSTAT
What is the name of a command-line utility in MS Windows that allows for displaying protocol statistics and current
TCP/IP network connections?
TRACERT
TRACEROUTE
NETSTAT ( Missed)
NSLOOKUP
Which of the following answers lists a Windows command-line utility designed to be of help in troubleshooting
2/5
NetBIOS name resolution problems?
NETSTAT
NSLOOKUP
NBTSTAT ( Missed)
TRACEROUTE
The following Windows command-line command can be used to display a list of domains, computers, or shared
resources available on a specific computer.
Which of the network administration command-line tools listed below is used for DNS queries?
TRACERT
NSLOOKUP ( Missed)
NETSTAT
PATHPING
Which of the actions listed below should be of help while troubleshooting non-responsive touchscreen of a mobile
device?
Which of the following steps would ensure the proper re-assembly of a serviced laptop? (Select all that apply)
In laser printing, long vertical streaks on each output page indicate a problem related to:
Printer calibration
Damage to the imaging drum ( Missed)
Printer driver
Clogged print head nozzles
3/5
Which of the symptoms listed below would indicate a depleted toner cartridge as the source of a printing problem?
(Select all that apply)
Which step of the laser printer imaging process requires troubleshooting if a printer produces ghost images on
output pages?
Charging
Fusing
Exposing
Developing
Cleaning ( Missed)
In laser printing, toner falling off of the printed copy indicates a problem with:
Toner cartridge
Print head
Cleaning blade
Fusing unit ( Missed)
Garbled characters on output pages would indicate a printing problem related to:
Calibration
Printer driver ( Missed)
Fuser assembly
Imaging drum
Spare kit
Field Replaceable Unit (FRU)
Maintenance kit ( Missed)
Standard technician toolkit
Which of the following tools would be the most appropriate to clean the inside of a laser printer? (Select all that
apply)
4/5
Cleaning brush
A software that temporarily stores print jobs on the computer hard disk or in memory until the printer is ready to print
them is called:
Feed assembly
Print spooler ( Missed)
Task Scheduler
Task Manager
Total marks 32
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 1 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-1-exam-220-902
What are the recommended minimum system requirements for Windows Vista Home Basic? (Select 4 answers)
Which of the answers listed below describe the recommended minimum system requirements for all Microsoft
Windows Vista releases other than the Home Basic version (Home Premium, Business, Enterprise, and Ultimate)?
(Select 4 answers)
What are the system requirements for the 32-bit (x86) version of Microsoft Windows 7? (Select 4 answers)
Which of the following answers describe system requirements for the 64-bit (x64) version of Microsoft Windows 7?
(Select 4 answers)
1/6
1 GHz CPU ( Missed)
2 GB of system RAM ( Missed)
DirectX 9 graphics device with WDDM 1.0 or higher driver ( Missed)
20 GB of free hard disk space ( Missed)
1 GB of system RAM
Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPUs to use more than 4 GB
of physical memory on capable versions of Microsoft Windows operating systems.
True ( Missed)
False
A type of feature used by CPUs for isolating areas of memory in order to prevent the execution of code from non-
executable memory locations is known as:
Which of the following answers refers to the area of implementation of No-eXecute bit (NX bit)?
Parity checks
Malware protection ( Missed)
Biometric authentication
Data backup
Which of the terms listed below refers to a solution (a complimentary instruction set) that extends the capabilities of
a CPU?
RISC
SSE2 ( Missed)
EIDE
SSID
What are the recommended minimum system requirements for the 32-bit (x86) version of Microsoft Windows 8/8.1?
(Select 4 answers)
1 GHz CPU with support for PAE, NX, and SSE2 ( Missed)
1 GB of system RAM ( Missed)
Microsoft DirectX 9 graphics device with WDDM driver ( Missed)
20 GB of free hard disk space
2 GB of system RAM
16 GB of free hard disk space ( Missed)
1 GHz CPU
2/6
Which of the following answers refer to the recommended minimum system requirements for the 64-bit (x64) version
of Microsoft Windows 8/8.1? (Select 4 answers)
1 GHz CPU
2 GB of system RAM ( Missed)
Microsoft DirectX 9 graphics device with WDDM driver ( Missed)
20 GB of free hard disk space ( Missed)
1 GB of system RAM
25 GB of free hard disk space
1 GHz CPU with support for PAE, NX, and SSE2 ( Missed)
Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are
mandatory CPU requirements for Microsoft Windows 8/8.1, therefore Windows 8/8.1 cannot be installed on
computer systems that lack support for these features.
True ( Missed)
False
A visual desktop experience included in Windows Vista and Windows 7 that adds various graphics intensive
features (such as animations and transparency effects) to the User Interface (UI) is known as:
Modern UI
Charms
Metro UI
Aero ( Missed)
Which of the following editions of Microsoft Windows Vista does not include Windows Aero desktop experience?
Which of the Microsoft Windows 7 releases listed below do not include Windows Aero desktop experience? (Select
2 answers)
Windows Sidebar in Windows Vista is a long, vertical bar displayed on the desktop side that can be customized by
adding various simple-task applications called gadgets.
3/6
True ( Missed)
False
Windows Desktop Gadgets in Windows 7 provides similar functionality to Windows Sidebar known from Vista,
however it does not feature the vertical bar displayed on the desktop side.
True ( Missed)
False
Windows Sidebar (Vista) and Windows Desktop Gadgets (Windows 7) are not available in Windows 8 and newer
releases of MS Windows due to the risk of potential vulnerabilities that can be exploited through the use of gadget
apps.
True ( Missed)
False
Windows Vista and later releases of the Microsoft OS offer a security feature which limits privileges of software
applications and access to administrative tasks. When a program makes a change that requires administrator-level
permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen
prompt requiring an administrator password to proceed. This functionality is called:
What is the name of a Microsoft Windows feature that allows for encrypting entire drives?
LoJack
Encrypting File System (EFS)
New Technology File System (NTFS)
BitLocker ( Missed)
Which of the Windows Vista releases listed below include the BitLocker functionality? (Select 2 answers)
Which of the following Windows 7 releases include the BitLocker functionality? (Select 2 answers)
Windows 7 Starter
Windows 7 Home Basic
Windows 7 Home Premium
Windows 7 Professional
4/6
Windows 7 Enterprise ( Missed)
Windows 7 Ultimate ( Missed)
Microsoft Windows 8/8.1 versions equipped with the BitLocker functionality include: (Select 2 answers)
Core
Starter
Pro ( Missed)
Enterprise ( Missed)
Ultimate
Previous versions are copies of files and folders that Windows automatically saves as part of a restore point.
Previous versions are sometimes referred to as:
Backup copies
Shadow copies ( Missed)
Primary copies
Mirror copies
With the release of Windows ME, Microsoft added a new built-in utility to their desktop operating systems which
allows to roll back system files and settings to an earlier point in time without affecting personal files. It provides a
yet another way to undo system changes to the computer when an installation of a new program or device driver
causes a problem and uninstalling doesn't fix the problem. The utility's interface contains a list allowing the user to
bring back the system to the state it was in before the selected event. Items on that list are called:
Roll-back points
Backup entries
Restore points ( Missed)
Recovery points
Which Microsoft Windows technology offers the capability to take advantage of unused space on a USB flash drive
or flash memory card to help improve PC performance?
Device Manager
Windows Easy Transfer
ReadyBoost ( Missed)
BitLocker To Go Reader
Total marks 47
Total Questions 25
5/6
Success ratio 0%
Marks secured 0
Percentage secured 0%
6/6
CompTIA A+ Certification Practice Test 2 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-2-exam-220-902
If an application written for an earlier version of Windows doesn't run correctly the operating system can emulate its
own older version to allow a given program to work with newer hardware or software. The compatibility mode
settings in Windows can be changed by:
Right-clicking the program icon and choosing "Restore previous versions" option from the menu
Right-clicking the program icon, clicking Properties, and then applying the required settings on the
Compatibility tab ( Missed)
Right-clicking the program icon and selecting "Run program using recommended compatibility settings"
option from the pop-up menu
Right-clicking the program icon and selecting "Run as administrator" option from the pop-up menu
Which of the answers listed below describe(s) the features of Windows XP Mode? (Select all that apply)
Windows Vista, Windows 7, and Windows 8/8.1 facilitate moving user accounts and settings, application
configuration data, and personal files from one computer to another with the use of:
Which of the answers listed below refers to a Windows folder containing various system tools for administrators and
advanced users?
Control Panel
Computer Management
Administrative Tools ( Missed)
System Configuration
Which of the following answers lists a Windows built-in software component that monitors network traffic and
depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?
Security Center
Windows Firewall ( Missed)
Action Center
Windows Defender
A Windows Vista operating system security and maintenance monitoring component is called:
Action Center
Windows Update
Windows Security Center ( Missed)
Security and Maintenance
What is the name of a system component designed for monitoring security and maintenance-related items in
Windows 7/8/8.1?
When a program installed in Windows stops responding or encounters an error, logs describing the error can be
examined with the use of:
Modern UI (aka Metro UI) is a Windows 8/8.1 replacement for Windows Aero desktop experience known from the
two previous releases of the OS (Windows Vista and Windows 7).
True ( Missed)
False
iDrive
Cloud Drive
Dropbox
OneDrive ( Missed)
2/5
An online Microsoft software distribution platform for games and apps is known as:
Which of the MS Windows versions listed below offers a built-in multi-monitor taskbar support feature?
Windows XP
Windows Vista
Windows 7
Windows 8/8.1 ( Missed)
Which of the following answers lists the name of a quick-access pop-up taskbar in Windows 8/8.1 activated by
placing the mouse cursor at the right edge of the screen?
Charms ( Missed)
Gadgets
Sticky Keys
Tools
A type of extended command-line shell and a scripting language designed to simplify administrative tasks in
Microsoft Windows is known as Windows PowerShell.
True ( Missed)
False
An operating system installation that preserves system settings, personal files, and applications from the older OS
version is referred to as:
Which of the in-place upgrade paths listed below are not available for users who wish to migrate their OS from an
older version to a newer release of MS Windows? (Select all that apply)
While upgrading from an earlier edition of Windows to Windows 7 it is important to make sure that programs and
devices will work with the new OS version. To find potential compatibility problems with computer's hardware,
3/5
devices, or programs that might affect the installation of Windows 7, Microsoft offers a free utility designed to check
for any issues and to provide recommendations on what to do before performing an upgrade to improve the PC's
compatibility with Windows 7. What is the name of that utility?
Windows Upgrade Assistant is a free Microsoft tool released mainly for Windows 7/8 owners who wish to perform an
in-place upgrade from their OS versions to Windows 8 or 8.1. The tool also allows to check for hardware
compatibility of systems running Windows XP and Vista with Windows 8. This functionality is directed at those users
who wish to upgrade older versions of their Windows OSs to Windows 8 through the clean installation option, which
is the only upgrade path available in such case.
True ( Missed)
False
After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for
information about secondary storage devices that might contain the OS. The list of devices and the order in which
they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred
to as:
A UEFI functionality designed to prevent the loading of malware, untrusted operating systems and software during a
system's startup process is known as:
LoJack
Bitlocker
Secure boot ( Missed)
Kerberos
Which of the following answers refer(s) to the common storage media types that can be used locally to boot/install
an OS? (Select all that apply)
PXE
Netboot
Recovery partition on internal HDD ( Missed)
USB drive ( Missed)
CD-ROM disc ( Missed)
DVD disc ( Missed)
Preboot Execution Environment (PXE) and Apple NetBoot are two examples of technologies that enable booting a
4/5
computer system with the use of a network interface.
True ( Missed)
False
The ability to replace computer system components without causing interruption to the system is known as:
Multitasking
Hardware acceleration
Cold plugging
Hot swapping ( Missed)
Which of the terms listed below refers to an automated installation process that relies on an answer file and does not
require user interaction or presence?
Total marks 35
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 3 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-3-exam-220-902
A type of Windows installation that erases the contents of the target partition is called:
Unattended installation
Clean installation ( Missed)
Remote network installation
Repair installation
If a computer's hard disk has an adequate free disk space, it is possible to install more than one operating system
and then choose which OS to use during each startup. This type of configuration setup is known as:
Multi-mode
Single sign-on
Multiboot ( Missed)
Virtualization
Which of the following terms refers to a backup technique that allows for creating an exact copy of an entire drive
and replicating the drive to a new computer or to another drive on the same computer in case of a hard drive failure?
Repair installation
Drive imaging ( Missed)
Incremental backup
Differential backup
Which of the installation types listed below provides a simpler and less costly alternative to manual OS installation in
an environment consisting of multiple hosts requiring the same configuration settings?
Upgrade install
Repair installation
Image deployment ( Missed)
Clean install
A recovery disc is a general term for removable media commonly shipped with most new computers allowing a user
to reformat the hard drive and restore the operating system to the original factory condition as configured by an
Original Equipment Manufacturer (OEM). Most OEM recovery systems for Microsoft Windows involve booting from
a separate CD-ROM or DVD, however in recent years bundled recovery CD-ROMs and DVDs have become less
common as in case of newer systems more frequently the recovery data becomes available on a separate partition
of a new computer's hard drive.
True ( Missed)
False
Which of the new built-in software options added in Windows 8 allows for reinstallation of the OS without affecting
the existing user profiles and settings?
1/5
Reset
Refresh ( Missed)
Repair
Restore
A new maintenance feature added in Windows 8 that enables clean installation of the OS without the need for
installation media is called:
Reset ( Missed)
Refresh
Repair
Restore
The practice of dividing a hard disk drive (HDD) storage space into separate logical drives is known as:
Formatting
Partitioning ( Missed)
Virtualization
Disk imaging
What are the advantages of organizing hard drive space into multiple partitions? (Select all that apply)
Which of the following answers lists the most commonly used storage type found on computers running Microsoft
Windows OSs?
Dynamic disk
Striped volumes
Basic disk ( Missed)
Dynamic volumes
By creating volumes that span multiple disks (spanned and striped volumes), dynamic disks in Windows provide the
capability for software implementations of RAID.
True ( Missed)
False
Methods used by Microsoft Windows operating systems for organizing disk partitions include: (Select 2 answers)
GUI
MBR ( Missed)
2/5
FAT32
GPT ( Missed)
NTFS
Which of the answers listed below describe the available options of the Master Boot Record (MBR) partitioning
scheme? (Select 3 answers)
Which of the following answers refer to a labeling used in reference to a partition type that stores information about
the Windows OS and other partitions on the disk drive? (Select 2 answers)
Extended
Active ( Missed)
Basic
Logical
Bootable ( Missed)
A basic disk using the GPT partition style can have up to:
4 primary partitions
16 primary partitions
64 primary partitions
128 primary partitions ( Missed)
ext3
FAT32
NFS
exFAT ( Missed)
CDFS
The 4 GB maximum file size limit and 8 TB maximum partition size limit are the characteristic features of:
NTFS
FAT32 ( Missed)
NFS
exFAT
3/5
In order to create a system image of a Windows drive, the drive must be formatted to use:
Which of the following are advantages of the New Technology File System (NTFS) over FAT32 file system? (Select
best answer)
Disk quotas
Compression
Object permissions
Encryption
All of the above features are improvements implemented in NTFS not available in FAT32 ( Missed)
Which of the answers listed below refers to a file system designed for optical media?
CDFS ( Missed)
FAT32
NTFS
exFAT
Which of the following terms refer to methods of storing and accessing data over computer network? (Select 2
answers)
ext3
DFS ( Missed)
ext4
FAT32
NFS ( Missed)
exFAT
ext3 and ext4 are examples of default file systems used by:
OS X
Mac OS
Windows Server
Linux distributions ( Missed)
Quick format is a disk formatting option in MS Windows that apart from deleting the file system structure also
checks the drive for bad sectors.
True
False ( Missed)
4/5
A computer program/code that provides software interface to hardware devices enabling operating systems and
other computer programs to interact with the device is commonly referred to as a device driver.
True ( Missed)
False
Which of the following sources allow(s) for obtaining, installing, and updating device drivers used by Microsoft
Windows OSs? (Select all that apply)
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 4 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-4-exam-220-902
Which of the following statements describing different methods for organizing Windows-based computers in
networks are true? (Select 3 answers)
Which of the statements listed below apply to Windows workgroups? (Select 3 answers)
Logging on to any computer on the Windows domain requires a single set of credentials ( Missed)
Security policies and permissions on the Windows domain are administered centrally ( Missed)
Windows domains are based on the Peer-to-Peer networking architecture
Each computer on the Windows domain has its own security policy
Windows domains are based on the Client-Server networking architecture ( Missed)
All members of the Windows domain must be on the same local network or subnet
Which of the MS Windows command-line utilities allows to terminate tasks by process id or image name?
TASKKILL ( Missed)
SHUTDOWN
EXIT
TASKLIST
Provided that the process ID of NOTEPAD.EXE obtained with the TASKLIST command is 1230, which of the
following answers lists the correct syntax for a Windows Command Prompt TASKKILL command that would allow to
close this application?
Which of the answers listed below refers to the correct syntax for a Windows Command Prompt TASKKILL
command that would allow to close NOTEPAD.EXE by providing its imagename?
Windows Recovery Environment (WinRE) offers a set of tools and utilities to troubleshoot Windows startup issues.
Which of the command-line commands launches a tool for manual troubleshooting of problems related to master
boot record (MBR), boot sector, and Boot Configuration Data (BCD) store in Windows RE Command Prompt?
DISKPART
BOOTREC.EXE ( Missed)
CHKDSK
FIXBOOT
Which of the Windows Command Prompt commands writes a new master boot record to a disk?
BOOTREC /FIXBOOT
FIXBOOT
BOOTREC /FIXMBR ( Missed)
FIXBOOT
Which of the following commands in Windows Command Prompt writes a new boot sector to the system partition?
BOOTREC /FIXMBR
FIXBOOT
BOOTREC /FIXBOOT ( Missed)
FIXMBR
The following command can be used to shut down or restart local or remote hosts running MS Windows.
SHUTDOWN ( Missed)
TASKKILL
EXIT
REBOOOT
What would be the correct syntax for setting the time-out period of 60 seconds before powering off a Windows host?
POWEROFF /t 60
HALT /t 60
REBOOT /t 60
2/5
SHUTDOWN /t 60 ( Missed)
Which SHUTDOWN command switch in Windows Command Prompt forces full system shutdown and restart of the
Windows host?
-s -r
/r ( Missed)
/s r
-i
Which of the following command-line commands in Windows displays a list of currently running processes on a local
or remote host?
IEXPLORE
TASKLIST ( Missed)
SERVICES.MSC
NETSTAT
The MS Windows command-line commands used for creating a directory or subdirectory include: (Select 2
answers)
RMDIR
MD ( Missed)
MKDIR ( Missed)
CD
CHDIR
RD
The following command(s) can be used in Windows Command Prompt to delete a directory. (Select all that apply)
CLS
MKDIR
RD ( Missed)
RMDIR ( Missed)
MD
Which parameter of the RD command in Windows allows for the deletion of an entire directory tree? (the specified
directory and all its subdirectories, including all files)
/A
/S ( Missed)
/Y
/Q
Which of the following commands in Windows change(s) the current directory to the root directory? (Select all that
apply)
3/5
CHDIR /R
CD\ ( Missed)
CHDIR\ ( Missed)
CD..
DIR /ROOT
Which parameter of the CD command in Windows moves the command-line prompt one folder up in the directory
tree (sets the prompt at the parent folder of the current folder)?
\
/
+
... ( Missed)
Which of the Windows Command Prompt commands listed below can be used to delete one or more files? (Select
all that apply)
EDIT
TASKKILL
DEL ( Missed)
ERASE ( Missed)
MOVE
For a newly added hard drive, this command allows to configure it with a file system so that Windows can store
information on the disk.
MSTSC
DEFRAG
NBTSTAT
FORMAT ( Missed)
The following command-line command can be used to copy one or more files from one location to another.
SFC
COPY ( Missed)
MOVE
PUSHD
Which of the COPY command switches verifies that the new files are written correctly?
/-Y
/V ( Missed)
/Y
/A
Which of the COPY command switches suppresses the confirmation prompt displayed when Windows is about to
4/5
overwrite the contents of an existing file?
/V
/Y ( Missed)
/A
/-Y
Which of the Microsoft Windows command-line commands allow(s) for copying multiple files or entire directory trees
from one directory to another and for copying files across a network? (Select all that apply)
XCOPY ( Missed)
PUSHD
SHIFT
ROBOCOPY ( Missed)
MOVE
Which of the following commands in MS Windows launches a text-based command-line partitioning utility?
REGSVR32
CHKDSK
DEFRAG
DISKPART ( Missed)
Total marks 36
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 5 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-5-exam-220-902
Which of the command-line commands listed below allows for updating multiple Group Policy settings in MS
Windows?
CONVERT
GPUPDATE ( Missed)
BCDEDIT
GPRESULT
A command-line command in MS Windows that displays Group Policy information for a machine or user is known
as:
NBTSTAT
GPRESULT ( Missed)
VERIFY
GPUPDATE
Which of the following Windows Command Prompt commands can be used to list all directory's files and
subdirectories contained in the current directory? (Select 2 answers)
DIR ( Missed)
1/5
/?
DIR *.* ( Missed)
*.*
DIR /ALL
Which of the commands listed below allow(s) for exiting the command interpreter in Windows? (Select all that apply)
Which of the following commands in Windows can be used to display help information related to a specific
command-line utility? (Select all that apply)
Used without any parameters, the HELP command in MS Windows displays a list of available system commands
along with a brief description of each command.
True ( Missed)
False
Which of the answers listed below refers to a Windows Command Prompt command used for uncompressing
cabinet files?
REPLACE
EXPAND ( Missed)
CONVERT
RECOVER
The "Run as administrator" option in MS Windows available after right-clicking on the Command Prompt application
icon allows for execution of shell commands reserved for a system administrator.
True ( Missed)
False
Many of the utilities available in the Administrative Tools menu in Windows Control Panel are implemented as the
so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this menu
(which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer)
is called:
2/5
Task Manager
Performance Monitor
Computer Management ( Missed)
System Configuration
If a device in Windows fails after driver update, the driver can be restored to the previously installed version in:
Which of the command-line commands in Microsoft Windows launches the Device Manager tool?
MSCONFIG.EXE
DEVMGMT.MSC ( Missed)
APPWIZ.CPL
COMPMGMT.MSC
Local Users and Groups is a Microsoft Management Console (MMC) snap-in included by default in all versions of
MS Windows that enables creating custom user groups, moving accounts from one group to another, or
adding/removing accounts from different groups.
True
False ( Missed)
Which of the tools listed below allows for managing multiple user accounts in home editions of MS Windows?
An MS Windows account that enables users to have temporary access to a computer without the capability to install
software or hardware, change settings, or create a user password is called:
Due to the fact that the Guest account in Windows allows a user to log on to a network, browse the Internet, and
shut down the computer, it is recommended to keep it disabled when it isn't needed.
True ( Missed)
False
3/5
The Local Security Policy administrative tool in home editions of MS Windows can be used by system administrators
to modify account and local policies, public key policies and IP security policies for a local host.
True
False ( Missed)
Which of the following tools in MS Windows is used to examine (both in real time and by collecting log data for later
analysis) how programs that are run affect a computer's performance?
Task Manager
Performance Monitor ( Missed)
System Properties
Computer Management
Event Viewer
An MS Windows Administrative Tools folder applet for managing background applications is called:
Services ( Missed)
Resource Monitor
System Configuration
Component Services
Which of the Microsoft Windows tools listed below can be used by system administrators to find and isolate
problems that might prevent the OS from starting correctly?
Task Manager
System Information
Computer Management
System Configuration ( Missed)
Windows Task Scheduler is a component of Microsoft Windows that provides the ability to schedule the launch of
programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains
the application icon shortcut which can be used to launch the Task Scheduler MMC snap-in?
Which of the following answers refers to one of the Microsoft Windows Administrative Tools utilities designed for use
by application developers?
4/5
The function of the Data Sources configuration utility in Windows is to facilitate communication between applications
and varying types of databases.
True ( Missed)
False
Total marks 29
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 6 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-6-exam-220-902
Which of the tools listed below allow for administering print devices in Microsoft Windows? (Select 3 answers)
A shortcut icon to the Windows Memory Diagnostic tool can be found in:
Windows Memory Diagnostic Tool cannot be run inside Windows and requires computer restart (the utility is
launched during reboot before loading the operating system).
True ( Missed)
False
Which of the following answers refers to a Windows built-in software component that monitors network traffic and
depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?
Security Center
Windows Firewall ( Missed)
Action Center
Windows Defender
Which tab of the MSCONFIG utility in Windows lists choices for startup configuration modes?
Services
Boot
General ( Missed)
Startup
Tools
Which of the tabs of the System Configuration utility in Windows contains the Diagnostic startup option?
Tools
1/5
General ( Missed)
Services
Startup
Boot
Which of the configuration features listed below can be managed through the MSCONFIG Boot tab? (Select all that
apply)
The System Configuration tab containing a list of background applications that can be enabled/disabled during
system startup is called:
Boot
Applications
Services ( Missed)
General
Tools
Prior to Windows 8, the MSCONFIG Startup tab contained a list of user applications that could be enabled/disabled
during system boot. The contents of this tab are not available in the MSCONFIG utility shipped with later releases of
MS Windows.
True ( Missed)
False
In Windows 8 and later releases, contents of the MSCONFIG's Startup tab can be viewed and managed via:
The System Configuration tab in MS Windows providing access to MMC snap-ins is called:
Services
Tools ( Missed)
Applications
2/5
Programs
Which of the answers listed below describe(s) the function of Windows Task Manager? (Select all that apply)
Windows Task Manager can be launched by: (Select all that apply)
Which of the following answers list Windows Task Manager tabs available only in Windows 7 and earlier releases of
the Microsoft OS? (Select all that apply)
Startup
Applications ( Missed)
Processes ( Missed)
App history
Performance ( Missed)
Networking ( Missed)
In Windows 8 and later releases, the real-time information about resources used by user applications and system
processes in Task Manager can be found grouped in one place under the Processes tab.
True ( Missed)
False
Which of the Windows Task Manager tabs in Windows 8 includes the information about the network resources
usage listed under Networking tab in previous releases of the Microsoft OS?
Applications
Processes
Performance ( Missed)
Services
The Task Manager utility in Windows 8 contains a new tab previously included as part of the System Configuration
3/5
(MSCONFIG) utility which allows system administrators to control user applications that could be enabled/disabled
during system boot. What is the name of this tab?
Boot
Startup ( Missed)
App history
Details
Which of the following answers lists the correct sequence of steps required to close a non-responsive user
application in Task Manager in Windows 7?
On the Processes tab, click the program that isn't responding, click End Task button
On the Applications tab, click the program that isn't responding, click End Task button ( Missed)
On the Performance tab, click the program that isn't responding, click End Task button
On the App history tab, click the program that isn't responding, click End Task button
Which of the answers listed below describes the correct sequence of steps required to close a non-responsive user
application or process in Task Manager in Windows 8?
On the App history tab, click the program/process that isn't responding, click End Task button
On the Performance tab, click the program/process that isn't responding, click End Task button
On the Processes tab, click the program/process that isn't responding, click End Task button ( Missed)
On the Applications tab, click the program/process that isn't responding, click End Task button
A Windows Command Prompt command used for launching a GUI system utility for managing HDDs is called:
DISKMGMT.MSC ( Missed)
CONTROL.EXE
DISKPART.EXE
DEVMGMT.MSC
COMPMGMT.MSC
Which of the following provide(s) access to the Disk Management utility in Windows? (Select all that apply)
In Windows Disk Management utility, a normal disk status indicating that the disk is ready for read/write operations
is labeled as:
Basic
Online ( Missed)
Dynamic
4/5
Unallocated
In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another
computer and found by the OS is labeled as:
Offline
Foreign ( Missed)
Disconnected
Online
Which of the following answers refers to a dynamic disk status indicating disk corruption or its temporal
unavailability?
Foreign
Unallocated
Offline ( Missed)
Imported
A temporary disk status set to "Initializing" indicates that a basic disk is in the process of being converted into a
dynamic disk.
True ( Missed)
False
Total marks 39
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 7 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-7-exam-220-902
Which of the MS Windows tools listed below allow(s) for managing disks, partitions, and volumes? (Select all that
apply)
DISKPART.EXE ( Missed)
Computer Management
DISKMGMT.MSC ( Missed)
System Configuration
Disk Management ( Missed)
CHKDSK
Which of the following answers list(s) the correct sequence of steps for reducing partition size in Windows Disk
Management utility? (Select all that apply)
Right-click on a partition, select "Shrink Volume..." option from the pop-up menu, in the launched pop-up
window enter the amount of space to shrink in MB, click the "Shrink" button ( Missed)
In Disk Management Action menu select the partition to shrink, right-click on the partition, select "Shrink
Volume..." option from the pop-up menu, enter the amount of space to shrink in MB, click the "Shrink" button
Left-click on a partition in order to select it, in Disk Management Action menu select All Tasks menu item,
select "Shrink Volume..." option, in the launched pop-up window enter the amount of space to shrink in MB,
click the "Shrink" button ( Missed)
Right-click on a partition, select "Split Volume..." option from the pop-up menu, in the launched pop-up
window enter the amount of space to shrink in MB, click the "Split" button
What is the name of a Windows Disk Management interface option for increasing partition size with the use of an
unallocated disk space?
Extend ( Missed)
Add
Convert
Expand
Which of the DISKPART.EXE commands can be used for managing the size of a disk volume? (Select 2 answers)
ADD
EXTEND ( Missed)
CONVERT
SHRINK ( Missed)
COMPACT
Windows 8 introduces a virtualization technology that enables organization of multiple physical disks into logical
volumes in a fashion similar to RAID levels. What is the name of the Control Panel applet providing access to this
functionality?
1/5
Sync Center
Disk Management
Devices and Printers
Storage Spaces ( Missed)
Administrative Tools
Which of the following Windows tools allow(s) for migrating user data and user information to a new computer?
(Select all that apply)
Windows Vista, Windows 7, and Windows 8/8.1 facilitate moving user accounts and settings, application
configuration data, and personal files from one computer to another with the use of:
While upgrading from an earlier edition of Windows to Windows 7 it is important to make sure that programs and
devices will work with the new OS version. To find potential compatibility problems with computer's hardware,
devices, or programs that might affect the installation of Windows 7, Microsoft offers a free utility designed to check
for any issues and to provide recommendations on what to do before performing an upgrade to improve the PC's
compatibility with Windows 7. What is the name of that utility?
Windows Upgrade Assistant is a free Microsoft tool released mainly for Windows 7/8 owners who wish to perform an
in-place upgrade from their OS versions to Windows 8 or 8.1. The tool also allows to check for hardware
compatibility of systems running Windows XP and Vista with Windows 8. This functionality is directed at those users
who wish to upgrade Windows XP/Vista to Windows 8 through the clean installation option, which is the only
upgrade path available in such case.
True ( Missed)
False
Which of the following system utilities in MS Windows provides access to a database containing system
configuration information?
2/5
NBTSTAT
MSCONFIG
REGEDIT ( Missed)
MSINFO32
Which other command-line command besides REGEDIT can be used to launch registry editor in Windows?
REGDT
COMMAND
REGEDIT32
MSTSC
REGEDT32 ( Missed)
Which of the answers listed below refers to a command interpreter utility in Windows?
CMD ( Missed)
MSCONFIG
MSTSC
MMC
Which of the following answers lists a Windows command that launches an applet for managing background
applications?
MSCONFIG.EXE
APPWIZ.CPL
SERVICES.MSC ( Missed)
MSINFO32
A framework providing access to a collection of tools that can be used by administrators and advanced users to
manage networks, computers, services, and other system components in Windows is known as:
CMD
MSCONFIG
MMC ( Missed)
MSTSC
Which of the following answers refers to the MS Windows client application for Remote Desktop Services?
MBSA
REGSVR32
SERVICES.MSC
MSTSC ( Missed)
A simple Windows text-editing utility that can be launched from any place in the Command Prompt without the need
for specifying path to the application's file location is called:
3/5
WORDPAD
EXPLORER
NOTEPAD ( Missed)
MSWORD
What is the name of a GUI-based file and folder manager application in Windows?
EXPLORER ( Missed)
BOOTREC
IEXPLORE
MSTSC
A Microsoft Windows application utility that displays details about computer's hardware configuration, computer
components, software, and device drivers is known as:
MSCONFIG
NBTSTAT
MSINFO32 ( Missed)
IEXPLORE
Which of the answers listed below refers to a diagnostic tool for detecting display, sound, and input related problems
in MS Windows?
DXDIAG ( Missed)
MMC
DirectX
REGSVR32
An MS Windows system utility designed to improve file access speed by rearranging data stored on a disk or drive
is called:
FORMAT
DEFRAG ( Missed)
CHKDSK
DISKPART
A system utility available in Windows ME and newer releases of Microsoft operating systems that allows to roll back
system files and settings to an earlier point in time is known as:
Task Manager
Windows Easy Transfer
Computer Management
System Restore ( Missed)
Which of the following DEFRAG command parameters allows to locate and consolidate fragmented files on all
volumes?
4/5
/A
/E
/V
/C ( Missed)
If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to
recover such files.
True
False ( Missed)
Which of the answers listed below refers to a Microsoft online service that allows for patching up system
vulnerabilities, improving system performance, and fixing coding errors found in Windows software?
Action Center
Windows Update ( Missed)
Security Center
Windows Store
Which of the following locations in MS Windows provide(s) access to the Internet Properties (INETCPL.CPL) system
utility? (Select all that apply)
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 8 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-8-exam-220-902
Which of the Windows Internet Properties system utility tabs provides access to proxy settings?
Security
Privacy
Advanced
Connections ( Missed)
The Internet Properties applet tab containing an option for configuring VPN settings is called:
General
Programs
Connections ( Missed)
Privacy
The Security tab of the Internet Properties utility in Windows allows for imposing restrictions on web content allowed
in Microsoft Internet Explorer web browser.
True ( Missed)
False
Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary
Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web
forms?
General ( Missed)
Privacy
Advanced
Security
A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites
is called:
Security
Programs
Privacy ( Missed)
General
What is the name of the Windows Internet Properties applet tab providing access to advanced cookie management
options?
Programs
Privacy ( Missed)
Connections
1/5
Security
A Windows Internet Properties system utility tab containing an option for managing Internet Explorer web browser
add-ons is called:
Privacy
General
Security
Programs ( Missed)
Which of the following tabs of the Windows Internet Properties applet provides an option for rolling back all of the
Internet Explorer web browser configuration settings to the state they were in when Internet Explorer was first
installed?
General
Security
Privacy
Advanced ( Missed)
The "View by Category" option in Windows Control Panel allows for displaying entire contents of the Control Panel
in a single window providing quick access to each Control Panel applet.
True
False ( Missed)
Which of the locations listed below allow(s) for accessing computer display configuration settings in MS Windows?
(Select all that apply)
Which of the following actions are available within the standard Windows account in User Accounts Control Panel
applet? (Select 2 answers)
The Folder Options menu in File Explorer (also known as Windows Explorer in Windows releases prior to Windows
8) provides access to configuration settings that allow for displaying hidden files, folders, and drives.
2/5
True ( Missed)
False
A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be
stored in RAM due to the insufficient memory space is called: (Select all that apply)
Which tab of the System Properties (SYSDM.CPL) Windows applet provides access to virtual memory configuration
settings?
Hardware
System Protection
Environment Variables
Performance
Advanced ( Missed)
The Remote tab of the System Properties applet in MS Windows contains configuration options for: (Select all that
apply)
Which tab of the System Properties Windows applet provides access to the System Restore settings?
Advanced
Performance
System Protection ( Missed)
Environment Variables
Hardware
Which of the power-saving states in MS Windows uses the least amount of power?
Standby
Sleep
Hibernation ( Missed)
Suspend
The term "Power plan" refers to a collection of hardware and system settings that manage how a Windows-based
3/5
computer uses power. Available configuration options for managing power in MS Windows (accessible via the
Power Options applet in Windows Control Panel) include three pre-set power plans (Balanced, Power saver, and
High performance) along with the possibility of creating a custom power plan based on specific user preferences.
True ( Missed)
False
A power management mode in Windows that draws small amount of power, saves the system state in RAM, and
allows for quick resuming of full-power operation with the use of a power button or on command is known as:
Sleep ( Missed)
Power saver
High performance
Hibernation
The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)
Which of the following statements describing features of Windows HomeGroup are true? (Select 3 answers)
Which of the Control Panel items in Windows 7 and later releases replaces the Printers applet known from previous
versions of MS Windows?
Device Manager
Ease of Access Center
Devices and Printers ( Missed)
Computer Management
Which of the locations listed below allow(s) for making adjustments to the volume of sound in Windows 7 and
Windows 8/8.1? (Select 2 answers)
4/5
Sounds and Audio Devices applet in Control Panel
AutoPlay applet in Control Panel
Sound applet in Control Panel ( Missed)
The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 is a centralized place providing access
to several software tools that can automatically fix common problems related to application compatibility, hardware,
sound, networking, operating system, and security.
True ( Missed)
False
A Control Panel applet introduced in Windows Vista providing information about the network connection status is
called:
Networking
Phone and Modem
Internet Options
Network and Sharing Center ( Missed)
Total marks 38
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 9 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-9-exam-220-902
Which of the locations listed below provide access to the Device Manager applet in MS Windows? (Select 2
answers)
Which of the signs listed below indicates that a Windows network share is intended for administrative access?
#
$ ( Missed)
?
&
In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or
drive is:
Hidden ( Missed)
Inaccessible
Visible to any user
Accessible by any user
A system that uses public network (e.g. Internet) as a means for creating private encrypted connections between
remote locations is known as:
Which of the following Internet access types takes advantage of the traditional PSTN lines?
Fiber-optic
Mobile broadband
Dial-up ( Missed)
WiMAX
A unique identifier for a WLAN (a wireless network name) is commonly referred to as:
1/6
EUI
SSID ( Missed)
OUI
CNAME
Setting up a wireless connection in Network and Sharing Center Control Panel applet in MS Windows requires:
(Select all that apply)
Encryption mechanisms designed for securing wireless networks include: (Select all that apply)
WMS
WPA ( Missed)
MD5
WPA2 ( Missed)
WEP ( Missed)
Which of the wireless encryption schemes listed below offers the highest level of protection?
WEP
WPA2 ( Missed)
WAP
WPA
A type of wireless network providing high-speed Internet access through mobile telecommunication cellular network
technologies is known as:
VLAN
WWAN ( Missed)
VPN
WLAN
Which of the following Control Panel applets in MS Windows provides an option for setting up a broadband, dial-up,
or VPN connection?
In computer networking, a computer system or an application that acts as an intermediary between another
2/6
computer and the Internet is commonly referred to as:
Bridge
Active hub
Server
Proxy ( Missed)
In Windows 7/8/8.1, the Remote Desktop Connection utility can be launched from the Start menu search box, from
the Run menu dialog box, or from a command line. Which of the following commands is used to start Remote
Desktop Connection from the Command Prompt?
MMC
MSDS
RDP
MSTSC ( Missed)
Which of the statements listed below refer(s) to the Windows Remote Assistance utility? (Select all that apply)
Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)
Tunnel
Static route
Exception ( Missed)
Event
3/6
Introduced in Windows Vista, Windows Firewall with Advanced Security MMC snap-in offers more detailed
configuration options allowing system administrators to execute more granular control over inbound and outbound
network traffic.
True ( Missed)
False
Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool?
Which of the locations listed below allow(s) for enabling/disabling Windows Firewall? (Select all that apply)
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DNS
SNMP
NAT
DHCP ( Missed)
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?
SMTP
DNS
DHCP ( Missed)
SNMP
In order to be able to connect to a website on the Internet and display its contents, a URL entered in the web
browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle
this type of request?
ICS server
Web server
DNS server ( Missed)
DHCP server
Which of the Windows Command Prompt utilities allows to display IP addresses, subnet mask, and default gateway
4/6
for all adapters?
NETSTAT
IFCONFIG
TRACERT
IPCONFIG ( Missed)
Which of the following answers list(s) data required for manual configuration of network adapter settings in MS
Windows? (Select all that apply)
IP address ( Missed)
Subnet mask ( Missed)
Default gateway ( Missed)
MAC address
DNS server address ( Missed)
SSID (aka network name)
Which of the answers listed below describes the correct sequence of steps for accessing the IPv4 connection
manual configuration interface in MS Windows?
Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> Select
Internet Protocol version 4 (TCP/IPv4) from the connection components list -> Click the Properties button ->
Fill in the required fields
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> Right-click
on the device -> Select Properties from the pop-up menu -> Select Internet Protocol version 4 (TCP/IPv4)
from the connection components list -> Click the Properties button -> Fill in the required fields ( Missed)
Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change
adapter settings -> Select Internet Protocol version 4 (TCP/IPv4) from the connection components list ->
Click the Properties button -> Fill in the required fields
Control Panel (Icon view) -> Internet Options applet -> Connections tab -> Click the "LAN settings" button ->
Select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> Click the Properties
button -> Fill in the required fields
Total marks 40
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/6
6/6
CompTIA A+ Certification Practice Test 10 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-10-exam-220-902
A type of transmission that takes place in two directions simultaneously is known as:
If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking
place:
Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their
capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based
on the highest performance settings supported by both devices.
True ( Missed)
False
Which of the answers listed below describes the correct sequence of steps for accessing the Speed & Duplex
settings of an Ethernet adapter in MS Windows?
Control Panel (Category view) -> View Devices and Printers -> Right-click on the device -> Select Properties
from the pop-up menu -> click the Configure... button -> On the Advanced tab select the Speed & Duplex
settings
Control Panel (Icon view) -> Internet Options applet -> Connections tab -> Click the "LAN settings" button ->
Right-click on the device -> Select Properties from the pop-up menu -> click the Configure... button -> On the
Advanced tab select the Speed & Duplex settings
Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> Right-
click on the device -> Select Properties from the pop-up menu -> click the Configure... button -> On the
Advanced tab select the Speed & Duplex settings
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> Right-click
on the device -> Select Properties from the pop-up menu -> click the Configure... button -> On the Advanced
tab select the Speed & Duplex settings ( Missed)
A solution that allows to turn on a network host remotely by sending a special data packet (known as Magic Packet)
is called:
RDP
1/5
Jumbo frame
Backdoor access
Wake-on-LAN ( Missed)
Which of the following terms refers to a mechanism that allows for controlling network resources and assigning
priority to different types of traffic? (Select best answer)
Which of the answers listed below describe(s) the function of Differentiated Services Code Point (DSCP)
architecture? (Select all that apply)
Security
QoS ( Missed)
Authentication
Network traffic management ( Missed)
Accounting
In order to operate, an integrated component such as Network Interface Card (NIC) on a brand new motherboard
may need to be first:
In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.
True
False ( Missed)
The backup utility in Windows 8 that allows for restoration of different versions of saved personal files is called:
NTBackup
Backup and Restore
2/5
File History ( Missed)
System Restore
Which of the answers listed below describes the correct sequence of steps for accessing disk maintenance utilities
in Windows 8.1?
Windows Explorer (Windows logo key + E) -> Select This PC from the left menu item list to view storage
devices -> Right-click on the drive -> Select Properties from the pop-up menu -> Select a disk maintenance
utility from the Tools tab ( Missed)
Control Panel (Icon view) -> Backup and Restore -> Right-click on the drive -> Select Properties from the
pop-up menu -> Select a disk maintenance utility from the Tools tab
Windows Explorer (Windows logo key + E) -> Select My Computer from the left menu item list to view
storage devices -> Right-click on the drive -> Select Properties from the pop-up menu -> Select a disk
maintenance utility from the Tools tab
Control Panel (Category view) -> Select View devices and printers -> Select a storage device -> Right-click
on the drive -> Select Properties from the pop-up menu -> Select a disk maintenance utility from the Tools
tab
A Microsoft service providing software error patches for the Windows operating system and its installed components
is called:
Virus definition database files contain all the known viruses and countermeasures against them that can be applied
by a particular antivirus application. In order to be effective, an AV program needs up-to-date versions of these files
which can be obtained through an AV software update feature.
True ( Missed)
False
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify
malicious code are known as:
Repositories
Signature files ( Missed)
Macros
Security logs
3/5
An antivirus software is kept up to date through: (Select 2 answers)
Driver updates
Audit trails
Engine updates ( Missed)
OS updates
Virus signature updates ( Missed)
Which of the following allows for backing up the entire Windows installation and restoring the entire contents of the
drive in case of hard drive failure?
System repair disc, which is one of the features of the Backup and Restore Control Panel applet in Windows, allows
for creating a CD/DVD disc which can be used for recovering Windows from a serious error or restoring the
Windows installation from a system image.
True ( Missed)
False
Linux
Mac OS X ( Missed)
Windows
Other
Which of the answers listed below refers to a Mac OS disk maintenance tool?
DEFRAG
Disk Cleanup
Disk Management
CHKDSK
Disk Utility ( Missed)
Resource Monitor
Task Manager
TASKKILL command
Force Quit ( Missed)
4/5
Performance Monitor
A Mac OS X system feature providing a single-screen thumbnail preview of all open windows and applications is
called:
Spotlight
Mission Control ( Missed)
Ease of Access Center
Desktop Window Manager
Which of the following Mac OS features allows for creation of switchable desktop environments?
Spaces ( Missed)
Personalization
Display
Aero
Kerberos
LoJack
BitLocker
Keychain ( Missed)
Total marks 28
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 11 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-11-exam-220-902
Which of the answers listed below refers to the system search utility for Mac OS?
Explorer
File explorer
Spotlight ( Missed)
Finder
iCloud ( Missed)
Remote Disk
OneDrive
Dropbox
Which of the following answers refers to an interface capable of sensing more than one finger press at a time?
Touchscreen
Advanced Host Controller Interface (AHCI)
Digital Visual Interface (DVI)
Multi-touch ( Missed)
Konqueror
Explorer
Finder ( Missed)
Nautilus
Which of the Mac OS X features allows for using the CD or DVD drive hosted from another computer?
Remote Disk
Dock
Boot Camp
Remote Disc ( Missed)
Explorer
Dock ( Missed)
Spotlight
Finder
1/5
Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment?
Which of the following commands in Linux is used to display information about files and directories contained within
the current working directory?
pwd
ls ( Missed)
grep
ps
A command-line command in Linux that allows to search files for lines containing a match to a given pattern is
called:
rm
chmod
find
grep ( Missed)
Which of the Linux command-line commands listed below is used for directory traversal?
cd ( Missed)
dir
ps
dig
The following command can be used for turning off or restarting a Linux host.
reboot
shutdown ( Missed)
exit
taskkill
A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:
mv
pwd ( Missed)
rm
dir
A Linux command-line command allowing a user to change his/her own password is known as:
pwd
2/5
pass
passwd ( Missed)
password
replace
export
move
mv ( Missed)
Which of the answers listed below refers to a Unix command for copying files and directories?
cp ( Missed)
copy
xcopy
robocopy
What is the name of a Linux command used for renaming files and directories?
rm
ps
mv ( Missed)
ls
A command-line command in Linux used for deleting files and directories is known as:
erase
rm ( Missed)
del
edit
3/5
A Linux command-line utility used for displaying and modifying network interface configuration settings is called:
ifconfig ( Missed)
net config
ipconfig
networksetup
Which of the following answers refers to a Linux command-line command used for configuring network interface
parameters specific to the wireless communication?
net config
ifconfig
networksetup
iwconfig ( Missed)
What is the name of a Linux command-line utility used for reporting statistics on running processes?
ps ( Missed)
tasklist
nbtstat
id
Which of the answers listed below refers to a Linux command that allows for assuming the identity of a different
system user and executing commands with security privileges of that user account?
sync
id
usermod
su ( Missed)
A Linux command that allows for modifying security privileges in order to be able to execute a single command that
requires root access permissions is called:
id
sudo ( Missed)
usermod
su
Which of the answers listed below refers to a package management system most often used on Debian and Debian-
based Linux distributions?
KDE
APT ( Missed)
Yum
RPM
4/5
Your Final Report
Total marks 25
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 12 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-12-exam-220-902
Which of the following answers refers to a software tool used for searching and installing software packages on
Debian and Debian-based Linux distributions?
