CompTIA A+ Exam Questions

Page 2 of 50

21.

What is the primary advantage of using NTFS compression on a Windows file system?

 

  • Reduced file storage space usage

  • Increased security for sensitive files

  • Faster file access times

  • Enhanced file-sharing capabilities

Correct answer: Reduced file storage space usage

The primary advantage of using NTFS compression is that it reduces the amount of disk space required to store files. By compressing files, you can store more data in the same amount of disk space, which can be particularly useful for large volumes of data.

NTFS compression does not enhance security. It only reduces file size. Encryption and access control lists (ACLs) are the features used for increasing security. NTFS compression may actually slow down file access times because the CPU needs to decompress files on the fly when they are accessed. NTFS compression does not directly affect file-sharing capabilities. It focuses on reducing file size, not on how files are shared.

22.

EP toner cartridges contain a toner that consists of black carbon and what kind of resin?

  • Polyester

  • Carbon

  • Calcium

  • Lithium

Correct answer: Polyester

EP toner cartridges contain a toner that consists of black carbon and polyester resin. These types of toner cartridges are common in laser printers.

23.

What device is akin to an inverted, or turned upside down, mouse?

  • Trackball

  • Laser pointer

  • Digitizer

  • Touchpad

Correct answer: Trackball

A trackball is virtually an inverted mouse. Instead of moving the mouse, you move the trackball, which is isolated on little rollers. Modern trackball mice use lasers and read the surface of the trackball for higher precision. Trackball mice are excellent for areas where a mouse is needed, but there is limited space. 

A laser pointer does not take input. A digitizer converts analog information into digital. A touchpad has a special surface that takes touch as input.

24.

While working for a firm that is publicly listed on a stock exchange, an administrator inadvertently gains access to a document that exposes sensitive financial information. 

What regulation makes sure that this sensitive information cannot be released inappropriately?

  • SOX

  • FERPA

  • GLBA

  • HIPAA

Correct answer: SOX

The Sarbanes-Oxley Act (SOX) regulates how confidential information for publicly traded companies is protected. It's important to know this law if one is working at a publicly-traded company.

FERPA is the Family Educational Rights and Privacy Act. GLBA is Gramm-Leach-Bliley Act that requires financial institutions to safeguard client information. HIPAA is the Health Insurance Portability and Accountability Act.

25.

What is the MOST common type of malware affecting the Windows OS?

  • Virus

  • Spyware

  • Bot

  • Cookie

Correct answer: Virus

The most common OS-affecting malware is the virus, which falls under the umbrella of malware (short for malicious software). There are virtually millions of viruses and even more variants of each virus, so there is a massive list of virus signatures that must be used by an antivirus program to protect a system.

Spyware is malware spread by users unknowingly adding it. A bot is a computer under the control of a threat actor. A cookie is a file that stores a user's information on a web browser.

26.

What do you use when you want to find ALL files with a specific file extension in Windows?

  • Wildcard

  • Down arrow sign

  • Right-pointing arrow

  • Ctrl + click

Correct answer: Wildcard

You can use the wildcard character ( * ) to search for all files with a specific extension. For instance, a search of "*.docx" finds all Word documents on the Windows computer. 

The down arrow sign will collapse a folder. The right-pointing arrow expands a folder. Ctrl + click lets you select multiple files.

27.

You are on the phone with a user who has an Android phone. They are looking for the company mail application on their device but are unable to locate it. You determine that it is not installed. 

Which of the following would you direct them to in order to obtain the application?

  • Google Play Store

  • Settings

  • File Manager

  • Browser

Correct answer: Google Play Store

Google Play Store is a digital distribution service operated and developed by Google. It serves as the official app store for the Android operating system and allows users to browse and download applications developed with the Android software development kit (SDK) and published through Google.

The Settings app is used to configure various options on the device, such as network settings, display settings, and system preferences. It is not used for downloading and installing applications. The File Manager app is used to browse and manage files on the device's internal storage and SD card. It is not used for downloading applications from the internet. While a browser can be used to search for information and access websites, it is not the primary method for installing applications on Android devices. The Google Play Store is specifically designed for this purpose.

28.

If you want to change your computer's internet settings, such as options relating to Microsoft Edge, which applet would you use from within the Control Panel?

  • Internet Options

  • Network and Sharing Center

  • Programs and Features

  • Storage Spaces

Correct answer: Internet Options

If you want to change your internet settings, then use "Internet Options" from within the Control Panel. Note that these settings primarily affect your browsing experience and can also be found inside the options from Microsoft Edge. 

The Network and Sharing Center will change options related to the network connection, like Ethernet adapters and VPNs. The Programs and Features option will let you uninstall or repair a program. The Storage Spaces applet helps save files to multiple drives for redundancy.

29.

System boards are typically classified by which of the following?

  • Form factor

  • Processing material

  • Year of manufacture

  • Compatibility with motherboard

Correct answer: Form factor

System boards are classified by their "form factor," which is described as their dimensions and "design," such as 32-bit or 64-bit. The common form factors are: Standard-ATX, Micro-ATX, Mini-ITX, Nano-ITX, and Pico-ITX. 

Processing material, year of manufacture, and motherboard compatibilities are not mentioned when classifying.

30.

What type of code classification is macOS under?

  • Closed-source

  • Open-source

  • Free source

  • Restricted source

Correct answer: Closed-source

MacOS is considered proprietary, closed-source software, and only Apple is able to develop and provide the source code. Unlike Linux, which is open-source and has a huge community development, macOS is only worked on by Apple developers. There are benefits and drawbacks to both open and closed-source code, so it comes down to personal preference. For example, Linux allows customization of main components of the device, whereas macOS restricts customization.