RPM
apt-rpm
Yum
apt-get ( Missed)
Which of the answers listed below refers to a command used for invoking a text editor in Unix-like operating
systems?
edit
notepad
vi ( Missed)
bcdedit
A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:
fsutil
diskpart
dd ( Missed)
format
Which of the following terms refers to a solution that allows multiple operating systems to work simultaneously on
the same hardware?
Virtualization ( Missed)
Clustering
Hyperthreading
Load balancing
Which of the virtualization-related definitions listed below are correct? (Select 3 answers)
The term "Host machine" refers to an isolated operating system installation within the host operating system
An operating system run inside a virtual machine is referred to as a guest operating system ( Missed)
The term "Virtual machine" refers to a physical computer that uses virtualization software
The term "Host machine" refers to a computer that uses virtualization software to run virtual machines (
Missed)
An operating system run inside a virtual machine is referred to as a host operating system
The term "Virtual machine" refers to an isolated operating system installation within the host operating
system ( Missed)
1/5
Which components would have the highest priority while building a custom workstation designed to run virtual
machines? (Select 2 answers)
High-capacity HDD
Maximum amount of RAM ( Missed)
Specialized GPU
High-end cooling
Multicore CPU ( Missed)
Hardware enhancements adding support for virtualization developed by AMD for its CPUs are known as:
Hyper-V
AMD Catalyst
VT-x
AMD-V ( Missed)
A set of Intel CPU hardware enhancements improving support for virtualization is called:
EPV
VT-x ( Missed)
Catalyst
Hyper-V
The term "Emulator" refers to a solution that allows to bridge the gap between different OSs by enabling them to run
software specifically designed for other (incompatible) operating systems.
True ( Missed)
False
In virtualization technology, a software program that manages multiple operating systems (or multiple instances of
the same operating system) on a single computer system is called:
Hypervisor ( Missed)
Virtual switch
Host machine
Virtual machine
Which of the following statements describe(s) disadvantages of virtualization? (Select all that apply)
Multiple virtual machines run on a single host share hardware resources which has a degrading effect on
performance ( Missed)
Deployment of different types of operating systems or multiple copies of the same operating system or
application becomes more difficult in a virtualized environment due to hardware configuration issues
On a larger scale, virtualization has a negative effect on operational costs due to increased power supply
requirements
Hardware used for hosting virtual machines becomes a single point of failure ( Missed)
2/5
A cloud computing service model offering remote access to applications based on monthly pricing or annual
subscription fee is called:
PaaS
SaaS ( Missed)
IaaS
In which of the cloud computing service models clients, instead of buying all the hardware and software, purchase
computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment
and software?
IaaS ( Missed)
SaaS
PaaS
Which of the following cloud service types would provide the best solution for a web developer intending to create a
web app?
SaaS
PaaS ( Missed)
IaaS
Which of the answers listed below refers to a cloud computing deployment model in which the cloud infrastructure is
provisioned for open use by the general public?
Hybrid cloud
Private cloud
Community cloud
Public cloud ( Missed)
A cloud deployment model consisting of two or more interlinked cloud infrastructures (private, community, or public)
is referred to as a hybrid cloud.
True ( Missed)
False
Which of the terms listed below refers to a cloud computing feature that allows for automatic allocation of computing
resources in proportion with the demand?
Which of the following terms applies to cloud computing feature that allows consumers to control the volume and
type of utilized computing resources?
Measured service
3/5
On-demand self-service ( Missed)
Broad network access
Rapid elasticity
In cloud computing, the practice of grouping together computing resources and making them available for shared
access for multiple consumers is referred to as:
In cloud computing, the term "Measured service" refers to the cloud provider's ability to track the computing
resources consumers are accessing as well as the amount of resources they are consuming. It provides
transparency for both the provider and consumer and is used, among other applications, for the purpose of billing.
True ( Missed)
False
File storage
Serving of web pages ( Missed)
Name resolution
Email handling
SMTP server
DNS server
HTTP server
FTP server ( Missed)
Which of the server types listed below is used to assign dynamic IP addresses to devices on a network?
DNS server
DHCP server ( Missed)
FTP server
HTTP server
In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar
needs to be translated into an IP address. Which of the following server types is used to handle this type of request?
ICS server
Web server
DNS server ( Missed)
4/5
DHCP server
In computer networks, a computer system or an application that acts as an intermediary between another computer
and the Internet is commonly referred to as:
Bridge
Active hub
Web server
Proxy ( Missed)
Total marks 29
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 13 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-13-exam-220-902
Which of the server types listed below is used for the purpose of verification of the identity of a person or process?
Proxy server
DNS server
Authentication server ( Missed)
Web server
The term "Unified Threat Management" (UTM) refers to a network security solution (commonly in the form of a
dedicated device called UTM appliance) which combines the functionality of a firewall with additional safeguards
such as for example URL filtering, spam filtering, gateway antivirus protection, intrusion detection or prevention,
content inspection, or malware inspection.
True ( Missed)
False
The term "Intrusion Detection System" (IDS) refers to a device or software application designed to detect malicious
activities and violations of security policies on a network and/or computer host. An IDS designed to monitor networks
is known as Network Intrusion Detection System (NIDS), an IDS installed on a particular host monitoring only that
host is called Host Intrusion Detection System (HIDS). IDSs do not take any active steps to prevent or stop the
intrusion relying only on passive response which may include sending an alert to a management console or saving
information about the event in logs.
True ( Missed)
False
Firewall reconfiguration
Closing down connection
Logging ( Missed)
Terminating process
Sending an alert ( Missed)
Which of the answers listed below illustrates the difference between passive and active security breach response?
Which of the following statements describe(s) the characteristic features of open-source applications? (Select all that
apply)
Proprietary software
Permission to modify and redistribute the application ( Missed)
Free access to the application code ( Missed)
Permission to use the application only under certain conditions
Lack of free access to the application code
Windows Phone, iOS, and Android are all examples of closed-source operating systems.
True
False ( Missed)
Mobile apps for iOS are available for purchase and download through which of the following online marketplaces?
Amazon Appstore
App Store ( Missed)
Windows Marketplace for Mobile
Google Play
Which of the marketplaces listed below offer(s) apps for Android-based devices? (Select all that apply)
App Store
Google Play ( Missed)
Windows Marketplace for Mobile
Amazon Appstore ( Missed)
Modern mobile devices have the capability to present landscape or portrait views of the device's screen based on
the way the device is being held. Which of the following built-in functionalities allows for determining screen
orientation in those devices?
Hypervisor
Geotracking
Accelerometer ( Missed)
Gyroscope
Which of the following built-in functionalities available in modern mobile devices supplements the function of an
accelerometer by offering more accurate recognition of movement within a 3D space?
Direct3D
Multitouch
Gyroscope ( Missed)
2/5
Hypervisor
Resistive touchscreen displays rely on the electrical properties of the human body to detect when and where on a
display the user is touching. Because of this, resistive displays can be controlled with very light touches of a finger
and generally cannot be used with a mechanical stylus or a gloved hand. Another characteristic feature of resistive
touchscreens is that they do not require screen calibration.
True
False ( Missed)
Capacitive touchscreen displays are composed of two flexible sheets coated with a resistive material and separated
by an air gap or microdots. Pressure applied to the surface of the display by a finger or stylus causes the layers to
touch, which completes electrical circuits and tells the device where the user is touching. As such, capacitive
touchscreens require much more pressure to activate than resistive touchscreens as well as periodic screen
calibration in order to be able to register the exact touch location.
True
False ( Missed)
A procedure of identifying someone's physical location by obtaining GPS data from their mobile device or other
GPS-enabled devices is known as:
Geotagging
Wireless survey
Geotracking ( Missed)
Tethering
Which of the solutions listed below was designed to alleviate cellular network coverage problems?
A type of mobile user interface presenting the main view of the device with a group of shortcut icons to apps is
known as:
Title screen
Launcher ( Missed)
Virtual assistant
Desktop
Which of the following acronyms refers to a set of tools used for developing applications for a specific platform?
GUI
SDLC
API
SDK ( Missed)
3/5
A package file format used by Android OS for distribution and installation of mobile apps is called:
XAP
APK ( Missed)
IPA
EXE
Which of the answers listed below refers to a technology that enables carrying out mobile payment transactions with
the use of the physical phone device?
WAP
NFC ( Missed)
IR
RFC
A wireless network Access Point (AP) or site offering public wireless Internet access is commonly referred to as:
Hotspot ( Missed)
Proxy
Hub
Gateway
Which of the following terms refers a mobile device's capability to share its Internet connection with other devices?
Pairing
Clustering
Tethering ( Missed)
Bonding
The term "Airplane mode" refers to a functionality that allows to disable wireless transmission capability on a device
that comes equipped with this feature.
True ( Missed)
False
A type of limited-range computer network used for data transmission among various types of personal devices
centered around a single workstation is known as:
PAN ( Missed)
LAN
SAN
MAN
The process of establishing connection between Bluetooth devices (for example between a Bluetooth enabled
headset and a Bluetooth enabled phone) is commonly referred to as:
Linking
4/5
Three-way handshake
Crosstalk
Pairing ( Missed)
Total marks 28
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 14 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-14-exam-220-902
Intranet
Piconet ( Missed)
Extranet
Ethernet
Which of the following answers refers to a security feature used in Bluetooth device pairing?
Mobile device email configuration settings required for retrieval of messages from a mail server include: (Select all
that apply)
IMAP ( Missed)
SLP
SMTP
POP3 ( Missed)
SNMP
Which of the answers listed below refer(s) to POP3S encrypted communication? (Select all that apply)
What are the characteristic features of the secure version of IMAP? (Select all that apply)
Gmail
1/5
Outlook
IIS
Exchange ( Missed)
Multipurpose Internet Mail Extensions (MIME) specification extends the email message format beyond simple text
enabling the transfer of graphics, audio, and video files over the Internet mail system.
True ( Missed)
False
Lack of authentication
Digital signatures ( Missed)
Encryption ( Missed)
Lack of non-repudiation
Unencrypted communication
Which of the answers listed below refers to the default configuration settings a mobile device is shipped with?
PRI ( Missed)
RIS
PII
PRL
The process of moving from one Wireless Access Point (WAP) coverage area to another without re-authentication or
loss in connectivity is commonly referred to as
Roaming ( Missed)
Switching
Routing
DHCP relay
A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to
establish connection with the right cell phone tower is called:
PRL ( Missed)
RIS
PRI
PII
Which of the following answers refers to a unique number used for identification of a physical mobile device?
MAPI
IMEI ( Missed)
SSID
2/5
IMSI
A unique number used for identification of a mobile network phone user is known as:
USMT
MIMO
IMSI ( Missed)
IMEI
Mobile device synchronization methods for Apple iOS devices include: (Select all that apply)
iTunes ( Missed)
OneDrive
Remote Disk
iCloud ( Missed)
Dropbox
An authentication subsystem that enables a user to access multiple, connected system components (such as
separate hosts on a network) after a single login at only one of the components is commonly referred to as:
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to
computer systems are commonly referred to as:
Trojans
Malware ( Missed)
Viruses
Spyware
Malicious software collecting information about users without their knowledge/consent is known as:
Logic bomb
Adware
Computer worm
Spyware ( Missed)
A computer program containing malicious segment that attaches itself to an application program or other executable
component is called:
Adware
Spam
Virus ( Missed)
3/5
Flash cookie
A standalone malicious computer program that replicates itself over a computer network is known as:
Spyware
Worm ( Missed)
Trojan
Spam
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is
called:
Adware
Computer worm
Trojan horse ( Missed)
Spyware
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a
computer or computer network is known as:
Trojan
Rootkit ( Missed)
Armored virus
Backdoor
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a
program, online service, or an entire computer system?
Root access
Administrative access
Zero-day vulnerability
Backdoor ( Missed)
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the
user performs requested action is known as:
Grayware
Adware
Ransomware ( Missed)
Spyware
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to
confidential information they shouldn't have access to is commonly referred to as:
Phishing ( Missed)
Privilege escalation
Backdoor access
4/5
Shoulder surfing
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later
by an attacker for the purpose of identity theft is an example of: (Select 2 answers)
Phishing ( Missed)
Watering hole attack
Social engineering ( Missed)
Zero-day exploit
Vishing
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 15 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-15-exam-220-902
Phishing scams targeting a specific group of people are generally referred to as:
Vishing
Spear phishing ( Missed)
Spoofing
Whaling
An email sent from an unknown source disguised as the source known to the message receiver is an example of:
(Select 2 answers)
Spoofing ( Missed)
Dictionary attack
Trojan horse
Brute forcing
Social engineering ( Missed)
Tailgating
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?
SMTP ( Missed)
RDP
SNMP
Telnet
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data
is known as:
Zero-day attack
MITM attack
Social engineering ( Missed)
Backdoor access
Which of the following fall(s) into the category of social engineering attacks? (Select all that apply)
MITM attack
Spear phishing ( Missed)
Dictionary attack
Shoulder surfing ( Missed)
Zero-day attack
Tailgating ( Missed)
1/5
In computer security, a situation in which an unauthorized person is able to view another user's display or keyboard
to learn their password or other confidential information is known as:
Spear phishing
Tailgating
Shoulder surfing ( Missed)
Spoofing
New accounts
Patched software
Vulnerability that is present in already released software but unknown to the software developer ( Missed)
Well known vulnerability
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online
hijacker is called:
Honeypot
Zombie ( Missed)
Logic bomb
Proxy
Which of the following terms is used to describe a collection of intermediary compromised systems under control of
a hacker?
Honeynet
Botnet ( Missed)
Intranet
Malware
An attack against encrypted data that relies heavily on computing power in order to check all possible keys and
passwords until the correct one is found is known as a brute-force attack.
True ( Missed)
False
Which of the password attacks listed below takes advantage of a predefined list of words?
Replay attack
Birthday attack
Dictionary attack ( Missed)
Brute-force attack
What type of security measure is in place when a client is denied access to the network due to an outdated antivirus
software?
2/5
NAS
DMZ
NAC ( Missed)
NAT
Which of the following answers refer(s) to the implementation of best security practices in a corporate environment?
(Select all that apply)
What is tailgating?
Spoofing
Zero-day attack
Spear phishing
MITM ( Missed)
The term "Mantrap" refers to a physical security access control system used to prevent unauthorized users from
gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance
point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until
he/she provides authentication token required to unlock the inner door.
True ( Missed)
False
Hardware locks
Mantraps ( Missed)
Video surveillance
EMI shielding
Which of the following provides physical security measure against laptop theft?
3/5
Cable locks ( Missed)
Trusted Platform Module (TPM)
Geotracking
LoJack for Laptops
Which of the tools listed below allows for secure disposal of physical documents?
Shredder ( Missed)
Hard drive sanitation
Degaussing tool
Recycle Bin
A type of identification badge that can be held within a certain distance of the reader to authenticate the holder is
called:
ID badge
Smart card
Security token
RFID badge ( Missed)
Privacy filter (aka privacy screen) is a protective overlay placed on the computer screen that narrows the viewing
angle so data is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one
of the countermeasures against shoulder surfing.
True ( Missed)
False
Which of the following prevention methods fall(s) into the category of physical security controls? (Select all that
apply)
The two factors that are considered important for creating strong passwords are:
4/5
Authentication process can be based on different categories of authentication factors, including unique physical
traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something
you have"), or user names and passwords ("something you know"). Additional factors might include geolocation
("somewhere you are"), or user-specific activity patterns, such as for example keyboard typing style ("something you
do"). Multifactor authentication systems require implementation of authentication factors from two or more different
categories.
True ( Missed)
False
Total marks 36
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 16 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-16-exam-220-902
Which of the following functionalities allows a DLP system to fulfil its role?
Motion detection
Environmental monitoring
Content inspection ( Missed)
Loop protection
Which of the acronyms listed below refers to a security solution designed to detect and prevent unauthorized use
and transmission of confidential information outside of the corporate network?
DEP
RADIUS
DLP ( Missed)
PGP
One of the measures for securing networking devices includes the practice of disabling unused ports.
True ( Missed)
False
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted
access to objects as well as what operations are allowed on a given object?
CRL
NAT
BCP
ACL ( Missed)
Antimalware ( Missed)
Email filtering ( Missed)
Directory permissions ( Missed)
Biometrics
Privacy filters
Antivirus ( Missed)
User authentication
Strong passwords
Changing default user names
1/5
User education ( Missed)
A set of rules enforced in a network that restricts the use to which the network may be put is known as:
SLA
AUP ( Missed)
MOU
SOW
A security rule that prevents users from accessing information and resources that lie beyond the scope of their
responsibilities is known as principle of least privilege.
True ( Missed)
False
Which of the following default local groups has the least amount of access privileges in MS Windows?
Backup operator
Power user
Guest ( Missed)
Standard user
Which of the following statements describing share permissions in MS Windows are true? (Select 2 answers)
In NTFS filesystem, the term "Permission propagation" refers to a situation where a folder or file created inside
another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent
folder propagate down to its child objects, i.e. folders and files created inside that folder).
True ( Missed)
False
In NTFS filesystem, a folder or file copied from one location to another on the same volume retains its original
permissions.
True ( Missed)
False
2/5
In NTFS filesystem, a folder or file moved from one location to another on the same volume inherits permissions of
its new parent folder.
True
False ( Missed)
ATTRIB is a command used to set and remove file attributes in Microsoft Windows operating systems. Available
options for this command include: read-only (R), archive (A), system (S), and hidden (H). With ATTRIB, the "+"
symbol sets an attribute for a file, the "-" sign removes the attribute. Which of the answers listed below refers to the
correct syntax for applying the read-only attribute to a file?
An authentication subsystem that enables a user to access multiple, connected system components (such as
separate hosts on a network) after a single login at only one of the components is known as:
SSO ( Missed)
WAP
TPM
OVAL
The "Run as administrator" option in MS Windows allows users with lower-level permissions to perform tasks
reserved for system administrators. This feature requires providing Administrator account credentials and
temporarily elevates the current user's privileges to perform a given task. It also simplifies common system tasks,
such as for example installation of new software, which would otherwise require logging out and switching to an
admin account.
True ( Missed)
False
What is the name of a Microsoft Windows feature that allows for encrypting entire drives?
LoJack
Encrypting File System (EFS)
New Technology File System (NTFS)
BitLocker ( Missed)
A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:
BitLocker
Encrypting File System (EFS)
BitLocker To Go ( Missed)
Trusted Platform Module (TPM)
Which of the answers listed below refers to a Windows built-in component that allows for encryption of individual
3/5
files?
T$7C52WL4SU
GdL3tU8wxYz
@TxBL$nW@Xt
G$L3tU8wY@z ( Missed)
Which of the security settings in MS Windows determines the number of unique new passwords that have to be
associated with a user account before an old password can be reused?
Which of the security policy settings in MS Windows prevents users from repeatedly changing their passwords to
bypass the password history policy setting and get back to their original/preferred password?
Which of the security policy settings listed below prevents attackers using cracked passwords from gaining
permanent access to a Windows workstation?
The importance of changing default user names and passwords can be illustrated on the example of certain network
devices (such as for example routers) which are often shipped with default and well-known admin credentials that
can be looked up on the web.
True ( Missed)
False
4/5
Total marks 30
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 17 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-17-exam-220-902
Screensaver password requirement falls into the category of security best practices as it allows to block access of
unauthorized persons to a user's workstation in situations where the user is forced to leave their desk for a short
period of time.
True ( Missed)
False
What kind of user permission restrictions can be set in BIOS? (Select all that apply)
root password
Supervisor password ( Missed)
Administrator password
Power User password
Which of the account management security measures listed below narrows down a user's computer access to
specified hours?
Which of the following account management options provides a countermeasure against brute-force attacks?
An MS Windows feature enabling automatic execution of code contained on a mounted drive is known as:
1/5
Which of the answers listed below refer(s) to Microsoft Windows OS feature(s) that should be disabled due to
potential security risks? (Select all that apply)
explorer.exe
Guest account ( Missed)
Windows Aero
iexplore.exe
AutoRun ( Missed)
A user interface element controlling access to a mobile device after the device is switched on is called:
Launcher
Screen lock ( Missed)
Privacy filter
Hardware lock
Which of the following answers lists screen lock types used for securing mobile devices?
Fingerprint lock
Face lock
Swipe lock
Passcode lock
All of the above ( Missed)
Which of the answers listed below refers to a security countermeasure that allows to erase data on a lost or stolen
mobile device?
Remote lock
Degaussing
Low-level formatting
Remote wipe ( Missed)
A mobile device's built-in functionality enabling the usage of locator applications is called:
WPS
GSM
IMEI
GPS ( Missed)
2/5
The ability to use mobile apps from unofficial sites typically requires changing a mobile OS's security configuration
setting that enables downloading and installing apps from unknown sources.
True ( Missed)
False
Which of the answers listed below refers to a policy that allows employees to use their own mobile devices on a
corporate network?
BSOD
BYOD ( Missed)
JBOD
BYOB
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic
drive?
Quick format
Overwriting data
Degaussing ( Missed)
Standard format
Which of the Windows utilities listed below is used for the purpose of hard drive low-level formatting?
CHKDSK
BOOTREC
FORMAT
DISKPART
None of the above ( Missed)
Which of the following WAP configuration settings allows for adjusting the boundary range of a wireless signal?
Beacon frame
Power level controls ( Missed)
Maximum Transmission Unit (MTU)
Quality of Service (QoS)
Which of the tools listed below would be of help in troubleshooting signal loss and low wireless network signal
coverage? (Select 2 answers)
3/5
Heat map ( Missed)
Logical network diagram
Protocol analyzer
WAP power level controls ( Missed)
Physical network diagram
A solution that simplifies configuration of new wireless networks by providing non-technical users with a capability to
easily configure network security settings and add new devices to an existing network is known as:
WPA
WPS ( Missed)
WEP
WAP
Which of the following wireless technologies are not recommended and should not be used due to their known
vulnerabilities? (Select 2 answers)
WPS ( Missed)
WAP
WPA2
WAF
WEP ( Missed)
A network access control method whereby the 48-bit address assigned to each network card is used to determine
access to the network is called:
Hardware lock
Post-admission NAC
Rule-Based Access Control (RBAC)
MAC filter ( Missed)
An IP address assigned permanently to a computer by an Internet Service Provider (ISP) is known as:
A server with a private IP address has been set up to handle requests from an outside (public) network. Which of the
solutions listed below would enable this function?
Port bonding
Port labeling
Port forwarding ( Missed)
Port mirroring
4/5
An application software used to selectively block access to certain websites is an example of:
Captive portal
Media converter
Content filter ( Missed)
Proxy server
Total marks 31
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 18 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-18-exam-220-902
JBOD
BYOD
BSoD ( Missed)
DDOS
Which of the following solutions would be the easiest while troubleshooting Windows blue screen?
Which of the OSs listed below uses a spinning wait cursor (aka spinning beach ball) to indicate that an application
entered unresponsive state?
Android
Linux
Mac OS ( Missed)
Windows
A type of software that manages the startup sequence of an operating system is known as:
OS kernel
Startup BIOS
Boot loader ( Missed)
System BIOS
Which of the hardware-related solutions listed below can be used in troubleshooting failed system boot process?
(Select 2 answers)
Safe mode
Drive cable/connector check ( Missed)
Command-Line Interface (CLI)
Hard drive replacement ( Missed)
Log analysis
Which of the following could be of help in troubleshooting the "Invalid boot disk" error message in MS Windows?
(Select all that apply)
1/5
Safe mode
Checking BIOS settings for boot order ( Missed)
Removing floppy disk from the floppy disk drive ( Missed)
Administrative Tools
Startup Repair (Windows Vista/7/10) and Automatic Repair (Windows 8/8.1) is a Windows recovery tool (available
under different names in different releases of the Microsoft OS) used for automatic troubleshooting of problems that
prevent the operating system from starting normally.
True ( Missed)
False
What is the name of the boot loader software used in Windows Vista and later releases of the Microsoft OS?
GRUB
NTLDR
WINLOAD.EXE ( Missed)
LILO
Which key/key combination should be pressed during system boot in Windows XP/Vista/7 to get access to the
Startup Repair utility?
F1
Ctrl + Alt + Delete
F8 ( Missed)
Ctrl+ Shift + Esc
Shift + F8
Which of the actions listed below enables access to the Automatic Repair utility during next system boot in Windows
8/8.1? (Select best answer)
LILO
BOOTMGR
GRUB
NTLDR ( Missed)
2/5
Which of the following allows to force Windows into Safe mode during next system boot?
Windows Error Recovery (Windows XP/Vista/7) and Recovery (Windows 8/8.1) are menu screens displayed during
next boot when Windows detects that the system didn't shut down properly (triggering this menu in Windows 8/8.1
requires additional prerequisite). Both menu screens provide access to utilities for troubleshooting persistent
problems as well as additional options ("Start Windows normally" in Windows Vista/7 and "Exit and continue to
Windows" in Windows 8/8.1) that allow to attempt launching the OS without taking up any troubleshooting steps.
True ( Missed)
False
An essential Windows XP startup file containing a list of installed OSs as well as information on the location of the
operating system files is called:
BOOT.INI ( Missed)
WINLOAD.EXE
BCD (Boot Configuration Data)
NTDETECT.COM
Automatic boot to Windows Recovery Environment (WinRE) in Windows 8/8.1 requires the system to fail the boot
process three times.
True ( Missed)
False
BOOTREC.EXE is a WinRE tool (available in Windows Vista and later releases of the Microsoft OS) used for
troubleshooting: (Select 3 answers)
Which of the following answers list(s) example(s) of boot loader software used in Linux operating systems? (Select
all that apply)
GRUB ( Missed)
NTLDR
3/5
BOOTMGR
LILO ( Missed)
In Windows Vista and newer releases of the Microsoft operating system the BOOT.INI file is replaced by:
NTDETECT.COM
Boot Configuration Data (BCD) file ( Missed)
NTBOOTDD.SYS
WINLOAD.EXE
BOOTMGR (Windows Boot Manager)
Which of the Windows Recovery Environment (WinRE) utilities would be used for manual troubleshooting of system
startup issues?
BOOTREC.EXE ( Missed)
Startup Repair
REGSVR32
Automatic Repair
Which of the files listed below are required to start Windows XP? (Select 3 answers)
Which of the following sequence of steps in Windows Device Manager (DEVMGMT.MSC) allows for reverting back
to the previously installed driver when a device fails after driver update?
Right-click on the device and click the Roll Back Driver button
Double-click the device type to view devices in that category -> Right-click on the device and click the Roll
Back Driver button
Right-click on the device and select Properties -> On the Driver tab, click the Driver Details button -> Click
the Roll Back Driver button
4/5
Double-click the device type to view devices in that category -> Right-click on the device and select
Properties -> On the Driver tab, click the Roll Back Driver button ( Missed)
Which of the answers listed below refers to a collection of precompiled functions designed to be used by more than
one Microsoft Windows application simultaneously in order to save system resources?
DLL ( Missed)
ISO
EXE
INI
What is the name of a Windows tool that can be used for troubleshooting problems related to Dynamic-Link Libraries
(DLLs) and ActiveX controls?
DXDIAG
REGSVR32 ( Missed)
WINLOAD.EXE
REGEDT32
Common troubleshooting steps related to Windows services that fail to start include: (Select 2 answers)
Total marks 36
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 19 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-19-exam-220-902
If an application written for an earlier version of MS Windows doesn't run correctly the operating system can emulate
its own older version to allow a given program to work with newer hardware or software. The compatibility mode
settings in Windows can be changed manually by right-clicking the program icon and:
Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with
older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be
accessed via the Troubleshooting applet in Windows 7/8/8.1 Control Panel. Selecting the "Run programs made for
previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with
older programs installed on the current version of Windows.
True ( Missed)
False
Which of the following could cause slow performance of a hard drive? (Select 3 answers)
Disk striping
File fragmentation ( Missed)
Disk mirroring
Disk thrashing ( Missed)
Insufficient amount of RAM ( Missed)
Disk duplexing
Disk Defragmenter is a software tool used for rearranging data on disks and drives in order to improve system
performance. Defragmentation results in faster read/write operations of the magnetic hard drive's read/write heads
as they can access the data sequentially without seeking data fragments in different areas of the disk
(defragmentation consolidates data into smallest contiguous regions).
True ( Missed)
False
What is the correct sequence of steps for launching the disk defragmenter utility in MS Windows? (Select 3
answers)
In Windows Vista/7: Open Windows Explorer by pressing the E key while holding the Windows Logo key ->
Click on the Computer menu item list on the left to display all drives -> Right-click on the drive and select
Properties from the pop-up window -> Launch the disk defragmenter utility available on the Tools tab (
Missed)
1/6
In Windows 8/8.1: Open Windows Explorer by pressing the E key while holding the Windows Logo key ->
Click on the Computer menu item list on the left to display all drives -> Right-click on the drive and select
Properties from the pop-up window -> Launch the disk defragmenter utility available on the Hardware tab
Press the R key while holding the Windows Logo key -> type in "cmd" (without quotation marks), and hit
Enter -> Launch the disk defragmenter utility by typing in DEFRAG with the appropriate command switch (
Missed)
In Windows Vista/7: Open File Explorer by pressing the E key while holding the Windows Logo key -> Click
on the This PC menu item list on the left to display all drives -> Right-click on the drive and select Properties
from the pop-up window -> Launch the disk defragmenter utility available on the Hardware tab
In Windows 8/8.1: Open File Explorer by pressing the E key while holding the Windows Logo key -> Click on
the This PC menu item list on the left to display all drives -> Right-click on the drive and select Properties from
the pop-up window -> Launch the disk defragmenter utility available on the Tools tab ( Missed)
Press the R key while holding the Windows Logo key -> Launch the disk defragmenter utility by typing in
"DEFRAG" (without quotation marks) and pressing Enter
Similarly to magnetic drives, Solid State-Drives (SSDs) require periodic defragmentation in order to improve system
performance.
True
False ( Missed)
Which of the following might be the cause of slow computer system performance? (Select all that apply)
Unpatched OS ( Missed)
Disk mirroring
Malware presence ( Missed)
OS power management options ( Missed)
Disk striping
File fragmentation ( Missed)
Disk thrashing ( Missed)
Automatic booting into Safe mode on a Windows-based host might be caused by: (Select 2 answers)
Overheating
MSCONFIG settings ( Missed)
RAID failure
Malware presence
Corrupt device driver ( Missed)
Which of the answers listed below refer(s) to troubleshooting solution(s) used when a Windows-based host does not
start in Normal mode, but only in Safe mode? (Select all that apply)
2/6
Troubleshooting system startup files
Malware removal ( Missed)
Startup Repair utility ( Missed)
Examples of MS Windows system utilities that allow to pinpoint corrupt device drivers include: (Select 2 answers)
Which of the Control Panel applets in Windows 7/8/8.1 provides access to a system tool used for troubleshooting
mismatched file associations?
Which of the answers listed below refer to possible causes of the "NTLDR is missing" error message displayed
during system boot? (Select 2 answers)
Kernel panic
Damaged hard drive
Corrupt NTLDR file ( Missed)
Improper shutdown
The system is trying to boot from a non-bootable drive ( Missed)
Which of the following solutions would be of help in troubleshooting the "NTLDR is missing" error message displayed
during system boot? (Select all that apply)
One of the fixes for the "NTLDR is missing" error message during system boot relies on replacing the corrupt
NTLDR file with the same file copied from another Windows host using the same operating system (Windows XP),
or restoring it from the Windows XP installation CD. Copying the NTLDR file manually requires access to the
command-line interface which can be found as one of the options available in the Advanced Boot Options menu
displayed after pressing the F8 key during system boot. After gaining access to the CLI, the NTLDR file can be
restored with the COPY command from an external storage device (e.g. USB flash drive) to the root folder (typically
C:\) of the drive containing the corrupt version of the file.
3/6
True ( Missed)
False
While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing
required information" error message. Which of the following BOOTREC options should be used by a technician for
manual CLI troubleshooting of this error?
BOOTREC /ScanOs
BOOTREC /RebuildBcd ( Missed)
BOOTREC /FixMbr
BOOTREC /FixBoot
Which of the answers listed below refer(s) to possible cause(s) of the "Missing operating system" error message
displayed during system boot? (Select all that apply)
Which of the following actions would be of help in troubleshooting the "Missing operating system" error message
displayed during system boot?
Which of the solutions/software tools listed below would be of use when troubleshooting a missing system GUI in
MS Windows? (Select all that apply)
The term "Live CD" typically refers to a compact disc (although other types of media such as DVD or USB can also
be used to offer similar functionality) with a fully operational bootable Linux operating system distribution (the term is
also used with reference to other OSs) which is run in the computer's memory thus eliminating the need for its
installation on the hard drive. Live CDs can be used as an OS installation media, but also provide a convenient way
for testing a given distro before installation as well as means for troubleshooting various OS-related problems.
4/6
True ( Missed)
False
"Kernel panic" is a term used to describe stop errors in: (Select all that apply)
Windows
Linux ( Missed)
Android
Mac OS ( Missed)
Which of the following locations would be the right source for finding information pertaining to a digital certificate
validity?
Which of the file-related symptoms might indicate that the system has been infected by malware?
One of the best practices for malware removal involves the process of isolation of files and applications suspected of
containing malware in order to prevent further execution and potential harm to the user's system. This process is
referred to as:
Quarantine ( Missed)
Content filtering
Protected mode
Blacklisting
One of the recommended ways for enhancing a mobile device's security includes employing a web-based service
(an app scanner) that allows users to check for known potential security/privacy risks related to a mobile application
before downloading/purchasing the app.
True ( Missed)
False
The term "Cell tower analyzer" refers to a software tool that can be used for obtaining data on coverage, location,
and signal strength of a Wi-Fi network.
True
False ( Missed)
5/6
Your Final Report
Total marks 47
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
6/6
CompTIA A+ Certification Practice Test 20 (Exam 220-902)
examcompass.com/comptia-a-plus-practice-test-20-exam-220-902
Which of the following tools are used to provide protection against ESD? (Select all that apply)
Examples of devices/device components regulated under special disposal procedures due to environmental/safety
hazards include: (Select all that apply)
PSUs
Batteries ( Missed)
CRTs ( Missed)
Toner cartridges ( Missed)
LCDs
Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that
apply)
CRTs ( Missed)
Power supplies ( Missed)
Inverters ( Missed)
CPUs
Laser printers ( Missed)
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is
called:
AUP
MSTSC
MAU
MSDS ( Missed)
SCADA
HIPS
TEMPEST
HVAC ( Missed)
1/5
Power spike
Electromagnetic interference
Temporary drop in voltage ( Missed)
Power outage
A device designed to provide emergency power during an unexpected main power source outage is called:
UPS ( Missed)
PoE
SVC
PSU
Which of the following solutions add(s) redundancy in areas identified as single points of failure? (Select all that
apply)
Virtualization
RAID ( Missed)
Uninterruptible Power Supply (UPS) ( Missed)
Backup generator ( Missed)
A device designed to protect electronic devices from large voltage fluctuations is known as:
Which of the following tools would be used to clean the inside of a laser printer? (Select all that apply)
Regular vacuum
Cleaning brush
Can of compressed air ( Missed)
Toner vacuum ( Missed)
In cases where users are found in violation of policies related to prohibited content or activity, the elements of first
response should include: (Select all that apply)
Consulting co-workers
Reporting through proper channels ( Missed)
2/5
Multi-factor authentication
Problem identification ( Missed)
Data/device preservation ( Missed)
In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:
Proxy list
Order of volatility
Access log
Chain of custody ( Missed)
A type of control access technology providing protection against copyright infringements is called:
OEM
EULA
DRM ( Missed)
AUP
An agreement granting a user the right to use software application in a manner determined by the software vendor
is known as:
AUP
RMA
EULA ( Missed)
DRM
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to
uniquely identify that person?
PIN
Biometrics
PII ( Missed)
PKI
Examples of proper communication and professional skills while dealing with difficult customer include: (Select 2
answers)
Clarifying customer statements by asking open ended questions to narrow the scope of the problem (
Missed)
Restating the issue to verify understanding ( Missed)
Adjusting to the technical user conversation style by using technical jargon
Asking close-ended questions to let the customer answer with a simple "Yes" or "No"
Clarifying customer statements by interrupting them if necessary
Which of the following is an example of good communication skills when dealing with a customer?
3/5
Asking close-ended questions to let the customer answer with a simple "Yes" or "No"
Arguing with a technical user if necessary to educate them
Listening to the customer and avoiding interruptions until he or she has finished describing the problem (
Missed)
Relying on your own judgment and not restating/clarifying what the customer says
Which of the answers listed below refers to an example of appropriate handling of customer's confidential data in a
situation where troubleshooting requires user's password?
Which of the following actions should be the first step in the troubleshooting process?
Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research
based on symptoms may also involve asking for assistance of a more experienced tech.
True
False ( Missed)
Once the theory of probable cause of the problem has been established, the next troubleshooting step should
involve:
Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology
process is to:
According to the troubleshooting theory, verification of full system functionality and implementation of applicable
preventative measures should be performed:
4/5
As the first step of the troubleshooting process
After implementing the solution ( Missed)
As the last step of the troubleshooting process
The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step
comes after verification of full system functionality and implementation of applicable preventive measures.
True ( Missed)
False
Total marks 38
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 1 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-1-exam-220-802
Windows Vista and Windows 7 offer a security feature which limits privileges of software applications and access to
administrative tasks. When a program makes a change that requires administrator-level permission or a user
attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an
administrator password to proceed. This functionality is called:
Which of the following are the system memory requirements for Microsoft Windows 7?
Changes the way in which windows are displayed by adding translucent window borders ( Missed)
Is a set of user interface enhancements available in premium editions of Windows Vista and Windows 7 (
Missed)
Was introduced in Windows XP
Is a set of user interface enhancements available in all editions of Windows Vista and Windows 7
Offers live preview of an entire open window after hovering over a taskbar icon (taskbar preview of open
windows) ( Missed)
What is the name of a Microsoft Windows feature that allows for encrypting entire drives?
LoJack
Encrypting File System (EFS)
New Technology File System (NTFS)
BitLocker ( Missed)
Previous versions are copies of files and folders that Windows automatically saves as part of a restore point.
Previous versions are sometimes referred to:
Spare copies
Shadow copies ( Missed)
Primary copies
Mirror copies
1/5
What is the function of Windows Defender software?
Which of the following CPU specifications complies with system requirements for Microsoft Windows 7?
Which Microsoft Windows technology offers the capability to take advantage of unused space on a USB flash drive
or flash memory card to help improve PC performance?
Device Manager
Windows Easy Transfer
ReadyBoost ( Missed)
BitLocker To Go Reader
With the release of Windows ME, Microsoft added a new built-in utility to their desktop operating systems which
allows to roll back system files and settings to an earlier point in time without affecting personal files. It provides a
yet another way to undo system changes to the computer when an installation of a new program or device driver
causes a problem and uninstalling doesn't fix the problem. The utility's interface contains a list allowing the user to
bring back the system to the state it was in before the selected event. Items on that list are called:
Backup files
Restore points ( Missed)
System logs
Roll-back points
Windows 7 includes a collection of mini utility programs used to display information about date, time, weather, or
CPU usage in a form of standalone widgets that can be moved and arranged on the Windows desktop. Desktop
Gadgets in Windows 7 (also known as Windows Sidebar in Vista) can be configured in:
If an application written for an earlier version of Windows doesn't run correctly the operating system can emulate its
own older version to allow a given program to work with newer hardware or software. The compatibility mode
settings in Windows can be changed by:
2/5
Right-clicking the program icon and selecting "Run program using recommended compatibility settings"
option from the pop-up menu
Right-clicking the program icon, clicking Properties, and then applying the required settings on the
Compatibility tab ( Missed)
Right-clicking the program icon and selecting "Run as administrator" option from the pop-up menu
Right-clicking the program icon and choosing "Restore previous versions" option from the menu
Windows Vista and Windows 7 facilitate moving user accounts and settings, application configuration data, and
personal files from one computer to another with the use of:
In order to work effectively, one of the applications listed below requires specific types of files containing up-to-date
definitions of potential software threats. Which of the following software included in Windows requires such files?
Event Viewer
Windows Firewall
Windows Defender ( Missed)
Windows Experience Index
Which of the following editions of Microsoft Windows OS do(es) not include Windows Aero desktop experience?
(Select all that apply)
If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to
recover such files.
True
False ( Missed)
Which of the following are the hard disk space system requirements for Windows 7?
Windows XP utility for transferring files and settings from an old computer to a new computer is called:
3/5
System Restore
Files and Settings Transfer Wizard ( Missed)
Windows Easy Transfer
Program Compatibility troubleshooter
One of the few advantages of the older 32-bit version of Windows is that it handles large amounts of random access
memory (RAM) more effectively than a 64-bit system.
True
False ( Missed)
An OS installation that doesn't preserve programs, files, or settings is sometimes referred to as:
Upgrade
Unattended installation
Image deployment
Clean install ( Missed)
While upgrading from an earlier edition of Windows to Windows 7 it is important to make sure that programs and
devices will work with the new OS version. To find potential compatibility problems with computer's hardware,
devices, or programs that might affect the installation of Windows 7, Microsoft offers a free utility designed to check
for any issues and to provide recommendations on what to do before performing an upgrade to improve the PC's
compatibility with Windows 7. What is the name of this utility?
Which of the following terms refers to an environment that allows to boot a PC through a network interface?
PoE
Multiboot
PXE ( Missed)
Fixboot
When a program installed in Windows stops responding or encounters an error, logs describing error can be
examined with the use of:
Command Prompt (cmd.exe) is a feature of Microsoft Windows operating systems that allows for performing tasks
on the PC without the use of Windows graphical interface. Command Prompt can be invoked through which
sequence of steps? (Select all that apply / Fragments of text all in upper case are the actual commands to type in)
4/5
In Control Panel, change one of the settings in the Display menu to Console
Windows Logo key + L, type in CMD.EXE, Enter
Windows Logo key + R, type in CMD, Enter ( Missed)
Ctrl+Shift+Esc to invoke Task Manager, click New Task... button on the Applications tab in Task Manager,
type in CMD, Enter ( Missed)
Which of the following commands in Windows is used to display help information related to a specific command-line
utility?
[command] /? ( Missed)
$ [command] --help
$ man [command]
$ info [command]
Total marks 31
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 2 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-2-exam-220-802
If a computer's hard disk has adequate free disk space, it is possible to install more than one operating system and
then choose which OS to use during each startup. This type of configuration setup is often referred to as:
Single sign-on
Multi-mode
Multiboot ( Missed)
Clean install
Migrating from an earlier Microsoft operating system version to Windows 7 through an Upgrade install: (Select 2
answers)
Which of the following statements describing different methods for organizing Windows-based computers in
networks are true? (Select 3 answers)
Which of the power-saving states in Windows uses the least amount of power?
Sleep
Standby
High performance
Hibernation ( Missed)
What is the name of a Windows Command Prompt command that can be used to shut down, restart, log off, or
hibernate the computer?
EXIT
TASKKILL
SHUTDOWN ( Missed)
PROMPT
Which of the following terms describes a hard disk partition that can contain only one logical drive?
1/5
Logical
Extended
Primary ( Missed)
Locked
By creating volumes that span multiple disks (spanned and striped volumes), dynamic disks in Windows provide the
capability for software implementations of RAID.
True ( Missed)
False
Quick format is a disk formatting option in MS Windows that apart from deleting the file system structure also
checks the drive for bad sectors.
True
False ( Missed)
What is the name of a Windows network diagnostic tool for displaying the path and measuring transit delays of
packets across an Internet Protocol (IP) network?
TRACEROUTE
NETSTAT
IPCONFIG
TRACERT ( Missed)
Which of the following terms refers to a backup technique that allows for creating an exact copy of an entire drive
and replicating the drive to a new computer or to another drive on the same computer in case of a hard drive failure?
Repair installation
Drive imaging ( Missed)
Incremental backup
Differential backup
Which of the following terms refers to a Windows command-line network administration utility used to test the
communication with another computer on an Internet Protocol (IP) network?
PING ( Missed)
IPCONFIG
MSINFO32
IFCONFIG
DXDIAG
Microsoft's New Technology File System (NTFS) provides several improvements over earlier File Allocation Table
(FAT) file systems. These improvements include: (Select all that apply)
Encrypting File System (EFS) which allows for encryption of any file or folder on an NTFS volume ( Missed)
Providing the capability to set permissions on a file and folder level ( Missed)
2/5
Extending the limit for maximum volume size to 2TB (terabytes)
Extending the maximum file size limit for a single file to 4GB (gigabytes)
File compression ( Missed)
Disk quotas which allow the administrator to set a threshold of disk space that users may use and also to
keep track of how much disk space each user is using ( Missed)
A recovery disc is a general term for removable media commonly shipped with most new computers to allow the
user to reformat the hard drive and restore the operating system to the original factory condition as configured by an
Original Equipment Manufacturer (OEM). Most OEM recovery systems for Microsoft Windows involve booting from
a separate CD-ROM or DVD, however in recent years bundled recovery CD-ROMs and DVDs have become less
common as in case of newer systems more frequently the recovery data becomes available on a separate partition
of a new computer's hard drive.
True ( Missed)
False
The following command-line utility in Windows can be used to display information about computer's network
configuration settings (including its IP address, subnet mask, DNS server address, and default gateway).
TRACERT
PING
IFCONFIG
NETSTAT
IPCONFIG ( Missed)
Which of the following commands in Windows Command Prompt can be used to display help information related to
a specific command-line utility? (Select 2 answers)
info [command]
[command] /help
$ man [command]
help [command] ( Missed)
[command] /? ( Missed)
System Configuration is a Windows tool that can help in finding and isolating problems that might prevent Windows
from starting correctly by providing the capability to choose which common services and programs should be run
during startup. Which of the following commands is used to launch System Configuration from the Command
Prompt?
TASKMGR
MSINFO32
APPWIZ.CPL
WSCUI.CPL
MSCONFIG ( Missed)
To create a system image of a Windows drive, the drive must be formatted to use:
3/5
FAT32 file system
CDFS file system
FAT file system
NTFS file system ( Missed)
The shortcut icon to run Windows Memory Diagnostic tool can be found in:
System menu
Hardware and Sound menu in Control Panel
Administrative Tools menu in Control Panel ( Missed)
Performance Information and Tools menu
Which of the following commands can be used to open Windows Explorer from the Command Prompt?
EXPLORER ( Missed)
IEXPLORE.EXE
SERVICES.MSC
REGEDIT
Both upgrade and full editions of Windows 7 include the same features and both can be used to migrate an older
Microsoft OS to Windows 7, however upgrading an earlier operating system than Windows XP (for example,
Windows 95 or Windows 2000) requires full edition of Windows 7 and a custom (clean) installation.
True ( Missed)
False
Which of the following Windows Command Prompt commands are used to create a directory or subdirectory?
(Select 2 answers)
CHDIR
CD
MKDIR ( Missed)
DIR
RD
MD ( Missed)
In Windows 7, the Remote Desktop Connection can be launched from the Start menu search box, from the Run
menu dialog box, or from a command line. Which of the following commands is used to start Remote Desktop
Connection from the Command Prompt?
MMC
EXPLORER
MSTSC ( Missed)
NSLOOKUP
SFC
4/5
In order to make sure that a hard disk has no errors, Windows operating systems offer a utility tool that can be used
to scan and verify the integrity of all protected system files and to replace incorrect versions with correct Microsoft
versions. Which of the following Command Prompt commands is used to launch this tool and make it repair
corrupted files?
SFC /SCAN+VERIFY
SFC /VERIFYONLY
DISKPART /CLEAN
SFC /SCANNOW ( Missed)
NBTSTAT
A collection of computers on a Windows network where servers are used to control the security and permissions for
all computers is called:
Workgroup
Homegroup
Demilitarized zone (DMZ)
Domain ( Missed)
Which of the following Windows command-line utilities allow for copying entire directory structures with
subdirectories and files? (Select all that apply)
COPY
MKDIR
XCOPY ( Missed)
ROBOCOPY ( Missed)
Total marks 34
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 3 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-3-exam-220-802
Which of the menus in Windows 7 Control Panel provides the quickest access to screen resolution settings?
Which of the following is an example of a biometric authentication? (Select all that apply)
The way in which files and folders function and how items are displayed in Windows 7 can be changed by:
AVG
Windows Firewall
Windows Defender ( Missed)
Microsoft Windows Malicious Software Removal Tool
Gaining unauthorized access to a restricted area by following someone through the door they just unlocked is
referred to as:
Shoulder surfing
Phishing
Mantrap
Tailgating ( Missed)
Virus definition database files contain all the known viruses and countermeasures against them that can be applied
by a particular antivirus application. In order to be effective, an AV program needs up-to-date versions of these files
which can be obtained:
1/5
Through Windows updates
From technical support
As an additional, paid option
Which of the following terms refers to a technology that allows multiple operating systems to work simultaneously on
the same hardware?
Hyperthreading
Multi core
Virtualization ( Missed)
Combo drive
If a network adapter's "Speed & Duplex" property is set to Half Duplex, it means that communication on the network
will be taking place:
Which of the following Windows tools allow(s) for migrating user data and user information to a new computer?
(Select all that apply)
Static route
Tunnel
Exception ( Missed)
Event
Which of the following Windows Command Prompt commands are used for creating a new directory or
subdirectory? (Select 2 answers)
RD
MD ( Missed)
COPY
MKDIR ( Missed)
CD
2/5
Many of the utilities available in the Administrative Tools menu in Windows Control Panel are implemented as the
so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this menu
(which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer)
is called:
Task Manager
Performance Monitor
Computer Management ( Missed)
System Configuration
System Configuration is a Windows utility used for identifying problems that might prevent Windows from starting
correctly. It can be launched from the Administrative Tools menu in Windows Control Panel, but also from the
Windows Command Prompt. Which of the following commands is used to start System Configuration from Windows
command line?
MSCONFIG ( Missed)
COMPMGMT.MSC
TASKMGR.EXE
MSINFO32
CONTROL.EXE
Which of the following Windows Command Prompt commands is used to display all active TCP / IP connections and
listening ports?
NSLOOKUP
NET VIEW
TRACERT
NETSTAT -R
NETSTAT -A ( Missed)
A type of identification badge that can be held within a certain distance of the reader to authenticate the holder is
called:
Biometric device
RFID badge ( Missed)
Private key
Ethernet card
Which of the following Control Panel menus in Windows 7 offers an option to create a system repair disc?
The Advanced Boot Options screen allows for starting Windows in advanced troubleshooting modes. The Advanced
3/5
Boot Options menu can be accessed by turning on the PC and pressing a function key before Windows starts.
Which of the following keys provides access to this menu?
F1
Del
F8 ( Missed)
Esc
The Recovery Console available in earlier versions of Windows has been removed in Windows Vista / 7 and
replaced by several tools located in the System Recovery Options menu. The System Recovery Options menu can
be accessed through:
Which of the following options of BOOTREC.EXE can be used to write a new Windows 7 or Windows Vista-
compatible master boot record to the system partition?
/ScanOs
/FixMbr ( Missed)
/FixBoot
/RebuildBcd
Which of the following Windows Command Prompt commands are used to delete a directory? (Select all that apply)
XCOPY
CHDIR
RMDIR ( Missed)
ROBOCOPY
CD
RD ( Missed)
If a device in Windows fails after driver update, the driver can be restored to the previously installed version in:
Which of the following locations can provide access to the System Recovery Options menu? (Select all that apply)
Windows Task Scheduler is a component of Microsoft Windows that provides the ability to schedule the launch of
programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains
the application icon shortcut which can be used to launch the Task Scheduler MMC snap-in?
Advanced details (including real-time reports) on how a computer running Windows OS is using system resources
such as random access memory (RAM) and the central processing unit (CPU) can be viewed: (Select all that apply)
In computer security, a situation in which an unauthorized person is able to view another user's display or keyboard
to learn their password or other confidential information is known as:
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 4 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-4-exam-220-802
Which of the following Command Prompt commands launches the Remote Desktop Connection utility in Windows?
MSTSC ( Missed)
MMC
SERVICES.MSC
EXPLORER
In Microsoft Windows OSs, system configuration information is stored centrally in a hierarchical database called:
Which item in Windows Control Panel contains an option that allows to display hidden files, folders, and drives?
In computer security, the practice of obtaining confidential information by manipulating and / or deceiving people is
called:
Bluejacking
Social engineering ( Missed)
White box testing
Hacking
Which of the following terms refers to a collection of Microsoft Windows technologies used by many of the
multimedia applications for handling display, sound, and input related tasks?
Lynx
DirectX ( Missed)
DXDIAG
OpenGL
i.LINK
After moving a dynamic disk to the local computer from another computer its status in Windows Disk Management
utility is set to:
Foreign ( Missed)
1/5
CompTIA A+ Certification Practice Test 5 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-5-exam-220-802
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic
drive?
Quick format
Overwriting data
Degaussing ( Missed)
Low-level format
A standalone malicious computer program that replicates itself over a computer network is commonly referred to as:
Adware
Worm ( Missed)
Spyware
Spam
Trojan
Which of the following wireless encryption standards provides the lowest level of security?
WEP ( Missed)
WPA
WPA2
WAP
Unwanted programs designed specifically to damage or disrupt the operation of a computer system are commonly
referred to as:
Adware
Malware ( Missed)
Spyware
Grayware
Which of the following default local groups has the least amount of access privileges in Windows?
Administrators
Backup Operators
Power Users
Guests ( Missed)
Which of the following prevention methods fall into the category of digital security? (Select all that apply)
Retinal scanner
Antivirus ( Missed)
1/5
Privacy filter
Firewall ( Missed)
RFID badge
Antispyware ( Missed)
A security rule that prevents users from accessing information and resources that lie beyond the scope of their
responsibilities is called:
A network security access control method whereby the 48-bit address assigned to each network card is used to
determine access to the network is commonly referred to as:
127.0.0.1
192.168.0.3
169.254.10.20 ( Missed)
65.55.57.27
Which of the following prevention methods fall into the category of physical security controls? (Select all that apply)
Firewall
Key fob ( Missed)
Door locks ( Missed)
Antivrus
Directory permissions
RFID badge ( Missed)
A set of physical characteristics of the human body that can be used for identification and access control purposes is
generally referred to as:
Biometrics ( Missed)
Personally Identifiable Information (PII)
Physical token
AAA framework
Which of the following provides the best defense against social engineering attacks?
2/5
User education ( Missed)
Principle of least privilege
Implicit deny policy
Strong passwords
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later
by an attacker for the purpose of identity theft is an example of: (Select 2 answers)
Phishing ( Missed)
Permission sharing
Zero-day exploit
Unathorized access
Social engineering ( Missed)
True ( Missed)
False
BSoD ( Missed)
BNC
JBOD
BYOD
Software that performs unwanted and harmful actions in disguise of a legitimate and useful program is commonly
referred to as:
Adware
Trojan horse ( Missed)
Spyware
Backdoor
Which of the following technologies allows one core on the microprocessor to appear as multiple cores to the
operating system?
QPI
HTT ( Missed)
HyperTransport
CrossFireX
An MS Windows account that allows users to have temporary access to a computer without the capability to install
software or hardware, change settings, or create a user password is called:
In computer security, a malicious software designed to hide the existence of certain processes or programs from
normal methods of detection and enable continued unathorized access to a computer is known as:
Backdoor
Hypervisor
Rootkit ( Missed)
Spyware
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?
DNS
DHCP ( Missed)
APIPA
SNMP
Which of the following examples falls into the category of biometric authentication?
Password
Retinal scan ( Missed)
Smart card
User name
Malicious computer programs collecting information about users without their knowledge or consent are commonly
referred to as: (Select best answer)
Malware
Grayware
Adware
Spyware ( Missed)
Which of the following terms refer(s) to a method for securing mobile devices that allows for removing data stored on
a lost or stolen device? (Select all that apply)
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to
confidential information they shouldn't have access to is commonly referred to as:
4/5
Phishing ( Missed)
Privilege escalation
Backdoor access
Shoulder surfing
Which of the following security measures can be applied to a wired SOHO network? (Select all that apply)
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
Online
Missing
Basic
Which of the following Windows Command Prompt commands launches the Registry Editor?
MSTSC
REGEDIT ( Missed)
MMC
MSCONFIG
A type of wireless network providing high-speed Internet access through mobile telecommunication cellular network
technologies is known as:
VLAN
WWAN ( Missed)
VPN
WLAN
In computer networks, a computer system or an application that acts as an intermediary between another computer
and the Internet is commonly referred to as a:
Bridge
Active hub
Web server
Proxy ( Missed)
A system that uses public network (such as Internet) as a means for creating private encrypted connections
between remote locations is called:
VLAN
Proxy
VPN ( Missed)
TELNET
Which of the following locations in Windows Control Panel provides access to proxy settings?
2/5
Security tab in Internet Options (Custom level...)
Privacy tab in Internet Options (Advanced)
Since the release of Service Pack 2 for Windows XP, Microsoft operating systems (including Windows Vista and
Windows 7) offer a Control Panel item providing users with the ability to review the status of security and (starting
from Windows 7) system maintenance settings. The applet interface lists important messages about settings that
require user attention and informs the user about recommended actions via a pop-up notification balloon in the
taskbar area. In Windows 7, this Control Panel item is called:
A solution that allows someone to turn on a network computer remotely by sending a special data packet (known as
Magic Packet) is known as:
Jumbo frame
Backdoor access
Wake-on-LAN ( Missed)
Tailgating
Which of the following Windows diagnostic tools allows for detecting problems with display, sound, and input
settings?
MSCONFIG
DirectX
DXDIAG ( Missed)
MSINFO32
Task Scheduler is a Windows MMC snap-in for setting up automated tasks that perform actions at a specific time or
when a certain event occurs. Which of the following commands can be used to launch this utility in Windows
Command Prompt?
TASKMGR.EXE
TASKSCHD.MSC ( Missed)
WSCUI.CPL
COMPMGMT.MSC
What is the name of a new improved functionality introduced in Windows 7 that allows for managing different types
of files in a structure similar to Windows folder?
Cluster
Partition
Library ( Missed)
Media Center
3/5
Alongside the WorkGroup system used by previous versions, Windows 7 adds a new ad hoc home networking
system known as:
ATTRIB is a command used to set and remove file attributes. Available options include read-only (R), archive (A),
system (S), and hidden (H). With ATTRIB, the + symbol sets an attribute for a file, - sign removes the attribute.
Which of the following answers contains the correct syntax for setting the read-only attribute to a file?
Which of the following Windows Command Prompt commands launches a utility for managing system partitions?
DISKMGMT.MSC ( Missed)
CONTROL.EXE
WUAPP.EXE
COMPMGMT.MSC
Which of the following statements describing features of Windows HomeGroup are true? (Select all that apply)
Search indexing
Setting file attribute to read-only
Creating an extra copy of a file
Indicating whether a file has been modified since the last backup ( Missed)
Converting a dynamic disk back to a basic disk in Windows: (Select all that apply)
Which of the following Windows Control Panel items contains an option to create a password reset disk?
System Restore
Ease of Access Center
Parental Controls
User Accounts ( Missed)
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?
DHCP ( Missed)
SNMP
ICMP
DNS
Total marks 28
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 6 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-6-exam-220-802
Which of the following acronyms refers to a file system designed for optical media?
CDFS ( Missed)
FAT32
NTFS
CD-RW
Which of the following answers lists the correct sequence of steps required to close a non-responsive application in
Windows Task Manager?
Click the Applications tab, click the program that isn't responding, and choose End Selected from the Task
Manager Options menu
Click the Applications tab, click the program that isn't responding, and then click End Task ( Missed)
Click the Performance tab, click the program that isn't responding, and then click End Task
Click the Applications tab, right-click the program that isn't responding, and choose Bring To Front option
from the pop-up menu
A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be
stored in RAM due to the insufficient memory space is called: (Select all that apply)
The recommended ways to solve or prevent low memory problems in Windows include: (Select 3 answers)
In Windows, a computer program that operates in the background and provides support to other programs is called:
1/5
Server
Firmware
Daemon
Service ( Missed)
Startup configuration modes in Windows allow an administrator to choose which services and drivers should be run
when the computer starts up, which in turn helps in identifying problems that might prevent the OS from starting
correctly.
True ( Missed)
False
Which tab of the MSCONFIG utility in Windows lists choices for startup configuration modes?
Services
Boot
General ( Missed)
Startup
Which tab of the System Configuration utility in Windows lists applications that run when the computer starts up?
Applications
Processes
Boot
Startup ( Missed)
In Windows, changing a basic disk to dynamic allows for creating volumes that span multiple drives.
True ( Missed)
False
DISKPART ( Missed)
MSTSC
REGEDIT
FDISK
Which of the following Control Panel applets are unique to Windows 7? (Select 3 answers)
2/5
Which of the following answers refer to Windows dynamic volumes consisting of disk space on more than one
physical disk? (Select 2 answers)
Striped ( Missed)
Basic
Simple
Spanned ( Missed)
System
In computer networking, a solution that allows to prioritize certain types of network traffic is known as:
Which of the following DEFRAG parameters allows for locating and consolidating fragmented files on all volumes?
DEFRAG /H
DEFRAG /A
DEFRAG /C ( Missed)
DEFRAG /E
Which of the following Control Panel applets are unique to Windows Vista? (Select 3 answers)
Troubleshooting
Problem Reports and Solutions ( Missed)
Pen and Input Settings ( Missed)
Action Center
Tablet PC Devices ( Missed)
HomeGroup
According to the troubleshooting theory, the last step of the troubleshooting process should include verification of full
system functionality and implementation of preventive measures.
True
False ( Missed)
A technology implemented in modern tablets and smartphones providing an alternative to traditional input devices
such as mice and keyboards is called:
Windows Aero
KVM switch
Multitouch ( Missed)
Graphical User Interface (GUI)
3/5
A database in Windows containing detailed information about system hardware, installed programs and settings,
and profiles of each of the user accounts is called:
BIOS
SAM
Hive
Registry ( Missed)
Protected operating system files required to start and run Windows (files labeled as System and Hidden) are by
default not visible in Windows Explorer.
True ( Missed)
False
Mobile apps for iOS are available for purchase and download through which of the following online marketplaces?
Amazon Appstore
App Store ( Missed)
Windows Marketplace for Mobile
Google Play
Android ( Missed)
iOS
Windows 7
Windows Phone
Protected operating system files can be displayed in Windows Explorer after selecting "Show hidden files, folders,
and drives" setting in Folder Options menu.
True
False ( Missed)
Android mobile apps are available for purchase and download through which of the following online marketplaces?
App Store
Android Market ( Missed)
Windows Marketplace for Mobile
Windows Store
Which of the following Command Prompt commands in Windows launch Registry Editor? (Select 2 answers)
REGEDT32 ( Missed)
DISKPART
BOOTREC
REGEDIT32
4/5
REGEDIT ( Missed)
Total marks 34
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 7 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-7-exam-220-802
Extranet
Piconet ( Missed)
Intranet
Ethernet
According to the troubleshooting theory, identifying the problem by questioning the user about user changes to the
computer should be:
Which of the following tools would be the most suitable for diagnosing problems with a NIC port?
POST card
Loopback plug ( Missed)
ESD strap
Screwdriver
A tiny spot on an LCD monitor display that permanently remains black when it should be activated and displaying
color is commonly referred to as dead pixel.
True ( Missed)
False
Dial-Up ( Missed)
STP
DSL
ADSL
A circuit board or part that can be quickly and easily removed and replaced by the user or by a technician without
having to send the entire product or system to a repair facility is called:
RMA
EMI
FRU ( Missed)
OEM
1/5
Which of the following devices offers the least amount of options when it comes to hardware upgrades that can be
performed by the device user?
Laptop
Workstation
Desktop
Tablet ( Missed)
Windows Phone, iOS, and Android are all examples of closed-source operating systems.
True
False ( Missed)
The process of establishing connection between Bluetooth devices (for example between a Bluetooth enabled
headset and a Bluetooth enabled phone) is commonly referred to as:
Linking
Three-way handshake
Crosstalk
Pairing ( Missed)
VDSL
ADSL ( Missed)
UDSL
SDSL
Which type of cabling provides protection against EMI? (Select all that apply)
Fiber-optic ( Missed)
STP ( Missed)
UTP
Coaxial ( Missed)
Tailgating ( Missed)
Phishing
Malware
Shoulder surfing
Which of the following terms refers to communication that takes place in two directions simultaneously?
Half duplex
Full duplex ( Missed)
Simplex
2/5
Broadcast
Which of the following storage media types cannot be sanitized by degaussing? (Select all that apply)
Which of the following tools are used for testing power supply voltage output? (Select 2 answers)
Tone probe
Torx screwdriver
Power supply tester ( Missed)
Loopback plug
Multimeter ( Missed)
POST card:
Which of the following tools would be used for locating a cable in a cabling bundle?
Crimper
Toner and probe kit ( Missed)
Punchdown tool
Multimeter
Degaussing button in CRT monitors is used for correcting image and color distortion on the monitor screen resulting
from the impact of external magnetic field.
True ( Missed)
False
Which of the following tools would be used for locating faults and breaks in fiber-optic cabling?
TDR
Toner and probe kit
Multimeter
OTDR ( Missed)
Which of the following tools would be the best for attaching wires to a patch panel?
3/5
Cable certifier
Crimper
Punchdown tool ( Missed)
Needle-nose pliers
Which of the following ensure(s) proper reassembly of a laptop? (Select all that apply)
Adjusting the signal strength on Wireless Access Point (WAP) provides a countermeasure against which type of
security threat?
Which of the following tools would be used for locating faults and breaks in a twisted-pair or coaxial cabling?
NTLDR
OTDR
TDR ( Missed)
Loopback plug
Which of the following tools would be the best for attaching an RJ-45 connector to the end of a twisted-pair Ethernet
cable?
Cable tester
Needle-nose pliers
Punchdown tool
Crimper ( Missed)
4/5
Total marks 30
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 8 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-8-exam-220-802
Which tab of the Internet Options applet in Windows 7 Control Panel provides access to proxy configuration
settings?
Privacy
Security
Connections ( Missed)
Content
Which of the following recovery tools are part of the System Recovery Options menu in Windows 7? (Select 3
answers)
A software or hardware that checks information coming from the Internet or a network and depending on settings
either blocks it or allows it to pass through is called:
Antispyware
Firewall ( Missed)
Malware
Antivirus
Which security measure is in place when a client is denied access to the network due to outdated antivirus
software?
DMZ
NAC ( Missed)
NAT
MAC filter
Which of the following acronyms refers to a Microsoft-proprietary network access control method?
NAP ( Missed)
NAC
WPS
NAS
Which of the following applets in Windows 7 Control Panel allow for checking the status of Windows Firewall?
1/5
(Select all that apply)
Internet Options
Performance Monitor
Action Center ( Missed)
Windows Firewall ( Missed)
Programs and Features
The System Recovery Options menu contains several tools that can help in recovering Windows from a serious
error. This set of tools can be on the computer's hard drive (preinstalled by the computer manufacturer), or on the
Windows installation disc. If none of these two options is available, it is also possible to create a system repair disc
containing recovery tools while logged in in Windows.
True ( Missed)
False
Which of the following tools allows for secure disposal of physical documents?
Shredder ( Missed)
Hard drive sanitation
Degaussing tool
Recycle Bin
Antispyware
Strong passwords
Changing default user names
User education ( Missed)
According to the troubleshooting theory, the first step of the troubleshooting process should consist of establishing a
plan of action to resolve the problem and implementing the solution.
True
False ( Missed)
Modern mobile devices have the capability to present landscape or portrait views of the device's screen based on
the way the device is being held. Which of the following built-in functionalities allows for determining screen
orientation in those devices?
Hypervisor
Geotracking
Accelerometer ( Missed)
Gyroscope
Which tab of the Internet Options menu in Windows Internet Explorer provides access to proxy configuration
settings?
2/5
Content
Security
Connections ( Missed)
Privacy
No connectivity
Collisions on the network ( Missed)
Intermittent connectivity
Other issue
Which of the following applets in Windows 7 Control Panel contains an option to create a system repair disc?
Provided that folder A resides inside folder B, which of the following commands changes the location of folder A one
level up in the directory tree and places it on the same level as folder B?
MKDIR A
COPY A ..
CD A B
MOVE A .. ( Missed)
A user interface element on mobile devices controlling access to a device after the device is switched on is called:
Accelerometer
Single Sign-On (SSO)
Lock screen ( Missed)
Locator application
Which of the following built-in functionalities available in modern mobile devices supplements the function of an
accelerometer by offering more accurate recognition of movement within a 3D space?
Multitouch
Hypervisor
Gyroscope ( Missed)
DirectX
Which of the following statements describe(s) the characteristic features of open-source applications? (Select all that
apply)
Proprietary software
3/5
Permission to modify and redistribute the application ( Missed)
Free access to the application code ( Missed)
Permission to use the application only under certain conditions
Lack of free access to the application code
Resistive touchscreen displays rely on the electrical properties of the human body to detect when and where on a
display the user is touching. Because of this, resistive displays can be controlled with very light touches of a finger
and generally cannot be used with a mechanical stylus or a gloved hand.
True
False ( Missed)
According to the troubleshooting theory, establishing a theory of probable problem cause should come as the first
step of the troubleshooting process.
True
False ( Missed)
Which of the following answers refers to an interface capable of sensing more than one finger press at a time?
Multitouch ( Missed)
Digital Visual Interface (DVI)
Touchscreen
Graphical User Interface (GUI)
Which of the following answers list(s) methods for securing mobile devices? (Select all that apply)
Degaussing
Remote wipes ( Missed)
File defragmentation
Failed login attempts restrictions ( Missed)
Passcode locks ( Missed)
Capacitive touchscreen displays are composed of two flexible sheets coated with a resistive material and separated
by an air gap or microdots. Pressure applied to the surface of the display by a finger or stylus causes the layers to
touch, which completes electrical circuits and tells the device where the user is touching. As such, capacitive
touchscreens require much more pressure to activate than resistive touchscreens.
True
False ( Missed)
A procedure of identifying someone's physical location by obtaining GPS data from their mobile device or other
GPS-enabled devices is known as:
Phishing
Wireless survey
Geotracking ( Missed)
4/5
Vishing
Gmail
PXE
IMAP
Exchange ( Missed)
Total marks 31
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 9 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-9-exam-220-802
Which of the following tools can be used to rearrange data on disks and drives in order to improve system
performance?
CHKDSK
File recovery software
Performance Monitor
Disk Defragmenter ( Missed)
Rebuilding an array and recovering data after failure of one of the drives in a RAID 0 hardware setup can be
performed by replacing the faulty drive.
True
False ( Missed)
A wireless connection management utility included with Microsoft Windows XP that dynamically selects a wireless
network to connect to based on a user's preferences and various default settings is called:
Low RF signal issues can be caused by: (Select all that apply)
Which of the following solutions allows network administrators to prioritize certain types of network traffic?
NAC
UAC
NAT
1/5
QoS ( Missed)
Bent or broken video connector pins can prevent a monitor screen from displaying one of the base colors (red,
green, or blue).
True ( Missed)
False
Which of the following Windows NT tools scan for and attempt recovery of bad sectors? (Select 2 answers)
CHKDSK.EXE ( Missed)
Backup and Restore
Error-checking ( Missed)
Disk Defragmenter
ScanDisk
Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T.) allows for monitoring system for anticipated:
Which of the following POST beep codes would be an indicator of RAM memory failure?
Which of the following acronyms refers to the process of returning a product in order to receive a refund,
replacement, or repair during the product's warranty period?
HCL
MSDS
QoS
RMA ( Missed)
Which of the following could be of help in troubleshooting the "Invalid boot disk" error message? (Select all that
apply)
2/5
Which of the following would be the easiest step to troubleshoot a CRT producing discoloration on the display?
Recycling
Degaussing ( Missed)
Recovery console
CRT replacement
Which of the following steps ensure proper re-assembly of a serviced laptop? (Select all that apply)
POST messages allow to exclude various computer internal components as probable points of failure.
True ( Missed)
False
If a program written for an earlier version of Windows doesn't run correctly, its settings can be adjusted so that the
current OS version can run the program emulating settings from a previous version of Windows. Which of the
following answers lists the correct steps for manual change of compatibility settings?
Right-click the program icon, click Properties, and then apply required settings on the Compatibility tab (
Missed)
Open Programs and Features applet in Windows Control Panel, right-click the program icon, and then apply
required settings on the Compatibility tab
Right-click the program icon and select Restore previous versions from the application menu
Open Backup and Restore applet in Windows Control Panel and select Recover system settings from the
applet menu
A wireless locator device can be used for finding hotspots and measuring wireless signal strength.
True ( Missed)
False
Which of the following POST beep codes indicates video adapter card failure?
Which of the following steps could be of help in resolving the problem of excessive heat and improve heat
dissipation inside computer case? (Select all that apply)
Failure of one of the drives in a RAID 1 hardware setup does not affect the data stored in the array.
True ( Missed)
False
Which of the following answers refers to a Windows Vista and windows 7 built-in tool that can be used to to detect
the available wireless networks and automatically connect to the most preferred wireless network?
Low RF signal
Local connectivity ( Missed)
Slow transfer speeds
Browser redirection
While troubleshooting disk problems, a loud clicking noise can be an indicator of an issue with:
SDD
NTLDR
HDD ( Missed)
MBR
Which of the following Microsoft Windows tools allows to check for the presence of an APIPA address?
IPCONFIG ( Missed)
CHKDSK
IFCONFIG
MSCONFIG
Which of the following tools allows to scan for and restore corruptions in Windows system files?
DXDIAG
SFC.EXE ( Missed)
SERVICES.MSC
DEFRAG
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 10 (Exam 220-802)
examcompass.com/comptia-a-plus-practice-test-10-exam-220-802
Which of the following files are required to start Windows XP? (Select all that apply)
Which of the following allows to start Windows only with default settings and basic device drivers?
Standby mode
System restore
Safe Mode ( Missed)
Guest account
Which of the following could cause slow performance of a hard drive? (Select all that apply)
Which of the following tools can be used to create backup copy of critical Windows system and boot files? (Select 2
answers)
ASR ( Missed)
ERD ( Missed)
ESD
HTPC
CDFS
Which of the following should be performed regularly in order to help restore a computer’s data after hard drive
failure?
System Restore
Factory Restore
Windows Memory Diagnostics
Scheduled Backups ( Missed)
1/5
True ( Missed)
False
Which of the following would be the easiest step to troubleshoot Windows blue screen?
Which of the following commands would be used to repair the OS boot sector?
FIXMBR
FIXBOOT ( Missed)
FORMAT
CHKDSK
Microsoft service that provides updates for the Windows operating system and its installed components is called:
Event Viewer
Windows Firewall
Recovery console
Windows Defender ( Missed)
A technician just finished removing spyware from a computer and now they are not able to connect to any websites.
Which of the following is the most likely cause?
Which of the following files are required to start Windows Vista/7? (Select all that apply)
Which of the following Windows tools allows for troubleshooting Dynamic-link libraries (DLLs) and ActiveX controls?
REGSVR32.EXE ( Missed)
MSCONFIG
NTLDR
DEVMGMT.MSC
Which of the following answers lists the most probable cause for garbled characters on paper printout?
In laser printing, toner falling off of the printed copy indicates a problem with:
Print head
Cleaning blade
Fusing unit ( Missed)
Toner cartridge
Erase lamp
Which of the following Windows 7 Control Panel items allows for detecting external displays?
A user calls about their workstation not powering on in the morning. According to the troubleshooting theory, which
of the following steps should the technician perform next?
Dim display on laptop screen could result from failure of which of the following components? (Select 2 answers)
Inverter ( Missed)
Backlight ( Missed)
Video driver
Laptop battery
3/5
Virus
Which of the following tools would be used to clean the inside of a printer? (Select all that apply)
Regular vacuum
Cleaning brush
Can of compressed air ( Missed)
Toner vacuum ( Missed)
Which of the following places allows for easy access to all queued print jobs?
SERVICES.MSC
Windows Taskbar ( Missed)
Devices and Printers applet in Control Panel
Device Manager
Which of the following commands writes a new master boot record to a disk?
REGEDIT
CHKDSK
FIXMBR ( Missed)
FIXBOOT
JBOD
BYOD
BSoD ( Missed)
DDOS
In Windows Vista and later Microsoft operating systems, the BOOT.INI file containing boot-configuration data was
replaced by:
NTDETECT.COM
Boot Configuration Data (BCD) file ( Missed)
NTBOOTDD.SYS
WINLOAD.EXE
BOOTMGR (Windows Boot Manager)
A customer reports that their operating system crashes during usage. Which of the following is a common acronym
used to describe this condition?
BSoD ( Missed)
JBOD
Stop error
BYOD
4/5
Which of the following answers lists the most common fix for random time and date resets in Windows?
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 1 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-1-exam-220-801
After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for
information about secondary storage devices that might contain the OS. The list of devices and the order in which
they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred
to as:
After a normal system shutdown, when the computer is turned off, contents of the memory used to store BIOS
settings are:
Erased
Saved on hard drive
Retained ( Missed)
Stored in page file
What is LoJack?
Loopback adapter
Security feature used for locating stolen desktops, laptops, or tablets ( Missed)
Connector standard
RJ11 plug
Which of the following terms refers to a technology that allows for storing passwords, certificates, or encryption keys
in a hardware chip?
ACPI ( Missed)
HCL
TPM
EMI
APM ( Missed)
In modern PCs, the procedure of replacing BIOS contents in order to upgrade to a newer version is sometimes
1/5
referred to as:
Which of the following acronyms refers to a series of basic hardware diagnostic tests performed by the startup BIOS
after the computer is powered on?
QoS
POTS
CMOS
POST ( Missed)
What kind of security features can be set in BIOS? (Select all that apply)
A computer supporting LoJack technology has two main components installed: an Application Agent residing in the
operating system which sends tracking signals to the monitoring center allowing the law enforcement to locate and
recover stolen device, and Persistence Module which restores the Application Agent and allows it to survive
operating system re-installation or hard drive format. The highest level of security offered by LoJack can be
achieved when Persistence Module resides in:
Operating system
Partition gap on the hard drive
USB key
Computer's BIOS ( Missed)
Chassis intrusion detection is an option that can be enabled / disabled in the BIOS setup utility (if a BIOS comes
equipped with this feature). Coupled with a hardware sensor mounted inside the computer case, this option can be
used to check if the case was opened and display a notification alert during next boot.
True ( Missed)
False
2/5
Which of the following resources can be used by an operating system to communicate with hardware? (Select 2
answers)
After replacing a modular hardware component inside computer case, the updated information about specific
parameters of the new device is stored in:
System BIOS
Startup BIOS
Secondary storage
CMOS RAM ( Missed)
Fix physical hardware faults found in replaceable components inside the computer's case
Fix known programming errors discovered in the current BIOS version ( Missed)
Repair damaged BIOS ( Missed)
Provide support for new types of attached hardware ( Missed)
The CMOS setup utility can be accessed by pressing: (Select best answer)
Shareware
Malware
Firmware ( Missed)
Adware
After launching Windows Virtual PC application technician receives error message stating that the hardware-
assisted virtualization (HAV) feature is not enabled on the computer. Which of the following steps might help in fixing
this problem? (Select best answer)
MSINFO32.EXE ( Missed)
Control Panel
WINVER.EXE
IPCONFIG
CMOS settings can be set to factory defaults by: (Select all that apply)
Which of the following terms refer to BIOS types that can be updated without removing the BIOS chip from a
motherboard? (Select 2 answers)
EEPROM ( Missed)
ROM
Plug and Play (PnP)
EPROM
Flash Memory ( Missed)
While trying to enable the entire drive encryption feature in Windows technician receives the following error
message: "A compatible Trusted Platform Module (TPM) Security Device must be present on this computer, but a
TPM was not found". Knowing that the system has a TPM chip installed, which of the following steps might help in
solving this problem?
Which of the following acronyms refers to an integrated circuit that keeps track of the current time in a PC?
CRT
CMOS
RTC ( Missed)
MBR
Which of the following are the features offered by LoJack? (Select all that apply)
Shadow Copy
Backup BIOS
Option ROM ( Missed)
Add-in BIOS
In order to retain its configuration data, CMOS RAM requires constant supply of electricity which is provided by the:
AC adapter
Power Supply Unit (PSU)
CMOS battery ( Missed)
Uninterruptible Power Supply (UPS)
Total marks 35
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 2 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-2-exam-220-801
A standardized specification of a motherboard (including its dimensions, supported power supply types, and layout
of components) is known as the motherboard's: (Select best answer)
Architecture
Blueprint
Form factor ( Missed)
Diagram
PATA
PCIe ( Missed)
ISA
IEEE 1284
For CPUs without integrated memory controller, which part of the chipset manages communication between the
CPU and memory?
Which of the following slots on the motherboard allow for attaching a dedicated video card? (Select 2 answers)
PGA
AGP ( Missed)
ATX connector
PCIe ( Missed)
Slot A
Which of the following are motherboard form factors? (Select all that apply)
Micro-ATX ( Missed)
Chipset
ITX ( Missed)
miniPCI
ATX ( Missed)
CNR slot:
1/5
Allows for connecting dedicated video adapter cards
Is used for specialized networking, audio, and telephony equipment ( Missed)
Allows for connecting mass storage devices such as hard disk drives and optical drives
RAM
Video adapter card
CPU
Modem ( Missed)
Keyboard
Can only detect errors, but does not have the capability to correct them
Refers to parity RAM (the two terms are interchangeable)
Offers better performance in terms of speed when compared to a non-ECC type of RAM
Can detect and correct errors ( Missed)
Certain types of RAM take advantage of an additional bit in order to detect whether a data error has occurred. An
extra bit is used to store information about the number of bits set to the value of one in a given string of data
(typically one byte) and by examining that information at different stages of processing it is possible to detect
whether the data has been corrupted or not. What is the name of that extra bit?
Digest
Binary number
Parity bit ( Missed)
Hash value
Compared to a non-ECC type of memory, the ECC RAM is a less expensive option and will always perform faster.
True
False ( Missed)
Which of the following sockets is designed to work with CPUs manufactured by AMD?
What is the name of the most common connector type used for providing power to various hardware components
inside computer case?
RJ-45
BNC
2/5
Molex ( Missed)
USB
A type of PCI slot designed for expansion cards installed in laptops characterized by a much smaller form factor
when compared to its desktop version is called:
PCIe
miniPCI ( Missed)
AGP
PCI-X
Each switch and LED on the front panel of a computer case has a connector attached to it that must be attached to
the appropriate pins on the:
Riser card
Expansion slot
Power supply
Motherboard ( Missed)
The most notable difference between pin grid array (PGA) and land grid array (LGA) packaging relates to the
placement of contact pins, which in case of PGA can be found on the socket, and in case of LGA on the CPU.
True
False ( Missed)
Rambus DRAM design requires memory modules to be installed in sets of two. Any remaining open memory slots
must be filled with:
An expansion card equipped with slots for additional adapter cards is called: (Select best answer)
Which of the following statements about Blu-ray Disc (BD) technology are true? (Select all that apply)
3/5
BD-RE discs can be erased and re-recorded multiple times ( Missed)
A standard-size dual-layer Blu-ray disc can store up to 50GB of data ( Missed)
Which of the following configuration settings can be applied to Parallel ATA (PATA) drives to set their priority when
multiple drives are attached to the same cable? (Select all that apply)
SCSI ID
Cable select ( Missed)
Master ( Missed)
Logical Unit Number (LUN)
Slave ( Missed)
Which of the following CPU socket types is compatible with an AMD microprocessor?
A storage technology that combines multiple disk drive components into a single logical unit to increase logical
volume size, improve performance, or reliability is known as:
Which of the following socket types are designed for Intel CPUs? (Select 3 answers)
Socket 940
Socket FM1
LGA 1366 / Socket B ( Missed)
Socket AM3
LGA 775 / Socket T ( Missed)
LGA 1156 / Socket H ( Missed)
Total marks 40
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 3 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-3-exam-220-801
The ability to replace computer system components without causing interruption to the system is referred to as:
Multitasking
Hardware acceleration
Hot swapping ( Missed)
Cold plugging
SCSI ID:
Which of the following answers describe(s) the characteristic feature(s) of tape drives? (Select all that apply)
7.8 GB
8.544 GB
15.6 GB
25 GB ( Missed)
Which of the following terms refers to a proprietary flash memory card format used mainly in older digital cameras?
xD ( Missed)
SD
1/5
SSD
Mini-SD
Micro-SD
2 drives
3 drives
4 drives ( Missed)
5 drives
What is the maximum number of USB devices that can be connected to a single USB host controller?
31
63
127 ( Missed)
255
Red stripe on the edge of the floppy disk ribbon cable is used for:
18 inches
4.5 meters
5 meters ( Missed)
1 meter
8.544 GB
4.7 GB
7.8 GB
15.6 GB ( Missed)
2/5
An improved heat dissipation from the CPU is achieved through the use of:
Hyperthreading
Surge suppressor
Thermal compound ( Missed)
Backplane
Which of the following are memory form factors used in laptops? (Select 2 answers)
SO-DIMM ( Missed)
ECC
AGP
SO-RIMM ( Missed)
C-RIMM
480 Mbps
12 Mbps ( Missed)
1.5 Mbps
3.2 Gbps
Which of the following terms refer(s) to RAID Level 1? (Select all that apply)
What is the maximum allowable cable length defined in the Parallel ATA (PATA) interface standard?
18 inches ( Missed)
2 meters
5 meters
1 meter
Which of the following values refers to the number of pinouts that can be found on a floppy disk cable?
68
3/5
80
50
34 ( Missed)
18 inches
2 meters
4.5 meters ( Missed)
5 meters
Which of the following is the maximum speed supported by the IEEE 1394b interface?
400 Mbps
12 Mbps
480 Mbps
800 Mbps ( Missed)
360 KB
1.44 MB ( Missed)
360 KB
1.2 MB
Which of the following are the two main CPU manufacturers for personal computers? (Select 2 answers)
ASUS
nVidia
AMD ( Missed)
EVGA
Intel ( Your answer)
Which of the following components is used for passive cooling of the CPU?
4/5
7.8 GB of data
Total marks 30
Total Questions 25
Success ratio 0%
Marks secured 1
5/5
CompTIA A+ Certification Practice Test 4 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-4-exam-220-801
What is the name of a hardware device that allows for administering multiple hosts with the use of a single mouse,
keyboard, and computer screen?
Device Manager
KVM switch ( Missed)
Microsoft Management Console (MMC)
Docking station
Which of the following statements apply to the USB 3.0 standard? (Select 3 answers)
Which of the following ATA versions allows for attaching devices other than hard drives?
ATA-2
ATAPI ( Missed)
ATA-1
ATA-3
What is the maximum data transfer rate supported by the SATA 3.0 standard?
6 Gbps ( Missed)
800 Mbps
3 Gbps
480 Mbps
5 meters
2 meters
1 meter
4.5 meters ( Missed)
7 pins
34 pins
1/5
40 pins
15 pins ( Missed)
A single Parallel ATA (PATA) cable can be used to connect one motherboard socket with:
Up to 2 devices ( Missed)
Up to 3 devices
Only 1 device
Up to 4 devices
What is the maximum data transfer rate supported by the SATA 2.0 standard?
480 Mbps
3 Gbps ( Missed)
800 Mbps
6 Gbps
A single Serial ATA (SATA) data cable can be used to connect one motherboard socket with:
Up to 3 devices
Up to 2 devices
Only 1 device ( Missed)
Up to 4 devices
Which of the following statements list(s) data transfer rate(s) of the USB 1.1 standard? (Select all that apply)
12 Mbps ( Missed)
1.5 Mbps ( Missed)
800 Mbps
5 Gbps
480 Mbps
2 meters
4.5 meters
18 inches ( Missed)
5 meters
800 Mbps
480 Mbps ( Missed)
400 Mbps
12 Mbps
2/5
Which type of standard FireWire connector has the capability of supplying voltage to a device?
2-pin connector
4-pin connector
6-pin connector ( Missed)
8-pin connector
1 meter ( Missed)
18 inches
5 meters
4.5 meters
800 Mbps
1.5 Gbps
5 Gbps ( Missed)
480 Mbps
Which of the following are parallel communication interfaces? (Select all that apply)
AGP ( Missed)
PCI ( Missed)
IEEE 1284 ( Missed)
IEEE 1394
PCI Express
15 Mbps
1.2 Mbps
1.5 Mbps ( Missed)
12 Mbps
Which of the following statements refer(s) to the IEEE 1394a standard? (Select all that apply)
3/5
What is the maximum data transfer rate supported by the SATA 1.0 standard?
DVI
AGP
VGA
S/PDIF ( Missed)
400 Mbps
12 Mbps ( Missed)
480 Mbps
15 Mbps
A feature that can be found in some types of PC Power Supply Units that allows a PSU to automatically adapt to the
AC voltage supplied from the power socket is called:
Fixed-input
Inverter
Auto-switching ( Missed)
Hot plugging
127 devices
255 devices
15 devices
63 devices ( Missed)
Which of the following statements refer(s) to the IEEE 1394b standard? (Select all that apply)
Total marks 32
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 5 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-5-exam-220-801
Which of the following answers describe the features of tape drives? (Select 3 answers)
A smaller, faster memory type for storing copies of the data from frequently used main memory locations used by the
central processing unit of a computer to reduce the average time to access memory is called:
Secondary storage
RAM
ECC memory
CPU cache ( Missed)
Which of the answers listed below refers to the Video Graphics Array (VGA) connector?
A computer on a network where most functions are carried out on a central server or a software application that
uses the client-server model where the server performs all the processing is called:
Thick client
Active Hub
Thin client ( Missed)
Virtual machine
Which of the following units is used for measuring clock speed in modern CPUs?
Which of the following answers lists storage media types arranged from lowest to highest capacity?
1/5
CD, DVD, Floppy disk, BD (Blu-ray), Tape
Floppy disk, CD, DVD, Tape, BD (Blu-ray)
Floppy disk, Tape, CD, DVD, BD (Blu-ray)
Which components would have the highest priority while building a custom workstation designed to run virtual
machines? (Select 2 answers)
High-end video
CPU ( Missed)
HTPC compact form factor
RAM ( Missed)
HDMI output
What is the name of a microprocessor component that performs all comparisons and calculations?
UART
ALU ( Missed)
GUI
LUN
Aspect ratio
Interlacing
Refresh rate ( Missed)
Screen resolution
Which of the following terms refer to CPU technologies designed to minimize the CPU's power consumption and
heat generation? (Select 2 answers)
64-bit processing
CPU throttling ( Missed)
Overclocking
SpeedStep ( Missed)
Hyperthreading
Brightness of an LCD monitor (the level of light emitted by an LCD display) is measured in:
Pixels
Candelas per square metre (cd/m2) ( Missed)
Watts
Dots per inch (DPI)
A component of computer graphics display adapters which converts digitally encoded images into analog signals
that can be displayed by a monitor is called:
2/5
OLED
CAD
RAMDAC ( Missed)
CRT
Which of the following display standards use 4:3 aspect ratio? (Select 2 answers)
UXGA ( Missed)
HDTV 720p
WUXGA
SVGA ( Missed)
HDTV 1080p
The practice of running a motherboard or microprocessor at a higher speed than recommended by the manufacturer
is commonly referred to as:
Throttling
Overclocking ( Missed)
Hyper-Threading
Virtualization
In order to ensure the sharpest text and image displayed by a CRT monitor it is usually recommended to set the
monitor to run only at a specific resolution (which is also referred to as the CRT's native resolution).
True
False ( Missed)
Which of the following terms refers to a monitor filter used to reduce reflection from the surface of a CRT or LCD
display?
OLED
Widescreen
Antiglare ( Missed)
Flat panel
Which of the following statements describe(s) disadvantages of virtualization? (Select all that apply)
Multiple virtual machines run on a single host share hardware resources which has a degrading effect on
performance ( Missed)
Deployment of different types of operating systems or multiple copies of the same operating system or
application becomes more difficult in a virtualized environment due to hardware configuration issues
On a larger scale, virtualization has a negative effect on operational costs due to increased power supply
requirements
Hardware used for hosting virtual machines becomes a single point of failure ( Missed)
Which type of DVI connector doesn't provide output for digital signal?
3/5
DVI-D
DVI-A ( Missed)
DVI-I
S/PDIF
In personal computer microprocessor architecture, a computer bus used to connect the CPU to CPU cache memory
is called:
Which of the following acronyms refers to a new type of thin and lightweight display devices offering higher contrast
ratio and color quality in comparison to LCD without the need for a special light source to produce a visible image?
OLED ( Missed)
LED
HDMI
HTPC
Which of the following interfaces provides the capability for transmission of both video and audio data?
S/PDIF
DVI
S-Video
VGA
HDMI ( Missed)
AGP
DVI
VGA
S/PDIF ( Missed)
Computer displays with aspect ratios of 16:10 and 16:9 are commonly referred to as:
UXGA displays
Fullscreen displays
Widescreen displays ( Missed)
SVGA displays
In virtualization technology, a software program that manages multiple operating systems (or multiple instances of
the same operating system) on a single computer system is called:
4/5
Guest OS
KVM switch
Hypervisor ( Missed)
Projector
Which of the following physical security measures can be applied to a computer screen?
Content filter
Power level controls
Privacy filter ( Missed)
Password protection
Total marks 31
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 6 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-6-exam-220-801
40 pins
34 pins
15 pins
7 pins ( Missed)
Which of the following acronyms refers to a technology enabling more efficient use of electric power in a PSU?
PFC ( Missed)
PXE
PVC
PCB
The colored stripe on one of the edges of a floppy drive ribbon cable is used to indicate the proper alignment
between the cable connector and the motherboard socket.
True ( Missed)
False
A type of connector that typically provides power to hard drives, video cards, fans and motherboard inside a
computer case is commonly referred to as:
RJ-45
SATA
PS/2
Molex ( Missed)
Which of the following connectors increases the power consumption limit for advanced graphics cards?
T568A
15-pin VGA
PCIe 6/8-pin ( Missed)
4/8-pin 12v
34 pins
40 pins
20 pins ( Missed)
68 pins
24 pins ( Missed)
1/5
The floppy drive ribbon cable connector consists of:
34 pins ( Missed)
15 pins
80 pins
40 pins
Which of the following auxiliary connectors is used to supply dedicated power for a high-end CPU?
34 pins
15 pins ( Missed)
40 pins
7 pins
Which of the following connectors are used with optical fiber cabling? (Select all that apply)
ST ( Missed)
SC ( Missed)
BNC
LC ( Missed)
RJ-11
Optional 8-pin PCIe power connector increases the power consumption limit for connected device to:
75 W
150 W ( Missed)
25 W
125 W
2/5
Serving web pages
Translating domain names into IP addresses
File exchange ( Missed)
Which of the following connector types can be used for connecting keyboards and mice to a PC? (Select all that
apply)
S/PDIF
PS/2 ( Missed)
6-pin Mini-DIN ( Missed)
USB ( Missed)
PCIe 6/8-pin
Which of the following connector types are used with twisted-pair cabling? (Select 2 answers)
BNC
LC
RJ-45 ( Missed)
RJ-11 ( Missed)
ST
Which of the following acronyms refers to a Microsoft-proprietary protocol providing a user with graphical interface
to connect to another computer over a network connection?
SMTP
RDP ( Missed)
DHCP
DNS
Optional 6-pin PCIe power connector increases the power consumption limit for connected device to:
75 W ( Missed)
150 W
25 W
125 W
Which of the following answers refer(s) to specification(s) used for coaxial cabling? (Select all that apply)
RJ-45
3/5
RJ-11
RG-6 ( Missed)
RGB
RG-59 ( Missed)
Which of the following protocols was designed as a secure replacement for Telnet?
SSH ( Missed)
FTP
SMTP
SNMP
A twist in the floppy ribbon cable wiring is used for the purpose of identifying drives on the cable.
True ( Missed)
False
Which of the following acronyms refers to a protocol used in network management systems for the monitoring of
network-attached devices?