Open-source code can be modified and distributed by anyone. Free source and restricted source are not accepted terminologies.

31.

If you need more ports, connectivity to a monitor, and the ability to charge your laptop, what type of device should you purchase?

  • Docking station

  • Expansion bay

  • Desktop converter

  • PC connector

Correct answer: Docking station

A docking station lets you use a laptop as a desktop. It offers extra ports and a monitor connection, and it charges your laptop. 

An expansion bay is an area on PCs for adding components like CD-ROM drives, not for charging a laptop. The other answer choices are not accepted terminology.

32.

You are contacted by a customer requesting assistance with managing all their passwords. They are currently using Mac OS X and want software that centralizes their passwords and secures them. 

Which of the following is the Mac OS X password management application?

  • Keychain Access

  • Dock

  • Spotlight

  • Terminal

Correct answer: Keychain Access

Keychain Access is an OS X app that stores your passwords and account information and reduces the number of passwords you have to remember and manage. When you access a website, email account, network server, or another password-protected item, you may be given the option to remember or save the password. If you choose to save the password, it’s saved in your keychain, so you don’t have to remember or type your password every time.

The Dock is where applications are launched from. Spotlight is for searching for files and folders. Terminal is the command prompt to enter system commands.

33.

Which of the following devices is NOT an input device?

  • KVM switch

  • Touchscreen

  • Keyboard

  • Biometric device

Correct answer: KVM switch

A KVM switch is a device that allows a user to switch between input devices, but it is not an input device itself. You can use a KVM switch to connect multiple computers to one centralized set of a mouse, keyboard, and monitor. 

Touchscreens, keyboards, and biometric devices all accept user input.

34.

Marcelle works in a computer repair center. The work environment has been rather arid, and there are more occurrences of ESD than normal. The team has been asked to implement additional steps to prevent further damage. Of the following, which measures BEST prevent ESD?

A. Wearing an antistatic wrist strap

B. Utilizing antistatic bags

C. Using a dehumidifier

D. Removing shoes when on the carpet

  • A, B

  • A, C, D

  • C, D

  • A, D

Correct answer: A, B

It is important to use antistatic equipment such as antistatic wrist straps, bags, and mats to reduce the risk of electrostatic discharge. As the damage isn't always apparent or detectable by humans, it is important to take all precautions to prevent ESD.

A dehumidifier makes the air drier, which can increase ESD. Carpeting also increases ESD.

35.

Which of the following socket types is made for Intel-based processors?

  • LGA 1200

  • Socket AM4

  • Socket TR4

  • Socket FM2

Correct answer: LGA 775

Any socket type labeled with LGA is Intel-based. Since the socket will vary depending on the motherboard design, you need to know the socket type on a motherboard to identify which CPU you can install. This is very important because the sockets are not universal but rather specific. 

The other answer choices are for AMD processors.

36.

What type of solid-state storage format has become the preeminent product for mobile devices?

  • microSD

  • CompactFlash

  • xD-PictureCard

  • MMC

Correct answer: microSD

The micro secure digital (microSD) card has become the dominant storage card on the market, with virtually every smartphone packing the capability to use one. They range in size all the way up to 128 GB and are extremely compact, being only 15mm x 11mm. 

CompactFlash has larger dimensions at 36mm x 43mm. xD-PictureCard has dimensions of 20mm x 25mm. MultiMedia Card (MMC) has dimensions of 32mm x 24mm.

37.

A user prints a page on a laser printer, but all pages printed are completely black. Which part of the printer is causing this problem?

  • Charging unit

  • Transfer corona assembly

  • Fuser

  • Erasure lamp

Correct answer: Charging unit

This can happen when the charging unit (either the charging corona wire or charging corona roller) in the toner cartridge does not charge the EP drum. As the drum rotates, all the toner is transferred to it, which makes the page black. Replacing the toner cartridge can fix this.

The transfer corona assembly (or transfer roller) transfers the toner from the drum to the paper. A malfunction here could cause issues with image transfer, leading to light or incomplete prints, but it would not typically cause completely black pages. A problem with the fuser can result in image smudging. A problem with an erasure lamp could result in ghosting.

38.

Which command checks the disk for errors?

  • chkdsk

  • diskpart

  • format

  • cd

Correct answer: chkdsk

The "chkdsk" tool (pronounced "check disk") scans the hard drive for errors and bad sectors. It isolates any corrupted area of the disk to avoid file corruption and attempts to repair any errors.

The "diskpart" command manages partitions. The "format" command wipes data to format a partition. The "cd" command changes directories.

39.

What is the BIGGEST risk of overclocking?

  • Heat

  • Power consumption

  • Size

  • Cost

Correct answer: Heat

Overclocking any component in a computer substantially increases the risk of the component melting due to heat exceeding factory limits. Overclocking is popular with CPUs to get faster speeds but at the risk of overheating the CPU, which permanently damages it. 

Overclocking does not consume too much power. It does not take up any more space. It does not cost extra to overclock, except for minor electricity costs.

40.

Which printer uses a form of light exposure to transfer an image to memory for printing?

  • Laser printer

  • Inkjet printer

  • Dot matrix printer

  • Impact printer

Correct answer: Laser printer

The laser printer uses a form of light exposure to transfer an image to the EP drum for printing. Laser printers use photoconductive compounds and light to place an image on the EP drum, which then gets coated in toner. After this step, the corona roller pulls the toner from the drum to the paper.

Inkjet printers work by spraying tiny droplets of ink onto paper. They do not use light exposure to transfer an image. Dot matrix printers function by striking a print head against an ink ribbon to form characters or images, which are then transferred onto paper. Impact printers, a category that includes dot matrix printers, work by physically striking a print head against an ink ribbon to transfer ink to paper.