SMTP
IMAP
HTTPS
SNMP ( Missed)
RGB
HDMI ( Missed)
VGA
S-Video
Which of the following interfaces support(s) hot plugging? (Select all that apply)
USB ( Missed)
IEEE 1394 ( Missed)
GUI
SATA ( Missed)
EIDE
PATA
Which of the connectors types listed below are used with coaxial cabling? (Select 2 answers)
ST
F-connector ( Missed)
BNC ( Missed)
4/5
LC
RJ-11
Total marks 35
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 7 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-7-exam-220-801
20
21
22
23 ( Missed)
An Internet service used for translating domain names into IP addresses is called:
SNMP
DHCP
HTTP
DNS ( Missed)
File Transfer Protocol (FTP) runs by default on TCP ports: (Select 2 answers)
25
22
21 ( Missed)
20 ( Missed)
23
A security access control method whereby the 48-bit address assigned to each network card is used to determine
access to the network is called:
Hardware lock
MAC filtering ( Missed)
Quality of Service (QoS)
Subnetting
Encryption standard
Line of sight wireless internet service
Directory access protocol ( Missed)
1/5
Cable rating
Which of the following TCP port numbers is used by Simple Mail Transfer Protocol (SMTP)?
110
25 ( Missed)
22
143
32 bits ( Missed)
128 bits
64 bits
48 bits
80
443
110
53 ( Missed)
Network topology
Media Access Control (MAC) address
Network file sharing protocol ( Missed)
Ethernet frame
HTTPS
IMAP
HTTP ( Missed)
Telnet
TFTP
HTTP
Telnet
SFTP ( Missed)
255.255.225.0
255.255.191.0
255.255.127.0
255.255.64.0
None of the above is a valid subnet mask ( Missed)
A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is
commonly referred to as:
Bridge
VLAN
DMZ ( Missed)
VPN
32 bits
48 bits
64 bits
128 bits ( Missed)
Which of the following networking protocols automates the process of assigning dynamic IP addresses?
SMTP
SNMP
DHCP ( Missed)
DNS
Ethernet
WiMAX
WLANs ( Missed)
Bluetooth
110 ( Missed)
143
25
3/5
443
IEEE 802.16 is a series of standards defining high-speed, long-distance wireless communication, also known as:
WiMAX ( Missed)
WPA
Bluetooth
Ethernet
Which of the following default port numbers is not used by a remote administration tool?
23
22
3389
25 ( Missed)
PAN ( Missed)
LAN
MAN
WAN
Which of the following port numbers is used by Remote Desktop Protocol (RDP)?
3389 ( Missed)
143
3398
443
Which of the following wireless encryption schemes offers the highest level of security?
SSID
WPA2 ( Missed)
WEP
WPA
Which of the following acronyms refers to a solution that allows for carrying both data and electrical power over a
single cable?
WPA
PoE ( Missed)
PnP
QoS
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 8 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-8-exam-220-801
Which of the following technologies simplifies configuration of new wireless networks by providing non-technical
users with a capability to easily configure network security settings and add new devices to an existing network?
WPA
WPS ( Missed)
WEP
WAP
Which of the following wireless standards allows for the highest data transfer rate?
IEEE 802.11a
IEEE 802.11g
IEEE 802.11n ( Missed)
IEEE 802.11b
WEP
802.11i ( Missed)
WPA
802.3
IEEE 802.11g offers backward compatibility with which of the following wireless standards?
802.11a
802.3
802.11b ( Missed)
802.11n
11 GHz
2.4 GHz
5 GHz ( Missed)
1.2 GHz
Which of the following standards allows for achieving the highest distance between Wireless Access Point (WAP)
and connecting wireless devices?
1/5
IEEE 802.11a
1 Gbps
100+ Mbps
54 Mbps ( Missed)
11 Mbps
Which of the following acronyms refers to a technology utilizing multiple antennas at both the transmitter and
receiver to increase wireless bandwidth and range?
MIMO ( Missed)
AES
CCFL
OLED
1.2 GHz
2.4 GHz ( Missed)
11 GHz
5 GHz
1 Gbps
54 Mbps
100+ Mbps
11 Mbps ( Missed)
Cabling with a fire-retardant jacket placed in the space between dropped ceiling and structural ceiling is known as:
T568A
PVC
T568B
Plenum ( Missed)
2/5
1.2 GHz
5 GHz
11 GHz
2.4 GHz ( Missed)
Which of the following hides the internal IP addresses by modifying IP address information in IP packet headers
while in transit across a traffic routing device?
DNS
VLAN
NAT ( Missed)
VPN
IEEE 802.11n offers backward compatibility with which of the following standards? (Select all that apply)
802.11g ( Missed)
802.11a ( Missed)
802.3
802.11b ( Missed)
In structured cabling, the interference between signals sent over adjacent wires is commonly referred to as
Crosstalk (XT).
True ( Missed)
False
100+ Mbps
1 Gbps
54 Mbps ( Missed)
11 Mbps
A type of network topology where each node has a connection to every other node in the network is known as:
Bus
Ring
Star
Mesh ( Missed)
127.0.0.1
192.168.0.1
169.254/16
::1 ( Missed)
3/5
802.11n devices operate in the frequency range of: (Select all that apply)
11 GHz
2.4 GHz ( Missed)
1.2 GHz
5 GHz ( Missed)
2.5 GHz
In UTP and STP cabling wires in wire pairs are twisted around one another in order to minimize signal interference.
True ( Missed)
False
2 Mbps
100+ Mbps ( Missed)
54 Mbps
11 Mbps
Fast Ethernet is a collective term for a number of Ethernet standards that carry traffic at the nominal rate of:
10 Mbps
100 Mbps ( Missed)
1 Gbps
10 Gbps
802.11n improves upon the previous IEEE 802.11 standards by offering which of the following features? (Select best
answer)
MIMO ( Missed)
Data transfer rates of up to 54 Mbps
WEP encryption
Multi-user MIMO (MU-MIMO)
Which of the following takes advantage of the Advanced Encryption Standard (AES)?
WEP
WPA
WAP
WPA2 ( Missed)
Total marks 28
4/5
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 9 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-9-exam-220-801
Which of the following answers list the characteristics of Microdrive (MD): (Select 2 answers)
ExpressCard /34 and ExpressCard /54 are two form factors specified by the ExpressCard standard. Numbers after
slash in these two form factors refer to the card's:
Width ( Missed)
Length
Thickness
Speed
Every computer on a single LAN must have unique host and nework ID.
True
False ( Missed)
Which of the following functionalities allows to overcome keyboard size restrictions in laptops?
Touchpad
Numeric keypad
Fn key ( Missed)
Digitizer
1/5
Flash memory card formats include: (Select all that apply)
Which of the following tools would be used for attaching cables to a patch panel?
Crimper
Snips
Punchdown tool ( Missed)
Cable stripper
A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to
help make the address shorter.
True ( Missed)
False
Which of the following tools would be best for verifying the correct electrical connections of wires in a cable?
Loopback plug
Tone generator
Cable tester ( Missed)
Multimeter
The two most common form factors used in modern HDDs include: (Select 2 answers)
3.5-inch ( Missed)
5.25-inch
2.5-inch ( Missed)
1.8-inch
Which of the following answers lists the most common battery type that can be found in modern portable devices?
Nickel–metal hydride
2/5
Lithium-ion ( Missed)
Alkaline
Nickel-cadmium
Which of the following answers lists an HDD form factor used in laptops?
3.5-inch
5.25-inch
1.8-inch
2.5-inch ( Missed)
Which of the following provides physical security measure against laptop theft?
The disadvantage from using this device results from a fact that any incoming signal on any of its ports is re-created
and sent out on any connected ports, which in turn forces all the connected devices to share the total amount of
available bandwidth.
Router
Switch
Bridge
Hub ( Missed)
Which of the following answers lists an obsolete flash memory card format used in older digital cameras?
Memory Stick
xD-Picture Card ( Missed)
SO-DIMM
Secure Digital (SD)
Guidelines outlining safe handling and disposal of various computer components can be found in: (Select best
answer)
User manual
MBSA
Hardware Compatibility List (HCL)
MSDS documentation ( Missed)
In incident response procedures the process that ensures proper handling of collected evidence is called chain of
custody.
True ( Missed)
3/5
False
Which of the following flash memory card formats offers the highest capacity?
xD-Picture Card
Secure Digital (SD) ( Missed)
ExpressCard
SmartMedia
Which of the following answers refers to a group of technologies enabling telephone calls over the Internet?
VoIP ( Missed)
Ethernet
802.16
POTS
Which of the following answers lists an HDD form factor used in desktops?
5.25-inch
2.5-inch
3.5-inch ( Missed)
1.8-inch
A dedicated computer appliance designed for storing and serving files on a network is known as:
NAT
NAS ( Missed)
Bridge
SAN
Power spike
Electromagnetic interference
Temporary drop in voltage ( Missed)
Power outage
A network protocol that allows multiple devices on a private LAN to connect to a public network with the use of the
same public IPv4 address is called:
NAT ( Missed)
WPS
APIPA
VPN
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Practice Test 10 (Exam 220-801)
examcompass.com/comptia-a-plus-practice-test-10-exam-220-801
A software that temporarily stores print jobs on the computer hard disk or in memory until the printer is ready to print
them is called:
In impact printing, calibration helps to ensure that the colors and layout represented on the monitor display match
the colors and layout of the printed image.
True
False ( Missed)
Which of the following printer types use(s) inked ribbon to produce an imprint on paper? (Select all that apply)
Inkjet
Laser
Dot matrix ( Missed)
Thermal
Daisy wheel ( Missed)
Which of the following answers lists a standard unit for measuring print resolution?
1/5
Pages per minute (ppm) ( Missed)
Which of the following answers lists the correct order of the laser printing process?
True ( Missed)
False
Which of the following printer types fall into the category of impact printers? (Select 2 answers)
Which extinguisher type should be used for fires that involve ordinary solid combustibles, such as paper and wood?
Class A ( Missed)
Class B
Class C
Class D
Which of the following devices may pose a risk to electrical safety due to accumulated high voltage?
CRT monitor
Power supply unit (PSU)
Inverter
Laser printer
All of the above devices and components require high AC voltage and may pose a risk to a technician's
safety ( Missed)
Which of the following answers is an example of appropriate handling of customer's confidential data in a situation
where troubleshooting requires user password?
Which of the following printer components allows for automatic printing on both sides of the page?
2/5
Roller
Print head
Duplexing assembly ( Missed)
Feeder
Print device sharing through a wired connection can be implemented with the use of which of the following
interfaces? (Select all that apply)
Parallel ( Missed)
USB ( Missed)
Bluetooth
Serial ( Missed)
802.11x
Ethernet ( Missed)
Which extinguisher type should be used for fires that involve ordinary flammable liquids and gases?
Class A
Class B ( Missed)
Class C
Class D
Which of the following is an example of good communication skills when dealing with a customer?
Ask close-ended questions to let the customer answer with a simple "Yes" or "No"
Argue with a technical user if necessary to educate them
Listen to the customer and do not interrupt until he or she has finished describing the problem ( Missed)
Rely on your own judgment and do not restate and clarify what the customer says
Which of the following tools are used to protect against ESD? (Select all that apply)
Which of the following printer types have the capability to produce duplicate pages (multipart forms) during printing
process? (Select all that apply)
3/5
Inkjet
Trojan horse
Backdoor
Logic bomb
Grayware ( Missed)
Which of the following are examples of proper communication and professional skills while dealing with difficult
customer? (Select 2 answers)
Clarifying customer statements by asking open ended questions to narrow the scope of the problem (
Missed)
Restating the issue to verify understanding ( Missed)
Adjusting to the technical user conversation style by using technical jargon
Talking to co-workers while interacting with the customer
Clarifying customer statements by interrupting them if necessary
Which of the following printer types can often be found as part of point of sale systems?
Inkjet
Thermal ( Missed)
Daisy wheel
PostScript
Print device sharing through a wireless connection can be implemented with the use of which of the following
interfaces? (Select all that apply)
Bluetooth ( Missed)
802.11x ( Missed)
Infrared (IR) ( Missed)
Parallel
USB
Which extinguisher type should be used for fires that involve energized electrical equipment?
Class A
Class B
4/5
Class C ( Missed)
Class D
In cases where users are found in violation of policies related to prohibited content or activity, the elements of first
response should include: (Select all that apply)
Consulting co-workers
Reporting through proper channels ( Missed)
Multi-factor authentication
Problem identification ( Missed)
Data/device preservation ( Missed)
Total marks 40
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ 220-901 Certification - Exam Acronyms Quiz
examcompass.com/comptia-a-plus-220-901-certification-exam-acronyms-quiz
Which of the following terms refers to a microchip embedded on the motherboard of a personal computer or laptop
that can store keys, passwords and digital certificates?
UTM
EFS
MBR
TPM ( Your answer)
Can only detect errors, but does not have the capability to correct them
Refers to parity RAM (the two terms are interchangeable)
Offers better performance in terms of speed when compared to a non-ECC type of RAM
Can detect and correct errors ( Missed)
Which of the terms listed below refers to a proprietary flash memory card format used mainly in older digital
cameras?
xD ( Missed)
SD
SSD
Mini-SD
Micro-SD
Which of the following answers describe the features of SSDs? (Select 3 answers)
Low performance
High device cost ( Missed)
Lower capacity compared to magnetic drives ( Missed)
High performance ( Missed)
Low device cost
Higher capacity compared to magnetic drives
What is the name of an HDD type that combines high performance and capacity at a relatively low device cost?
SSD
SRAM
USB
SSHD ( Missed)
A type of media used as a secondary system storage in tablets and mobile phones is known as:
1/19
CF
Mini-SD
eMMC ( Missed)
Micro-SD
xD
LGA is a type of integrated circuit packaging that is notable for having pins arranged in a regular array on the
underside of the package.
True
False ( Missed)
A CPU design based on instruction set that tries to improve speed by utilizing relatively few and simple instructions
is known as:
RISC ( Missed)
HPFS
EPIC
CISC
The bus between the CPU and the L2 cache inside the CPU housing is called:
ICH
FSB
USB
BSB ( Missed)
PGA is a type of surface-mount packaging for ICs that is notable for having pins on the socket rather than the
integrated circuit.
True
False ( Missed)
BSB
USB
ICH
FSB ( Missed)
Which of the following acronyms refers to a specific feature of certain types of microprocessor sockets that facilitates
the insertion and removal of a CPU chip?
ZIF ( Missed)
TPM
ZIP
2/19
FRU
What is the name of a microprocessor component that performs all comparisons and calculations?
FRU
UART
ALU ( Missed)
LUN
Which of the terms listed below refers to a situation where a single CPU appears as multiple virtual CPUs to the
OS?
HTT ( Missed)
eMMC
TPM
AHCI
The most notable difference between PGA and LGA packaging relates to the placement of contact pins, which in
case of PGA can be found on the socket, and in case of LGA on the CPU.
True
False ( Missed)
Which of the following built-in functionalities allows a CPU to take over tasks normally executed by a dedicated
graphics card?
ALU
BSB
GPU ( Missed)
FSB
A security feature used by CPUs for isolating areas of memory in order to prevent the execution of code from non-
executable memory locations is known as:
DLP
NX bit ( Missed)
ECC
Parity bit
"DB-15", "DE-15", and "HD-15" are terms referring to the different variants of the:
RJ-45 connector
BNC connector
VGA connector ( Missed)
8P8C connector
A type of interface providing the capability for transmission of both video and audio data is known as:
3/19
S/PDIF
DVI
S-Video
VGA
HDMI ( Missed)
Which of the DVI connector types does not provide support for digital signal transmission?
DVI-D
DVI-A ( Missed)
DVI-I
DVI-A/D
Which of the following answers describes(s) the characteristic features of S/PDIF? (Select all that apply)
Twisted-pair cabling
Digital audio interface ( Missed)
Coaxial cabling ( Missed)
Video interface
Fiber-optic cabling ( Missed)
Which of the connector types listed below plugs into a NIC port?
DB15
S/PDIF
RCA
RJ-45 ( Missed)
Which of the following answers list(s) examples of wireless connectivity media? (Select all that apply)
RF ( Missed)
HDMI
IEEE 802.3
IR ( Missed)
NFC ( Missed)
Which of the acronyms listed below refers to the type of electric current supplied to most of the internal PC
components?
AC
PFC
DC ( Missed)
A/V
PSUs capable of operating with either 110-120 or 220-240 volt power input ranges are referred to as dual rail PSUs.
4/19
True
False ( Missed)
Which of the hardware requirements listed below should be given priority while assembling a custom CAD/CAM
design workstation? (Select 3 answers)
What type of hardware components would be the most important for an A/V editing workstation? (Select all that
apply)
Which of the following hardware requirements should be given priority while building a custom HTPC? (Select all
that apply)
TV tuner ( Missed)
Surround sound audio ( Missed)
HDMI output ( Missed)
Motherboard form factor ( Missed)
Specialized GPU
Multicore CPU
Which of the LCD technologies listed below offers the fastest response time?
TN ( Missed)
CRT
UXGA
IPS
What are the characteristic features of the IPS LCD panel technology? (Select 3 answers)
Which of the following answers describe the features of the TN LCD panel technology? (Select 3 answers)
Which of the acronyms listed below refers to an LCD panel taking advantage of fluorescent lamps?
LED
CCFL ( Missed)
DFS
OLED
A type of thin and lightweight display device offering higher contrast ratio and color quality in comparison to LCD
without the need for a special light source to produce a visible image is referred to as:
IPS
OLED ( Missed)
LED
CRT
What type of unit is used to describe the refresh rate of a computer screen?
Hz ( Missed)
cd/m2
MHz
Lumen
KHz
Hz
Lumens
dB
cd/m2 ( Missed)
Which of the display standards listed below uses the 16:10 aspect ratio?
XGA
6/19
SXGA
UXGA
WUXGA ( Missed)
A technical standard for digital representation and transmission of sound is known as:
MAPI
MIDI ( Missed)
MIME
MIMO
An infrastructure device designed for connecting wireless/wired client devices to a network is called:
DMZ
AP ( Missed)
IDF
WPS
Which of the following answers refers to a common network communication protocol used for enabling two hosts to
establish a network connection and exchange data?
STP
WPS
UTP
TCP ( Missed)
Inkjet
Laser
Thermal ( Missed)
Impact
XPS ( Missed)
GDI
PCL
PDF ( Missed)
TXT
RS-232
LPT ( Missed)
COM
7/19
USB
Which of the answers listed below refers to a language used for describing the appearance of a printed page?
DLT
CCFL
SSL
PCL ( Missed)
A Microsoft Windows OS component responsible for representing graphical objects and transmitting them to output
devices such as monitors and printers is called:
GDI ( Missed)
IDS
PostScript
PCL
Which of the following answers refer to parallel printer port operation modes? (Select 2 answers)
ECP ( Missed)
EFS
ERD
EPP ( Missed)
ECC
Examples of network protocols designed to enable remote printing include: (Select 2 answers)
IMAP
RDP
LDAP
IPP ( Missed)
LPD/LPR ( Missed)
Which of the answers listed below refer(s) to connector type(s) used with fiber-optic cabling? (Select all that apply)
ST ( Missed)
DB-25
SC ( Missed)
RG-59
LC ( Missed)
RG-6
One of the differences between the UTP and STP cabling is that the STP cable takes advantage of additional
protective cover reducing signal interference from outside sources.
True ( Missed)
8/19
False
Materials from which the plenum-rated cable's cover is made include: (Select 2 answers)
FPM
PVC ( Missed)
EPP
FEP ( Missed)
ECP
An IPv4 address in the range 169.254.0.1 through 169.254.255.254 indicates problem with what type of service?
SMTP
DNS
DHCP ( Missed)
SNMP
A system containing mappings of domain names to various types of data, such as for example numerical IP
addresses is known as:
IDS
DNS ( Missed)
SQL
DFS
A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over
a network is known as:
RDP ( Missed)
IPP
RIP
WAP
9/19
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
True ( Missed)
False
Which of the protocols listed below is used for automated discovery of networked services on LANs?
SMB
AFP
CIFS
SLP ( Missed)
Which of the following answers refer(s) to file sharing network protocol(s)? (Select all that apply)
RIP
FTP ( Missed)
NNTP
AFP ( Missed)
SNMP
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DNS
SNMP
NAT
DHCP ( Missed)
Authentication protocol
Address resolution protocol
Directory access protocol ( Missed)
File exchange protocol
A protocol used in network management systems for monitoring network-attached devices is known as:
SMTP
ICMP
SNMP ( Missed)
IPsec
SMB and CIFS are examples of network protocols used for providing shared access to files, directories, and
devices.
True ( Missed)
False
10/19
Examples of secure network protocols offering traffic encryption include: (Select 3 answers)
FTP
HTTPS ( Missed)
Telnet
HTTP
IPsec ( Missed)
SSH ( Missed)
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote
command-line login, remote command execution, and other secure network services between two networked
computers?
PPP
HTTPS
SSH ( Missed)
IPsec
Which of the protocols listed below was designed as a secure replacement for Telnet?
CHAP
FTP
SNMP
SSH ( Missed)
TCP is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred
to as unreliable or best-effort protocol).
True
False ( Missed)
UDP is a connection-oriented protocol that requires a set of initial steps in order to establish connection (three-way
handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent),
and sequencing (rearranging packets that arrived out of order).
True
False ( Missed)
Which of the wireless security standards listed below has been deprecated in favor of newer standards due to known
vulnerabilities resulting from implementation flaws?
AES
WPA2
PEAP
WEP ( Missed)
CCMP
11/19
Which of the following wireless encryption schemes offers the highest level of protection?
WEP
WPA2 ( Missed)
WAP
WPA
A security protocol introduced in order to strengthen existing WEP implementations without requiring the
replacement of legacy hardware is known as:
PEAP
TKIP ( Missed)
CCMP
WPA2
WEP
WPA2 ( Missed)
PAP
WPA
A lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall is
commonly referred to as:
WWAN
VPN
DMZ ( Missed)
VLAN
Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP
packet headers while in transit across a traffic routing device?
NAC
ACL
NAT ( Missed)
DMZ
A solution that alleviates the problem of depleting IPv4 address space by allowing multiple hosts on the same private
LAN to share a single public IP address is known as:
DNS
APIPA
NAT ( Missed)
DHCP
DNAT provides a permanent mapping between a private IP address and a public IP address on a one-to-one basis.
12/19
True
False ( Missed)
SNAT provides a mapping between private IP address and any of the IP addresses belonging to the available public
IP address pool.
True
False ( Missed)
Which of the following solutions allows network administrators to prioritize certain types of network traffic?
NAC
UAC
NAT
QoS ( Missed)
A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure,
and learn about the presence and capabilities of other devices is known as:
DHCP
UPnP ( Missed)
S.M.A.R.T
UEFI
WAP
UPnP ( Missed)
TKIP
PnP
Which of the following technologies simplifies configuration of new wireless networks by providing non-technical
users with a capability to easily configure network security settings and add new devices to an existing network?
WPA
WPS ( Missed)
UPnP
WAP
Examples of technologies that are not recommended and should be disabled due to their known vulnerabilities or
other security risks they might pose include: (Select 3 answers)
WPS ( Missed)
WAP
UPnP ( Missed)
WEP ( Missed)
13/19
TKIP
Which of the following enables broadband Internet access based on the cable television infrastructure?
SONET
GBIC
DOCSIS ( Missed)
SCADA
VDSL
ADSL ( Missed)
SDSL
UDSL
A network connecting computers within a small geographical area such as a building or group of buildings is
commonly referred to as a:
PAN
LAN ( Missed)
MAN
WAN
A computer network connecting multiple smaller networks over very large geographical areas is known as:
PAN
LAN
MAN
WAN ( Missed)
True ( Missed)
False
A type of limited-range computer network used for data transmission among various types of personal devices
centered around a single workstation is called:
PAN ( Missed)
LAN
SAN
MAN
A computer network connecting multiple LANs over an area of a city or campus is called:
PAN
14/19
LAN
MAN ( Missed)
WAN
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to
communicate with each other is commonly referred to as:
MAN
WLAN ( Missed)
LAN
VLAN
A computer networking technology that enables sending data over wiring used for transmission of electrical power is
called:
PLC ( Missed)
ECP
PoE
EPP
Which of the following acronyms refers to a solution that allows for carrying both data and electrical power over a
single twisted-pair Ethernet cable?
EPP
PoE ( Missed)
ECP
PLC
A type of memory module form factor most commonly used for extending the capacity of primary storage in laptop
computers is called:
SO-DIMM ( Missed)
SRAM
MicroDIMM
RDIMM
Which of the answers listed below refers to a technology that enables carrying out mobile payment transactions with
the use of the physical phone device?
WAP
NFC ( Missed)
IR
RFC
Which of the following acronyms refers to a series of basic hardware diagnostic tests performed by the startup BIOS
after the computer is powered on?
15/19
EIDE
POTS
ACPI
POST ( Missed)
Windows BSoD provides technical information that might be of help for advanced users in solving the problem that
caused the stop error. The information displayed on the screen when Windows encounters this type of error typically
includes error code, memory address where it occurred, and the name of the driver that caused it.
True ( Missed)
False
Which of the answers listed below refers to a standard that relies on serial communication?
ISA
PCI-X
IEEE 1284
PCI
PATA
PCIe ( Missed)
Motherboard slots that enable installation of dedicated graphics controllers include: (Select 2 answers)
PGA
AGP ( Missed)
CNR slot
ATX connector
PCIe ( Missed)
Which of the following answers refers to a firmware interface designed as a replacement for BIOS?
UEFI ( Missed)
ACPI
CMOS
USMT
Which of the following slot types allows for adding primary storage modules to the motherboard?
USB
16/19
SATA
RAM ( Missed)
PATA
Which of the answers listed below refer(s) to the features of a motherboard's CPU socket? (Select all that apply)
PGA ( Missed)
TPM
LGA ( Missed)
FRU
ZIF ( Missed)
PGA2 ( Missed)
Which of the memory types listed below are designed to store permanent data that cannot be changed? (Select all
that apply)
RAM
EPROM
ROM ( Missed)
PROM ( Missed)
EEPROM
What is the most common memory module form factor type used in laptop computers?
SO-DIMM ( Missed)
DIMM
MicroDIMM
C-RIMM
A memory module form factor commonly used in sub-notebook devices is known as:
C-RIMM
MicroDIMM ( Missed)
SO-DIMM
DIMM
Compared to a non-ECC type of memory, the ECC RAM is a less expensive option and will always perform faster.
True
False ( Missed)
Which of the memory types listed below allows for permanent storage of data?
VRAM
DVD-RAM ( Missed)
Static RAM
17/19
Buffered memory
DRAM
What type of safety measures should accompany the installation of an adapter card?
A PCB that can be installed in a motherboard slot in order to extend the system functionality is commonly referred to
as an expansion card.
True ( Missed)
False
Which of the following answers refer to examples of power management specifications? (Select 2 answers)
ACPI ( Missed)
HCL
ATM
AHCI
APM ( Missed)
PCIe is a high-speed, serial expansion bus designed as a replacement for: (Select all that apply)
PCI ( Missed)
SATA
USB
PCI-X ( Missed)
AGP ( Missed)
Examples of CPU hardware enhancements improving support for virtualization include: (Select 2 answers)
AHCI
VT-x ( Missed)
NX bit
AMD-V ( Missed)
EVP
18/19
Questions correctly answered 1
Marks secured 1
19/19
CompTIA A+ 220-902 Certification - Exam Acronyms Quiz
examcompass.com/comptia-a-plus-220-902-certification-exam-acronyms-quiz
Which of the following terms refers to an environment that allows to boot a PC through a network interface?
PoE
EFS
PXE ( Missed)
DLP
Methods used by Microsoft Windows operating systems for organizing disk partitions include: (Select 2 answers)
GUI
MBR ( Missed)
FAT32
GPT ( Missed)
NTFS
FAT32
NFS
exFAT ( Missed)
CDFS
Which of the answers listed below refers to a file system designed for optical media?
CDFS ( Missed)
FAT32
NTFS
exFAT
Which of the following terms refer to methods of storing and accessing data over computer network? (Select 2
answers)
exFAT
NTFS
DFS ( Missed)
FAT32
NFS ( Missed)
An MS Windows tool used for migrating user data and user information to a new computer is called:
UEFI
MMC
1/12
USMT ( Missed)
MBSA
A system that uses public network (such as Internet) as a means for creating private encrypted connections
between remote locations is called:
WWAN
VPN ( Missed)
DNS
VLAN
A type of wireless network providing high-speed Internet access through mobile telecommunication cellular network
technologies is known as:
VLAN
WWAN ( Missed)
VPN
WLAN
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DNS
SNMP
NAT
DHCP ( Missed)
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?
SMTP
DNS
DHCP ( Missed)
SNMP
127.0.0.1
192.168.0.3
169.254.10.20 ( Missed)
65.55.57.27
A system containing mappings of domain names to various types of data, such as for example numerical IP
addresses is known as:
IDS
DNS ( Missed)
SQL
2/12
DFS
Which of the solutions listed below allows network administrators to prioritize certain types of network traffic?
NAC
UAC
NAT
QoS ( Missed)
Which of the following answers refers to a type of software embedded into hardware device?
API
BIOS ( Missed)
HAL
NetBIOS
A cloud computing service model offering remote access to applications based on monthly pricing or annual
subscription fee is called:
PaaS
SaaS ( Missed)
IaaS
In which of the cloud computing service models clients, instead of buying all the hardware and software, purchase
computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment
and software?
IaaS ( Missed)
SaaS
PaaS
Which of the following cloud service types would provide the best solution for a web developer intending to create a
web app?
SaaS
PaaS ( Missed)
IaaS
Which of the acronyms listed below refers to a network security solution combining the functionality of a firewall with
additional safeguards such as URL filtering, content inspection, or malware inspection?
MTU
WPA
UTM ( Missed)
WAP
3/12
Firewall reconfiguration
Closing down connection
Logging ( Missed)
Terminating process
Sending an alert ( Missed)
Which of the answers listed below illustrates the difference between passive and active security breach response?
A mobile device's built-in functionality enabling the usage of locator applications is called:
WPS
GSM
IMEI
GPS ( Missed)
A Windows command used for launching a GUI system utility for managing HDDs is called:
DISKMGMT.MSC ( Missed)
CONTROL.EXE
DISKPART.EXE
DEVMGMT.MSC
COMPMGMT.MSC
A set of tools used for developing applications for a specific platform is referred to as:
GUI
SDLC
API
SDK ( Missed)
A package file format used by Android OS for distribution and installation of mobile apps is known as:
XAP
APK ( Missed)
IPA
EXE
A type of limited-range computer network used for data transmission among various types of personal devices
centered around a single workstation is known as:
PAN ( Missed)
4/12
LAN
SAN
MAN
Mobile device email configuration settings required for retrieval of messages from a mail server include: (Select all
that apply)
IMAP ( Missed)
SLP
SMTP
POP ( Missed)
SNMP
Which of the following protocols are used for securing HTTP connections? (Select 2 answers)
SCP
EFS
SSL ( Missed)
TLS ( Missed)
STP
A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply)
HSPA
HTTP over SSL ( Missed)
HSRP
HTTP over TLS ( Missed)
HTTPS ( Missed)
Lack of authentication
5/12
Digital signatures ( Missed)
Encryption ( Missed)
Lack of non-repudiation
Unencrypted communication
Which of the answers listed below refers to the default configuration settings a mobile device is shipped with?
PRI ( Missed)
RIS
PII
PRL
A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to
establish connection with the right cell phone tower is called:
PRL ( Missed)
RIS
PRI
PII
Which of the following answers refers to a unique number used for identification of a physical mobile device?
MAPI
IMEI ( Missed)
SSID
IMSI
A unique number used for identification of a mobile network phone user is known as:
USMT
MIMO
IMSI ( Missed)
IMEI
An authentication subsystem that enables a user to access multiple, connected system components (such as
separate hosts on a network) after a single login at only one of the components is known as:
SSO ( Missed)
WAP
TPM
OVAL
Which security measure is in place when a client is denied access to the network due to an outdated antivirus
software?
NAS
6/12
DMZ
NAC ( Missed)
NAT
VoIP
DDoS
CIFS
MITM ( Missed)
Which of the following prevention methods fall(s) into the category of physical security controls? (Select all that
apply)
Which of the acronyms listed below refers to software or hardware based security solutions designed to detect and
prevent unauthorized use and transmission of confidential information outside of the corporate network?
DEP
RADIUS
DLP ( Missed)
PGP
Which of the following functionalities allows a DLP system to fulfil its role?
Motion detection
Environmental monitoring
Content inspection ( Missed)
Loop protection
A set of rules enforced in a network that restricts the use to which the network may be put is known as:
SLA
AUP ( Missed)
MOU
SOW
A Windows built-in component that allows for encryption of individual files is called:
7/12
EFS ( Missed)
AES
TPM
NTFS
UEFI ( Missed)
ACPI
CMOS
USMT
Which of the answers listed below refers to a policy that allows employees to use their own mobile devices on a
corporate network?
BSOD
BYOD ( Missed)
JBOD
BYOB
BSS
SSID ( Missed)
ESS
IBSS
A solution that simplifies configuration of new wireless networks by providing non-technical users with a capability to
easily configure network security settings and add new devices to an existing network is known as:
WPA
WPS ( Missed)
WEP
WAP
Which of the following wireless technologies are not recommended and should not be used due to their known
vulnerabilities? (Select 2 answers)
WPS ( Missed)
WAP
WPA2
WAF
WEP ( Missed)
Which of the access control models listed below enforces the strictest set of access rules?
8/12
MAC ( Missed)
RBAC
DAC
HMAC
IP to FQDN
MAC to IP
IP to MAC ( Missed)
FQDN to IP
A network access control method whereby the 48-bit address assigned to each network card is used to determine
access to the network is called:
IP filter
Post-admission NAC
MAC filter ( Missed)
RBAC
JBOD
BYOD
BSoD ( Missed)
DDOS
Which of the following answers list(s) example(s) of boot loader software used in Linux operating systems? (Select
all that apply)
GRUB ( Missed)
NTLDR
BOOTMGR
LILO ( Missed)
A collection of precompiled functions designed to be used by more than one Microsoft Windows application
simultaneously in order to save system resources is known as:
DLL ( Missed)
ISO
EXE
INI
Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and
communications equipment components against:
9/12
RFI
ESD ( Missed)
SVC
EMI
Examples of devices/device components regulated under special disposal procedures due to environmental/safety
hazards include: (Select all that apply)
PSUs
Batteries ( Missed)
CRTs ( Missed)
Toner cartridges ( Missed)
LCDs
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is
called:
AUP
MSTSC
MAU
MSDS ( Missed)
SCADA
HIPS
TEMPEST
HVAC ( Missed)
A device designed to provide emergency power during an unexpected main power source outage is referred to as:
UPS ( Missed)
PoE
SVC
PSU
What is the name of a control access technology providing protection against copyright infringement?
OEM
EULA
DRM ( Missed)
AUP
A type of agreement granting a user the right to use software application in a manner determined by the software
vendor is known as:
10/12
AUP
RMA
EULA ( Missed)
DRM
Which of the following tools can be used to create a backup copy of critical Windows system and boot files? (Select
2 answers)
ASR ( Missed)
ERD ( Missed)
USMT
SCP
CDFS
An access control method based on the identity of subjects and/or groups to which they belong is called:
HMAC
DAC ( Missed)
MAC
RBAC
Which of the following attacks uses multiple compromised computer systems against its target?
DoS
MITM
ECP
DDoS ( Missed)
SMTP server
DNS server
HTTP server
FTP server ( Missed)
A network admin is able to ping remote host by its IP address, but not by FQDN. Which of the following is the most
probable source of the problem?
ICMP
DNS ( Missed)
NetBIOS
DHCP
A list of computer hardware that is compatible with a particular operating system or device management software is
referred to as:
11/12
SLA
HCL ( Missed)
WDS
HAL
File storage
Serving of web pages ( Missed)
Name resolution
Email handling
A framework providing access to a collection of tools that can be used by administrators and advanced users to
manage networks, computers, services, and other system components in MS Windows is known as:
CMD
MSCONFIG
MMC ( Missed)
MSTSC
Total marks 86
Total Questions 70
Success ratio 0%
Marks secured 0
Percentage secured 0%
12/12
CompTIA A+ Certification Exam - Connectors & Cabling Quiz
examcompass.com/comptia-a-plus-certification-connectors-and-cabling-quiz
Which of the following answers lists the maximum allowable length for a USB cable?
4.5 meters
1 meter
5 meters ( Your answer)
2 meters
The Land Grid Array (LGA) is a type of integrated circuit packaging that is notable for having the pins arranged in a
regular array on the underside of the package.
A single Serial ATA (SATA) cable can be used to connect one motherboard socket to:
Which of the following answers refer(s) to the characteristics of Parallel ATA (PATA) cabling? (Select all that apply)
Fiber-optic cabling
Cable consisting of 40 wires ( Your answer)
RJ-11 connector
Ribbon cable ( Your answer)
Cable consisting of 80 wires ( Missed)
Coaxial cabling
68-pin connectors
40-pin connectors ( Your answer)
15-pin connectors
80-pin connectors
The maximum allowable cable length of 4.5 meters is a characteristic feature of: (Select all that apply)
The PS/2 connector is a 6-pin Mini-DIN connector used for connecting: (Select all that apply)
Modems
Sound cards
Mice ( Missed)
Hard drives
Keyboards ( Missed)
Which of the following cabling types are used in optical-fiber communication links? (Select 2 answers)
Multimode ( Missed)
RG-6
Shielded Twisted Pair (STP)
RG-59
Unshielded Twisted Pair (UTP)
Single mode ( Missed)
Which of the following answers refer(s) to S/PDIF? (Select all that apply)
Twisted-pair cabling
Digital audio interface ( Missed)
Coaxial cabling ( Missed)
Video interface
Fiber-optic cabling ( Missed)
High-Definition Multimedia Interface (HDMI)
The Parallel ATA (PATA) interface standard specifies the maximum allowable cable length of:
2/11
4.5 meters
1 meter
18 inches ( Missed)
2 meters
Which of the answers listed below refer to coaxial cabling? (Select 2 answers)
RG-59 ( Missed)
UTP
Multimode
STP
RG-6 ( Missed)
Single mode
Which of the following devices connects to the motherboard via a 34-pin ribbon cable?
The Pin Grid Array (PGA) is a type of surface-mount packaging for integrated circuits (ICs) that is notable for having
the pins on the socket rather than the integrated circuit.
True
False ( Missed)
The Serial ATA (SATA) interface standard defines a data cable connector consisting of:
40 pins
7 pins ( Missed)
15 pins
4 pins
34 pins
The Universal Serial Bus (USB) standard specifies that type A connectors can be attached to: (Select 2 answers)
Target devices
Devices that supply power ( Missed)
Host devices ( Missed)
Any type of device
Devices that receive power
Which of the following connector types are used with fiber-optic cabling? (Select all that apply)
3/11
ST ( Missed)
SC ( Missed)
T568A
LC ( Missed)
RJ-11
BNC
The optional 8-pin PCIe connector increases the maximum allowable power consumption of a PCIe card by
additional 150 Watts.
True ( Missed)
False
The Serial ATA (SATA) interface specification defines the maximum allowable cable length of:
4.5 meters
1 meter ( Missed)
18 inches
2 meters
Which of the following connector types are used with coaxial cabling? (Select all that apply)
T568A
RJ-11
LC
RJ-45
BNC ( Missed)
F-connector ( Missed)
T568B
SC
The external Serial ATA (eSATA) standard defines the maximum allowable cable length of:
4.5 meters
5 meters
1 meter
2 meters ( Missed)
Which of the following Digital Visual Interface (DVI) connector types does not provide support for digital signal
transmission?
DVI-D
DVI-A ( Missed)
DVI-I
4/11
DVI-A/D
Which of the following answers list the most common areas of application of the RJ-11 connector? (Select 2
answers)
What is the maximum number of devices that can be attached to a PC through a single PATA cable?
1
2 ( Missed)
3
4
Which of the following twisted-pair cabling types provides additional protection against electromagnetic
interference?
STP ( Missed)
T568B
UTP
T568A
The Universal Serial Bus (USB) standard specifies that type B connectors can be attached to: (Select 2 answers)
The optional 6-pin PCIe connector increases the maximum allowable power consumption of a PCIe card by
additional 75 Watts.
True ( Missed)
False
Which of the following connector types are used with twisted-pair cabling? (Select all that apply)
ST
RJ-45 ( Missed)
RG-6
RJ-11 ( Missed)
5/11
F-connector
BNC
RG-59
The Serial ATA (SATA) interface standard defines a power connector consisting of:
7 pins
40 pins
15 pins ( Missed)
34 pins
Which of the following Digital Visual Interface (DVI) connector types does not provide support for analog signal
transmission?
DVI-D ( Missed)
DVI-A
DVI-I
DVI-A/D
The purpose of the characteristic "twist" in an FDD cable wiring is to allow the controller to differentiate between
drive A and drive B on the cable.
True ( Missed)
False
Which of the following connectors provide the capability for carrying both video and audio signals? (Select 2
answers)
S-Video
S/PDIF
DVI
DisplayPort ( Missed)
HDMI ( Missed)
Which of the following Digital Visual Interface (DVI) connector types provides support for both digital and analog
video signal transmission?
DVI-A
S/PDIF
DVI-I ( Missed)
Composite
DVI-D
Phono connector, Cinch connector, and "A/V jack" all refer to a popular type of electrical connector commonly used
to carry audio and video signals. This type of connector is formally known as:
DVI connector
6/11
RCA connector ( Missed)
VGA connector
RJ-45 connector
DE-15, DB-15, and HD-15 are names referring to the different variants of the:
RJ-45 connector
BNC connector
VGA connector ( Missed)
8P8C connector
In building construction, a space between the structural floor and the dropped ceiling (or under a raised floor)
facilitating air circulation for heating and air conditioning systems typically used to house the communication cables
for the building's computer and telephone network is known as plenum.
True ( Missed)
False
Which of the following connector types allow(s) for attaching keyboard to a PC? (Select all that apply)
PS/2 ( Missed)
6-pin Mini-DIN ( Missed)
DE-15
USB ( Missed)
F-connector
RJ-45
The standardized pin/pair assignment methods for twisted pair cabling are known as:
The 20- or 24-pin connector providing main power to the motherboard is commonly referred to as:
RCA connector
P1 connector ( Missed)
ST connector
PS/2 connector
According to the fire safety standards, the jacket of a plenum-rated cable should be made of a low-smoke material
providing good resistance against fire.
True ( Missed)
7/11
False
Which of the following answers list the characteristic features of the signal that can be carried through the VGA
connectors and cables? (Select 2 answers)
What is the cable segment length limit for CAT3, CAT5, and CAT5e cabling?
50 meters
100 meters ( Missed)
180 feet
500 meters
The most popular type of power connector in desktop PCs is commonly referred to as:
EPS12V
Molex ( Missed)
PCIe 6/8-pin
RCA connector
ATX12V
An additional ATX12V power connector designed to supply dedicated power for the CPU is known as:
Mini-DIN
P4 connector ( Missed)
BNC connector
P1 connector
Which of the following answers refers to an 8-pin secondary power connector designed to supply dedicated power
for the CPU on high-end/server motherboards?
ATX12V
PCIe 6/8-pin
8/11
EPS12V ( Missed)
F-connector
Which of the following connector types plugs into a port of an Ethernet NIC?
DB15
S/PDIF
RCA
RJ-45 ( Missed)
Which of the following answers list the characteristic features of the signal that can be carried through the HDMI
connectors and cables? (Select 2 answers)
Analog signal
Video only
Digital signal ( Missed)
Audio only
Video and audio ( Missed)
Which older generation of personal computers relied on a 25-pin SCSI port for connecting mass storage devices?
AMD
Apple Macintosh ( Missed)
Intel
Windows-based PCs
Which types of standard FireWire connectors have the capability of supplying voltage to a device? (Select 2
answers)
2-pin connector
4-pin connector
6-pin connector ( Missed)
8-pin connector
9-pin connector ( Missed)
For optical connections, The IEEE 1394b standard extends the maximum allowable cable length to 100 meters.
True ( Missed)
False
Which of the following interfaces takes advantage of the 19-pin Type A connector?
USB
Thunderbolt
FireWire
DisplayPort
9/11
HDMI ( Missed)
Examples of connector types used for carrying audio signals include: (Select all that apply)
8P8C connector
Lightning connector ( Missed)
BNC connector
Lucent Connector (LC)
A single copper-based Thunderbolt cable provides the capability for a simultaneous transfer of: (Select all that apply)
Which of the following answers lists the maximum allowable length for Thunderbolt copper cabling?
3 meters ( Missed)
4.5 meters
5 meters
10 meters
30 meters
40 meters
50 meters
60 meters ( Missed)
USB Type-A
DVI-A
Mini DisplayPort (MDP) ( Missed)
USB Type-B
VGA connector
10/11
USB Type-C ( Missed)
Which of the following connectors is used for the purpose of increasing the power consumption limit of advanced PC
graphics cards?
15-pin VGA
F-connector
PCIe 6/8-pin ( Missed)
4/8-pin 12v
Total marks 87
Total Questions 60
Success ratio 5%
Marks secured 5
11/11
CompTIA A+ Certification Exam - CPU Quiz
examcompass.com/comptia-a-plus-certification-exam-cpu-quiz
Which of the following units is used for measuring the speed of modern CPUs?
A type of CPU architecture where a single physical CPU contains more than one execution core on a single die or
chip is known as:
Parallel processing
Symmetric Multiprocessing (SMP)
Multicore ( Your answer)
Hyperthreading (HTT)
The Land Grid Array (LGA) is a type of integrated circuit packaging that is notable for having pins arranged in a
regular array on the underside of the package.
Hardware enhancements adding support for virtualization developed by AMD for its CPUs are known as:
Hyper-V
AMD Catalyst
VT-x
AMD-V ( Your answer)
Which of the following provides a CPU with the fastest access to frequently used data?
Flash memory
Multi-level cache ( Your answer)
Random Access Memory (RAM)
1/8
Secondary storage
EVP
XD bit ( Your answer)
VT-x
Hyper-V
Which of the answers listed below refer to the features of Socket H2? (Select 3 answers)
A CPU design based on instruction set that tries to improve speed by utilizing relatively few and simple instructions
is known as:
The Pin Grid Array (PGA) is a type of surface-mount packaging for integrated circuits (ICs) that is notable for having
pins on the socket rather than the integrated circuit.
Which of the following answers describe the characteristic features of Socket H/H1? (Select 3 answers)
The bus between the CPU and the internal memory cache (L2 cache) inside the CPU housing is called:
2/8
Back-side bus (BSB) ( Missed)
A set of Intel CPU hardware enhancements improving support for virtualization is known as:
EPV
VT-x ( Your answer)
Catalyst
Hyper-V
An additional ATX12V power connector designed to supply dedicated power for the CPU is known as:
Mini-DIN
P4 connector ( Missed)
BNC connector
P1 connector ( Your answer)
Which of the answers listed below describe the features of Socket H3? (Select 3 answers)
1366 contacts
LGA packaging ( Missed)
AMD CPU socket ( Your answer)
1150 contacts ( Your answer)
PGA packaging
Intel CPU socket ( Missed)
Which of the following acronyms refers to a specific feature of certain types of microprocessor sockets that facilitates
the insertion and removal of a CPU chip?
ZIF ( Missed)
TPM
3/8
ZIP
FRU
What is the name of a microprocessor component that performs all comparisons and calculations?
UART
ALU ( Missed)
GUI
LUN
Which of the following answers refer(s) to example(s) of Intel CPU(s) designed for desktop/workstation computers?
(Select all that apply)
Itanium
Celeron ( Missed)
Pentium ( Missed)
Core i3 ( Missed)
Athlon
Core i5 ( Missed)
Core i7 ( Missed)
Athlon
Opteron ( Missed)
Itanium
Phenom
Sempron
Which of the following answers refer to the characteristics of Socket R? (Select 3 answers)
Xeon ( Missed)
Celeron
Opteron
Itanium ( Missed)
4/8
Sempron
Atom
EVP ( Missed)
XD bit
VT-x
Hyper-V
The AMD CPU brands designed for desktop/workstation computers include: (Select all that apply)
Opteron
Athlon ( Missed)
Sempron ( Missed)
Phenom ( Missed)
FX ( Missed)
As opposed to active cooling components, such as cooling fans, heat sinks fall into the category of passive cooling
components because they do not need to draw any electrical power in order to operate.
True ( Missed)
False
Which of the following answers describe the features of Socket FM2? (Select 3 answers)
LGA packaging
Intel CPU socket
905 contacts
PGA packaging
AMD CPU socket ( Missed)
PGA-ZIF packaging ( Missed)
904 contacts ( Missed)
A 64-bit CPU can be used either with a 32-bit or 64-bit version of the Microsoft Windows operating system.
True ( Missed)
False
Which of the terms listed below refers to a situation where a single CPU appears as two virtual CPUs to the
operating system?
Stepping
Multicore
Hyperthreading ( Missed)
Multitasking
PGA packaging
Intel CPU socket
PGA-ZIF packaging ( Missed)
942 contacts
AMD CPU socket ( Missed)
LGA packaging
941 contacts ( Missed)
The most notable difference between Pin Grid Array (PGA) and Land Grid Array (LGA) packaging relates to the
placement of contact pins, which in case of PGA can be found on the socket, and in case of LGA on the CPU.
True
False ( Missed)
Which of the answers listed below refer(s) to solution(s) aimed at improving CPU heat dissipation? (Select all that
apply)
Which of the following built-in functionalities allows a CPU to take over tasks normally executed by a dedicated
graphics card?
DisplayPort
Integrated GPU ( Missed)
Multicore architecture
Hyperthreading
VGA mode
6/8
What are the characteristic features of Socket FM1? (Select 3 answers)
In CPU cooling, thermal compound is applied to fill in the narrow space between:
Which of the answers listed below refers to the area of implementation of No-eXecute bit (NX bit)?
Parity checks
Malware protection ( Missed)
Biometric authentication
Data backup
LGA packaging
941 contacts
PGA packaging
AMD CPU socket ( Missed)
PGA-ZIF packaging ( Missed)
942 contacts ( Missed)
Intel CPU socket
A security feature used by CPUs for isolating areas of memory in order to prevent the execution of code from non-
executable memory locations is known as:
Which of the CPU models listed below are compatible with the LGA 775 socket?
Celeron, Sempron, Pentium, Core i3, Core i5, Core i7, Xeon E3, Xeon E5, Xeon E7
7/8
Athlon II X2, Athlon II X3, Athlon II X4, Phenom II, Phenom II X2, Phenom II X4, Phenom II X6, FX
Pentium 4, Pentium D, Celeron, Celeron D, Pentium XE, Core 2 Duo, Core 2 Extreme, Core 2 Quad, Xeon (
Missed)
Celeron, Pentium, Core i3, Core i5, Core i7, Xeon E3, Xeon E5, Xeon E7, Opteron
Total marks 73
Total Questions 40
Marks secured 13
8/8
CompTIA A+ Certification Exam - Display Devices Quiz
examcompass.com/comptia-a-plus-certification-exam-display-devices-quiz
A tiny spot on an LCD monitor display screen that permanently remains black when it should be activated and
displaying color is commonly referred to as stuck pixel.
True
False ( Missed)
A permanent computer display screen discoloration caused by displaying the same static image for extended
periods of time is known as:
Artifact
Stuck pixel
Burn-in ( Missed)
Dead pixel
Which of the actions listed below should be of help while troubleshooting non-responsive touchscreen of a mobile
device?
Which of the LCD technologies listed below offers the fastest response time?
What are the characteristic features of the In-Plane Switching (IPS) LCD panel technology? (Select 3 answers)
Which of the following answers describe the features of the Twisted Nematic (TN) LCD panel technology? (Select 3
answers)
1/6
Low viewing angles ( Missed)
Fast response times ( Missed)
Low color quality ( Missed)
High color quality
Slow response times
Wide viewing angles
Which of the acronyms listed below refers to an LCD panel taking advantage of fluorescent lamps?
LED
CCFL ( Missed)
DFS
OLED
Which of the following answers describe the function of a power inverter? (Select 2 answers)
Examples of devices posing risk to electrical safety due to accumulated high voltage include: (Select all that apply)
CRTs ( Missed)
Power supplies ( Missed)
Inverters ( Missed)
CPUs
Laser printers ( Missed)
Which of the acronyms listed below refers to a new type of thin and lightweight display devices offering higher
contrast ratio and color quality in comparison to LCD without the need for a special light source to produce a visible
image?
OLED ( Missed)
LED
HDMI
HTPC
Aspect ratio
Interlacing
Refresh rate ( Missed)
Screen resolution
2/6
Which of the following statements are true? (Select all that apply)
A digital image displayed on the graphics monitor screen consists of pixels arranged in rows and columns (
Missed)
The term "screen resolution" refers to the maximum number of pixels in each dimension (horizontal and
vertical) that can be addressed by a digital display device ( Missed)
In order to ensure the sharpest text and image displayed by a CRT monitor it is usually recommended to set
the monitor to run only at a specific resolution (which is also referred to as the CRT's native resolution)
The term "screen resolution" refers to the relative horizontal and vertical size of a digital image displayed on
the graphics monitor screen
The smallest unit of a digital image represented on the digital display device is known as pixel ( Missed)
In order to ensure the sharpest text and image displayed by a LCD monitor it is usually recommended to set
the monitor to run only at a specific resolution (which is also referred to as the LCD's native resolution) (
Missed)
What type of unit is used to describe the refresh rate of a computer screen?
Hz ( Missed)
cd/m2
MHz
Lumen
KHz
Which of the following units is used for measuring the brightness of an image rendered by an image projector?
dB
cd/m2
Lumen ( Missed)
Hz
Hz
Lumens
dB
cd/m2 ( Missed)
Cable locks
Video surveillance
Privacy filters ( Missed)
Security guards
Screensavers
A monitor filter used to reduce reflection from the surface of a CRT or LCD display is called:
3/6
Widescreen
Antiglare ( Missed)
Flat panel
Privacy filter
The relative horizontal and vertical size of a digital image displayed on the graphics monitor screen is referred to as:
Frame rate
Screen resolution
Aspect ratio ( Missed)
Native resolution
Which of the answers listed below refer to the characteristics of the Extended Graphics Array (XGA) display
standard? (Select 2 answers)
Display devices with aspect ratios of 16:10 and 16:9 are commonly referred to as:
UXGA displays
Fullscreen displays
WUXGA displays
Widescreen displays ( Missed)
The Super Extended Graphics Array (SXGA) display standard features: (Select 2 answers)
Which of the following answers refers to the standard display format for HDTV?
4/6
What are the characteristic features of the Ultra Extended Graphics Array (UXGA) display standard? (Select 2
answers)
Which of the answers listed below refer to the Widescreen Ultra Extended Graphics Array (WUXGA) display
standard (Select 2 answers)
Which of the following display standards use(s) the 4:3 aspect ratio? (Select all that apply)
XGA ( Missed)
SXGA
UXGA ( Missed)
WUXGA
A dim display on a laptop LCD screen might indicate a problem related to: (Select 2 answers)
Stuck pixels
Backlight ( Missed)
Dead pixels
Incorrect color patterns
Inverter ( Missed)
Which of the display standards listed below uses the 16:10 aspect ratio?
XGA
SXGA
UXGA
WUXGA ( Missed)
When a computer monitor is unable to display image on the screen, the most common causes (and the easiest ones
to fix) for this problem include: (Select 2 answers)
5/6
Inverter failure
Loose cable connections ( Missed)
Bad LCD display
Wrong input selection ( Missed)
Backlight failure
Which of the terms listed below refers to the distorted display geometry issue?
Frame rate
Aspect ratio ( Missed)
Native resolution
Refresh rate
Screen Resolution is a Windows utility used for changing the appearance of connected displays. The tool includes a
feature that allows to click and drag a graphical representation of connected display device which in turn enables
troubleshooting of multiple monitor misalignment/orientation issues.
True ( Missed)
False
Total marks 48
Total Questions 30
Success ratio 0%
Marks secured 0
Percentage secured 0%
6/6
CompTIA A+ Certification Exam - Network Devices & Tools Quiz
examcompass.com/comptia-a-plus-certification-exam-network-devices-and-tools-quiz
The disadvantage from using this device results from a fact that any incoming signal on any of its ports is re-created
and sent out on any connected ports, which in turn forces all the connected devices to share the total amount of
available bandwidth.
Hub ( Missed)
Switch
Access point
Bridge
Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between
Local Area Network (LAN) segments?
Router
Hub
Switch ( Missed)
Firewall
A device designed to filter and transfer IP packets between dissimilar types of computer networks is called:
Hub
Switch
Load balancer
Router ( Missed)
An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to
as:
Captive portal
Access Point (AP) ( Missed)
Intermediate Distribution Frame (IDF)
Active hub
What type of device would be the most convenient for interconnecting two or more physically separated network
segments?
Which of the devices listed below allows for establishing a communication channel over a PSTN?
A software or hardware that checks information coming from the Internet and depending on the applied configuration
settings either blocks it or allows it to pass through is called:
Antivirus
Firewall ( Missed)
Antispyware
Malware
A simple device consisting of multiple computer ports arranged in rows used for the purpose of cable management is
known as:
F-connector
Media converter
Main Distribution Frame (MDF)
Patch panel ( Missed)
A type of network device that amplifies received signal so it can be transmitted over greater distance without loss in
quality is called:
Patch panel
Multiplexer
Repeater ( Missed)
Passive hub
Which of the answers listed below refers to a network device that allows to overcome limitations related to the
maximum allowable cable segment length?
Passive hub
Extender ( Missed)
Patch panel
Multiplexer
A computer networking technology that enables sending data over wiring used for transmission of electrical power is
called:
PLC ( Missed)
ECP
PoE
EPP
Which of the following acronyms refers to a solution that allows for carrying both data and electrical power over a
single twisted-pair Ethernet cable?
2/4
EPP
PoE ( Missed)
ECP
PLC
Which of the following tools would be used for attaching RJ-45 connectors to a twisted-pair Ethernet cable?
Cable tester
Needle-nose pliers
Punchdown tool
Crimper ( Missed)
What is the name of a tool used for removing electrical insulation cover from electric wires?
Cable crimper
Snips
Wire stripper ( Missed)
Punchdown tool
Which of the tools listed below would be used for testing power supply voltage output?
Torx screwdriver
Toner and probe kit
Loopback plug
Multimeter ( Missed)
What is the name of a networking tool used for locating a cable in a cabling bundle or tracing individual wires in a
cable?
Spectrum analyzer
Toner and probe kit ( Missed)
Time Domain Reflectometer (TDR)
Multimeter
A type of tool used for verifying correct electrical connections of wires in a cable is known as:
Loopback plug
Tone generator
Cable tester ( Missed)
Multimeter
While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's port can be tested
with the use of:
POST card
Cable tester
3/4
Multimeter
Loopback plug ( Missed)
Which of the networking tools listed below is used for attaching wires to a patch panel?
Cable crimper
Punchdown tool ( Missed)
Cable stripper
Needle-nose pliers
Which of the following networking tools would be of help in determining the optimal placement of a WAP?
Pentest
Vulnerability scanner
Proximity reader
Wi-Fi analyzer ( Missed)
Total marks 20
Total Questions 20
Success ratio 0%
Marks secured 0
Percentage secured 0%
4/4
CompTIA A+ Certification Exam - Network Protocols Quiz
examcompass.com/comptia-a-plus-certification-exam-network-protocols-quiz
32 bits ( Missed)
48 bits
64 bits
128 bits
::1
FE80::/64
169.254/169
0:0:0:0:0:0:0:1
127.0.0.1 ( Missed)
Octagonal numbers
Binary numbers
Hexadecimal numbers ( Missed)
Decimal numbers
32 bits
48 bits
64 bits
128 bits ( Missed)
127.0.0.1
0:0:0:0:0:0:0:1 ( Missed)
169.254/16
::1 ( Missed)
FE80::/64
A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to
make the address shorter.
True ( Missed)
False
1/8
The FTP protocol is designed for:
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote
command-line login, remote command execution, and other secure network services between two networked
computers?
Telnet
SSH ( Missed)
Bcrypt
TFTP
Which of the protocols listed below was designed as a secure replacement for Telnet?
CHAP
FTP
SNMP
SSH ( Missed)
True ( Missed)
False
Examples of secure network protocols offering traffic encryption include: (Select 3 answers)
FTP
HTTPS ( Missed)
Telnet
HTTP
IPsec ( Missed)
SSH ( Missed)
File exchange
Translating domain names into IP addresses
Sending email messages between mail servers ( Missed)
Serving web pages
Which of the following answers refers to a system containing mappings of domain names to various types of data,
such as for example numerical IP addresses?
2/8
TCP/IP
DNS ( Missed)
SQL
DHCP
In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar
needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?
ICS server
Web server
DNS server ( Missed)
DHCP server
A protocol used for retrieving contents of an Internet page from a web server is called:
SNMP
HTTP ( Missed)
SMTP
IMAP
A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply)
HSPA
HTTP over SSL ( Missed)
HSRP
HTTP over TLS ( Missed)
HTTPS ( Missed)
A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over
a network is known as:
RDP ( Missed)
3/8
IPP
RIP
WAP
Which of the following would be in use when a WINS server tries to resolve a host name into an IP address on a
Windows-based LAN?
TCP/IP
NetBIOS ( Missed)
Telnet
DNS
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
True ( Missed)
False
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for
providing shared access to files, directories, and devices.
True ( Missed)
False
Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks
(LANs)?
SMB
AFP
CIFS
SLP ( Missed)
RIP
NNTP
AFP ( Missed)
SNMP
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DNS
SNMP
NAT
DHCP ( Missed)
Which of the server types listed below is used to assign dynamic IP addresses to devices on a network?
DNS server
4/8
DHCP server ( Missed)
FTP server
WINS server
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?
SMTP
DNS
DHCP ( Missed)
SNMP
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way
handshake (thus it is also referred to as unreliable or best-effort protocol).
True
False ( Missed)
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to
establish a connection (three-way handshake), supports retransmission of lost packets, flow control (managing the
amount of data that is being sent), or sequencing (rearranging packets that arrived out of order).
True
False ( Missed)
IPv6 to IPv4
MAC to IP
Domain name to IP
IP to MAC ( Missed)
IPsec
SNMP
SSH
ICMP ( Missed)
A type of network protocol used for exchanging information concerning the state of the IP network (e.g. testing the
reachability of a remote host) is known as:
CIFS
IMAP
ICMP ( Missed)
PPTP
Which of the following answers refers to a protocol used for performing printing-related task on a network?
5/8
PPP
IPP ( Missed)
NTP
PPTP
The term Internet Protocol Security (IPsec) refers to a suite of protocols providing authentication and encryption
features in order to ensure secure exchange of IP packets.
True ( Missed)
False
Authentication protocol
Address resolution protocol
Directory access protocol ( Missed)
File exchange protocol
A network protocol used for synchronizing clocks over a computer network is called:
NTP ( Missed)
AFP
SLP
RTC
Which of the following answers refers to a protocol used for establishing a dedicated point-to-point link between two
networked devices?
IPP
SLP
NTP
PPP ( Missed)
Which of the network protocols listed below allows for creating encrypted links over unsecure public networks such
as the Internet and sending regular traffic through those secure links?
IPP
PPTP ( Missed)
RIP
6/8
PPP
RDP
CIFS
RIP ( Missed)
TKIP
A protocol used in network management systems for monitoring network-attached devices is known as:
SMTP
ICMP
SNMP ( Missed)
IPsec
What are the characteristic features of TFTP? (Select all that apply)
A solution designed to strengthen existing WEP implementations without the requirement for replacement of legacy
hardware is called:
IPsec
TKIP ( Missed)
SSH
HTTPS
What is the common term for a group of protocols used to carry voice data over a packet-switched network?
VoIP ( Missed)
PSTN
PBX
POTS
Which of the answers listed below refers to a suite of protocols used to enable Internet access on mobile devices?
WPA
WAP ( Missed)
WEP
WPS
7/8
Your Final Report
Total marks 52
Total Questions 45
Success ratio 0%
Marks secured 0
Percentage secured 0%
8/8
CompTIA A+ Certification Exam - Port Numbers Quiz
examcompass.com/comptia-a-plus-certification-exam-port-numbers-quiz
The File Transfer Protocol (FTP) Control Connection for administering a session is established through port number:
20
22
21 ( Missed)
25
The File Transfer Protocol (FTP) Data Connection for sending file data is established through port number:
23
25
20 ( Missed)
21
Port 23
Port 25
Port 21
Port 22 ( Missed)
Simple Mail Transfer Protocol (SMTP) operates with the use of port:
110
25 ( Missed)
143
23
Which of the following port numbers is used by Domain Name System (DNS)?
25
23
53 ( Missed)
67
1/3
Port number 80 is used by:
110 ( Missed)
143
123
443
Which of the port numbers listed below is used by Hypertext Transfer Protocol over TLS/SSL (HTTPS)?
80
443 ( Missed)
53
143
A network technician uses a Remote Desktop Protocol (RDP) client on their Windows OS in order to remotely
troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-
in Windows RDP server to allow this type of network connection?
1701
139
3389 ( Missed)
548
Which of the following port numbers are reserved for NetBIOS services? (Select all that apply)
136
161
137 ( Missed)
162
138 ( Missed)
139 ( Missed)
2/3
Port 445 is used by: (Select 2 answers)
143
427 ( Missed)
548
443
Which of the port numbers listed below is used by an Apple-proprietary file services protocol?
427
443
445
548 ( Missed)
Total marks 18
Total Questions 15
Success ratio 0%
Marks secured 0
Percentage secured 0%
3/3
CompTIA A+ Certification Exam - Printers Quiz
examcompass.com/comptia-a-plus-certification-printers-quiz
Which of the following places in Microsoft Windows allows for easy access to all queued print jobs?
Control Panel
Windows Taskbar ( Missed)
Device Manager
Print spooler
In laser printing, long vertical streaks on each output page indicate a problem related to:
Printer calibration
Damaged imaging drum ( Missed)
Printer driver
Clogged print head nozzles
Which of the answers listed below refer to languages used for describing the appearance of a printed page? (Select
2 answers)
DLT
PRL
PostScript ( Missed)
PCL ( Missed)
LPT
Garbled characters on the output pages would indicate a problem related to the printer's:
Calibration
Device driver ( Missed)
Fuser assembly
Imaging drum
Which of the following allow(s) for print device sharing over a wired connection? (Select all that apply)
USB ( Missed)
Parallel ( Missed)
802.11x
Bluetooth
Ethernet ( Missed)
Infrared (IR)
Serial ( Missed)
A software that temporarily stores print jobs on the computer hard disk or in memory until the printer is ready to print
1/6
them is called:
Task Scheduler
Feed assembly
Task Manager
Print spooler ( Missed)
What is the name of a Windows Vista Control Panel applet used for adding, removing, and managing printers?
HomeGroup
Printers and Faxes
Devices and Printers
Printers ( Missed)
Which of the printer types listed below use inked ribbon to produce an imprint on paper? (Select 2 answers)
Inkjet
Daisy wheel ( Missed)
Laser
Dot matrix ( Missed)
Thermal
Which of the following tools would be the most appropriate to clean the inside of a laser printer? (Select all that
apply)
XPS ( Missed)
GDI
PCL
PDF ( Missed)
TXT
Which of the answers listed below refers to a standard unit for measuring print resolution?
Aspect ratio
Pixels per inch (ppi)
Candelas per square metre (cd/m2)
Dots per inch (dpi) ( Missed)
Examples of network protocols designed to enable remote printing include: (Select 2 answers)
PRL
RDP
IPP ( Missed)
LPD/LPR ( Missed)
PRI
Which of the following answers lists the correct sequence of steps in the laser printing process?
Which type of printer takes advantage of tractor feed during printing process?
Inkjet
Laser
Impact ( Missed)
Thermal
A Microsoft Windows OS component responsible for representing graphical objects and transmitting them to output
devices such as monitors and printers is called:
GDI ( Missed)
IDS
PostScript
PCL
Inkjet printers
Thermal printers
Laser printers ( Missed)
Impact printers
Which of the printer types listed below fall into the category of impact printers? (Select 2 answers)
Laser
Inkjet
3/6
Daisy wheel ( Missed)
Thermal
Dot matrix ( Missed)
Spare kit
Field Replaceable Unit (FRU)
Maintenance kit ( Missed)
Standard technician toolkit
Which of the following allow(s) for print device sharing over a wireless connection? (Select all that apply)
Bluetooth ( Missed)
Ethernet
802.11x ( Missed)
Parallel
USB
Infrared (IR) ( Missed)
What is the name of a printer component that allows for automatic printing on both sides of the page?
Pickup roller
Duplexing assembly ( Missed)
Transfer roller
Fuser assembly
Which of the following Windows 7/8/8.1 Control Panel applets allows for adding, removing, and managing printers?
Printers
Devices and Printers ( Missed)
Action Center
Printers and Faxes
In impact printing, calibration helps to ensure that the colors and layout represented on the monitor display match
the colors and layout of the printed image.
True
4/6
False ( Missed)
In laser printing, toner falling off of the printed copy indicates a problem with:
Toner cartridge
Print head
Cleaning blade
Fusing unit ( Missed)
Which of the printer types listed below provide(s) the capability to produce duplicate pages (multipart forms) during
printing process? (Select all that apply)
Inkjet
Thermal
Impact ( Missed)
Dot matrix ( Missed)
Laser
Daisy wheel ( Missed)
Inkjet
Laser
Thermal ( Missed)
Impact
Which step of the laser printer imaging process requires troubleshooting if a printer produces ghost images on
output pages?
Charging
Fusing
Exposing
Developing
Cleaning ( Missed)
Which of the symptoms listed below would indicate a depleted toner cartridge as the source of a printing problem?
(Select all that apply)
A single sheet or roll of printing paper with holes punched along each side is designed for use with:
5/6
Laser printers
Dot-matrix printers ( Missed)
Inkjet printers
Thermal printers
Total marks 45
Total Questions 30
Success ratio 0%
Marks secured 0
Percentage secured 0%
6/6
CompTIA A+ Certification Exam - RAM Quiz
examcompass.com/comptia-a-plus-certification-exam-ram-quiz
Random Access Memory (RAM) falls into the category of the so-called volatile storage media. It requires a
continuous flow of electricity to preserve its contents thus all the data stored in RAM lasts only while the power is on.
True ( Missed)
False
Which of the answers listed below refer(s) to the characteristic feature(s) of Static Random Access Memory
(SRAM)? (Select all that apply)
Which of the following answers describes(s) the characteristics of Dynamic Random Access Memory (DRAM)?
(Select all that apply)
The term "Synchronous Dynamic Random Access Memory (SDRAM)" refers to a broad category of DRAM modules
that rely on the signal sent by the system clock in order to coordinate their functioning with other internal PC
components.
True ( Missed)
False
Which of the statements listed below are true? (Select all that apply)
A Single Data Rate Synchronous Dynamic Random Access Memory (SDR SDRAM) can read/write one word of data
per clock cycle.
True ( Missed)
False
144
168 ( Missed)
184
240
The placement of a notch on the RAM module contact surface allows for proper alignment of the module with the
memory bank on the motherboard and prevents the installation of incompatible memory types.
True ( Missed)
False
What are the characteristic features of the Double Data Rate Synchronous Dynamic Random Access Memory (DDR
SDRAM)? (Select 3 answers)
Which of the answers listed below refers to the industry name used for DDR-333 modules?
PC-2100
PC-2400
PC-2700 ( Missed)
PC-3200
2/7
1600 MB/s
2133 MB/s ( Missed)
2666 MB/s
3200 MB/s
What are the characteristic features of the Double Data Rate 2 Synchronous Dynamic Random Access Memory
(DDR2 SDRAM)? (Select 3 answers)
Which of the following answers refers to the industry name used for DDR2-1066 modules?
PC2-4200
PC2-5300
PC2-6400
PC2-8500 ( Missed)
3200 MB/s
4266 MB/s ( Missed)
5333 MB/s
6400 MB/s
What are the characteristic features of the Double Data Rate 3 Synchronous Dynamic Random Access Memory
(DDR3 SDRAM)? (Select 3 answers)
Which of the answers listed below refers to the industry name used for DDR3-1333 modules?
PC3-6400
PC3-8500
PC3-10600 ( Missed)
3/7
PC3-12800
What is the maximum amount of data that can be transferred each second by a DDR3-1600 module?
6400 MB/s
8533 MB/s
10667 MB/s
12800 MB/s ( Missed)
Which of the answers listed below describe(s) the characteristics of Dual In-line Memory Modules (DIMMs)? (Select
all that apply)
Printed Circuit Board (PCB) type used as a placeholder for memory chips ( Missed)
32-bit data path
Separate electrical contacts on each side of the module ( Missed)
Obsolete memory packaging type used only in legacy systems
64-bit data path ( Missed)
Unified electrical contact surface spanning both sides of the module
Used with various SDRAM memory types (SDR, DDR, DDR2, and DDR3) ( Missed)
What is the most common memory module form factor type used in laptop computers?
SO-DIMM ( Missed)
DIMM
MicroDIMM
C-RIMM
Which of the following answers lists the number of pins used by SO-DIMM DDR SDRAM memory modules?
168
172
200 ( Missed)
204
168
172
4/7
204 ( Missed)
214
A memory module form factor commonly used in sub-notebook devices is known as:
C-RIMM
MicroDIMM ( Missed)
SO-DIMM
DIMM
Which of the answers listed below refers to the number of pins used by MicroDIMM DDR SDRAM memory modules?
168
172 ( Missed)
204
214
200
204
214 ( Missed)
240
Can only detect errors, but does not have the capability to correct them
Refers to parity RAM (the two terms are interchangeable)
Offers better performance in terms of speed when compared to a non-ECC type of RAM
Can detect and correct errors ( Missed)
Certain types of RAM take advantage of an additional bit in order to detect whether a data error has occurred. An
extra bit is used to store information about the number of bits set to the value of one in a given string of data
(typically one byte) and by examining that information at different stages of processing it is possible to detect
whether the data has been corrupted or not. What is the name of that extra bit?
Digest
Binary number
Parity bit ( Missed)
Hash value
Compared to a non-ECC type of memory, the ECC RAM is a less expensive option and will always perform faster.
True
False ( Missed)
The color-coded memory slots on the motherboard indicate that the system is capable of taking advantage of the
5/7
multi-channel memory architecture.
True ( Missed)
False
Which of the following characteristics apply to the type of RAM most commonly used as the main system memory in
desktop PCs? (Select 3 answers)
Buffered memory
Non-ECC memory ( Missed)
Static RAM
Unbuffered memory ( Missed)
Dynamic RAM ( Missed)
ECC memory
Taking advantage of the performance benefits offered by the multi-channel memory architecture requires: (Select all
that apply)
A type of typically more expensive memory modules equipped with additional circuitry designed to ensure better
system stability and accuracy of data processing is known as: (Select all that apply)
VRAM
Buffered memory ( Missed)
RDIMM ( Missed)
Synchronous DRAM
UDIMM
Unbuffered memory
A single-sided memory module type can have memory chips placed on both sides of the module.
True ( Missed)
False
Which of the following RAM types would be the most suitable choices for a high-end server? (Select 3 answers)
UDIMM
Buffered memory ( Missed)
Non-ECC memory
RDIMM ( Missed)
6/7
Unbuffered memory
ECC memory ( Missed)
Which of the memory types listed below allows for permanent storage of data?
VRAM
DVD-RAM ( Missed)
SRAM
Buffered memory
DRAM
Total marks 62
Total Questions 35
Success ratio 0%
Marks secured 0
Percentage secured 0%
7/7
CompTIA A+ Certification Exam - Storage Devices & Media Quiz
examcompass.com/comptia-a-plus-certification-exam-storage-devices-and-media-quiz
Which of the following answers list(s) example(s) of storage media type(s) that can be read, but not written to?
(Select all that apply)
BD-R
CD-ROM ( Missed)
DVD-RW
BD-RE
DVD-ROM ( Missed)
CD-RW
Which of the terms listed below refers to computer data storage systems, data storage devices, and data storage
media that can be written to once, but read from multiple times?
DVD-RW
Tape library
Floppy disk
WORM ( Missed)
Which of the following is an example of Write Once, Read Many (WORM) storage media type?
BD-R ( Missed)
Flash drive
CD-RW
Magnetic tape
CD-ROM
What are the storage limitations of a standard CD-ROM media format? (Select 2 answers)
Which of the following answers list(s) example(s) of storage media type(s) that can be erased and written to multiple
times? (Select all that apply)
BD-R
CD-ROM
DVD-RW ( Missed)
BD-RE ( Missed)
DVD-ROM
1/8
CD-RW ( Missed)
Which of the acronyms listed below refers to a dedicated storage appliance that can be added to a local network?
SPS
NAS ( Missed)
SAN
NFS
Which of the following answers list(s) example(s) of hot-swappable drives? (Select all that apply)
A type of storage device with no moving parts that uses memory chips instead of magnetic platters is commonly
referred to as a Solid-State Drive (SSD).
True ( Missed)
False
Which of the terms listed below refers to a proprietary flash memory card format used mainly in older digital
cameras?
xD ( Missed)
SD
SSD
2/8
Mini-SD
Micro-SD
A hybrid drive provides a combination of which of the following technologies? (Select 2 answers)
SD
HDD ( Missed)
xD
SSD ( Missed)
CF
A type of media used as a secondary system storage in tablets and mobile phones is known as:
CF
Mini-SD
eMMC ( Missed)
Micro-SD
xD
A storage technology that combines multiple disk drive components into a single logical unit to increase logical
volume size, improve performance, or reliability is called:
RAID 5
Disk duplexing
RAID 0 ( Missed)
Disk mirroring
RAID 1
3/8
RAID Level 1: (Select 3 answers)
The term "Disk duplexing" refers to a more reliable RAID Level 1 configuration setup where each disk relies on its
own hardware that controls the drive.
True ( Missed)
False
Which of the following RAID array types has the highest disk overhead?
RAID Level 3
RAID Level 5
RAID Level 6
RAID Level 1 ( Missed)
2 drives
3 drives
4 drives ( Missed)
5 drives
Which of the answers listed below refer to a nested (hybrid) RAID level? (Select 2 answers)
RAID 0
RAID 1
RAID 1+0 ( Missed)
RAID 5
RAID 10 ( Missed)
4/8
Which type of RAID level creates a striped set from a series of mirrored drives?
RAID 0
RAID 1
RAID 5
RAID 10 ( Missed)
Which of the following statements describing the Blu-ray Disc (BD) technology are true? (Select 4 answers)
8.544 GB of data
4.7 GB of data
7.8 GB of data ( Missed)
15.6 GB of data
8.544 GB
4.7 GB
7.8 GB
15.6 GB ( Missed)
5/8
Which of the answers listed below describe the features of tape drives? (Select 3 answers)
Which of the following answers lists storage media types arranged from lowest to highest capacity?
iDrive
Cloud Drive
Dropbox
OneDrive ( Missed)
Which of the answers listed below refer(s) to the common storage media types that can be used locally to boot/install
an OS? (Select all that apply)
PXE
Netboot
Recovery partition on internal HDD ( Missed)
USB drive ( Missed)
CD-ROM disc ( Missed)
DVD disc ( Missed)
The term "Recovery disc" refers to a removable media type commonly shipped with most new computers allowing a
user to reformat the hard drive and restore the operating system to the original factory condition as configured by an
Original Equipment Manufacturer (OEM). Most OEM recovery systems for Microsoft Windows involve booting from
a separate CD-ROM or DVD, however in recent years bundled recovery CD-ROMs and DVDs have become less
common as in case of newer systems more frequently the recovery data becomes available on a separate partition
of a new computer's hard drive.
True ( Missed)
False
Which of the following answers lists an HDD form factor used in desktops?
5.25-inch
6/8
2.5-inch
3.5-inch ( Missed)
1.8-inch
SCSI ID ( Missed)
Device ID
OUI
Bus ID
Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T.) allows for monitoring system for anticipated:
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic
drive?
Quick format
Overwriting data
Degaussing ( Missed)
Low-level format
Which of the memory types listed below allows for permanent storage of data?
VRAM
DVD-RAM ( Missed)
SRAM
Buffered memory
DRAM
360 KB
1.44 MB ( Missed)
360 KB
1.2 MB
3.5-inch
5.25-inch
1.8-inch
7/8
2.5-inch ( Missed)
Total marks 64
Total Questions 40
Success ratio 0%
Marks secured 0
Percentage secured 0%
8/8
CompTIA A+ Certification Exam - Security Threats &
Vulnerabilities Quiz
examcompass.com/comptia-a-plus-certification-exam-security-threats-and-vulnerabilities-quiz
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to
computer systems are commonly referred to as:
Trojans
Malware ( Missed)
Viruses
Spyware
Malicious software collecting information about users without their knowledge/consent is known as:
Logic bomb
Adware
Computer worm
Spyware ( Missed)
A computer program containing malicious segment that attaches itself to an application program or other executable
component is called:
Adware
Spam
Virus ( Missed)
Flash cookie
A standalone malicious computer program that replicates itself over a computer network is known as:
Spyware
Worm ( Missed)
Trojan
Spam
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is
called:
Adware
Computer worm
Trojan horse ( Missed)
Spyware
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a
computer or computer network is known as:
1/5
Trojan
Rootkit ( Missed)
Armored virus
Backdoor
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a
program, online service, or an entire computer system?
Root access
Administrative access
Zero-day vulnerability
Backdoor ( Missed)
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the
user performs requested action is known as:
Grayware
Adware
Ransomware ( Missed)
Spyware
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to
confidential information they shouldn't have access to is commonly referred to as:
Phishing ( Missed)
Privilege escalation
Backdoor access
Shoulder surfing
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later
by an attacker for the purpose of identity theft is an example of: (Select 2 answers)
Phishing ( Missed)
Watering hole attack
Social engineering ( Missed)
Zero-day exploit
Vishing
Vishing
Spear phishing ( Missed)
MITM attack
Whaling
An email sent from unknown source disguised as a source known to the message receiver is an example of: (Select
2/5
2 answers)
Spoofing ( Missed)
Dictionary attack
Trojan horse
Brute-force attack
Social engineering ( Missed)
Tailgating
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?
SMTP ( Missed)
RDP
SNMP
Telnet
The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data
is known as:
Zero-day attack
MITM attack
Social engineering ( Missed)
Backdoor access
Which of the following fall(s) into the category of social engineering attacks? (Select all that apply)
MITM attack
Spear phishing ( Missed)
Dictionary attack
Shoulder surfing ( Missed)
Zero-day attack
Tailgating ( Missed)
In computer security, a situation in which an unauthorized person is able to view another user's display or keyboard
to learn their password or other confidential information is known as:
Tailgating
Man-in-the-middle attack
Shoulder surfing ( Missed)
Brute-force attack
New accounts
Patched software
3/5
Vulnerability that is present in already released software but unknown to the software developer ( Missed)
Well known vulnerability
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online
hijacker is called:
Honeypot
Zombie ( Missed)
Logic bomb
Proxy
Which of the following terms is used to describe a collection of intermediary compromised systems under control of
a hacker?
Honeynet
Botnet ( Missed)
Intranet
Malware
An attack against encrypted data that relies heavily on computing power in order to check all possible keys and
passwords until the correct one is found is known as a brute-force attack.
True ( Missed)
False
Which of the password attacks listed below takes advantage of a predefined list of words?
Replay attack
Birthday attack
Dictionary attack ( Missed)
Brute-force attack
What type of security measure is in place when a client is denied access to the network due to an outdated antivirus
software?
NAS
DMZ
NAC ( Missed)
NAT
Which of the following answers refer(s) to the implementation of best security practices in a corporate environment?
(Select all that apply)
What is tailgating?
Spoofing
Zero-day attack
Spear phishing
MITM ( Missed)
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA A+ Certification Exam - Windows System Utilities Quiz
examcompass.com/comptia-a-plus-certification-exam-windows-system-utilities-quiz
Which of the following system utilities in Windows provides access to a database containing system configuration
information?
NBTSTAT
MSCONFIG
REGEDIT ( Missed)
MSINFO32
Which other command-line command besides REGEDIT can be used to launch registry editor in Windows?
REGDT
COMMAND
REGEDIT32
MSTSC
REGEDT32 ( Missed)
Which of the answers listed below refers to a command interpreter utility in Windows?
CMD ( Missed)
MSCONFIG
MSTSC
MMC
MSCONFIG
SERVICES.MSC ( Missed)
BCDEDIT
MSINFO32
A framework providing access to a collection of tools that can be used by administrators and advanced users to
manage networks, computers, services, and other system components in Windows is known as:
CMD
MSCONFIG
MMC ( Missed)
MSTSC
Which of the following answers refers to the MS Windows client application for Remote Desktop Services?
MBSA
REGSVR32
1/3
SERVICES.MSC
MSTSC ( Missed)
A simple Windows text-editing utility that can be launched from any place in the Command Prompt without the need
for specifying path to the application's file location is called:
WORDPAD
EXPLORER
NOTEPAD ( Missed)
MSWORD
What is the name of a GUI-based file and folder manager application in Windows?
EXPLORER ( Missed)
BOOTREC
IEXPLORE
MSTSC
A Microsoft Windows application utility that displays details about computer's hardware configuration, computer
components, software, and device drivers is known as:
MSCONFIG
NBTSTAT
MSINFO32 ( Missed)
IEXPLORE
Which of the answers listed below refers to a diagnostic tool for detecting display, sound, and input related problems
in MS Windows?
DXDIAG ( Missed)
MMC
DirectX
REGSVR32
An MS Windows system utility designed to improve file access speed by rearranging data stored on a disk or drive
is called:
FORMAT
DEFRAG ( Missed)
CHKDSK
DISKPART
A system utility available in Windows ME and newer releases of Microsoft operating systems that allows to roll back
system files and settings to an earlier point in time is known as:
Task Manager
Windows Easy Transfer
2/3
Computer Management
System Restore ( Missed)
Which of the following DEFRAG command parameters allows to locate and consolidate fragmented files on all
volumes?
/A
/E
/V
/C ( Missed)
If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to
recover such files.
True
False ( Missed)
Which of the following answers refers to a Microsoft online service that allows for patching up system vulnerabilities,
improving system performance, and fixing coding errors found in Windows software?
Action Center
Windows Update ( Missed)
Security Center
Windows Store
Total marks 15
Total Questions 15
Success ratio 0%
Marks secured 0
Percentage secured 0%
3/3
CompTIA A+ Certification Exam - Operational Procedures Quiz
examcompass.com/comptia-a-plus-certification-exam-operational-procedures-quiz
Which of the following tools are used to provide protection against ESD? (Select all that apply)
Examples of devices/device components regulated under special disposal procedures due to environmental/safety
hazards include: (Select all that apply)
PSUs
Batteries ( Missed)
CRTs ( Missed)
Toner cartridges ( Missed)
LCDs
Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that
apply)
CRTs ( Missed)
Power supplies ( Missed)
Inverters ( Missed)
CPUs
Laser printers ( Missed)
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is
called:
AUP
MSTSC
MAU
MSDS ( Missed)
SCADA
HIPS
TEMPEST
HVAC ( Missed)
1/5
Power spike
Electromagnetic interference
Temporary drop in voltage ( Missed)
Power outage
A device designed to provide emergency power during an unexpected main power source outage is called:
UPS ( Missed)
PoE
SVC
PSU
Which of the following solutions add(s) redundancy in areas identified as single points of failure? (Select all that
apply)
Virtualization
RAID ( Missed)
Uninterruptible Power Supply (UPS) ( Missed)
Backup generator ( Missed)
A device designed to protect electronic devices from large voltage fluctuations is known as:
Which of the following tools would be used to clean the inside of a printer? (Select all that apply)
Regular vacuum
Cleaning brush
Can of compressed air ( Missed)
Toner vacuum ( Missed)
In cases where users are found in violation of policies related to prohibited content or activity, the elements of first
response should include: (Select all that apply)
Consulting co-workers
Reporting through proper channels ( Missed)
2/5
Multi-factor authentication
Problem identification ( Missed)
Data/device preservation ( Missed)
In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:
Proxy list
Order of volatility
Access log
Chain of custody ( Missed)
A type of control access technology providing protection against copyright infringement is called:
OEM
EULA
DRM ( Missed)
AUP
A type of agreement granting a user the right to use software application in a manner determined by the software
vendor is known as:
AUP
RMA
EULA ( Missed)
DRM
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to
uniquely identify that person?
PIN
Biometrics
PII ( Missed)
PKI
Examples of proper communication and professional skills while dealing with difficult customer include: (Select 2
answers)
Clarifying customer statements by asking open ended questions to narrow the scope of the problem (
Missed)
Restating the issue to verify understanding ( Missed)
Adjusting to the technical user conversation style by using technical jargon
Asking close-ended questions to let the customer answer with a simple "Yes" or "No"
Clarifying customer statements by interrupting them if necessary
Which of the following is an example of good communication skills when dealing with a customer?
3/5
Asking close-ended questions to let the customer answer with a simple "Yes" or "No"
Arguing with a technical user if necessary to educate them
Listening to the customer and avoiding interruptions until he or she has finished describing the problem (
Missed)
Relying on your own judgment and not restating/clarifying what the customer says
Which of the answers listed below refers to an example of appropriate handling of customer's confidential data in a
situation where troubleshooting requires user's password?
Which of the following actions should be the first step in the troubleshooting process?
Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research
based on symptoms may also involve asking for assistance of a more experienced tech.
True
False ( Missed)
Once the theory of probable cause of the problem has been established, the next troubleshooting step should
involve:
Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology
process is to:
According to the troubleshooting theory, verification of full system functionality and implementation of applicable
preventative measures should be performed:
4/5
As the first step of the troubleshooting process
After implementing the solution ( Missed)
As the last step of the troubleshooting process
The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step
comes after verification of full system functionality and implementation of applicable preventive measures.
True ( Missed)
False
Total marks 38
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Exam - Wireless Networking Quiz (part 1 of
2)
examcompass.com/wireless-networking-quiz-part-1-of-2
A wireless networking topology consisting of at least one Access Point (AP) providing client devices with access to
network resources is known as:
Which of the following answers refers to a loss in wireless signal strength during transmission caused by increasing
distance and obstacles encountered on the signal path?
Amplitude
Channel bonding
Attenuation ( Missed)
Cross-talk
Carrier Sense Multiple Access (CSMA) is a network protocol providing means for controlling access to transmission
medium. "Carrier Sense" refers to the capability of a networked host to continuously monitor other hosts sharing the
transmission medium to see if they are transmitting. "Multiple Access" refers to the presence of multiple hosts
sharing the transmission medium.
True ( Missed)
False
The IEEE 802.11g wireless networking standard amendment provides for backward compatibility with:
802.11a
802.11n
802.16
802.11b ( Missed)
True ( Missed)
False
1/7
The IEEE 802.11b wireless standard amendment specifies the use of frequency band of:
5.0 GHz
2.4 GHz ( Missed)
3.6 GHz
5.4 GHz
The IEEE 802.11i amendment to the 802.11 wireless networking standard specifies security mechanisms for
wireless networks.
True ( Missed)
False
Ethernet
Fiber optic
WLANs ( Missed)
Token ring
A type of management frame containing information about the wireless network that helps wireless-capable devices
discover the presence of a wireless LAN is known as:
A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as:
Scope
Channel ( Missed)
Service set
Layer
Which of the following answers refers to the modification of the Carrier Sense Multiple Access (CSMA) network
access method used in wireless networks?
CSMA/CD
HSPA+
2/7
CSMA/CA ( Missed)
WiMAX
The IEEE 802.11a wireless standard amendment specifies the use of frequency band of:
Which of the following terms is used as a synonym for a rogue Access Point (AP)?
Trojan horse
Evil twin ( Missed)
Backdoor
Computer worm
Which of the following wireless encryption schemes offers the highest level of protection?
WEP
WPA
WPS
WPA2 ( Missed)
The IEEE 802.11b wireless standard amendment specifies maximum data signaling rate of:
11 Mbps ( Missed)
1 Mbps
54 Mbps
2 Mbps
Which of the following answers refer(s) to the signal modulation methods specified in the IEEE 802.11 standard?
(Select all that apply)
A feature of some wireless routers and network adapters that enables support for connections on both 2.4-GHz and
5-GHz links is known as:
3/7
Infrastructure mode
Which of the following technologies uses multiple antennas in order to increase performance and range?
MDI-X
Ethernet
MIMO ( Missed)
WiMAX
A wireless networking topology in which client devices communicate directly with each other without the use of a
controlling Access Point (AP) is known as: (Select 3 answers)
The IEEE 802.11a wireless standard amendment specifies maximum data signaling rate of:
11 Mbps
54 Mbps ( Missed)
2 Mbps
600 Mbps
Which of the following technologies simplifies configuration of new wireless networks by providing non-technical
users with a capability to easily configure network security settings and add new devices to an existing network?
WPA
WPS ( Missed)
WEP
WAP
Which of the following wireless security measures are not recommended and should be disabled due to their known
vulnerabilities? (Select 2 answers)
WPS ( Missed)
WAP
WPA2
WAF
WEP ( Missed)
The IEEE 802.11a wireless standard amendment specifies a signal modulation technique known as:
4/7
Frequency Hopping Spread Spectrum (FHSS)
Carrier Sense Multiple Access / Collision Detection (CSMA/CD)
Direct Sequence Spread Spectrum (DSSS)
A type of highly directional antenna for long-range point-to-point bridging links is known as:
Dipole antenna
Omnidirectional antenna
Dish antenna ( Missed)
Non-directional antenna
A situation in which multiple channels share the frequency band causing interference and performance degradation
for devices operating on channels that are too close to each other is known as:
Cross-talk
Channel overlapping ( Missed)
Collision
Channel bonding
The IEEE 802.11n wireless standard amendment specifies the use of frequency band(s) of: (Select all that apply)
2.0 GHz
5.4 GHz
2.4 GHz ( Missed)
5.0 GHz ( Missed)
Which of the following answers refer to the signal modulation techniques specified in the IEEE 802.11g wireless
standard amendment? (Select 2 answers)
Penetration testing
The practice of marking unsecured wireless networks
Vulnerability scanning
Scanning for unsecured wireless networks while driving in a car ( Missed)
The process of moving from one Wireless Access Point (WAP) coverage area to another without re-authentication or
loss in connectivity is commonly referred to as:
Roaming ( Missed)
5/7
Switching
Routing
DHCP relay
Which of the following answers lists an example of a protocol used for implementing control over multiple Wireless
Access Points (WAPs)?
RTSP
LWAPP ( Missed)
LDAP
MGCP
What type of device would be the most suitable for interconnecting two or more LANs in order to extend the network
range?
The process of planning and designing new WLANs for optimal performance, security and compliance typically
involves:
Penetration testing
Wireless site survey ( Missed)
Vulnerability scanning
End user awareness and training
An administrator needs to adjust multiple Access Point (AP) placement in order to ensure the best coverage for the
network. Which of the following tools would be of help while identifying the areas of low signal strength?
Total marks 42
Total Questions 35
Success ratio 0%
6/7
Marks secured 0
Percentage secured 0%
7/7
CompTIA Network+ Exam - Wireless Networking Quiz (part 2 of
2)
examcompass.com/wireless-networking-quiz-part-2-of-2
An infrastructure device designed for connecting client devices to a network is commonly referred to as an Access
Point (AP).
True ( Missed)
False
Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known
vulnerabilities resulting from implementation flaws?
AES
PEAP
WEP ( Missed)
CCMP
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and
point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism.
There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. IEEE 802.11
wireless networks use several EAP methods, including EAP-TLS, EAP-TTLS, PEAP, and EAP-SIM.
True ( Missed)
False
The IEEE 802.11g wireless standard amendment specifies maximum data signaling rate of:
11 Mbps
2 Mbps
54 Mbps ( Missed)
100 Mbps
Which of the following answers refers to an antenna type used as standard equipment on most Access Points (APs)
for indoor Wireless Local Area Network (WLAN) deployments?
What is the name of the signal modulation technique specified in the IEEE 802.11b wireless standard amendment?
In computer networking, the term "Collision" is used to describe a situation in which two or more demands are made
simultaneously on equipment that can handle only one at any given moment.
True ( Missed)
False
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a
shared medium before transmitting in order to prevent collisions and loss of data.
True ( Missed)
False
In Wireless Local Area Networks (WLANs), collisions are resolved with the use of Carrier Sense Multiple Access /
Collision Detection (CSMA/CD) network access method.
True
False ( Missed)
The IEEE 802.11n standard amendment provides for backward compatibility with: (Select all that apply)
802.11b ( Missed)
802.11g ( Missed)
802.11ac
802.11a ( Missed)
Which of the following answers refer to the 3G/4G mobile broadband telecommunications standards? (Select 2
answers)
The IEEE 802.11n wireless standard amendment specifies a signal modulation technique known as:
2/7
Orthogonal Frequency Division Multiplexing (OFDM) ( Missed)
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA)
Frequency Hopping Spread Spectrum (FHSS)
Which of the following protocols was introduced to strengthen existing WEP implementations without requiring the
replacement of legacy hardware?
PEAP
TKIP ( Missed)
CCMP
WPA2
Which of the following answers refers to an authentication framework frequently used in wireless networks and
point-to-point connections?
RDP
CCMP
EAP ( Missed)
LDAP
CCMP ( Missed)
TPM
TKIP
MTBF
Which of the following protocols encapsulates EAP within an encrypted and authenticated TLS tunnel?
CHAP
PAP
IPsec
PEAP ( Missed)
Which of the following answers refer to collision avoidance methods specified in the 802.11 wireless networking
standard? (Select 2 answers)
Which of the device types listed below offers the highest coverage of a wireless signal?
802.11g
3/7
802.11a
802.11n ( Missed)
802.11b
Which of the following WAP configuration settings allows for adjusting the boundary range of a wireless signal?
Beacon frame
Power level controls ( Missed)
Maximum Transmission Unit (MTU)
Quality of Service (QoS)
Which of the following answers refer(s) the characteristic features of the 802.11a wireless standard amendment?
(Select all that apply)
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
War chalking
Tailgating
War driving ( Missed)
Shoulder surfing
The IEEE 802.11g wireless standard amendment specifies the use of frequency band of:
5.0 GHz
2.4 GHz ( Missed)
2.0 GHz
5.4 GHz
The IEEE 802.11n wireless standard amendment specifies maximum data signaling rate of:
54 Mbps
600 Mbps ( Missed)
11 Mbps
100 Mbps
Which of the following answers list(s) the characteristic features of the 802.11n wireless standard amendment?
4/7
(Select all that apply)
Frequency bands for WLANs using IEEE 802.11 protocols include: (Select 2 answers)
Which of the following answers list(s) the characteristic features of the 802.11b wireless standard amendment?
(Select all that apply)
Spear phishing
Bluejacking
War driving ( Missed)
Shoulder surfing
War chalking
Which of the following answers list(s) the characteristic features of the 802.11g wireless standard amendment?
(Select all that apply)
Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
Orthogonal Frequency Division Multiplexing (OFDM) modulation ( Missed)
5/7
Maximum data signaling rate of 54 Mbps ( Missed)
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method ( Missed)
2.4 GHz frequency range ( Missed)
Maximum data signaling rate of 11 Mbps
Direct Sequence Spread Spectrum (DSSS) modulation ( Missed)
5.0 GHz frequency range
A Wireless Local Area Network (WLAN) operating in an infrastructure mode with the use of more than one Access
Point (AP) is referred to as:
Which of the following answers refers to the measurement of data transfer rate that excludes all protocol overhead
information as well as retransmission of lost data packets?
Goodput ( Missed)
Bandwidth cap
Throughput
Baseline
Modified older wireless standards that allow complaint devices to achieve higher speeds include: (Select all that
apply)
802.11x
802.11a-ht ( Missed)
802.11ac
802.11g-ht ( Missed)
Which of the antenna types listed below provide a 360-degree horizontal signal coverage? (Select 2 answers)
Unidirectional antenna
Dipole antenna ( Missed)
Dish antenna
Omnidirectional antenna ( Missed)
Yagi antenna
Which of the answers listed below refers to the new feature introduced with the IEEE 802.11ac standard?
MIMO
40-Hertz mode
MU-MIMO ( Missed)
Maximum data signaling rate of up to 600 Mbps
6/7
Which of the following serves as a unique identifier for a WLAN (a wireless network name)?
EUI
SSID ( Missed)
OUI
CNAME
Total marks 57
Total Questions 35
Success ratio 0%
Marks secured 0
Percentage secured 0%
7/7
CompTIA Network+ Certification Exam - OSI Layers Quiz
examcompass.com/osi-quiz
7 layers ( Missed)
3 layers
9 layers
5 layers
Layer 2
Layer 7
Layer 1 ( Missed)
Layer 4
Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)
HTTP ( Missed)
FTP ( Missed)
SMTP ( Missed)
NetBIOS
ARP
Layer 2
Layer 5
Layer 3 ( Missed)
Layer 4
Application layer
Presentation layer ( Missed)
Session layer
Transport layer
1/6
Session layer
Which of the following reside(s) at the physical layer of the OSI model? (Select all that apply)
Router
Hub ( Missed)
Switch
Network cabling ( Missed)
Bridge
Which OSI layer assumes responsibility for managing network connections between applications?
Network layer
Data link layer
Application layer
Session layer ( Missed)
What is the name of a data unit used at the OSI physical layer?
2/6
Frame
Segment
Bit ( Missed)
Packet
In the OSI model, Media Access Control (MAC) and Logical Link Control (LLC) sublayers are the components of:
Session layer
Data link layer ( Missed)
Transport layer
Network layer
Transport layer
Network layer
Data link layer ( Missed)
Physical layer
Network layer
Transport layer ( Missed)
Presentation layer
Data link layer
Transport layer resides between which two other layers of the OSI model?
3/6
Application layer of the OSI model
Layer 3 of the OSI model ( Missed)
Network layer of the OSI model ( Missed)
Layer 5 of the OSI model
Layer 4
Layer 6
Layer 5 ( Missed)
Layer 3
Layer 3 ( Missed)
Layer 1
Layer 4
Layer 6
Layer 3
Layer 6
Layer 7 ( Missed)
4/6
Layer 5
Which of the following devices resides at the data link layer of the OSI model?
Router
Passive Hub
Ethernet switch ( Missed)
Repeater
In the OSI model, Transmission Control Protocol (TCP) resides at: (Select all that apply)
Which of following protocols reside(s) at the OSI network layer? (Select all that apply)
IPv4 ( Missed)
UDP
IPsec ( Missed)
TCP
IPv6 ( Missed)
ICMP ( Missed)
Which of the protocols listed below resides at the session layer of the OSI model?
HTTP
UDP
SMTP
NetBIOS ( Missed)
IP
5/6
Total marks 39
Total Questions 30
Success ratio 0%
Marks secured 0
Percentage secured 0%
6/6
CompTIA Network+ Certification Exam - Routing Quiz
examcompass.com/routing-quiz
A device designed to filter and transfer data packets between different types of computer networks is called:
Router ( Missed)
Load balancer
Active hub
Switch
A collection of IP networks and routers under the control of one administrative entity is commonly referred to as:
Which of the cable types listed below is often used to connect a computer terminal to a router's console port?
Crossover cable
Straight-through cable
Patch cable
Rollover cable ( Missed)
What are the characteristic features of the Border Gateway Protocol (BGP)? (Select 2 answers)
A field in an IP datagram that specifies how many more hops a packet can travel before being discarded is called:
SPB
TTL ( Missed)
1/6
MTU
VTC
The term "Default route" refers to the network path used by a router for forwarding all packets with destination
addresses not listed in its routing table.
True ( Missed)
False
Which of the devices listed below is used for separating broadcast domains?
Active hub
Router ( Missed)
Layer 2 switch
Repeater
RIPv2
OSPF ( Missed)
RIP
IS-IS ( Missed)
OTDR
Which of the following provides a replacement for the Spanning Tree Protocol (STP)?
SIP
PGP
SPB ( Missed)
RTP
A set of rules stored on a Layer 3 switch or a networked host that allows to determine the topology of the
surrounding network is commonly referred to as:
Routing metrics
Loopback interface
Access Control List (ACL)
Routing table ( Missed)
Which of the following metrics describes the largest allowable data unit that can be transmitted across the network?
UTM
MTU ( Missed)
TTL
QoS
Which of the following command-line commands in MS Windows is used to display the contents of a routing table?
2/6
ipconfig /all
tracert
print route
netstat -r ( Missed)
In computer routing, a rough measure of distance between two networked hosts is commonly referred to as:
Latency
Default route
Hop count ( Missed)
MTU
OSPF
RIPv2
BGP ( Missed)
IS-IS
A loopback interface on a router provides the means for basic testing whether the router is on and operational.
True ( Missed)
False
Which of the following can be used to prevent routing loops? (Select 2 answers)
OSPF
RIPv2 ( Missed)
OTDR
IS-IS
3/6
A manually-configured routing entry is known as:
Which of the answers listed below refers to the process of the automated update of a routing table?
Static routing
Route redistribution
Dynamic routing ( Missed)
Route aggregation
Examples of interior gateway routing protocols include: (Select all that apply)
BGP
RIPv2 ( Missed)
OSPF ( Missed)
IS-IS ( Missed)
Which of the following protocol types is used for sharing routing information between autonomous systems (routing
domains)?
IGP
OSPF
EGP ( Missed)
IS-IS
Autonomous System Number (ASN) is a globally unique number allocated for a collection of networked systems that
operate common routing protocols and are under control of a single administrative authority.
True ( Missed)
False
Which of the protocols listed below are used for designating a backup router in the event of an active router failure?
(Select 2 answers)
DSCP
VRRP ( Missed)
ISAKMP
HSRP ( Missed)
TKIP
A solution used to optimize and decrease the size of a routing table is known as:
4/6
Dynamic routing
Route redistribution
Static routing
Which of the following networking protocols provide(s) redundancy? (Select all that apply)
DSCP
VRRP ( Missed)
ISAKMP
HSRP ( Missed)
TKIP
A solution used to translate routing information between routers configured to use different routing protocols is
known as:
True
False ( Missed)
Which of the following command-line commands in MS Windows is used to display the contents of a routing table?
netstat -a
route print ( Missed)
ipconfig /all
print route
Total marks 38
Total Questions 30
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/6
6/6
CompTIA Network+ Certification Exam - Subnetting Quiz
examcompass.com/subnetting-quiz
What is the last usable host IP address for the 172.45.120.0/23 network?
172.45.120.254
172.45.121.254 ( Missed)
172.45.122.254
172.45.123.254
254
126
62 ( Missed)
30
255.240.0.0
255.248.0.0 ( Missed)
255.252.0.0
255.254.0.0
What is the maximum number of subnets and hosts per subnet for the 192.168.50.247 255.255.255.224 network?
Which of the following answers lists the decimal notation of the binary number 11100000?
192
224 ( Missed)
240
248
172.26.56.97 ( Missed)
172.26.56.111
172.26.56.126
172.26.56.127
1/6
Which of the following answers lists the binary notation of the decimal number 252?
11110010
11111000
11111010
11111100 ( Missed)
What is the maximum number of hosts per subnet for the 10.47.255.1/20 network?
512 hosts
1022 hosts
2046 hosts
4094 hosts ( Missed)
What is the maximum valid range for IP addresses that can be assigned to hosts on the 192.168.100.248
255.255.255.248 network?
192.168.100.249 - 192.168.100.255
192.168.100.248 - 192.168.100.254
192.168.100.249 - 192.168.100.254 ( Missed)
192.168.100.248 - 192.168.100.255
Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?
192.168.31.255
192.168.47.255
192.168.63.255 ( Missed)
192.168.79.255
Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address
space? (Select 2 answers)
192.168.32.9
192.168.32.10 ( Missed)
192.168.32.11
192.168.32.12
2/6
11111111.11111111.10000000.00000000 ( Missed)
11111111.11111111.11000000.00000000
11111111.11111111.11100000.00000000
11111111.11111111.11110000.00000000
In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address
within that range belongs to the:
154.24.48.0
154.24.60.0
154.24.62.0
154.24.64.0 ( Missed)
Which of the following answers lists the CIDR notation for 255.255.224.0 subnet mask?
/19 ( Missed)
/20
/21
/22
Which of the following answers list the characteristic features of the 172.16.0.0 - 172.31.255.255 IPv4 address
space? (Select 2 answers)
Class A range
Public IP address range
Class B range ( Missed)
Non-routable (private) IP address range ( Missed)
Class C range
What is the first valid host address for a node residing in the 10.119.136.143/20 network?
10.119.96.1
10.119.128.1 ( Missed)
10.119.132.1
10.119.136.1
255.255.225.0
3/6
255.255.191.0
255.255.127.0
255.255.64.0
None of the above is a valid subnet mask ( Missed)
Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask?
/25
/26
/27 ( Missed)
/28
11111111.11111100.00000000.00000000
11111111.11111110.00000000.00000000 ( Missed)
11111111.11111101.00000000.00000000
11111111.11111000.00000000.00000000
Which of the following answers list the characteristic features of the 192.168.0.0 - 192.168.255.255 IP address
space? (Select 2 answers)
Class A range
Public IP address range
Class B range
Non-routable (private) IP address range ( Missed)
Class C range ( Missed)
What is the leading octet value range for an IPv4 address belonging to a class B network?
In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address
within that range belongs to the:
Which of the following answers lists the CIDR notation of the 255.192.0.0 subnet mask?
/10 ( Missed)
4/6
/11
/12
/13
Which of the following answers refer to the leading octet value range and class of the IPv4 multicast address block?
(Select 2 answers)
128 - 191
Class B
192 - 223
Class C
224 - 239 ( Missed)
Class D ( Missed)
Which of the following answers lists the broadcast address for the 46.28.247.109/10 network?
46.31.255.255
46.63.255.255 ( Missed)
46.127.255.255
46.255.255.255
192.168.223.10
192.168.223.11
192.168.223.12 ( Missed)
192.168.223.13
Compared to the number of all IPv4 addresses available per subnet, the total number of usable IPv4 addresses that
can be assigned to hosts from that pool is reduced by two. Those two addresses that cannot be assigned to hosts
are used as: (Select 2 answers)
What is the maximum valid range for IP addresses that can be assigned to hosts on the 134.170.185.46
255.255.128.0 network?
Total marks 35
Total Questions 30
Success ratio 0%
Marks secured 0
Percentage secured 0%
6/6
CompTIA Network+ Certification Exam - TCP and UDP Ports Quiz
examcompass.com/tcp-and-udp-ports-quiz
Ephemeral ports
Well-known ports ( Missed)
System ports ( Missed)
Dynamic ports
Registered ports
TCP port 23
TCP port 25
TCP port 21
TCP port 22 ( Missed)
SSH
FTP
Telnet ( Missed)
SMTP
Which of the following port numbers are used by the File Transfer Protocol (FTP)? (Select 2 answers)
25
53
20 ( Missed)
21 ( Missed)
23
Simple Mail Transfer Protocol (SMTP) operates with the use of TCP port:
110
25 ( Missed)
143
23
1/7
Dynamic Host Configuration Protocol (DHCP)
Bootstrap Protocol (BOOTP)
Which TCP port is used by the Post Office Protocol Version 3 (POP3)?
110 ( Missed)
123
143
119
Port numbers in the range from 1024 to 49151 are referred to as: (Select 2 answers)
Private ports
Dynamic ports
Well-known ports
User ports ( Missed)
Registered ports ( Missed)
Which of the following port numbers is reserved for the Network Time Protocol (NTP)?
143
119
80
123 ( Missed)
The File Transfer Protocol (FTP) Control Connection for administering a session is established through port number:
20
22
21 ( Missed)
25
TCP port 67
UDP port 53 ( Missed)
TCP port 43
UDP port 67
2/7
TCP port 53 ( Missed)
UDP port 43
Ports referred to as dynamic, or private, or ephemeral ports have numbers in the range of:
TCP port 23
UDP port 67
UDP port 69 ( Missed)
UDP port 53
Which of the following UDP ports are reserved for the Simple Network Management Protocol (SNMP)? (Select 2
answers)
143
161 ( Missed)
137
162 ( Missed)
138
3/7
Terminal Access Controller Access-Control System (TACACS) remote authentication protocol runs by default on
port:
80
67
53
49 ( Missed)
The File Transfer Protocol (FTP) Data Connection for sending file data is established through port number:
23
25
20 ( Missed)
21
Which of the following port numbers are reserved for NetBIOS services? (Select all that apply)
136
161
137 ( Missed)
162
138 ( Missed)
139 ( Missed)
Remote Authentication Dial In User Service (RADIUS) protocol runs on: (Select 2 answers)
Port 1723
Port 3388
Port 1722
Port 1813 ( Missed)
Port 3389
Port 1812 ( Missed)
4/7
Lightweight Directory Access Protocol (LDAP)
Layer 2 Tunneling Protocol (L2TP)
Point-to-Point Tunneling Protocol (PPTP)
Which of the following statements are true? (Select all that apply)
FTPS is an extension to the Secure Shell protocol (SSH) and runs by default on port number 22.
True
False ( Missed)
161 ( Missed)
138
162
139
161
137
162 ( Missed)
138
Which of the port numbers listed below is commonly used for Session Initiation Protocol (SIP) non-encrypted traffic?
5004
5005
5060 ( Missed)
5061
Port number 5061 is typically used for Session Initiation Protocol (SIP) traffic encrypted with Transport Layer
Security (TLS).
True ( Missed)
False
Which of the following port numbers are assigned to the Media Gateway Control Protocol (MGCP)? (Select 2
answers)
5/7
5004
5060
2427 ( Missed)
5005
2727 ( Missed)
5061
MGCP
RTP ( Missed)
H.323
RTCP
5004
5060
5005 ( Missed)
5061
MGCP
RTP
H.323 ( Missed)
RTCP
RDP
SMB ( Missed)
SIP
RTP
Total marks 47
Total Questions 35
Success ratio 0%
6/7
Marks secured 0
Percentage secured 0%
7/7
CompTIA Network+ Certification Exam - Command Line Quiz
examcompass.com/comptia-network-plus-certification-exam-command-line-quiz
What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?
ifconfig
nslookup
ipconfig ( Missed)
netstat
Used without any parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.
True ( Missed)
False
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP
configuration information for all adapters?
-a
/?
/all ( Missed)
/-a
Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?
-S srcaddr
/all ( Missed)
-i address
eth_addr
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration
settings for all adapters? (Select 2 answers)
What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings?
ifconfig ( Missed)
netstat
nslookup
ipconfig
A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network
1/6
connections is called:
tracert
traceroute
netstat ( Missed)
nslookup
Which netstat parameter allows to display all active TCP connections and the TCP and UDP ports on which the
computer is listening?
-a ( Missed)
-p
-e
-r
Which of the following command-line commands in MS Windows is used to display the contents of a routing table?
netstat -a
route print ( Missed)
ipconfig /all
print route
Which of the options listed below allows for execution of a command if the requested operation in the command-line
interface in MS Windows requires elevation?
sudo
Ctrl+Shift+Esc
Run as administrator ( Missed)
mode
Which of the netstat utility parameters listed below allows to display the contents of the IP routing table?
-a
-e
-p
-r ( Missed)
Which netstat parameter allows to display the names of applications and executable file components that are
accessing the network?
-a
-n
-b ( Missed)
-p
What is the name of a command-line utility used for checking the reachability of a remote host?
2/6
netstat
ping ( Missed)
nslookup
nbtstat
A command-line network administration utility that operates by sending Internet Control Message Protocol (ICMP)
echo request packets to the destination host and waiting for a reply in order to test the communication with another
computer on an Internet Protocol (IP) network is called ping.
True ( Missed)
False
Which of the following key combinations allows to stop the execution of the current command run in Windows
Command Prompt?
Ctrl+Alt+Delete
Esc
Ctrl+Shift+Esc
Ctrl+C ( Missed)
Which of the following commands in MS Windows is used to display help information related to a specific network
command-line utility?
[command] /? ( Missed)
man [command]
[command] --help
info [command]
What is the correct syntax for checking the IPv6 connectivity with another network node (host1) in MS Windows?
(Select 2 answers)
Which of the command-line commands listed below allows for sending an ICMPv6 echo request to another network
node (host1) in Linux OS?
ping host1 -6
3/6
ping ipv6.host1
ping6 host1 ( Missed)
ping -6 host1
A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their
way to another host is called:
ping
traceroute
nslookup
tracert ( Missed)
A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its
way to another network node is known as:
nbtstat
traceroute ( Missed)
netstat
tracert
Which of the following commands in MS Windows displays the route taken by IPv6 packets on their way to another
host?
traceroute6
tracert6
traceroute -6
tracert -6 ( Missed)
A network command-line utility in Linux that tracks and displays the route taken by IPv6 packets on their way to
another network node is known as: (Select 2 answers)
traceroute6 ( Missed)
tracert6
traceroute -6 ( Missed)
tracert -6
Which of the following answers lists a Windows command-line utility designed to be of help in troubleshooting
NetBIOS name resolution problems?
nbtstat ( Missed)
ping
netstat
tracert
Which of the nbtstat parameters allows to resolve remote host (host1) by its name?
Which of the nbtstat parameters allows to resolve remote host (192.168.1.10) by its IP address?
nbtstat -a 192.168.1.10
nbtstat 192.168.1.10 -A
nbtstat -A 192.168.1.10 ( Missed)
nbtstat 192.168.1.10 -a
Which of the following tools allows for obtaining a domain name to IP address mapping?
netstat
nslookup ( Missed)
tracert
pathping
Which of the following network administration command-line utilities can be used for DNS queries?
tracert
nslookup ( Missed)
tracert
pathping
Which command in MS Windows displays a table consisting of IP addresses and their resolved Ethernet or Token
Ring physical addresses?
arp -e
netstat -n
nslookup
arp -a ( Missed)
Which of the network command-line utilities in MS Windows combines the features of ping and tracert?
nbtstat
pathping ( Missed)
nslookup
netstat
Total marks 33
Total Questions 30
5/6
Questions correctly answered 0
Success ratio 0%
Marks secured 0
Percentage secured 0%
6/6
CompTIA Security+ Certification Exam - Malware Quiz
examcompass.com/malware-quiz
Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private
computer systems are commonly referred to as:
Adware
Malware ( Missed)
Computer viruses
Spyware
Which of the following answers refer to the characteristic features of an advertising-supported software? (Select 2
answers)
A computer program containing malicious segment that attaches itself to an application program or other executable
component is called:
Adware
Spam
Virus ( Missed)
Flash cookie
In computer security, the part of malware code responsible for performing malicious action is referred to as:
Payload ( Missed)
Frame
Exploit
Logic bomb
Malicious software collecting information about users without their knowledge/consent is known as:
Trojan
Backdoor
Virus
Adware
Spyware ( Missed)
The term "companion virus" refers to an older type of computer virus which doesn't alter files and works by creating
infected companion file with the exact same name as the legitimate program, but with different file extension. The
1/9
virus takes advantage of the fact that in the old MS-DOS command-line interface executables can be run by
providing only the file name which facilitates the execution of infected code by an unaware user.
True ( Missed)
False
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is
known as:
Adware
Backdoor
Trojan ( Missed)
Spyware
Which type of files pose the greatest risk related to the distribution of malware?
.png
.exe ( Missed)
.txt
.pdf
In computer security, an automatic download performed without the user's consent (and often without any notice)
aimed at installing malware or potentially unwanted programs is known as a drive-by download.
True ( Missed)
False
Extranet
Intranet
Botnet ( Missed)
Ethernet
Keylogger ( Missed)
Vulnerability scanner
Screen lock
Packet sniffer
Protocol analyzer
The iframe tag can be used for loading malicious code (often in the form of JavaScript applet) onto an otherwise
trusted page.
True ( Missed)
False
2/9
A computer virus that actively attacks an antivirus program in an effort to prevent detection is called:
Phage virus
Armored virus
Macro virus
Retrovirus ( Missed)
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a
computer or computer network is known as:
Trojan
Rootkit ( Missed)
Armored virus
Backdoor
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a
program, online service or an entire computer system?
Spyware
Trojan horse
Rootkit
Backdoor ( Missed)
The process of isolation of files and applications suspected of containing malware in order to prevent further
execution and potential harm to the user's system is known as:
Safe mode
Quarantine ( Missed)
Protected mode
Blacklisting
In its more intrusive form, adware can track browsing habits in order to serve better targeted ads based on user
interests.
True ( Missed)
False
Computer code or command that takes advantage of a design flaw in software is commonly referred to as:
Bug
Backdoor
Exploit ( Missed)
Rootkit
Which of the following answers refer(s) to the ways of delivering online advertising content utilized by adware?
(Select all that apply)
3/9
Replay attack
Pop-up ( Missed)
Bluesnarfing
Pop-under ( Missed)
Stegangraphy
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online
hijacker is called:
Honeypot
Zombie ( Missed)
Logic bomb
Adware
Which of the computer virus types listed below deletes or corrupts contents of the target host file instead of attaching
itself to the file?
Armored virus
Retrovirus
Companion virus
Phage virus ( Missed)
Web browser extensions (a.k.a. plugins, or add-ons) are downloadable components that extend the browser's
functionality by enabling interactive features of web pages. Downloading and installing browser extensions can be
risky, because some of them may contain malicious code and in disguise of a legitimate program introduce malware
to the system.
True ( Missed)
False
Which of the following terms describes a method employed by many computer antivirus programs designed to
detect previously unknown types of malware?
Heuristics ( Missed)
Steganography
Quarantine
Signature-based detection
A group of computers running malicious software under control of a hacker is known as:
Honeynet
Botnet ( Missed)
Ethernet
Honeypot
Which of the following answers best describes a type of mobile software that while running in disguise of a
legitimate program tries to harm user devices or personal data?
4/9
Phage virus
Computer worm
Malicious app ( Missed)
Trojan horse
Spyware
An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of a
false negative error.
True
False ( Missed)
Which of the application types listed below fall(s) into the category of anti-malware solutions? (Select all that apply)
Anti-spyware ( Missed)
Kerberos
Antivirus ( Missed)
GNU Privacy Guard (GPG)
Anti-spam ( Missed)
Pop-up blocker ( Missed)
Which of the following components pose a risk of unintended downloading and execution of malware on a PC?
(Select 2 answers)
Tracking cookies
Browser plugins ( Missed)
ActiveX controls ( Missed)
Polymorphic malware
Keylogger
A type of rogue application that exploits dialup connections by making unauthorized telephone calls is known as:
Dialer ( Missed)
Keylogger
Dropper
Trojan
Retrovirus ( Missed)
Phage virus
Polimorphic virus
Armored virus
A malware-infected networked host under remote control of a hacker is commonly referred to as:
5/9
Trojan
Worm
Bot ( Missed)
Honeypot
Which of the following answers refers to a technique used by certain types of malware to cause an error in a
program and make it easier to run malicious code?
Bluejacking
Buffer overflow ( Missed)
Malicious add-on
Input validation
Pentest
A software that automatically plays, displays, or downloads advertisements to a computer is known as:
Spyware
Malware
Adware ( Missed)
Shareware
A type of virus that takes advantage of various mechanisms specifically designed to make tracing, disassembling
and reverse engineering its code more difficult is known as:
Phage virus
Armored virus ( Missed)
Retrovirus
Companion virus
Macro virus
Which of the following acronyms refers to a network security solution combining the functionality of a firewall with
additional safeguards such as URL filtering, content inspection, or malware inspection?
MTU
MGCP
UTM ( Missed)
PGP
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify
malicious code are known as:
Repositories
Signature files ( Missed)
Macros
Security logs
6/9
Malicious code activated by a specific event is known as:
Trojan horse
Logic bomb ( Missed)
Spyware
Armored virus
Which of the following answers refers to the process by which a computer virus makes copies of itself to carry out
subsequent infections?
Polymorphism
Pharming
Replication ( Missed)
Phishing
A standalone malicious computer program that replicates itself over a computer network is known as:
Phage virus
Computer worm ( Missed)
Macro virus
Trojan horse
A type of Trojan designed to transfer other malware onto a PC via Internet connection is known as:
Dialer
Dropper
Downloader ( Missed)
Proxy
Which security measure is in place when a client is denied access to the network due to outdated antivirus
software?
NAC ( Missed)
DMZ
VLAN
NAT
A type of Trojan designed to install other malware files onto a PC without the need for an active Internet connection
is known as:
Proxy
Downloader
Dropper ( Missed)
Dialer
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the
user performs requested action is known as:
7/9
Grayware
Adware
Ransomware ( Missed)
Spyware
Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?
Spear phishing
Watering hole attack
Tailgating
SQL injection ( Missed)
Which type of computer virus takes advantage of the capability for creating and embedding simple scripts in popular
office applications?
Phage virus
Macro virus ( Missed)
Retrovirus
Armored virus
The process by which malicious software changes its underlying code in order to avoid detection is known as
polymorphism.
True ( Missed)
False
An antivirus software can be kept up to date through: (Select all that apply)
Audit trails
Engine updates ( Missed)
Virus signature updates ( Missed)
OS updates
Which of the following terms refers to unwanted applications or files that are not classified as malware, but can
worsen the performance of computers and pose security risk?
Grayware ( Missed)
Shareware
Ransomware
8/9
Freeware
Which of the terms listed below refers to a computer security vulnerability allowing attackers to insert malicious code
into a trusted website?
Replay attack
Buffer overflow
URL hijacking
Cross-site scripting ( Missed)
Xmas attack
Total marks 57
Total Questions 50
Success ratio 0%
Marks secured 0
Percentage secured 0%
9/9
Glossary of Malware Terms
examcompass.com/malware-glossary
ActiveX controls
A type of downloadable web browser plug-ins for Microsoft Internet Explorer providing additional interactive
features to web pages. Malicious ActiveX controls pose a risk of unintended execution of malware.
Adware
Software that automatically plays, displays, or downloads advertisements to a computer.
Armored virus
A type of computer virus that takes advantage of various mechanisms specifically designed to make tracing,
disassembling and reverse engineering its code more difficult.
Backdoor
An undocumented (and often legitimate) way of gaining access to a program, online service or an entire
computer system.
Botnet
A group of computers running malicious software under control of a hacker.
Buffer overflow
A technique used by certain types of malware to cause an error in a program and make it easier to run
malicious code.
Companion virus
An older type of computer virus which doesn't alter files and works by creating infected companion file with
the exact same name as the legitimate program, but with different file extension. The virus takes advantage of
the fact that in the old MS-DOS command-line interface executables can be run by providing only the file
name which facilitates the execution of infected code by an unaware user.
Computer worm
A standalone malicious computer program that replicates itself over a computer network.
Cross-site scripting
A computer security vulnerability allowing attackers to insert malicious code into a trusted website.
Dialer
A rogue application designed to exploit dialup connections by making unauthorized telephone calls.
Downloader
A type of Trojan designed to transfer other malware onto a PC via Internet connection.
Drive-by download
An automatic download performed without the user's consent (and often without any notice) aimed at
installing malware or potentially unwanted programs.
Dropper
A type of Trojan designed to install other malware files onto a PC without the need for an active Internet
connection.
Executable file
A type of computer file that when opened runs a program or series of instructions contained in the file.
Exploit
Computer code or command that takes advantage of software design flaws.
Grayware
A category of applications which despite of not being classified as malware can worsen the performance of a
computer and pose security risk.
Heuristics
A method employed by many computer antivirus programs designed to detect previously unknown types of
1/3
malware.
iframe
An HTML tag for embedding another web document within the current HTML web page. The downside of
utilizing iframes relates to the fact that they can be used for the purpose of injecting malicious code (often in
the form of JavaScript applet) into an otherwise trusted page.
Keylogger
An application collecting information about user keyboard activity. Typically, malicious keyloggers are installed
and run on a system without the user's knowledge/consent to steal logon credentials, credit card numbers,
and other sensitive data.
Logic bomb
Malicious code activated by a specific event.
Macro virus
A type of computer virus that exploits the capability for creating and embedding simple scripts in popular office
and cooperative applications.
Malicious app
Mobile application designed to harm user devices or personal data acting in disguise of a legitimate program.
Malware
A generic term for various types of malicious software used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems. The category of malware encompasses all sorts of
malicious applications, including Trojan horses, most rootkits and backdoors, computer viruses, worms,
spyware, keyloggers, more intrusive forms of adware, and other malicious programs.
Payload
The part of malware performing malicious action.
Phage virus
A type of computer virus that deletes or corrupts contents of the target host file instead of attaching itself to the
file.
Polymorphic malware
A type of malicious software capable of changing its underlying code in order to avoid detection.
Pop-under
One of the ways of delivering online advertising content utilized by adware. Advertising pop-unders are
usually displayed in a new browser window hidden beneath the current page and are not seen until the
covering window is closed.
Pop-up
One of the ways of delivering online advertising content utilized by adware. Advertising pop-ups are usually
displayed in a new web browser window and cover the contents of the current page.
Quarantine
Isolation of files and applications suspected of containing malware in order to prevent further execution and
potential harm to the user's system.
Ransomware
Malware that restricts access to a computer system by encrypting files or locking the entire system down until
the user performs requested action.
Replication
The process by which a virus makes copies of itself to carry out subsequent infections.
Retrovirus
A computer virus that actively attacks an antivirus program in an effort to prevent detection.
Rootkit
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level
access to a computer or computer network.
Signature file
A file containing new malicious code patterns used by the antivirus application as a reference in the process
2/3
of malware removal.
Spyware
Malicious software collecting information about users without their knowledge/consent.
SQL injection
Execution of SQL commands aimed at gaining unauthorized access to an online database. This type of attack
occurs when for example entry fields of web forms designed to collect information from users allow passing
unchecked user input to the database. The countermeasure against this type of code injection is input
validation, which limits the scope of user input that can be passed through an online form.
Trojan horse
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program.
Virus
A computer program containing malicious segment that attaches itself to an application program or other
executable component.
Windows Defender
A built-in application tool for Microsoft operating systems providing protection against viruses, spyware, and
other potentially unwanted programs.
XSS
A shorthand term for cross-site scripting.
Zero-day attack
A type of attack exploiting vulnerabilities that are present in already released software but unknown to the
software developer.
Zombie
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an
online hijacker.
3/3
CompTIA Network+ Certification Practice Test 1 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-1-exam-n10-006
A device designed to filter and transfer data packets between dissimilar types of computer networks is called:
Hub
Load balancer
Router ( Missed)
Switch
Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between
Local Area Network (LAN) segments?
Switch ( Missed)
Firewall
Router
Hub
A device that apart from the function of an ordinary network switch can also provide additional functions at higher
levels of the OSI reference model is known as a multilayer switch.
True ( Missed)
False
Which of the following answers refers to a software or hardware that monitors network traffic and depending on the
configuration settings applied to each data packet either blocks it or allows it to pass through?
HIDS
Firewall ( Missed)
Load balancer
Vulnerability scanner
A security solution implemented on an individual computer monitoring that specific system for malicious activities or
policy violations is referred to as:
NIPS
MAC filter
Firewall
HIDS ( Missed)
Which of the following answers illustrates the difference between passive and active security breach response?
1/5
IDS vs. IPS ( Missed)
An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to
as:
Demarc
Access Point (AP) ( Missed)
Intermediate Distribution Frame (IDF)
Active hub
An application software used to selectively block access to certain websites is an example of:
Captive portal
Media converter
Content filter ( Missed)
Proxy server
A network device designed for managing the optimal distribution of workloads across multiple computing resources
is called:
Layer 3 switch
Access Point (AP)
Load balancer ( Missed)
Domain controller
The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-
created and sent out on any connected ports which has a negative impact on network performance.
Router
Switch
Bridge
Hub ( Missed)
Which of the devices listed below allows for establishing a communication channel over a PSTN?
A technology that allows for prioritizing certain types of network traffic in order to improve the overall network
effectiveness and performance is known as:
AAA framework
Packet shaping ( Missed)
Content filtering
2/5
Port forwarding
Which of the following answers refers to a dedicated device for managing encrypted connections established over
an untrusted network, such as the Internet?
A system that uses public network (e.g. Internet) as a means for creating private encrypted connections between
remote locations is known as:
True
False ( Missed)
Which of the following solutions are used for implementing VPNs? (Select all that apply)
IPsec ( Missed)
GRE ( Missed)
SDLC
SSL/TLS ( Missed)
PPTP ( Missed)
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed
resources is called:
Authentication
Authorization
Accounting ( Missed)
Which of the answers listed below refers to the process of granting or denying access to resources?
Authentication
3/5
Authorization ( Missed)
Accounting
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
Authentication ( Missed)
Authorization
Accounting
Which of the following solutions provide(s) the AAA functionality? (Select all that apply)
PAP
RADIUS ( Missed)
TACACS+ ( Missed)
PPTP
MSCHAP
A dial-up or VPN connection allowing remote users to access corporate network requires what type of service?
RAS ( Missed)
PoE
NAS
WPS
A software solution designed to enable interaction between two devices over a network is generally referred to as:
Proxy
Web service ( Missed)
Software as a Service (SaaS)
Virtual switch
UTM appliance
Peer-to-Peer (P2P) architecture
Unified voice services ( Missed)
Reverse proxy
Which of the following answers lists an example of a protocol used for implementing control over multiple Access
Points (APs)?
LDAP
LWAPP ( Missed)
RTSP
MGCP
4/5
Your Final Report
Total marks 29
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 2 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-2-exam-n10-006
DNS
SNMP
NAT
DHCP ( Missed)
One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP
address based on the IP-to-MAC address mapping.
True ( Missed)
False
Which of the following terms refers to permanent IP address assignment from a DHCP server?
Scope
Reservation ( Missed)
DHCP relay
Lease
A range of IP addresses assigned to hosts requesting dynamic IP address from a DHCP server is known as:
Lease
DHCP relay
Scope ( Missed)
Reservation
The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to
as:
Option
Reservation
Scope
Lease ( Missed)
DHCP allows for passing additional configuration settings to DHCP clients on a network. The additional settings
might include (among other types of configuration info) the default gateway IP address, or DNS server IP address.
Which of the answers listed below refers to the part of a DHCP message containing those settings?
Options ( Missed)
Scope
Reservation
1/5
Lease
Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the
server through a DHCP relay agent.
True ( Missed)
False
Which of the following answers refers to a system containing mappings of domain names to various types of data,
such as for example numerical IP addresses?
TCP/IP
DNS ( Missed)
SQL
DHCP
In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar
needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?
ICS server
Web server
DNS server ( Missed)
DHCP server
Which of the DNS database records listed below returns a 32-bit IPv4 address?
MX
AAAA
CNAME
A ( Missed)
PTR
Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
AAAA
MX ( Missed)
PTR
CNAME
A
The DNS database AAAA record creates a pointer that maps a hostname to:
IPv4 address
Mail server
IPv6 address ( Missed)
Canonical name
2/5
Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address?
MX
CNAME ( Missed)
AAAA
PTR
A
Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers)
PTR record creates a pointer that maps a hostname to an IP address for reverse lookups.
The functionality provided by a PTR record allows multiple domain names to resolve to the same IP address.
PTR record resolves an IP address to a hostname for reverse lookups. ( Missed)
The functionality provided by a PTR record is the opposite of A and AAAA DNS records. ( Missed)
PTR record maps a domain name to a list of mail servers for that domain.
Which of the answers listed below refers to a solution that allows for keeping a domain name linked to a changing IP
address?
In computer networking, a system or an application processing requests on behalf of another system is commonly
referred to as:
Proxy ( Missed)
Web server
Man-in-the-middle (MITM)
First responder
Which of the following statements describe the function of a forward proxy? (Select 2 answers)
Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers)
3/5
Which of the following solutions alleviates the problem of depleting number of routable IPv4 addresses?
DNS
NAT ( Missed)
GRE
VPN
Dynamic Network Address Translation (DNAT) provides a permanent mapping between a private IP address and a
public IP address on a one-to-one basis.
True
False ( Missed)
Static Network Address Translation (SNAT) provides a mapping between private IP address and any of the IP
addresses belonging to the available public IP address pool.
True
False ( Missed)
Which of the following answers refers to a Network Address Translation (NAT) method that binds a combination of
private IP address and port number with a corresponding public IP address and port information?
PAT ( Missed)
RAS
GPG
EAP
A server with a private IP address has been set up to handle requests from an outside (public) network. Which of the
solutions listed below would enable this function?
Port bonding
Port labeling
Port forwarding ( Missed)
Port mirroring
LAN
MAN
WLAN
WAN ( Missed)
Which of the following answers list(s) the characteristic feature(s) of fiber-optic cabling? (Select all that apply)
4/5
Low bandwidth capacity
More suitable for carrying digital information than copper cabling ( Missed)
Total marks 30
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 3 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-3-exam-n10-006
Which of the following answers refers to an international standard for high-speed data communications over fiber-
optic media?
ISDN
HSPA+
LTE
SONET ( Missed)
A method that allows to combine multiple analog or digital data streams for transmission over a shared medium is
known as:
Multiplexing ( Missed)
Load balancing
Packet shaping
Frame aggregation
Which of the following answers refer(s) to the multiplexing method(s) used in fiber-optic communication? (Select all
that apply)
CDMA
CWDM ( Missed)
CSMA
DWDM ( Missed)
Which of the answers listed below refer to examples of packet-switching communication methods? (Select 2
answers)
What are the characteristic features of satellite Internet connections? (Select all that apply)
The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred
1/5
to as:
VDSL
ADSL ( Missed)
SDSL
UDSL
Which of the following solutions allows for simultaneous digital transmission of voice, video, data, and other network
services over a PSTN?
WiMAX
PoE
ISDN ( Missed)
HSPA+
32 bits
53 bytes ( Missed)
48 bits
56 bytes
Which of the following answers refers to a method for establishing a dedicated point-to-point link between two
networked devices?
PSK
PTR
PKI
PPP ( Missed)
MLPPP provides a method for combining two or more physical communication links into one logical interface for the
purpose of improved speed and redundancy.
True ( Missed)
False
Which of the technologies listed below enables the use of different types of network protocols on the same network?
LWAPP
MPLS ( Missed)
2/5
MLPPP
MIBS
Which of the following answers refer to cellular technologies used in mobile networks? (Select 3 answers)
CDMA ( Missed)
GSM ( Missed)
CSMA
LTE ( Missed)
DWDM
1G
2G
3G
4G ( Missed)
The characteristic feature of the Evolved High-Speed Packet Access (HSPA+) standard is the use of:
SDLC
MIMO ( Missed)
CSMA/CD
KVM
Which of the following Internet access types takes advantage of the traditional PSTN lines?
Fiber-optic
Mobile broadband
Dial-up ( Missed)
WiMAX
The IEEE 802.16 standards defining high-speed, long-distance wireless communication are also commonly referred
to as:
ISDN
SONET
WiMAX ( Missed)
HSPA+
In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of
network) and a WAN (larger type of network).
True ( Missed)
False
"Metro-Ethernet" is a general term for a computer network larger than a Local Area Network (LAN) and based on
3/5
Ethernet standards.
True ( Missed)
False
Dial-up
Leased line ( Missed)
Broadband cable
Satellite
Which of the following answers lists the maximum data transfer rate of an E1 connection?
1.544 Mbps
2.048 Mbps ( Missed)
34.368 Mbps
44.736 Mbps
1.544 Mbps
2.048 Mbps
34.368 Mbps
44.736 Mbps ( Missed)
Which of the answers listed below refers to the maximum data transfer rate of an E3 connection?
1.544 Mbps
2.048 Mbps
34.368 Mbps ( Missed)
44.736 Mbps
Optical Carrier (OC) transmission rate specifications adhere to a pattern whereby OC prefix is followed by a number
designating a multiple of the base unit of 51.84 Mbps.
True ( Missed)
False
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 4 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-4-exam-n10-006
1.544 Mbps
51.84 Mbps
44.736 Mbps
155.52 Mbps ( Missed)
Which of the answers listed below refers to the maximum data transfer rate of an OC-12 connection?
Which of the answers listed below refer(s) to example(s) of circuit-switching communication method(s)? (Select all
that apply)
Frame relay
POTS ( Missed)
T-carrier ( Missed)
ATM
E-carrier ( Missed)
What are the characteristic features of the RJ-11 connector? (Select 2 answers)
Which of the following answers refer to the RJ-45 connector? (Select 2 answers)
Which of the following connector types would be used for terminating a T-1 line?
RJ-45
1/5
RJ-48C ( Missed)
UTP
RJ-11
The RS-232 standard defines an interface for parallel data transmission method.
True
False ( Missed)
Which of the following connector types are used for connecting devices to a RS-232 port? (Select 2 answers)
RJ-11
DB-9/DE-9 ( Missed)
ST
RJ-48C
DB-25 ( Missed)
LC
A device used for the purpose of extending the length of various types of network cable runs is commonly referred to
as:
Coupler ( Missed)
Media converter
Amplifier
Cable certifier
Which of the connector types listed below are used with coaxial cabling? (Select 2 answers)
ST
MT-RJ
BNC ( Missed)
LC
F-connector ( Missed)
A mechanism that allows for connecting one set of wires with another set of wires in telecommunications closets or
local area networks (LANs) is commonly referred to as a punch-down block
True ( Missed)
False
The 66 block (older type/used in telephony) and the 110 block (newer type/used in networking) are examples of
punch-down blocks.
True ( Missed)
False
One of the differences between the UTP and STP cabling is that STP cable takes advantage of additional protective
2/5
cover reducing signal interference from outside sources.
True ( Missed)
False
Which of the cabling types listed below provide(s) protection against an outside signal interference? (Select all that
apply)
UTP
Coaxial ( Missed)
Fiber-optic ( Missed)
STP ( Missed)
In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each other in order to
reduce:
Cross-talk ( Missed)
Cable diameter
Collisions
Bend radius
What is the typical cable segment length for a copper twisted-pair Ethernet cable?
33 meters
55 meters
100 meters ( Missed)
250 meters
Category 3 (CAT3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring.
True ( Missed)
False
Which of the following answers list(s) the characteristic feature(s) of a Category 5 (CAT5) cabling? (Select all that
apply)
Which of the following twisted-pair copper cabling types is most commonly used in modern Ethernet networks?
CAT3
CAT4
CAT5
3/5
CAT5e ( Missed)
CAT5
CAT5e
CAT6 ( Missed)
CAT6A
The Category 6 (CAT6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas
CAT6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters.
True ( Missed)
False
A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used
for air handling is commonly referred to as:
Plenum ( Missed)
Access Point (AP)
Cable tray
HVAC system
A special type of cabling with a fire-retardant jacket placed inside the space between structural floor and dropped
ceiling or inside walls is known as a plenum-rated cabling.
True ( Missed)
False
Materials from which the plenum-rated cable's cover is made include low-smoke polyvinyl chloride (PVC) and
fluorinated ethylene polymer (FEP).
True ( Missed)
False
Which of the following answers list examples of coaxial cabling types? (Select 2 answers)
STP
RG-59 ( Missed)
Multimode fiber
UTP
RG-6 ( Missed)
Single mode fiber
Total marks 36
4/5
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 5 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-5-exam-n10-006
What kind of termination would be used to create a straight-through Ethernet cable? (Select 2 answers)
Rollover cable
Crossover cable
Patch cable ( Missed)
Yost cable
An Ethernet crossover cable uses T568A pin/pair assignment on one end and T568B pin/pair assignment on the
opposite end.
True ( Missed)
False
What type of Ethernet cable would be used for establishing a direct communication link between two PCs?
Patch cable
Crossover cable ( Missed)
Rollover cable
Straight-through cable
Which of the cable types listed below is often used to connect a computer terminal to a router's console port?
Crossover cable
Straight-through cable
Patch cable
Rollover cable ( Missed)
Which of the following answers list(s) example(s) of fiber-optic connectors (Select all that apply)
ST ( Missed)
DB-25
SC ( Missed)
LC ( Missed)
MT-RJ ( Missed)
FC ( Missed)
1/5
RG-6
The advantages of multimode fiber-optic cabling over single-mode cabling include data transfer rates over longer
distances, higher speed, and lower cost.
True
False ( Missed)
Which of the following answers refer to solutions used for controlling the light signal at a termination point of a fiber-
optic connection? (Select 2 answers)
APC ( Missed)
SCP
UPC ( Missed)
AUP
DLP
A network link consisting of two dissimilar media types requires an intermediary device known as:
Content filter
Patch panel
Media converter ( Missed)
Coupler
Which of the following tools would be used for attaching an RJ-45 connector to the end of a twisted-pair Ethernet
cable?
Which of the answers listed below refers to a tool used for attaching cables to a 110 block?
What is the name of a tool used for removing electrical insulation cover from electric wires?
Cable crimper
Snips
Wire stripper ( Missed)
Certifier
Which of the following answers refers to a specialized tool used for evening out wire ends?
2/5
Cable crimper
Needle-nose pliers
Wire stripper
Snips ( Missed)
Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that allows for locating faults and
breaks in fiber-optic cabling.
True ( Missed)
False
Which of the tools listed below allows for verification of the network cabling installation performance and its
compliance with TIA or ISO standards?
Multimeter
Cable certifier ( Missed)
Toner probe
Cable tester
A network topology in which each node has a direct physical connection to every other node is called:
Star
Partial mesh
Bus
Full mesh ( Missed)
Ring
Which of the following answers lists the number of connections in a full mesh network consisting of 10 nodes?
21
28
36
45 ( Missed)
Ring
Mesh ( Missed)
Bus
3/5
Star
In which type of network topology the main network cable becomes a single point of failure?
Star
Full mesh
Bus ( Missed)
Partial mesh
A network topology in which each node connects to exactly two other nodes is called:
Star topology
Bus topology
Dual ring topology ( Missed)
Mesh topology
Bus topology
Ring topology
Star topology ( Missed)
Mesh topology
True
False ( Missed)
True ( Missed)
False
Total marks 31
Total Questions 25
4/5
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 6 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-6-exam-n10-006
Which of the following network topologies is most commonly used in contemporary Ethernet LANs?
Bus topology
Star topology ( Missed)
Ring topology
Mesh topology
The advantages of the client-server model over peer-to-peer networking model include: (Select 3 answers)
A computer network connecting multiple smaller networks over very large geographical areas is known as:
PAN
LAN
MAN
WAN ( Missed)
True ( Missed)
False
A computer network connecting multiple LANs over an area of a city or campus is called:
PAN
LAN
MAN ( Missed)
WAN
A network connecting computers within a small geographical area such as a building or group of buildings is
1/5
commonly referred to as a:
PAN
LAN ( Missed)
MAN
WAN
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to
communicate with each other is commonly referred to as:
MAN
WLAN ( Missed)
LAN
VLAN
Network vulnerability
Bottleneck
Internet access ( Missed)
eDiscovery
A type of limited-range computer network used for data transmission among various types of personal devices
centered around a single workstation is known as:
PAN ( Missed)
LAN
MAN
WAN
Which of the following technologies can be used by devices communicating in a WPAN? (Select 3 answers)
Bluetooth ( Missed)
IEEE 802.3
Near Field Communication (NFC) ( Missed)
Infrared (IR) ( Missed)
100BASE-T
Which of the acronyms listed below refers to a general term used for a system providing the capability for remote
2/5
control, real-time monitoring, and gathering information related to industrial equipment?
RAS
ICS ( Missed)
KVM
IGP
Which of the following answers list examples of Industrial Control System (ICS) solutions? (Select 2 answers)
KVM
RADIUS
DCS ( Missed)
SCADA ( Missed)
IKE
Remote Terminal Unit (RTU) and Programmable Logic Controller (PLC) are examples of intelligent devices used in
systems designed to control and automate industrial processes.
True ( Missed)
False
Which of the following answers refers to a Cisco network architecture designed to improve the performance of video
and rich-media applications?
Medianet ( Missed)
TACACS+
Metro-Ethernet
eDiscovery
Which of the acronyms listed below refers to a solution that enables simultaneous two-way video and audio
transmissions between multiple networked hosts?
VPN
VTC ( Missed)
VDSL
VTP
The examples of technologies used for implementing VTC solutions include: (Select 2 answers)
UTM
IP/SIP ( Missed)
DCS
ISDN ( Missed)
SCADA
3/5
32 bits
48 bits
64 bits
128 bits ( Missed)
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration
Protocol (DHCP) for IPv4.
True ( Missed)
False
2002::/16
FE80::/64 ( Missed)
2001::/32
::1/128
Octagonal numbers
Binary numbers
Hexadecimal numbers ( Missed)
Decimal numbers
127.0.0.1
0:0:0:0:0:0:0:1 ( Missed)
169.254/16
::1 ( Missed)
FE80::/64
4/5
Your Final Report
Total marks 32
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 7 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-7-exam-n10-006
A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to
make the address shorter.
True ( Missed)
False
FE80::2AA::4C00:FE9A
FE80:0:2AA:0:4C:FE9A
FE80::2AA:0:4C00:FE9A ( Missed)
FE80:0:02AA::4C:FE9A
An IPv4 to IPv6 transition mechanism that allows IPv6 packets to be transmitted over an IPv4 network is known as:
6to4 ( Missed)
802.3af
eDiscovery
Miredo
Which of the following answers lists the binary notation of the decimal number 192?
10101100
11000000 ( Missed)
01111111
10101000
32 bits ( Missed)
48 bits
64 bits
128 bits
Which of the following answers lists the decimal notation of the binary number 10101100?
1/5
168
172 ( Missed)
192
255
255.255.225.0
255.255.191.0
255.255.127.0
255.255.64.0
None of the above is a valid subnet mask ( Missed)
Which of the following answers lists the default (classful) subnet mask for a class A network?
255.0.0.0 ( Missed)
255.128.0.0
224.0.0.0
255.224.0.0
192.168.0.3
127.0.0.1
169.254.10.20 ( Missed)
65.55.57.27
Which of the following answers lists the default (classful) subnet mask for a class B network?
255.252.0.0
255.255.0.0 ( Missed)
255.248.0.0
255.224.0.0
APIPA-assigned addresses are valid only for communications within a network segment that a given host is
connected to (a host with APIPA-assigned address cannot connect to the Internet).
True ( Missed)
False
Which of the following answers lists the default (classful) subnet mask for a class C network?
255.255.192.0
255.255.224.0
255.255.255.0 ( Missed)
255.255.252.0
2/5
An IPv4 address in the range 169.254.1.0 through 169.254.254.255 indicates a problem with what type of service?
SNMP
DNS
SMTP
DHCP ( Missed)
Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask?
/25
/26
/27 ( Missed)
/28
What is the first valid host address for a node residing in the 10.119.136.143/20 network?
10.119.96.1
10.119.128.1 ( Missed)
10.119.132.1
10.119.136.1
154.24.48.0
154.24.60.0
154.24.62.0
154.24.64.0 ( Missed)
Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?
192.168.31.255
192.168.47.255
192.168.63.255 ( Missed)
192.168.79.255
Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address
space? (Select 2 answers)
In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address
within that range belongs to the:
3/5
Class A address space ( Missed)
Class B address space
Class C address space
Class D address space
Which of the following answers list the characteristic features of the 172.16.0.0 - 172.31.255.255 IPv4 address
space? (Select 2 answers)
Class A range
Public IP address range
Class B range ( Missed)
Non-routable (private) IP address range ( Missed)
Class C range
What is the leading octet value range for an IPv4 address belonging to a class B network?
Which of the following answers list the characteristic features of the 192.168.0.0 - 192.168.255.255 IP address
space? (Select 2 answers)
Class A range
Public IP address range
Class B range
Non-routable (private) IP address range ( Missed)
Class C range ( Missed)
In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address
within that range belongs to the:
Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers)
128 - 191
Class B
192 - 223
Class C
224 - 239 ( Missed)
4/5
Class D ( Missed)
Total marks 29
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 8 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-8-exam-n10-006
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple
hosts on the same private LAN to share a single public IP address?
DNS
APIPA
NAT ( Missed)
DHCP
Which of the following solutions hides the internal IP addresses by modifying IP address information in IP packet
headers while in transit across a traffic routing device?
QoS
DHCP
NAT ( Missed)
DNS
Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the
Internet.
True ( Missed)
False
Which of the following answers refers to a Network Address Translation (NAT) method that binds a combination of
private IP address and port number with a corresponding public IP address and port information?
PAT ( Missed)
RAS
NAC
EAP
Which of the following answer(s) refer(s) to the characteristic features of a MAC address? (Select all that apply)
IPv6 to IPv4
MAC to IP
1/5
Domain name to IP
IP to MAC ( Missed)
Which of the following commands would be used to display MAC address in Linux?
ifconfig ( Missed)
ipconfig /all
ipconfig
ipconfig -a
Which of the following answers lists a command-line command used to display MAC address in MS Windows?
ifconfig
ipconfig /all ( Missed)
ipconfig
ipconfig -a
A type of network traffic intended for a particular group of hosts is known as:
Unicast
Multicast ( Missed)
P2P
Broadcast
A type of network traffic intended for a single host identified by a unique IP address is commonly referred to as:
Unicast ( Missed)
Multicast
Link local
Broadcast
Which of the following transmission types would be used to reach a networked host with unknown address?
Multicast
Point-to-point
Unicast
Broadcast ( Missed)
Which of the devices listed below is used for separating broadcast domains?
Active hub
Router ( Missed)
Layer 2 switch
Repeater
2/5
Bluejacking
Smurf attack ( Missed)
Brute force
Man-in-the-middle
In computer networking, a situation in which two or more demands are made simultaneously on equipment that can
handle only one at any given moment is commonly referred to as collision.
True ( Missed)
False
Which of the answers listed below refers to a network protocol providing means for controlling access to a
transmission medium?
CSMA ( Missed)
DWDM
CDMA
CWDM
Which of the following solutions allows for verifying the absence of other traffic on a shared medium before
transmitting in order to prevent collisions and loss of data in 802.3 networks?
CDMA
CSMA/CA
CWDM
CSMA/CD ( Missed)
Which of the following allows for controlling the shared medium in order to minimize collisions in 802.11 networks?
CWDM
CSMA/CD
CDMA
CSMA/CA ( Missed)
A loopback interface on a router provides the means for basic testing whether the router is on and operational.
True ( Missed)
False
A field in an IP datagram that specifies how many more hops a packet can travel before being discarded is called:
SPB
TTL ( Missed)
MTU
VTC
Which of the following mechanisms can be used to prevent routing loops? (Select 2 answers)
3/5
Maximum hop count ( Missed)
Time to live (TTL) ( Missed)
Default route
Maximum Transmission Unit (MTU)
Load balancing
A set of rules stored on a Layer 3 switch or a networked host that allows to determine the topology of the
surrounding network is commonly referred to as:
Routing metrics
Loopback interface
Routing table ( Missed)
Access Control List (ACL)
Which of the following command-line commands in MS Windows are used to display the contents of a routing table?
(Select 2 answers)
tracert
route print ( Missed)
nslookup
ipconfig /all
print route
netstat -r ( Missed)
Which of the answers listed below refers to the process of the automated update of a routing table?
Static routing
Route redistribution
Dynamic routing ( Missed)
Route aggregation
4/5
Your Final Report
Total marks 29
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 9 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-9-exam-n10-006
The term "Default route" refers to the network path used by a router for forwarding all packets with destination
addresses not listed in its routing table.
True ( Missed)
False
OSPF
RIPv2 ( Missed)
OTDR
IS-IS
RIPv2
OSPF ( Missed)
RIP
IS-IS ( Missed)
OTDR
OSPF
RIPv2
BGP ( Missed)
IS-IS
Examples of interior gateway routing protocols include: (Select all that apply)
BGP
RIPv2 ( Missed)
OSPF ( Missed)
IS-IS ( Missed)
A collection of IP networks and routers under the control of one administrative entity is commonly referred to as:
1/5
Which of the following protocol types is used for sharing routing information between autonomous systems (routing
domains)?
IGP
OSPF
EGP ( Missed)
IS-IS
What are the characteristic features of the Border Gateway Protocol (BGP)? (Select 2 answers)
Autonomous System Number (ASN) is a globally unique number allocated for a collection of networked systems that
operate common routing protocols and are under control of a single administrative authority.
True ( Missed)
False
A solution used to translate routing information between routers configured to use different routing protocols is
known as:
Which of the following networking protocols provide(s) redundancy? (Select all that apply)
DSCP
VRRP ( Missed)
ISAKMP
HSRP ( Missed)
TKIP
Which of the protocols listed below are used for designating a backup router in the event of an active router failure?
(Select 2 answers)
DSCP
VRRP ( Missed)
ISAKMP
HSRP ( Missed)
TKIP
2/5
A solution used to optimize and decrease the size of a routing table is known as:
In routing, a rough measure of distance between two networked hosts is commonly referred to as:
Latency
Default route
Hop count ( Missed)
MTU
Which of the following metrics describes the largest allowable data unit that can be transmitted across the network?
UTM
MTU ( Missed)
TTL
QoS
Which of the following provides a replacement for the Spanning Tree Protocol (STP)?
SIP
PGP
SPB ( Missed)
RTP
What is the common term for a group of protocols used to carry voice data over a packet-switched network?
VoIP ( Missed)
PSTN
PBX
POTS
Which of the following terms refers to a mechanism that allows for controlling network resources and assigning
priority to different types of traffic? (Select best answer)
Which of the answers listed below describe(s) the function of Differentiated Services Code Point (DSCP)
architecture? (Select all that apply)
Security
3/5
QoS ( Missed)
Authentication
Traffic management ( Missed)
Accounting
What is the functionality provided by the Class of Service (CoS) parameter? (Select all that apply)
Security
QoS ( Missed)
Authentication
Traffic management ( Missed)
Accounting
Which optional field in an Ethernet frame header can be used to enable the Quality of Service (QoS) functionality?
Preamble
CoS ( Missed)
Payload
CRC
Which of the following terms best describe(s) a system/infrastructure that integrates various types of voice, video,
and data services in a single user interface? (Select all that apply)
UC server ( Missed)
VPN concentrator
Autonomous System (AS)
Honeypot
Unified communications ( Missed)
Which of the following terms refers to a solution that allows multiple operating systems to work simultaneously on
the same hardware?
Virtualization ( Missed)
Clustering
Hyperthreading
Load balancing
A software application used to manage multiple guest operating systems on a single host system is called:
ICS server
Hypervisor ( Missed)
UC server
Virtual switch
Which of the networking protocols listed below enables creation of virtual routers?
4/5
NNTP
STP
VRRP ( Missed)
VTP
Total marks 34
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 10 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-10-exam-n10-006
Which of the answers listed below refers to a dedicated local network consisting of devices providing data access?
VLAN
SAN ( Missed)
iSCSI
NAS
A data transfer protocol for linking data storage components over a network is known as:
BootP
LDAP
iSCSI ( Missed)
SaaS
1000 bytes
1250 bytes
1500 bytes ( Missed)
2000 bytes
Which of the answers listed below refers to the MTU for a standard Ethernet frame?
500 bytes
750 bytes
1000 bytes
1500 bytes ( Missed)
A single non-standard Ethernet frame that allows for larger maximum payload size is commonly referred to as:
Magic packet
Jumbo frame ( Missed)
MTU black hole
Ping of death
A high-speed network technology primarily used to connect computer data storage is known as:
1/5
Which of the following acronyms refers to a dedicated storage appliance that can be added to a local network?
SPS
NAS ( Missed)
SAN
NFS
In which of the cloud computing infrastructure types clients, instead of buying all the hardware and software,
purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary
equipment?
IaaS ( Missed)
SaaS
PaaS
Which of the following cloud service types would provide the best solution for a web developer intending to create a
web app?
SaaS
PaaS ( Missed)
IaaS
A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating
the need to install and run the software on the customer's own computers is known as Software as a Service
(SaaS).
True ( Missed)
False
A cloud computing infrastructure offering a remote access to applications and pricing based on monthly or annual
subscription fee is called:
A dedicated software tool used to monitor and examine contents of network traffic is known as: (Select all that apply)
Port scanner
Packet sniffer ( Missed)
Vulnerability scanner
Protocol analyzer ( Missed)
Which of the following tools would be used to identify running services on a networked host?
Packet sniffer
Loopback interface
2/5
Protocol analyzer
Port scanner ( Missed)
Which of the following answers refers to a protocol used in network management systems for the monitoring of
network-attached devices?
SIP
SNMP ( Missed)
NetBIOS
RTP
A software module on a managed device that sends SNMP notifications to the managing station is called:
Agent ( Missed)
UC gateway
Proxy
ICS server
Which of the following answers provides a replacement term for SNMP notification?
Jumbo frame
Trap ( Missed)
Community string
SSID broadcast
An SNMP management station receives SNMP notifications from Agents on UDP port:
161
137
162 ( Missed)
138
161 ( Missed)
137
162
138
Which of the following Net-SNMP commands are used for retrieving information from an SNMP-capable device?
(Select all that apply)
snmpset
snmpwalk ( Missed)
snmpget ( Missed)
snmptranslate
3/5
An SNMP-compliant device includes a virtual database called Management Information Base (MIB) containing
information about configuration and state of the device that can be queried by the SNMP management station.
True ( Missed)
False
A type of server used for collecting system messages from networked devices is known as:
Web server
UC server
Syslog server ( Missed)
ICS server
Which of the acronyms listed below refers to a technology that allows for real-time analysis of security alerts
generated by network hardware and applications?
LACP
DSCP
SIEM ( Missed)
LWAPP
Which of the following terms refers to a solution used for controlling temperature and humidity?
SCADA
HIPS
TEMPEST
HVAC ( Missed)
The process of planning and designing new WLANs for optimal performance, security, and compliance typically
involves:
Penetration testing
Wireless site survey ( Missed)
Vulnerability scanning
End user awareness and training
Total marks 27
4/5
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 11 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-11-exam-n10-006
A type of transmission that takes place in two directions simultaneously is known as:
Which of the answers listed below refer(s) to a policy that allows employees to use their own mobile devices on the
corporate network? (Select all that apply)
Chain of custody
Mobile device on-boarding ( Missed)
Fair access policy
BYOD ( Missed)
Mobile device off-boarding
Which security measure is in place when a client is denied access to the network due to an outdated antivirus
software?
NAS
DMZ
NAC ( Missed)
NAT
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the
network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the
network. NAC can be implemented as Pre-admission NAC where a host must, for example, be virus free or have
patches applied before it is allowed to connect to the network, and/or Post-admission NAC, where a host is being
granted/denied permissions based on its actions after it has been provided with the access to the network.
True ( Missed)
False
A logical network diagram is a document that describes the detailed layout of the building and the way the devices
are connected to the network through the actual cabling that transmits data.
1/5
True
False ( Missed)
A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert
attacker's attention from the corporate network is known as:
Honeynet
Rogue access point
Honeypot ( Missed)
Flood guard
A network device designed for managing the optimal distribution of workloads across multiple computing resources
is called:
A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is
commonly referred to as:
VPN
Bridge
VLAN
DMZ ( Missed)
Which of the following answers refer(s) to a type of software embedded into hardware device? (Select all that apply)
HIDS
Device driver
BIOS ( Missed)
Firmware ( Missed)
A computer program/code that provides software interface to hardware devices enabling operating systems and
other computer programs to interact with the device is commonly referred to as a device driver.
True ( Missed)
False
Which of the terms listed below refers to a logical grouping of computers that allow computer hosts to act as if they
were attached to the same broadcast domain regardless of their physical location?
VLAN ( Missed)
DMZ
UC gateway
SNMP community
2/5
A Cisco-proprietary protocol for distributing VLAN information across the network is known as:
STP
VTP ( Missed)
VRRP
VTC
Which of the following solutions provide(s) protection against switching loops? (Select all that apply)
STP ( Missed)
802.1d ( Missed)
NTP
RSTP ( Missed)
VTC
802.1w ( Missed)
Which of the terms listed below refer(s) to a newer replacement for the Spanning Tree Protocol (STP)? (Select all
that apply)
802.1d
LACP
802.1w ( Missed)
RSTP ( Missed)
Data from multiple VLANs on a single switch is carried through a single network link between switches. This is often
referred to as:
Port labeling
Port trunking ( Missed)
Port bonding
Port filtering
A switch port configured to pass all the data, regardless of the VLAN number, between all switches on a LAN is
known as:
Default gateway
Trunk port ( Missed)
Captive portal
Mirrored port
To allow for multiple VLANs on a single link, frames from individual VLANs must be identified. The most common
and preferred method, IEEE 802.1Q, adds a tag to the Ethernet frame header labeling it as belonging to a certain
VLAN.
True ( Missed)
False
3/5
Which of the following solutions enables combining several physical ports into a single logical channel?
RSTP
VRRP
LACP ( Missed)
HSRP
Which of the following allows an administrator to inspect the traffic passing through a network switch?
In dynamic VLAN configuration, a device connecting to a certain switch port automatically becomes a member of
the VLAN assigned to that port.
True
False ( Missed)
Static VLAN configuration relies on assigning VLAN membership by examining the MAC address of the device
connecting to a switch port.
True
False ( Missed)
A solution that allows to supply electricity over standard Ethernet cables is known as: (Select all that apply)
IEEE 802.3ab
PoE ( Missed)
Metro-Ethernet
IEEE 802.3af ( Missed)
PSTN
IEEE 802.1d
IEEE 802.3at ( Missed)
IEEE 802.1x
IEEE 802.3ab
4/5
Your Final Report
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 12 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-12-exam-n10-006
The process of managing a network device via a connection other than the regular network link used by the device
to send and receive network traffic is known as:
Session hijacking
Out-of-band management ( Missed)
Backdoor access
In-band management
Which of the answers listed below refers to a Layer 2 network switch with configuration features that can be
changed through a user interface?
Unmanaged switch
Remote Terminal Unit (RTU)
Active hub
Managed switch ( Missed)
The process of moving from one Wireless Access Point (WAP) coverage area to another without re-authentication or
loss in connectivity is commonly referred to as:
Roaming ( Missed)
Switching
Routing
DHCP relay
Which of the following answers lists an example of a protocol used for implementing control over multiple Wireless
Access Points (WAPs)?
RTSP
LWAPP ( Missed)
LDAP
MGCP
What type of device would be the most convenient for interconnecting two or more physically separated network
segments?
An administrator needs to adjust multiple Access Point (AP) placement in order to ensure the best coverage for the
network. Which of the following tools would be of help while identifying the areas of low signal strength?
1/5
Heat map ( Missed)
Power level controls
Logical network diagram
Wi-Fi hotspots
A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as:
Scope
Channel ( Missed)
Service set
Baseline
A situation in which multiple channels share the frequency band causing interference and performance degradation
for devices operating on channels that are too close to each other is called:
Cross-talk
Channel overlapping ( Missed)
Collision
Channel bonding
Which of the following answers refers to the measurement of data transfer rate that excludes all protocol overhead
information as well as retransmission of lost data packets?
Goodput ( Missed)
Bandwidth cap
Throughput
Baseline
Modified older wireless standards that allow complaint devices to achieve higher speeds include: (Select all that
apply)
802.11x
802.11a-ht ( Missed)
802.11ac
802.11g-ht ( Missed)
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
2/5
War chalking
Tailgating
War driving ( Missed)
Shoulder surfing
Which of the following answers refers to a common antenna type used as a standard equipment on most Access
Points (APs) for indoor Wireless Local Area Network (WLAN) deployments?
Which of the antenna types listed below provide a 360-degree horizontal signal coverage? (Select 2 answers)
Unidirectional antenna
Dipole antenna ( Missed)
Dish antenna
Omnidirectional antenna ( Missed)
Yagi antenna
Which of the following answers refer(s) to highly directional antenna type(s) used for long-range point-to-point
bridging links? (Select all that apply)
Dipole antenna
Omnidirectional antenna
Dish antenna ( Missed)
Non-directional antenna
Unidirectional antenna ( Missed)
Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data
throughput due to the use of multiple antennas and multiple data streams.
True ( Missed)
False
Which of the answers listed below refers to the new feature introduced with the IEEE 802.11ac standard?
MIMO
40-Hertz mode
MU-MIMO ( Missed)
Maximum data signaling rate of up to 600 Mbps
Which of the following WAP configuration settings allows for adjusting the boundary range of the wireless signal?
3/5
Power level controls ( Missed)
Quality of Service (QoS)
Wi-Fi Protected Setup (WPS)
Bandwidth cap
A type of management frame containing information about the wireless network that helps wireless-capable devices
discover the presence of a Wireless LAN (WLAN) is known as:
Which of the following serves as a unique identifier for a WLAN (a wireless network name)?
EUI
SSID ( Missed)
OUI
CNAME
A wireless networking topology in which client devices communicate directly with each other without the use of a
controlling Access Point (AP) is known as: (Select 3 answers)
A wireless networking topology consisting of at least one Access Point (AP) is known as:
A Wireless Local Area Network (WLAN) operating in an infrastructure mode with the use of more than one Access
Point (AP) is referred to as:
4/5
Service Set Identifier (SSID)
Extended Service Set (ESS) ( Missed)
Basic Service Set (BSS)
Independent Basic Service Set (IBSS)
A device designed to provide emergency power during an unexpected main power source outage is called:
UPS ( Missed)
PoE
SVC
PSU
Total marks 31
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 13 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-13-exam-n10-006
Which of the following answers lists an example method for passive test of security controls?
Tabletop exercises
Pentest
Vulnerability scan ( Missed)
War chalking
Penetration test performed by an authorized professional with the full prior knowledge on how the system that is to
be tested works is called:
Black hat
White box testing ( Missed)
Fuzz testing
Black box testing
Penetration test of a computer system without the prior knowledge on how the system that is to be tested works is
commonly referred to as black box testing.
True ( Missed)
False
An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false
requests and in result doesn't have time or resources to handle legitimate requests is called:
Bluejacking
MITM attack
Session hijacking
1/5
Bluesnarfing
DoS attack ( Missed)
As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a
Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform attack against
its target.
True ( Missed)
False
A collection of intermediary compromised systems that are used as a platform for a DDoS attack is known as:
Honeynet
Botnet ( Missed)
Quarantine network
Network controllers
Malware
IP spoofing ( Missed)
Privilege escalation
DDoS ( Missed)
Polymorphic malware
Order of volatility
Large amount of ICMP echo replies ( Missed)
True ( Missed)
False
Which of the following exploits takes advantage of the spoofed MAC address?
Bluejacking
DNS poisoning
MAC filtering
ARP poisoning ( Missed)
An email sent from unknown source disguised as a source known to the message receiver is an example of: (Select
all that apply)
Spoofing ( Missed)
Bluesnarfing
Shoulder surfing
Bluejacking
2/5
Social engineering ( Missed)
Which of the following terms is used as a synonym for a rogue Access Point (AP)?
Trojan horse
Evil twin ( Missed)
Backdoor
Computer worm
Spear phishing
Bluejacking
War driving ( Missed)
Shoulder surfing
Penetration test
Scanning for unsecured wireless networks while driving in a car ( Missed)
Vulnerability scan
Marking unsecured wireless networks
Phishing
Bluejacking ( Missed)
Vishing
Bluesnarfing
MITM attack
Bluejacking
Phishing
Bluesnarfing ( Missed)
Which of the following technologies simplifies configuration of new wireless networks by providing non-technical
users with a capability to easily configure network security settings and add new devices to an existing network?
3/5
WPA
WPS ( Missed)
WEP
WAP
Which of the following wireless technologies are not recommended and should not be used due to their known
vulnerabilities? (Select 2 answers)
WPS ( Missed)
WAP
WPA2
WAF
WEP ( Missed)
An attack against encrypted data that relies heavily on computing power in order to check all possible keys and
passwords until the correct one is found is known as a brute-force attack.
True ( Missed)
False
Port filtering
Cleartext credentials
Access Control List (ACL)
Encryption ( Missed)
The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data
is known as:
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later
by an attacker for the purpose of identity theft is an example of:
Bluesnarfing
Brute-force attack
Social engineering ( Missed)
Bluejacking
User authentication
4/5
Strong passwords
Changing default user names
User education ( Missed)
Total marks 32
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 14 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-14-exam-n10-006
Phishing
DDoS
Xmas attack
MITM ( Missed)
Switch spoofing and double tagging are two primary methods of attacking networked resources on:
WLAN
VPN
VLAN ( Missed)
PAN
Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private
computer systems are commonly referred to as:
Adware
Malware ( Missed)
Computer viruses
Spyware
New accounts
Patched software
Vulnerability that is present in already released software but unknown to the software developer ( Missed)
Well known vulnerability
One of the measures for securing networking devices includes the practice of disabling unused ports.
True ( Missed)
False
A hacker has captured network traffic with cleartext commands sent from the client to the server console. Which of
the following ports is being used by the network admin for the client-server communication?
1/5
49
23 ( Missed)
68
22
A secure version of the HTTP protocol is known as: (Select all that apply)
HSPA
HTTP over SSL ( Missed)
HSRP
HTTP over TLS ( Missed)
HTTPS ( Missed)
Which of the following answers refers to a preferred replacement for the SLIP protocol?
PoE
PPP ( Missed)
CHAP
PAP
Which of the protocols listed below transmit(s) data in an unencrypted form? (Select all that apply)
SCP
IPsec
SNMPv1 ( Missed)
FTP ( Missed)
Telnet ( Missed)
SFTP
Which of the following protocols allow(s) for secure file transfer? (Select all that apply)
FTPS ( Missed)
TFTP
FTP
SFTP ( Missed)
SCP ( Missed)
FTPS is an extension to the Secure Shell protocol (SSH) and runs by default on port number 22.
True
False ( Missed)
Unblocking port number 22 enables what type of traffic? (Select all that apply)
SSH ( Missed)
2/5
SFTP ( Missed)
FTP
SCP ( Missed)
FTPS
FTP
TFTP ( Missed)
SCP
SFTP
Which version(s) of the SNMP protocol offer(s) only authentication based on community strings sent in an
unencrypted form? (Select all that apply)
SNMPv1 ( Missed)
SNMPv2 ( Missed)
SNMPv3
SNMPv4
Of the three existing versions of the Simple Network Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and
SNMPv2) offer authentication based on community strings sent in an unencrypted form (in cleartext). SNMPv3
provides packet encryption, authentication, and hashing mechanisms that allow for checking whether data has
changed in transit.
True ( Missed)
False
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote
command-line login, remote command execution, and other secure network services between two networked
computers?
Telnet
SSH ( Missed)
Bcrypt
TFTP
Which of the protocols listed below was designed as a secure replacement for Telnet?
CHAP
FTP
SSH ( Missed)
LDAP
Directory access
3/5
Secure file transfer ( Missed)
Network addressing
Sending emails
Which of the following protocols are used for securing HTTP connections? (Select 2 answers)
SCP
Telnet
SSL ( Missed)
SNMP
TLS ( Missed)
Tunnel ( Missed)
Payload
Transport
Default
Which of the following solutions provides a shielded environment that protects against unintentional signal leakage
and eavesdropping?
SCADA
TEMPEST ( Missed)
HVAC
RADIUS
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify
malicious code are known as:
Repositories
Signature files ( Missed)
Macros
Security logs
Driver updates
Audit trails
Engine updates ( Missed)
OS updates
Virus signature updates ( Missed)
The term "DHCP snooping" refers to an exploit that enables operation of a rogue DHCP server on the network.
True
4/5
False ( Missed)
Total marks 38
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 15 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-15-exam-n10-006
Which of the following security solutions allows for discarding ARP packets with invalid IP-to-MAC address
bindings?
DCS
SIEM
DAI ( Missed)
RARP
What is the name of a network access control method used to grant or deny access to the network based on the
physical address of the Network Interface Card (NIC)?
Which of the following answers refers to a set of rules that specify which users or system processes are granted
access to objects as well as what operations are allowed on a given object?
PKI
NAT
WPS
ACL ( Missed)
Which of the functionalities listed below allows a DLP system to fulfil its role?
Motion detection
Environmental monitoring
Content inspection ( Missed)
Loop protection
What type of filtering allows for controlling specific types of network traffic (e.g. web, mail, file transfer)?
IP
URL
Port ( Missed)
MAC
Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?
1/5
Implicit deny policy ( Missed)
Acceptable Use Policy (AUP)
Quality of Service (QoS)
Encryption mechanisms designed for securing wireless networks include: (Select all that apply)
WMS
WPA ( Missed)
MD5
WPA2 ( Missed)
WEP ( Missed)
Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known
vulnerabilities resulting from implementation flaws?
EAP
AES
WPA2
WEP ( Missed)
Solutions designed to strengthen existing WEP implementations without the requirement for replacement of legacy
hardware include: (Select 2 answers)
WPA ( Missed)
UTM
TKIP ( Missed)
802.11i
WPS
WEP
WPA2 ( Missed)
PAP
WPA
Which of the following wireless encryption schemes offers the highest level of protection?
WEP
WPA2 ( Missed)
WAP
WPA
Which part of the AAA framework deals with verification of the identity of a person or process?
Authorization
2/5
Non-repudiation
Authentication ( Missed)
Accounting
Challenge Handshake Authentication Protocol (CHAP) is a remote access authentication protocol that periodically
re-authenticates client at random intervals in order to prevent session hijacking.
True ( Missed)
False
Password Authentication Protocol (PAP) does not offer encryption and sends passwords in clear text.
True ( Missed)
False
Which of the answers listed below refers to a multi-protocol authentication framework frequently used in 802.11
networks and point-to-point connections?
PAP
MS-CHAP
EAP ( Missed)
CHAP
Which of the following is the default port number used by the Kerberos authentication system?
88 ( Missed)
443
84
3389
Authentication process can be based on different categories of authentication factors, including unique physical
traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something
you have"), or user names and passwords ("something you know"). Additional factors might include geolocation
("somewhere you are"), or user-specific activity patterns, such as for example keyboard typing style ("something you
do"). Multifactor authentication systems require implementation of authentication factors from two or more different
categories.
True ( Missed)
False
An authentication subsystem that enables a user to access multiple, connected system components (such as
3/5
separate hosts on a network) after a single login at only one of the components is commonly referred to as:
Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash
function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the main
content. In case there's any change to the data after the original hash was taken, the next time when hash function
is applied the resulting hash value calculated after content modification will be different from the original hash. In
computer forensics procedures, comparing hashes taken at different stages of evidence handling process ensures
that the evidence hasn't been tampered with and stays intact.
True ( Missed)
False
Trust models
Encryption algorithms
Hash functions ( Missed)
Virus signatures
The term "Mantrap" refers to a physical security access control system used to prevent unauthorized users from
gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance
point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until
he/she provides authentication token required to unlock the inner door.
True ( Missed)
False
Which of the answers listed below refer to physical security detective controls? (Select 2 answers)
Security guard
Hardware firewall
IP camera ( Missed)
Quarantine network
CCTV ( Missed)
In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for
identification and access control purposes.
True ( Missed)
False
Which of the following answers refer(s) to physical security control solution(s)? (Select all that apply)
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 16 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-16-exam-n10-006
Which of the following extends the functionality of a conventional firewall by preventing the execution of malicious
code?
Multilayer switch
Application firewall ( Missed)
Stateful packet inspection
Dynamic packet filtering
Which of the terms listed below refers to the dynamic packet filtering concept?
Port mirroring
Stateful inspection ( Missed)
Out-of-band management
Stateless inspection
Stateless inspection is a firewall technology that keeps track of the state of network connections and based on that
data determines which network packets to allow through the firewall.
True
False ( Missed)
Which of the following acronyms refers to a network security solution combining the functionality of a firewall with
additional safeguards such as URL filtering, content inspection, or malware inspection?
MTU
MGCP
UTM ( Missed)
PGP
The term "Virtual wire" refers to a solution that allows for creating logical binding between two ports and passing all
traffic between them without any switching or routing.
True ( Missed)
False
802.1D
802.1Q
802.1W
802.1X ( Missed)
The process of searching, collecting, and securing electronic data with the intent of using it in a legal proceeding or
investigation is known as:
1/5
eDiscovery ( Missed)
Legal hold
Chain of custody
Logging
In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:
Proxy list
Order of volatility
Access log
Chain of custody ( Missed)
In forensic analysis, taking hashes ensures that the collected digital evidence retains its:
Confidentiality
Integrity ( Missed)
Order of volatility
Availability
According to the network troubleshooting theory, verification of full system functionality and implementation of
applicable preventative measures should come as the last two steps of the troubleshooting process.
True
False ( Missed)
Which of the following actions should be the first three main steps in the network troubleshooting process? (Select 3
answers)
Which action should come next after the theory of probable problem cause has been established in the
troubleshooting process?
Questioning users
Testing the theory to determine the problem cause ( Missed)
Duplicating the problem, if possible
Identifying symptoms
Once a plan of action to resolve a problem has been established, the next step in the network troubleshooting
methodology process is to:
Which of the following are the last two steps in the network troubleshooting process? (Select 2 answers)
Verifying full system functionality and if applicable implementing preventative measures ( Missed)
Establishing a plan of action to resolve the problem and identifying potential effects
Documenting findings, actions and outcomes ( Missed)
Implementing the solution or escalating as appropriate
Testing the theory to determine cause
The very last step of the network troubleshooting process involves documenting findings, actions and outcomes.
This step comes after verification of full system functionality and implementation of applicable preventative
measures.
True ( Missed)
False
Which of the following commands in MS Windows is used to display help information related to a specific network
command-line utility?
[command] /? ( Missed)
man [command]
[command] --help
info [command]
What is the name of a Windows command-line utility that is used to display TCP/IP configuration settings?
ifconfig
nslookup
ipconfig ( Missed)
netstat
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP
configuration information for all adapters?
/?
/displaydns
/all ( Missed)
/-a
A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network
connections is called:
tracert
traceroute
3/5
netstat ( Missed)
nslookup
Which netstat parameter allows to display all active TCP connections and the TCP and UDP ports on which the
computer is listening?
-a ( Missed)
-p
-e
-r
What is the name of a Linux command-line utility that is used to display TCP/IP configuration settings?
ifconfig ( Missed)
netstat
nslookup
ipconfig
A command-line network administration utility that operates by sending Internet Control Message Protocol (ICMP)
echo request packets to the destination host and waiting for a reply in order to test the communication with another
computer on an Internet Protocol (IP) network is called ping.
True ( Missed)
False
What is the correct syntax for checking the IPv6 connectivity with another network node (host1) in MS Windows?
(Select 2 answers)
Which of the command-line commands listed below allows for sending an ICMPv6 echo request to another network
node (host1) in Linux OS?
ping host1 -6
ping ipv6.host1
ping6 host1 ( Missed)
ping -6 host1
A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their
way to another host is called:
ping
traceroute
nslookup
4/5
tracert ( Missed)
Total marks 29
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 17 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-17-exam-n10-006
A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its
way to another network node is known as:
nbtstat
traceroute ( Missed)
netstat
tracert
Which of the following commands in MS Windows displays the route taken by IPv6 packets on their way to another
host?
traceroute6
tracert6
traceroute -6
tracert -6 ( Missed)
A network command-line command in Linux that tracks and displays the route taken by IPv6 packets on their way to
another network node is called: (Select 2 answers)
traceroute6 ( Missed)
tracert6
traceroute -6 ( Missed)
tracert -6
Which of the following answers lists a Windows command-line utility designed to be of help in troubleshooting
NetBIOS name resolution problems?
nbtstat ( Missed)
ping
netstat
tracert
Which of the following tools allows for obtaining domain name to IP address mapping information?
netstat
nslookup ( Missed)
tracert
pathping
Which command in MS Windows displays a table consisting of IP addresses and their resolved Ethernet or Token
Ring physical addresses?
arp -a ( Missed)
1/5
netstat -n
nslookup
arp -e
Which of the network command-line utilities in MS Windows combines the features of ping and tracert?
nbtstat
pathping ( Missed)
nslookup
netstat
Which of the following tools would be used for locating a cable in a cabling bundle or tracing individual wires in a
cable?
Spectrum analyzer
Toner and probe kit ( Missed)
Time Domain Reflectometer (TDR)
Multimeter
A network service provider site set up in order to allow remote read-only access to routers operating on the
provider's network is called:
Honeypot
Captive portal
Looking glass site ( Missed)
Speed test site
Which of the server types listed below would be used for troubleshooting network-wide routing problems?
ICS server
LG server ( Missed)
UC server
DNS server
Which of the following tools would be of help in troubleshooting signal loss and low wireless network signal
coverage? (Select all that apply)
Protocol analyzer
WAP power level controls ( Missed)
Logical network diagram
Optical Time Domain Reflectometer (OTDR)
Heat map ( Missed)
Which of the following can be the source of RFI and cause disruptions in wireless network connectivity? (Select all
that apply)
2/5
Cordless phones ( Missed)
Baby monitors ( Missed)
Microwave ovens ( Missed)
Bluetooth devices ( Missed)
STP cabling
Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the
same area without causing interference.
True ( Missed)
False
The 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the
available spectrum. Which of the channel choices listed below allow for setting up three Wireless Access Points
(WAPs) that would operate on non-overlapping channels? (Select 3 answers)
1 ( Missed)
5
6 ( Missed)
9
11 ( Missed)
A metric that compares the amount of usable data and the background noise that is being sent over a transmission
channel is known as:
BRI
SNR ( Missed)
RFI
SVC
The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for the purpose of eavesdropping or
stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with
the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting
hosts.
True ( Missed)
False
802.11n
802.11a
802.11b ( Missed)
802.11ac
IEEE 802.11n offers backward compatibility with which of the following standards? (Select all that apply)
3/5
802.11g ( Missed)
802.11ac
802.11b ( Missed)
802.11a ( Missed)
A type of architecture in which most of the network configuration settings of an Access Point (AP) are set and
managed with the use of a central switch or controller is called:
Thin AP ( Missed)
Infrastructure mode
Thick AP
Ad hoc mode
The term "Thick AP" refers to a stand-alone Access Point (AP) device type offering network configuration settings
that can be managed through a User Interface (UI) after logging in to the device.
True ( Missed)
False
Which Access Point (AP) architecture is the most common in home or small office deployments?
IBSS
Thin AP
Ad hoc mode
Thick AP ( Missed)
The environmental factors that may impede the propagation of wireless signal include: (Select all that apply)
In structured cabling, the interference between signals sent over adjacent wires is commonly referred to as:
Db loss
Split horizon
Attenuation
Cross-talk ( Missed)
Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select all that apply)
ESD
Channel overlapping
Cross-talk ( Missed)
4/5
EMI ( Missed)
EMI shielding protects the transferred data signals from: (Select all that apply)
Total marks 38
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 18 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-18-exam-n10-006
Which of the cabling types listed below is susceptible to a split pair error? (Select all that apply)
STP ( Missed)
Twisted pair ( Missed)
Single mode fiber
Coaxial
UTP ( Missed)
Multimode fiber
Which of the following statements refer(s) to reversed TX/RX? (Select all that apply)
A type of Ethernet interface that automatically detects the required cable connection type (straight-through vs.
crossover) and configures the connection appropriately is known as:
GBIC
Basic-Rate Interface (BRI)
UC gateway
Auto MDI-X ( Missed)
GBIC and SFP are transceiver types that perform conversion between electrical and optical signals.
True ( Missed)
False
A network admin is able to ping remote host by its IP address, but not by FQDN. Which of the following is the most
probable source of the problem?
ICMP
DNS ( Missed)
NetBIOS
DHCP
Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their
capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based
on the highest performance settings supported by both devices.
1/5
True ( Missed)
False
A limit on the maximum amount of data in a single packet that can be transmitted without fragmentation over a
network segment is known as:
UTM
MDI
TTL
MTU ( Missed)
The term "MTU black hole" refers to a situation in which a network router silently discards a packet that is larger
than the maximum packet size set for the network link.
True ( Missed)
False
The process of combining multiple physical network adapters into a single logical interface is known as:
Route aggregation
Virtualization
NIC teaming ( Missed)
Device pairing
In a sample active-active NIC teaming configuration consisting of two network adapters all traffic is handled by one
of the network adapters. When a failure occurs all the traffic moves to the standby adapter.
True
False ( Missed)
Which of the following network adapter teaming modes allows for increasing the available bandwidth?
Point-to-point
Active-active ( Missed)
Point-to-multipoint
Active-passive
Malicious software collecting information about users without their knowledge/consent is known as:
Logic bomb
Adware
Computer worm
Spyware ( Missed)
Which type of files pose the greatest risk related to the distribution of malware?
.png
.exe ( Missed)
2/5
.txt
.pdf
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is
called:
Adware
Computer worm
Trojan horse ( Missed)
Spyware
In computer security, an automatic download performed without the user's consent (and often without any notice)
aimed at installing malware or potentially unwanted programs is known as a drive-by download.
True ( Missed)
False
Keylogger ( Missed)
Trojan horse
Computer worm
Backdoor
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a
program, online service, or an entire computer system?
Spyware
Trojan
Rootkit
Backdoor ( Missed)
Web browser extensions (a.k.a. plugins, or add-ons) are downloadable components that extend the browser's
functionality by enabling interactive features of web pages. Downloading and installing browser extensions can be
risky, because some of them may contain malicious code and in disguise of a legitimate program introduce malware
to the user's system.
True ( Missed)
False
Trojan
Logic bomb ( Missed)
Dropper
Retrovirus
A standalone malicious computer program that replicates itself over a computer network is known as:
3/5
Spyware
Worm ( Missed)
Trojan
Spam
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the
user performs requested action is known as:
Grayware
Adware
Ransomware ( Missed)
Spyware
Which of the following terms refers to unwanted applications or files that are not classified as malware, but can
worsen the performance of computers and pose security risk?
Grayware ( Missed)
Shareware
Ransomware
Freeware
Which of the answers listed below refer(s) to the ping of death attack? (Select all that apply)
Which of the following terms is used to describe the initial information, such as type of software run and version
number, displayed by remote server after connecting to a service on that server?
Log
Trap
Signature
Banner ( Missed)
The practice of connecting to an open port on a remote server to gather more information about the service running
on that port is known as:
Bluejacking
Banner grabbing ( Missed)
Session hijacking
eDiscovery
Total marks 29
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 19 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-19-exam-n10-006
Which of the answers listed below refer to the split horizon mechanism? (Select 2 answers)
A device providing remote line diagnostics capability placed at the joining point between an ISP's line and
customer's premises wiring is known as:
Demarc
Smart jack ( Missed)
UTM appliance
Line tester
Which of the following answers list examples of a Network Interface Unit (NIU)? (Select 2 answers)
F-connector
Remote Terminal Unit (RTU)
Smart jack ( Missed)
Network Interface Card (NIC) ( Missed)
Leased line
A physical point where an ISP's network ends and connects with the customer's on-premises wiring (which also
defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is commonly
referred to as demarc.
True ( Missed)
False
Which of the following devices would be used for connecting a router to a T-1 line?
OTDR
CSU/DSU ( Missed)
F-connector
MDI-X
Layer 2
Layer 7
1/5
Layer 1 ( Missed)
Layer 4
Which of the following reside(s) at the physical layer of the OSI model? (Select all that apply)
Router
Hub ( Missed)
Switch
Network cabling ( Missed)
Bridge
What is the name of a data unit used at the OSI physical layer?
Frame
Segment
Bit ( Missed)
Packet
Transport layer
Network layer
Data link layer ( Missed)
Physical layer
In the OSI model, Media Access Control (MAC) and Logical Link Control (LLC) sublayers are the components of:
Session layer
Data link layer ( Missed)
Transport layer
Network layer
Which of the following devices resides at the data link layer of the OSI model?
Router
Passive Hub
Ethernet switch ( Missed)
2/5
Repeater
Layer 2
Layer 5
Layer 3 ( Missed)
Layer 4
Layer 3 ( Missed)
Layer 1
Layer 4
Layer 6
Which of following protocols reside(s) at the OSI network layer? (Select all that apply)
IPv4 ( Missed)
UDP
IPsec ( Missed)
TCP
IPv6 ( Missed)
ICMP ( Missed)
3/5
Presentation layer of the OSI model
In the OSI model, User Datagram Protocol (UDP) resides at: (Select 2 answers)
Layer 3
Transport layer ( Missed)
Layer 4 ( Missed)
Network layer
Layer 6
Network layer
Data link layer
Session Layer
Transport layer ( Missed)
The transport layer resides between which two other layers in the OSI model?
In the OSI model, Transmission Control Protocol (TCP) resides at: (Select all that apply)
Layer 7
Transport layer ( Missed)
Layer 3
Application layer
Layer 4 ( Missed)
Network layer
Which OSI layer assumes the responsibility for managing network connections between applications?
Network layer
Data link layer
Application layer
Session layer ( Missed)
4/5
Presentation layer
Layer 4
Layer 6
Layer 5 ( Missed)
Layer 3
Total marks 34
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 20 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-20-exam-n10-006
Which of the protocols listed below resides at the session layer of the OSI model?
HTTP
UDP
SMTP
NetBIOS ( Missed)
IP
Session layer
Presentation layer ( Missed)
Network layer
Physical layer
Layer 1
Layer 3
Layer 6
1/6
Layer 7 ( Missed)
Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)
ARP
HTTP ( Missed)
FTP ( Missed)
SMTP ( Missed)
NetBIOS
The process of adding control information to data as it passes through the layers of the OSI model at the receiving
end of the network communication link is known as encapsulation.
True
False ( Missed)
Which of the answers listed below refers to a mechanism that allows for simultaneous transmission of multiple
signals over a single cable or other network medium?
Baseband
Multiplexing ( Missed)
Load balancing
Route aggregation
Which of the following devices provides the functionality of a single-input, multiple-output switch?
UTP coupler
Multiplexer
UC server
Demultiplexer ( Missed)
0xA8
0xC0
0xE0 ( Missed)
0xF8
MAC and IPv6 addresses are represented with the use of:
Binary notation
Hexadecimal notation ( Missed)
Octal notation
Decimal notation
What are the characteristic features of the baseband signaling method? (Select 3 answers)
2/6
Digital signaling ( Missed)
Bidirectional transmission ( Missed)
Analog signaling
Unidirectional transmission
Simultaneous transmission of multiple signals and traffic types
IEEE 802.3 signaling method ( Missed)
Which of the answers listed below refer(s) to broadband signaling? (Select all that apply)
Digital signaling
Bidirectional transmission
Analog signaling ( Missed)
Unidirectional transmission ( Missed)
Simultaneous transmission of multiple signals and traffic types ( Missed)
Which of the following layers are part of the 4-layer TCP/IP model? (Select 4 answers)
Application ( Missed)
Presentation
Session
Transport ( Missed)
Network
Internet ( Missed)
Link ( Missed)
Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard
amendment? (Select all that apply)
Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment? (Select all
that apply)
3/6
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method ( Missed)
What are the characteristics of the IEEE 802.11g wireless standard amendment? (Select all that apply)
Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
Maximum data signaling rate of 54 Mbps ( Missed)
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method ( Missed)
2.4 GHz frequency range ( Missed)
Maximum data signaling rate of 11 Mbps
5.0 GHz frequency range
The characteristic features of the IEEE 802.11n wireless standard amendment include: (Select all that apply)
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment?
(Select all that apply)
Which of the answers listed below refer(s) to UTP cabling? (Select all that apply)
4/6
Which of the following cabling types provide(s) protection against Electromagnetic Interference (EMI)? (Select all
that apply)
UTP cabling
Coaxial cabling ( Missed)
STP cabling ( Missed)
Fiber-optic cabling ( Missed)
10Base2 ( Missed)
Twisted-pair cabling
BNC connector ( Missed)
Maximum cable segment length of 100 meters
RJ-45 connector
10BaseT
RG-58 coaxial cabling ( Missed)
Maximum cable segment length of 185 meters ( Missed)
What are the characteristic features of the 10BaseT Ethernet standard? (Select 3 answers)
BNC connector
Twisted-pair copper cabling (Category 3 or higher) ( Missed)
Maximum cable segment length of 100 meters ( Missed)
8P8C connector ( Missed)
Twisted-pair copper cabling (Category 5 or higher)
Maximum cable segment length of 185 meters
Coaxial cabling
Which of the following answers refer to the 100BaseTX Ethernet standard? (Seect 3 answers)
Total marks 59
5/6
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
6/6
CompTIA Network+ Certification Practice Test 22 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-22-exam-n10-006
Which of the ports listed below are used by client applications designed to retrieve email messages from mail
servers? (Select 2 answers)
110 ( Missed)
443
3389
25
143 ( Missed)
Which of the following answers list the protocol and port number used by a spam filter? (Select 2 answers)
23
SMTP ( Missed)
443
Telnet
25 ( Missed)
Simple Mail Transfer Protocol (SMTP) operates with the use of TCP port:
110
25 ( Missed)
143
23
Which of the port numbers listed below is commonly used for Session Initiation Protocol (SIP) non-encrypted traffic?
5004
5005
1/5
5060 ( Missed)
5061
Port number 5061 is typically used for Session Initiation Protocol (SIP) traffic encrypted with Transport Layer
Security (TLS).
True ( Missed)
False
Which of the following port numbers are assigned to the Media Gateway Control Protocol (MGCP)? (Select 2
answers)
5004
5060
2427 ( Missed)
5005
2727 ( Missed)
5061
MGCP
RTP ( Missed)
H.323
RTCP
5004
5060
5005 ( Missed)
5061
MGCP
RTP
PPTP
H.323 ( Missed)
RTCP
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to
establish a connection (three-way handshake), supports retransmission of lost packets, flow control (managing the
amount of data that is being sent), or sequencing (rearranging packets that arrived out of order).
True
2/5
False ( Missed)
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way
handshake (thus it is also referred to as unreliable or best-effort protocol).
True
False ( Missed)
File Transfer Protocol (FTP) runs by default on TCP ports: (Select 2 answers)
25
22
21 ( Missed)
20 ( Missed)
23
Which of the following protocols is used in network management systems for monitoring network-attached devices?
RTP
SNMP ( Missed)
IMAP
RTCP
161 ( Missed)
138
162
139
Which of the following answers lists a cryptographic network protocol for secure data communication, remote
command-line login, remote command execution, and other secure network services between two networked
computers?
Telnet
SSH ( Missed)
Bcrypt
TFTP
Unblocking port number 22 enables what type of traffic? (Select all that apply)
SSH ( Missed)
SFTP ( Missed)
FTP
SCP ( Missed)
FTPS
3/5
A hacker has captured network traffic with cleartext commands sent from the client to the server console. Which of
the following ports is being used by the network admin for the client-server communication?
49
23 ( Missed)
68
22
A network administrator wants to replace a service running on port 23 with a more reliable solution. Which of the
following ports would be in use after implementing this change?
20
21
22 ( Missed)
25
139
53 ( Missed)
443
22
Which of the file transfer protocols listed below runs on port number 69 and does not provide authentication?
FTP
TFTP ( Missed)
SCP
SFTP
RDP
SMB ( Missed)
SIP
RTP
A network technician uses an RDP client on their Windows OS in order to remotely troubleshoot a problem on
4/5
another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to
allow this type of network connection?
1701
139
3389 ( Missed)
110
Total marks 34
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Network+ Certification Practice Test 21 (Exam N10-006)
examcompass.com/comptia-network-plus-certification-practice-test-21-exam-n10-006
Which of the answers listed below refer(s) to the 100BaseFX Ethernet standard? (Select 2 answers)
BNC connector
Maximum cable segment length of 2 kilometers (full-duplex over multimode optical fiber) ( Missed)
Twisted-pair copper cabling
Maximum cable segment cable segment length of 185 meters
Fiber-optic cabling ( Missed)
Maximum cable segment length of 5 kilometers (full-duplex over multimode optical fiber)
8P8C connector
What are the characteristic features of the 1000BaseT Ethernet standard? (Select all that apply)
Which of the following answers refer(s) to the 1000BaseTX standard? (Select all that apply)
Which of the answers listed below refer(s) to the 10GBaseT Ethernet standard? (Select all that apply)
1/5
Maximum cable segment length of 100 meters (Category 6a cable or higher) ( Missed)
What are the characteristic features of the 10GBaseSR Ethernet standard? (Select all that apply)
Coaxial cabling
Single-mode fiber-optic cabling
Maximum cable segment length of up to 400 meters ( Missed)
Twisted-pair copper cabling
Multimode fiber-optic cabling ( Missed)
Maximum cable segment length of up to 40 kilometers
8P8C connector
Which of the following answers refer(s) to the 10GBaseER Ethernet standard? (Select all that apply)
8P8C connector
Multimode fiber-optic cabling
Maximum cable segment length of up to 40 kilometers ( Missed)
Single-mode fiber-optic cabling ( Missed)
Maximum cable segment length of up to 400 meters
Twisted-pair copper cabling
Coaxial cabling
Which of the answers listed below refer(s) to the 10GBaseSW Ethernet standard? (Select all that apply)
IEEE 1905.1-2013 is a hybrid networking standard providing common interface to multiple bounded and unbounded
media home networking technologies, such as IEEE 802.11, IEEE 802.3, IEEE 1901, and MoCA.
True ( Missed)
False
Which of the following answers refers to the application of the IEEE 1901 standard?
Which of the following enables broadband Internet access based on the cable television infrastructure?
GBIC
2/5
SONET
DOCSIS ( Missed)
SCADA
A set of rules enforced in a network that restrict the use to which the network may be put is known as:
SLA
AUP ( Missed)
MOU
SOW
An agreement between a service provider and the user(s) defining the nature, availability, quality, and scope of the
service to be provided is called:
SOW
MSA
SLA ( Missed)
MOU
Which of the following terms refers to an agreement that specifies performance requirements for a vendor?
MSA
SLA ( Missed)
MOU
SOW
A document established between two or more parties to define their respective responsibilities and expectations in
accomplishing a particular goal or mission is known as:
SLA
MOU ( Missed)
SOW
MSA
A type of agreement that specifies generic terms in order to simplify the negotiation of future contracts between the
signing parties is called:
MOU
SLA
MSA ( Missed)
SOW
Which of the following acronyms refers to a document that defines the specific requirements of a project or service
contract?
AUP
3/5
MOU
SOW ( Missed)
MSA
Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that
apply)
CRTs ( Missed)
Power supplies ( Missed)
Inverters ( Missed)
CPUs
Laser printers ( Missed)
An electrostatic discharge that can damage integrated circuits used in computer and communications equipment is
known as:
EMI
Chip creep
RFI
ESD ( Missed)
Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and
communications equipment components against:
RFI
ESD ( Missed)
SVC
EMI
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is
called:
AUP
MAU
MSDS ( Missed)
WMS
A type of wiring closet that interconnects WAN links coming into the building with the internal network is known as
Intermediate Distribution Frame (IDF).
True ( Missed)
False
Which of the following answers refers to a cable rack that interconnects wiring between an MDF and workstation
devices?
ICS
4/5
MDI
IDF ( Missed)
MTU
HTTPS
IMAP
HTTP ( Missed)
Telnet
80
443 ( Missed)
53
143
Which of the port numbers listed below are used by NetBIOS? (Select all that apply)
137 ( Missed)
161
138 ( Missed)
162
139 ( Missed)
Total marks 46
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 1 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-1-exam-sy0-401
A software or hardware that checks information coming from the Internet and depending on the applied configuration
settings either blocks it or allows it to pass through is called:
Antivirus
Firewall ( Missed)
Antispyware
Malware
Layer 2 switch
Active hub
Content filter
Router ( Missed)
Tunnel
Exception ( Missed)
Access Point (AP)
Entry
A network device designed for managing the optimal distribution of workloads across multiple computing resources
is called:
True ( Missed)
False
A computer network service that allows clients to make indirect network connections to other network services is
called:
Load balancing
Proxy ( Missed)
Network Access Control (NAC)
Backdoor
1/5
Which of the terms listed below refers to a security solution implemented on an individual computer host monitoring
that specific system for malicious activities or policy violations?
NIPS
Content filter
Firewall
HIDS ( Missed)
One of the measures for securing networking devices includes the practice of disabling unused ports.
True ( Missed)
False
Hashing
Tunneling ( Missed)
Authentication
Cleartext credentials
Which of the following answers refers to a dedicated device for managing secure connections established over an
untrusted network, such as the Internet?
Load balancer
VPN concentrator ( Missed)
Layer 3 switch
Hardware firewall
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert
administrators of known or suspected unauthorized activity?
IDS ( Missed)
AES
TPM
EFS
A software tool used for monitoring and examining contents of the network traffic is known as: (Select all that apply)
Port scanner
Packet sniffer ( Missed)
Vulnerability scanner
Protocol analyzer ( Missed)
Which of the following answers list the protocol and port number used by a spam filter? (Select 2 answers)
HTTPS
23
2/5
SMTP ( Missed)
443
TELNET
25 ( Missed)
Which of the following acronyms refers to a network security solution combining the functionality of a firewall with
additional safeguards such as URL filtering, content inspection, or malware inspection?
MTU
STP
UTM ( Missed)
XML
URL filtering restricts access to Internet sites based on which of the following criteria?
Virus signature
Web address ( Missed)
Baseline
Data content
Which of the following network security solutions inspects network traffic in real-time and has the capability to stop
the ongoing attack?
NIPS ( Missed)
HIDS
NIDS
NIST
Which of the following acronyms refers to a firewall controlling access to a web server?
WEP
WAP
WPS
WAF ( Missed)
Which of the answers listed below refers to a set of rules that specify which users or system processes are granted
access to objects as well as what operations are allowed on a given object?
CRL
NAT
BCP
ACL ( Missed)
Which of the following actions can be taken by passive IDS? (Select 2 answers)
Firewall reconfiguration
3/5
Closing down connection
Logging ( Missed)
Terminating process
Sending an alert ( Missed)
An access control model in which access to resources is granted or denied depending on Access Control List (ACL)
entries is also known as:
A type of Intrusion Detection System (IDS) that relies on the previously established baseline of normal network
activity in order to detect intrusions is known as a signature-based IDS.
True
False ( Missed)
Which of the following security solutions provides a countermeasure against denial-of-service attack characterized
by increasing number of half-open connections?
UTP
OCSP
STP ( Missed)
HMAC
A type of Intrusion Detection System (IDS) that relies on known attack patterns to detect an intrusion is known as a
signature-based IDS.
True ( Missed)
False
4/5
Your Final Report
Total marks 28
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 2 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-2-exam-sy0-401
Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?
Non-repudiation
Implicit deny policy ( Missed)
Acceptable Use Policy (AUP)
Post-admission NAC
A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is
known as:
Extranet
Virtual Private Network (VPN)
Demilitarized Zone (DMZ) ( Missed)
Virtual Local Area Network (VLAN)
Intranet
192
192.168
192.168.1 ( Missed)
192.168.1.5
Which of the following acronyms refers to a solution allowing companies to cut costs related to the managing of
internal calls?
PBX ( Missed)
POTS
P2P
PSTN
A solution that allows to make phone calls over a broadband Internet connection instead of typical analog telephone
lines is known as:
IMAP
VoIP ( Missed)
POTS
ITCP
255.255.255.0
1/5
255.255.255.128
255.255.255.192
255.255.255.224 ( Missed)
ATX
Web server
PBX ( Missed)
BIOS
Which of the following terms refers to a logical grouping of computers that allow computer hosts to act as if they
were attached to the same broadcast domain, regardless of their physical location?
Honeynet
Virtual Private Network (VPN)
Demilitarized Zone (DMZ)
Virtual Local Area Network (VLAN) ( Missed)
SNMP community
Which security measure is in place when a client is denied access to the network due to outdated antivirus
software?
NAC ( Missed)
DMZ
ACL
NAT
Which of the following terms refers to a technology that allows multiple operating systems to work simultaneously on
the same hardware?
Hyperthreading
Combo drive
Virtualization ( Missed)
Multi core
A security stance whereby a host is being granted / denied permissions based on its actions after it has been
provided with the access to the network is known as:
Network separation
Pre-admission NAC
Quarantine
Post-admission NAC ( Missed)
Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP
packet headers while in transit across a traffic routing device?
2/5
NAC
ACL
NAT ( Missed)
DMZ
IP address
Trunk port ( Missed)
Physical address ( Missed)
Group permissions
MAC address ( Missed)
In which of the cloud computing infrastructure types clients, instead of buying all the hardware and software,
purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary
equipment?
IaaS ( Missed)
SaaS
P2P
PaaS
Which of the following cloud service types would provide the best solution for a web developer intending to create a
web app?
SaaS
API
PaaS ( Missed)
IaaS
A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating
the need to install and run the software on the customer's own computers is called:
Thick client
SaaS ( Missed)
Virtualization
IaaS
The biggest advantage of public cloud is that all services provided through this type of cloud computing service
model are offered free of charge.
True
False ( Missed)
A concept of effective security posture employing multiple tools and different techniques to slow down an attacker is
known as: (Select 2 answers)
3/5
Vulnerability scanning
Layered security ( Missed)
Authorization
Principle of least privilege
Defense in depth ( Missed)
Tunnel ( Missed)
Payload
Transport
Default
Which of the protocols listed below is used in network management systems for monitoring network-attached
devices?
RTP
SNMP ( Missed)
IMAP
RTCP
Which of the following protocols transmit(s) data in an unencrypted form? (Select all that apply)
SCP
IPsec
SNMPv1 ( Missed)
FTP ( Missed)
Telnet ( Missed)
SFTP
A group that consists of SNMP devices and one or more SNMP managers is known as:
SNMP trap
Network Management System (NMS)
SNMP community ( Missed)
Management Information Base (MIB)
Intranet
Which of the following protocols was designed as a secure replacement for Telnet?
ICMP
FTP
IPv6
SSH ( Missed)
4/5
A system used to convert a computer's host name into an IP address on the Internet is known as:
DNS ( Missed)
NetBIOS
TLS
DHCP
NAT
Mail server
IPv4 address
Canonical name
IPv6 address ( Missed)
Total marks 30
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 3 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-3-exam-sy0-401
Which of the following protocols are used for securing HTTP connections? (Select 2 answers)
SCP
Telnet
SSL ( Missed)
TTL
SNMP
TLS ( Missed)
Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?
NetBIOS
IPv4
TCP/IP ( Missed)
IPv6
LAN
FTPS is an extension to the FTP that adds support for the Transport Layer Security (TLS) and the Secure Sockets
Layer (SSL) cryptographic protocols.
True ( Missed)
False
Directory access
Secure file transfer ( Missed)
Network addressing
Sending emails
IPsec
SNMP
FCoE
ICMP ( Missed)
::/128
FF00::/8
::1 ( Missed)
1/5
127.0.0.1
A networking standard for linking data storage devices over an IP network is known as:
FCoE
iSCSI ( Missed)
TPM
SCSI
LDAP
Which of the protocols listed below facilitate(s) communication between SAN devices? (Select all that apply)
SCSI
MTBF
iSCSI ( Missed)
MTTF
FCoE ( Missed)
A network protocol for secure file transfer over Secure Shell (SSH) is called:
TFTP
SFTP ( Missed)
Telnet
FTPS
FTP
TFTP ( Missed)
SCP
SFTP
Which of the following protocols was designed as a secure replacement for Telnet?
FTP
IPv6
SSH ( Missed)
ICMP
2/5
FTP runs by default on ports: (Select 2 answers)
25
23
20 ( Missed)
22
21 ( Missed)
Which of the protocols listed below run(s) on port number 22? (Select all that apply)
FTPS
SSH ( Missed)
TFTP
SCP ( Missed)
SFTP ( Missed)
FTP
SMTP
SSH
Telnet ( Missed)
TFTP
25 ( Missed)
53
80
23
139
53 ( Missed)
443
52
443
88
143
80 ( Missed)
3/5
Which of the following ports enable(s) retrieving email messages from a remote server? (Select all that apply)
139
53
110 ( Missed)
443
143 ( Missed)
Which of the port numbers listed below are used by NetBIOS? (Select all that apply)
136
137 ( Missed)
161
138 ( Missed)
162
139 ( Missed)
143 ( Missed)
25
443
110
80
443 ( Missed)
53
143
88
Which of the answers listed below refers to the default port number for a Microsoft-proprietary remote connection
protocol?
389
443
3389 ( Missed)
139
Which of the following protocols operate(s) at layer 3 (the network layer) of the OSI model? (Select all that apply)
IPsec ( Missed)
IPv6 ( Missed)
HTTP
4/5
IPv4 ( Missed)
IMAP
ICMP ( Missed)
Physical layer
Network layer
Application layer
Session layer
Transport layer ( Missed)
Total marks 36
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 4 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-4-exam-sy0-401
Which of the following wireless encryption schemes offers the highest level of protection?
WEP
WPA2 ( Missed)
WAP
WPA
Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known
vulnerabilities?
PEAP
CCMP
WPA2
WEP ( Missed)
Which of the answers listed below refers to an authentication framework frequently used in wireless networks and
point-to-point connections?
DLP
OCSP
EAP ( Missed)
LDAP
A network access control method whereby the 48-bit address assigned to each network card is used to determine
access to the network is known as:
Hardware lock
Post-admission NAC
Rule-Based Access Control (RBAC)
MAC filter ( Missed)
BSS
SSID ( Missed)
ESS
IBSS
Which of the following protocols was introduced to strengthen existing WEP implementations without requiring the
replacement of legacy hardware?
PEAP
1/5
TKIP ( Missed)
CCMP
WPA2
Which of the protocols listed below encapsulates EAP within an encrypted and authenticated TLS tunnel?
LDAP
PAP
Telnet
PEAP ( Missed)
CCMP ( Missed)
TPM
TKIP
MTBF
War chalking
Tailgating
War driving ( Missed)
Shoulder surfing
Site survey ( Missed)
Which of the following WAP configuration settings allows for adjusting the boundary range of the wireless signal?
Which of the answers listed below refers to a solution allowing administrators to block Internet access for users until
they perform required action?
Mantrap
Honeypot
2/5
Captive portal ( Missed)
Access Control List (ACL)
Firewall
Which of the following antenna types would provide the best coverage for workstations connecting to a WAP placed
in a central point of a typical office? (Select all that apply)
Omnidirectional ( Missed)
Unidirectional
Bidirectional
Non-directional ( Missed)
Bluejacking
Spear phishing
War driving ( Missed)
Shoulder surfing
Which of the following examples falls into the category of technical security controls?
Change management
Acceptable Use Policy (AUP)
Intrusion Detection System (IDS) ( Missed)
Incident response procedure
An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:
Fault tolerance
False positive error ( Missed)
Incident isolation
False negative error
Which of the examples listed below falls into the category of operational security controls?
Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?
Which of the following acronyms refers to a set of rules enforced in a network that restrict the use to which the
network may be put?
OEM
AUP ( Missed)
UAT
ARO
One of the goals behind the mandatory vacations policy is to mitigate the occurrence of fraudulent activity within the
company.
True ( Missed)
False
Which of the answers listed below refers to a concept of having more than one person required to complete a given
task?
A security rule that prevents users from accessing information and resources that lie beyond the scope of their
responsibilities is known as:
Order of volatility
Principle of least privilege ( Missed)
Privacy policy
Single Sign-On (SSO)
Which of the following acronyms refers to a risk assessment formula defining probable financial loss due to a risk
over a one-year period?
ARO
ALE ( Missed)
SLE
UAT
Single Loss Expectancy (SLE) = Asset Value (AV) x Exposure Factor (EF). The Exposure Factor (EF) used in the
formula above refers to the impact of the risk over the asset, or percentage of asset lost when a specific threat is
4/5
realized. Which of the following answers lists the EF value for an asset that is entirely lost?
0
100
1.0 ( Missed)
0.1
Total marks 27
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 5 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-5-exam-sy0-401
Which of the following terms is used to describe the loss of value to an asset based on a single security incident?
SLE ( Missed)
ARO
ALE
ARP
An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is
known as:
ALE
ARO ( Missed)
SLE
AUP
Which of the answers listed below refers to the correct formula for calculating probable financial loss due to a risk
over a one-year period?
SLE = AV x EF
ALE = ARO x SLE ( Missed)
SLE = ALE x AV
ALE = AV x EF
Which of the following terms is used to describe the average time required to repair a failed component or device?
MTBF
MTU
MTTR ( Missed)
MPLS
High MTBF value indicates that a component or system provides low reliability and is more likely to fail.
True
False ( Missed)
Assessment of risk probability and its impact based on subjective judgment falls into the category of:
1/5
Environmental controls
Quantitative risk assessment
Forensic procedures
Qualitative risk assessment ( Missed)
A path or tool allowing an attacker to gain unauthorized access to a system or network is known as:
Backdoor
Threat vector ( Missed)
Discretionary access
Rootkit
In quantitative risk assessment, this term is used for estimating the likelihood of occurrence of a future threat.
ALE
AV
ARO ( Missed)
SLE
Contracting out a specialized technical component when the company's employees lack the necessary skills is an
example of:
Risk deterrence
Risk avoidance
Risk acceptance
Risk transference ( Missed)
Disabling certain system functions or shutting down the system when risks are identified is an example of:
Risk acceptance
Risk avoidance ( Missed)
Risk transference
Risk deterrence
Which of the answers listed below exemplifies an implementation of risk transference methodology?
Which of the following terms relates closely to the concept of residual risk?
Firewall rules
Virtualization
Risk acceptance ( Missed)
2/5
Quantitative risk assessment
What type of risk management strategy is in place when accessing the network involves a login banner warning
designed to inform potential attacker of the likelihood of getting caught?
Risk avoidance
Risk acceptance
Risk deterrence ( Missed)
Risk transference
Which of the following security control types can be used in implementing a risk mitigation strategy? (Select all that
apply)
Technical ( Missed)
Management ( Missed)
Operational ( Missed)
Zero-day
Which of the terms listed below refers to one of the hardware-related disadvantages of the virtualization technology?
Which of the following acronyms refers to a maximum tolerable period of time required for restoring business
functions after a failure or disaster?
RAS
RTO ( Missed)
ROI
RPO
Recovery time objective (RTO) specifies a point in time to which systems and data must be recovered after a
disaster has occurred.
True
False ( Missed)
An agreement between a service provider and the user(s) defining the nature, availability, quality, and scope of the
service to be provided is known as:
SLE
BPA
SLA ( Missed)
DLP
Which of the following answers refers to a key document governing the relationship between two business
3/5
organisations?
ISA
ALE
SLA
BPA ( Missed)
A document established between two or more parties to define their respective responsibilities in accomplishing a
particular goal or mission is known as:
BPA
MOU ( Missed)
SLE
ISA
Which of the answers listed below refers to an agreement established between the organizations that own and
operate connected IT systems to document the technical requirements of the interconnection?
ISA ( Missed)
ALE
MOU
BPA
Which of the following functionalities allows a DLP system to fulfil its role?
Motion detection
Environmental monitoring
Content inspection ( Missed)
Loop protection
In forensic procedures, a sequence of steps in which different types of evidence should be collected is known as:
In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:
Proxy list
Order of volatility
Access log
Chain of custody ( Missed)
4/5
Total marks 27
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 6 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-6-exam-sy0-401
Which of the following answers lists an example order of volatility for a typical computer system?
In forensic analysis, taking hashes ensures that the collected evidence retains:
Confidentiality
Integrity ( Missed)
Order of volatility
Availability
Log analysis should not take into account the difference between the reading of a system clock and standard time as
this impedes the reconstruction of the sequence of events during an attack or security breach.
True
False ( Missed)
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to
uniquely identify that person?
PIN
ID
PII ( Missed)
PKI
A sticky note with a password kept on sight in user's cubicle would be a violation of which of the following policies?
New accounts
Patched software
Vulnerability that is present in already released software but unknown to the software developer ( Missed)
Well known vulnerability
A system combining heating, ventilating, and air conditioning controls is known as:
HVAC ( Missed)
RADIUS
HMAC
VTC
EMI shielding protects the transferred data from: (Select all that apply)
Setting up hot and cold aisles in a server room allows for more efficient management of air flow.
True ( Missed)
False
Which of the following answers list(s) example(s) of physical security control types? (Select all that apply)
Fire suppression
Environmental monitoring
Biometrics ( Missed)
Motion detection ( Missed)
Video surveillance ( Missed)
Which of the following examples falls into the category of deterrent security control types?
Lighting ( Missed)
Access lists
Motion detection
2/5
Alarms
Which of the following solutions add(s) redundancy in areas identified as single points of failure? (Select all that
apply)
Virtualization
RAID ( Missed)
Hot site ( Missed)
UPS ( Missed)
Backup generator ( Missed)
PSU
Offers redundancy
Requires at least three drives to implement
Doesn't offer fault tolerance ( Missed)
Requires at least two drives to implement ( Missed)
Offers fault tolerance
RAID 5
Disk duplexing
RAID 0 ( Missed)
Disk mirroring
RAID 1
Which of the following answers lists an example method for passive test of security controls?
Tabletop exercises
Pentest
Vulnerability scan ( Missed)
War chalking
Which of the following terms refers to a backup technique that allows for creating an exact copy of an entire drive
and replicating the drive to a new computer or to another drive on the same computer in case of hard drive failure?
(Select best answer)
Disk striping
Drive imaging ( Missed)
Full backup
Differential backup
In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.
True
False ( Missed)
A United States federal government initiative aimed at enabling agencies to continue their essential functions across
a broad spectrum of emergencies is known as:
OVAL
4/5
TACACS
COOP ( Missed)
OCSP
Total marks 37
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 7 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-7-exam-sy0-401
Which of the following backup site types allows for fastest disaster recovery?
Cold site
Hot site ( Missed)
Warm site
Cross-site
A cold site is the most expensive type of backup site for an organization to operate.
True
False ( Missed)
Which of the following security controls provide(s) confidentiality? (Select all that apply)
Encryption ( Missed)
Certificates
Digital signatures
Steganography ( Missed)
Hashing
Which of the following security controls provide(s) integrity? (Select all that apply)
Hashing ( Missed)
Steganography
Fault tolerance
Digital signatures ( Missed)
Non-repudiation ( Missed)
Encryption
1/5
Transforming plaintext into ciphertext
Which of the following answers refers to a general term used to describe software designed specifically to damage
or disrupt the operation of a computer system?
Adware
Spyware
Spam
Malware ( Missed)
What is adware?
A computer program containing malicious segment that attaches itself to an application program or other executable
component is called:
Adware
Virus ( Missed)
Spam
Flash cookie
Malicious software collecting information about users without their knowledge / consent is called:
Logic bomb
Adware
Computer worm
Spyware ( Missed)
Which of the following answers refers to malicious software performing unwanted and harmful actions in disguise of
a legitimate and useful program?
Ransomware
Adware
Grayware ( Missed)
Shareware
2/5
What is the function of Windows Defender software?
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a
computer or computer network is known as:
Backdoor
Botnet
Honeypot
Rootkit ( Missed)
Armored virus
Which of the following answers refers to an undocumented way of gaining access to a program, online service or an
entire computer system?
Tailgating
Rootkit
Trojan horse
Backdoor ( Missed)
A group of computers running malicious software under control of a hacker is referred to as:
Intranet
Botnet ( Missed)
Ethernet
Honeynet
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the
user performs requested action is known as:
Grayware
Adware
Ransomware ( Missed)
Spyware
3/5
The process by which malicious software changes its underlying code to avoid detection is called:
Fuzzing
Polymorphism ( Missed)
Pharming
Spoofing
A type of virus that takes advantage of various mechanisms specifically designed to make tracing, disassembling
and reverse engineering its code more difficult is known as:
Phishing
DDoS
Xmas attack
MITM ( Missed)
Which of the following attacks uses multiple compromised computer systems against its target? (Select best
answer)
Spear phishing
DoS
Watering hole attack
DDoS ( Missed)
A replay attack occurs when an attacker intercepts user credentials and tries to use this information later for gaining
unauthorized access to resources on a network.
True ( Missed)
False
Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that
apply)
PAP
IPsec ( Missed)
OCSP
Kerberos ( Missed)
CHAP ( Missed)
An email sent from unknown source disguised as a source known to the message receiver is an example of:
4/5
Spoofing ( Missed)
Shoulder surfing
Backdoor
Birthday attack
Total marks 30
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 8 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-8-exam-sy0-401
IP spoofing ( Missed)
Privilege escalation
DDoS ( Missed)
Polymorphic malware
MITM attack
Large amount of ICMP echo replies ( Missed)
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later
by an attacker for the purpose of identity theft is an example of: (Select 2 answers)
Phishing ( Missed)
Watering hole attack
Social engineering ( Missed)
Bluejacking
Vishing
Unsolicited messages received over an instant messaging system are known as spim.
True ( Missed)
False
The practice of using a telephone system to manipulate user into disclosing confidential information is called:
Whaling
Spear phishing
Vishing ( Missed)
Pharming
Vishing
Spear phishing ( Missed)
Whaling
Phishing
Which of the answers listed below apply to xmas attack? (Select 2 answers)
Which of the following answers list(s) the characteristic features of pharming? (Select all that apply)
Port scanning
Dictionary attack
DNS poisoning ( Missed)
Rainbow table
Domain spoofing ( Missed)
Vishing
Pharming ( Missed)
Spear phishing
Whaling
Which of the following exploits takes advantage of the spoofed MAC address?
DNS poisoning
Bluesnarfing
MAC filtering
Bluejacking
ARP poisoning ( Missed)
Which of the following password attacks requires the most computing power?
Replay attack
Birthday attack
Brute force attack ( Missed)
2/5
Xmas attack
Dictionary attack
Which of the following password attacks takes advantage of a predefined list of words?
Birthday attack
Replay attack
Dictionary attack ( Missed)
Brute force attack
Rainbow tables are lookup tables used to speed up the process of password guessing.
True ( Missed)
False
Which of the following answers refers to the contents of a rainbow table entry?
The term "typo squatting" refers to the practice of registering misspelled domain name closely resembling other well
established and popular domain name in hopes of getting Internet traffic from users who would make errors while
typing in the web address in their browsers.
True ( Missed)
False
Banner grabbing
Session hijacking
Typo squatting ( Missed)
DNS poisoning
Cable locks
Video surveillance
Privacy filters ( Missed)
Security guards
Screensavers
A policy enforcing the use of paper shredder for all discarded documents is one of the countermeasures against
dumpster diving.
True ( Missed)
3/5
False
What is tailgating?
Phishing scams targeting people holding high positions in an organization or business are known as:
Vishing
Bluesnarfing
Whaling ( Missed)
Bluejacking
Pharming
Which of the following fall(s) into the category of social engineering attacks? (Select all that apply)
Whaling ( Missed)
MITM attack
Shoulder surfing ( Missed)
Bluejacking
Dumpster diving ( Missed)
Bluesnarfing
Tailgating ( Missed)
Vishing ( Missed)
Trojan horse
Backdoor
Computer worm
Evil twin ( Missed)
Penetration testing
Scanning for unsecured wireless networks while driving in a car ( Missed)
Vulnerability scanning
Marking unsecured wireless networks
Phishing
4/5
Bluejacking ( Missed)
Vishing
Bluesnarfing
Total marks 35
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 9 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-9-exam-sy0-401
Pharming
Bluesnarfing ( Missed)
Vishing
Bluejacking
Which of the answers listed below refers to an attack aimed at exploiting the vulnerability of WEP?
MITM attack
Smurf attack
IV attack ( Missed)
Xmas attack
Which of the following solutions simplifies configuration of new wireless networks by providing non-technical users
with a capability to easily configure network security settings and add new devices to an existing network?
WPA
WPS ( Missed)
WEP
WAP
Which of the answers listed below refers to a Wi-Fi Protected Setup (WPS) exploit?
Smurf attack
Watering hole attack
PIN recovery ( Missed)
Birthday attack
URL hijacking
Which of the following wireless security features are not recommended and should not be used due to their known
vulnerabilities? (Select 2 answers)
WPS ( Missed)
WAP
1/5
WPA2
WAF
WEP ( Missed)
Which of the answers listed below refers to a common target of cross-site scripting?
Physical security
Alternate sites
Dynamic web pages ( Missed)
Removable storage
Fuzzing
Input validation ( Missed)
XSRF
Directory traversal
An HTTP exploit which allows attackers to access restricted directories and execute commands outside of the web
server's root directory is known as:
Dictionary attack
URL hijacking
Watering hole attack
Directory traversal attack ( Missed)
A temporary area of memory allocated with a fixed size for holding data while it's waiting to be transferred to another
location is known as:
Cache
Header
Local Shared Object (LSO)
Buffer ( Missed)
A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the
software developer is called:
Xmas attack
Zero-day attack ( Missed)
2/5
IV attack
Replay attack
RPO
BCP
LSO ( Missed)
CRP
A type of exploit that relies on overwriting the contents of memory in order to cause unpredictable results in an
application is called:
IV attack
SQL injection
Buffer overflow ( Missed)
Fuzz test
What kind of general term is used to describe the process of securing a computer system?
Patching
Baseline configuration
Hardening ( Missed)
Fuzzing
Which of the following security control types fall(s) into the category of detection controls? (Select all that apply)
Warning signs
CCTV monitoring ( Missed)
Hardware locks
Motion sensors ( Missed)
IDS ( Missed)
Risk assessment
Identification of critical systems and components
Disabling unnecessary services ( Missed)
Password protection ( Missed)
Disabling unnecessary accounts ( Missed)
Which of the security control types listed below fall(s) into the category of preventative controls? (Select all that
apply)
IDSs
Fencing ( Missed)
3/5
Hardware locks ( Missed)
Motion sensors
Warning signs
Mantraps ( Missed)
A monitored host containing no valuable data specifically designed to detect unauthorized access attempts is known
as:
Flood guard
Trojan horse
Captive portal
Honeypot ( Missed)
Penetration test with the full prior knowledge on how the system that is to be tested works is called:
White hat
Fuzz test
White box ( Missed)
Black box
The practice of finding vulnerability in an application by feeding it incorrect input is known as:
Input validation
Exception handling
Application hardening
Fuzzing ( Missed)
Which of the following programming aspects are critical in secure application development process? (Select 2
answers)
Patch management
Input validation ( Missed)
Password protection
Error and exception handling ( Missed)
Application whitelisting
A computer system used to divert the attacker's attention from corporate network is known as:
4/5
Logic bomb
Trojan horse
UTM appliance
Honeypot ( Missed)
Which of the following answers refers to a user interface element on mobile devices controlling access to a device
after the device is switched on?
Captive portal
Screen lock ( Missed)
Recovery agent
Hardware lock
Total marks 35
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 10 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-10-exam-sy0-401
Which of the following answers refers to a privacy-related security risk connected with public sharing of pictures
taken with smartphones?
Data ownership
Steganography
Weak passwords
Embedded geotag ( Missed)
Which of the acronyms listed below refers to a policy of permitting employees to bring personally owned mobile
devices and to use those devices to access privileged company information and applications?
BSOD
BYOD ( Missed)
JBOD
BYOB
Restore point
Shadow copy
Snapshot ( Missed)
System image
In computer security, a mechanism for safe execution of untested code or untrusted applications is referred to as:
Guest OS
Sandbox ( Missed)
Buffer
Honeypot
Which of the following terms refers to a microchip embedded on the motherboard of a personal computer or laptop
that can store keys, passwords and digital certificates?
UTM
EFS
1/5
MBR
TPM ( Missed)
A piece of hardware and associated software / firmware that usually attaches to the inside of a PC or server and
provides at least the minimum of cryptographic functions is called:
HSM ( Missed)
EFS
STP
WAF
Which of the following acronyms refers to software or hardware based security solutions designed to detect and
prevent unauthorized use and transmission of confidential information outside of the corporate network?
DEP
RADIUS
DLP ( Missed)
PGP
Which of the answers listed below refers to a control system providing the capability for real-time monitoring and
gathering information related to industrial equipment?
OVAL
SCADA ( Missed)
TACACS
SCAP
One of the advantages of the Remote Authentication Dial-In User Service (RADIUS) is that it provides encryption for
the entire authentication process.
True
False ( Missed)
LDAP
Kerberos
SAML
TACACS+ ( Missed)
Assigning a unique key, called a ticket, to each user that logs on to the network is a characteristic feature of:
SAML
Secure LDAP
RADIUS
Kerberos ( Missed)
2/5
Which of the following port numbers is used by Kerberos?
23
80
22
88 ( Missed)
What type of encryption protocols are used by Secure LDAP (LDAPS)? (Select all that apply)
TLS ( Missed)
UDP
SSL ( Missed)
IP
TCP
Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that
apply)
IPsec ( Missed)
MPLS
PAP
Kerberos ( Missed)
CHAP ( Missed)
49
389 ( Missed)
3389
636
An authentication subsystem that enables a user to access multiple, connected system components (such as
separate hosts on a network) after a single login at only one of the components is known as:
SSO ( Missed)
WAP
TPM
OVAL
The non-standard, enhanced version of the LDAP protocol providing the capability for encrypted transmission runs
on port:
49
3389
636 ( Missed)
3/5
389
Which of the following solutions provides a single sign-on capability for Web services?
MOU
OVAL
SCADA
SAML ( Missed)
389
49 ( Missed)
636
88
Which part of the AAA framework deals with verification of the identity of a person or process?
Authorization
Non-repudiation
Authentication ( Missed)
Accounting
Authentication process can be based on different categories of authentication factors, including unique physical
traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something
you have"), or user names and passwords ("something you know"). Additional factors might include geolocation
("somewhere you are"), or user-specific activity patterns such as for example keyboard typing style ("something you
do").
True ( Missed)
False
A United States Department of Defense (DoD) smart card providing the capability for multi-factor authentication of its
personnel is known as:
SCADA
CAC ( Missed)
One-time pad
HOTP
Multi-factor authentication systems require implementation of authentication factors from two or more different
4/5
categories.
True ( Missed)
False
Total marks 28
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 11 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-11-exam-sy0-401
Multi-factor authentication
Single Sign-On (SSO)
Two-factor authentication
Something that the user knows ( Missed)
Which of the answers listed below refers to a security measure providing protection against various password-based
attacks, specifically password sniffing and replay attacks?
OTP ( Missed)
LSO
OCSP
CRL
An algorithm used for computing one-time password from a shared secret key and the current time is known as:
HOTP
PAP
TOTP ( Missed)
CHAP
Which of the following protocols transmits passwords over the network in an unecrypted form and is therefore
considered unsecure?
RADIUS
PAP ( Missed)
TACACS+
CHAP
Which part of the AAA framework deals with granting or denying access to resources?
Authentication
Identification
Accounting
Authorization ( Missed)
An access control model in which every resource has a sensitivity label matching a clearance level assigned to a
user is known as:
RBAC
DAC
1/5
HMAC
MAC ( Missed)
An access control model in which access to resources is granted or denied depending on Access Control List (ACL)
entries is called:
Which of the following answers list the characteristic features of the Mandatory Access Control (MAC) model?
(Select 3 answers)
Users are not allowed to change access policies at their own discretion ( Missed)
Labels and clearance levels can only be applied and changed by an administrator ( Missed)
Every object has an owner who at his/her own discretion determines what kind of permissions other users
can have to that object
Access to resources based on user identity
Every resource has a sensitivity label matching a clearance level assigned to a user ( Missed)
Which of the answers listed below refers to the most common access control model used in Trusted OS
implementations?
HMAC
MAC ( Missed)
RBAC
DAC
One of the basic requirements of the Mandatory Access Control (MAC) model is that in order to be able to access a
resource user's clearance level must be equal or higher than the sensitivity level assigned to the resource.
True ( Missed)
False
An access control method based on the identity of subjects and/or groups to which they belong is called:
HMAC
DAC ( Missed)
MAC
RBAC
Which of the following answers refer to the Rule-Based Access Control (RBAC) model? (Select 2 answers)
Access to resources granted or denied depending on Access Control List (ACL) entries ( Missed)
Every object has an owner who at his/her own discretion determines what kind of permissions other users
can have to that object
2/5
Implemented in network devices such as firewalls in order to control inbound and outbound traffic based on
filtering rules ( Missed)
Every resource has a sensitivity label matching a clearance level assigned to a user; labels and clearance
levels can only be applied and changed by an administrator
An access control method based on user identity
Which of the access control models listed below enforces the strictest set of access rules?
MAC ( Missed)
RBAC
DAC
HMAC
In computer security, biometrics refers to physical characteristics of the human body that can be used for
identification and access control purposes.
True ( Missed)
False
Which part of the AAA framework incorporates the time-of-day restrictions requirement?
Authentication
Non-repudiation
Accounting
Authorization ( Missed)
An account policy setting that forces users to come up with a new password every time they are required to change
their old password is called:
Password length
Multifactor authentication
Password history ( Missed)
Password complexity
T$7C52WL4SU
GdL3tU8wxYz
@TxBL$nW@Xt
G$L3tU8wY@z ( Missed)
Which of the account policies listed below provides a countermeasure against malicious users attempting to
determine an account password by trial and error?
Password history
Account lockout ( Missed)
Encryption
3/5
Acceptable use policy
The two factors that are considered important for creating strong passwords are:
The two basic techniques for encrypting information include symmetric encryption (also called public-key encryption)
and asymmetric encryption (also called secret-key encryption.)
True
False ( Missed)
In asymmetric encryption, any message encrypted with the use of the public key can only be decrypted by applying
the same algorithm and the matching private key.
True ( Missed)
False
Large amount of processing power required to both encrypt and decrypt the content of the message causes that
symmetric-key encryption algorithms are much slower when compared to algorithms used in asymmetric encryption.
True
False ( Missed)
A cryptographic key generated to be used only once within a short time frame is known as session key.
True ( Missed)
False
In asymmetric encryption, data encrypted with the use of a private key can only be decrypted with the use of a
matching public key.
True ( Missed)
False
Key exchange mechanism whereby the cryptographic key is being delivered over a different channel than the main
communication channel (for example on a USB thumb drive) is an example of an in-band key exchange.
True
False ( Missed)
Total marks 29
4/5
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5
CompTIA Security+ Certification Practice Test 12 (Exam SY0-401)
examcompass.com/comptia-security-plus-practice-test-12-exam-sy0-401
True
False ( Missed)
Tunnel ( Missed)
Host-to-host
Payload
Transport
An IPsec mode providing encryption only for the payload (the data part of the packet) is known as:
Protected mode
Tunnel mode
Transport mode ( Missed)
Safe mode
Confidentiality
Integrity ( Missed)
Order of volatility
Availability
What is the name of a storage solution used to retain copies of private encryption keys?
Trusted OS
Key escrow ( Missed)
Proxy server
Recovery agent
A digital signature is a hash of a message that uniquely identifies the sender of the message and provides a proof
that the message hasn't changed in transit.
True ( Missed)
False
What are the features of Elliptic Curve Cryptography (ECC)? (Select 2 answers)
Which of the following answers refer to the applications / features of quantum cryptography? (Select 2 answers)
High availability
Protection against eavesdropping ( Missed)
Loop protection
Secure key exchange ( Missed)
Host-based intrusion detection
Trust models
Encryption algorithms
Hash functions ( Missed)
Virus signatures
Which of the answers listed below refer(s) to the Advanced Encryption Standard (AES): (Select all that apply)
Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate
fragments and encrypt each fragment separately.
True ( Missed)
False
2/5
Which of the following are symmetric-key algorithms? (Select 3 answers)
AES ( Missed)
DES ( Missed)
RSA
Diffie-Hellman
3DES ( Missed)
Which of the following answers refers to a solution for secure exchange of cryptographic keys? (Select best answer)
One of the answers below lists some of the past and current authentication protocols used in Microsoft networks
arranged from oldest / obsolete up to the current recommendation. Which of the answers lists the protocols in the
correct order?
A computer program (and related protocols) that uses cryptography to provide data security for electronic mail and
other applications on the Internet is known as:
SMTP
PGP ( Missed)
OCSP
OVAL
GNU Privacy Guard (GPG) provides similar functionality and an alternative to:
PAP
IMAP4
PGP ( Missed)
Windows Firewall
Which of the protocols listed below uses elliptic curve cryptography for secure exchange of cryptographic keys?
ECC
LANMAN
ECDHE ( Missed)
OCSP
3/5
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote
command-line login, remote command execution, and other secure network services between two networked
computers?
Telnet
SSH ( Missed)
Bcrypt
TFTP
In cryptography, the term "key stretching" refers to a mechanism for extending the length of the cryptographic key in
order to make it more secure against brute force attacks.
True ( Missed)
False
PBKDF2 ( Missed)
RC4
NTLMv2
Bcrypt ( Missed)
FCoE
Which of the solutions listed below allow(s) to check whether a digital certificate has been revoked? (Select all that
apply)
CIRT
CRL ( Missed)
OCSP ( Missed)
CRC
ICMP
Which of the following provides the fastest way for validating a digital certificate?
ICMP
CRL
Key escrow
OCSP ( Missed)
Copies of lost private encryption keys can be retrieved from a key database by:
Power users
Recovery agents ( Missed)
End users
Backup operators
4/5
Your Final Report
Total marks 33
Total Questions 25
Success ratio 0%
Marks secured 0
Percentage secured 0%
5/5