No products in the cart.
CompTIA A+ Exam Questions
Page 3 of 50
41.
Which Windows Recovery Environment option will rebuild the BCD?
-
Startup Repair
-
Reset This PC
-
System Image Recovery
-
System Restore
Correct answer: Startup Repair
The Startup Repair option will attempt to fix many common problems. One way you can get into the Windows Recovery Environment is by holding F11 as the system starts up.
The Reset This PC option will revert the PC to its factory defaults. The System Image Recovery option will let you restore to a saved disk image. The System Restore option will let you revert to a restore point.
42.
A client calls and wants to ask for some information about their antivirus software. One of their questions is about how often the antivirus software needs to be updated.
Which of the following is the correct answer?
-
As often as the vendor releases updates
-
Once a week
-
Once a month
-
Antivirus software doesn't require updates
Correct answer: As often as the vendor releases updates
The majority of antivirus software will provide an ability to update the software automatically, typically on a schedule of checking for updates at least once a day. Some antivirus software may check a couple of times a day to ensure that systems are updated quickly as vulnerabilities are discovered.
Waiting to update once a week or once a month will give a large window of time in which the computer is unprotected from new viruses. Antivirus software needs to update to get the latest virus signatures.
43.
What is the outbound email server for Exchange Online?
-
smtp.office365.com
-
smtp.live.net
-
imap.live.com
-
outlook.office365.net
Correct answer: smtp.office365.com
SMTP servers are used for outbound email to send messages to recipients. For Microsoft's Office 365 and Outlook.com email services, smtp.office365.com must be configured in users' email clients to send outbound email.
The other answer choices are not officially recognized servers.
44.
What type of firewall is used to prevent intruders from public networks accessing private internal network resources?
-
Network-based
-
Host-based
-
Software
-
Virtual
Correct answer: Network-based
A network-based router is typically a physical hardware device that routes and controls all traffic to and from the public network. A network-based firewall can be as familiar as a router used in small home networks or a large, rack-mounted device. A hardware firewall stops outgoing and incoming connections from untrusted networks such as the internet and protects internal resources from any attacks.
A host-based firewall only protects the device it is on. Host-based firewalls are also implemented with software instead of a dedicated device. A virtual firewall protects resources in a virtualized environment.
45.
What device lets users paint or draw on a computer using a stylus pen?
-
Digitizer
-
Mouse
-
OLED
-
Laser pointer
Correct answer: Digitizer
A digitizer is a device that allows users to paint, draw, or write on a computer using a stylus pen. It captures the input from the stylus and translates it into digital data that the computer can process, making it ideal for artists and designers.
A mouse is an input device. An OLED is used in displays. A laser pointer only emits light.
46.
Bethany is a user and reports to you that they received a call from someone who stated that they were Edward from Accounts Receivable; however, Bethany had never heard of Edward. Edward asked if she had access to customer records as they needed some billing information to proceed with an order. She provided the information but wanted to discuss it with you.
This is likely an example of which of the following?
-
Social engineering
-
DDoS
-
Wardriving
-
Shoulder surfing
Correct answer: Social engineering
Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means such as talking to people in the organization. A social engineering attack may occur over the phone, by email, or in person. The intent is to acquire information, and the proper prevention methods focus primarily around user awareness and education.
A distributed denial-of-service is an attack that sends excessive requests to a server to take it offline. Wardriving is searching the perimeter of a building for Wi-Fi networks. Shoulder surfing is looking at a user's screen from behind.
47.
Which command allows for the duplication of files?
-
copy
-
dup
-
duplicate
-
multiply
Correct answer: copy
The "copy" command copies a file from one folder to another. The original file is left in the current folder, so you make an exact duplicate in the new folder without deleting the original. The command syntax is "COPY [FILENAME&PATH] [DESTINATION]".
The other answer choices are not system commands.
48.
When you are required to work on a power supply, what should be done with any residual charge left in the capacitors?
-
It should be safely discharged
-
It should be left alone because it is not a problem
-
It should be monitored for spiking
-
It should be left alone for one hour to naturally dissipate
Correct answer: It should be safely discharged
Power supply capacitors should be safely discharged before you start repairs. Without proper discharge, the power supply could harm you or your computer parts. You can safely discharge capacitors with a high-voltage probe.
If it's left alone, it could cause a shock. Monitoring the capacitors could be done only after discharging. The charge can stay long after the computer has been powered off, so one hour is not sufficient.
49.
An administrator wants to use a cable as a backbone to run between different floors of a building. They are looking for the lowest grade of cable that still supports 10 Gbps. What type of cable should they use?
-
Category 6
-
Category 5e
-
Category 5
-
Category 6a
Correct answer: Category 6
A Category 6 cable is the lowest grade of cable that should be used as a backbone between floors of a building. It supports 10 Gbps for up to 55 meters.
Category 5e only supports 1 Gbps. Category 5 only supports 100 Mbps. Category 6a is a higher grade that supports 10 Gbps.
50.
What do we call the serial number that is unique to every mobile device?
-
International Mobile Equipment Identity
-
National Mobile Identity Number
-
Unique Global Identifier
-
Global Manufacturer Serial Number
Correct answer: International Mobile Equipment Identity
The International Mobile Equipment Identity (IMEI) number is a 15-digit serial number that uniquely identifies every mobile phone. An IMEI is typically used in instances of theft because it leads to a blocklisting of the IMEI number so that it can't be reconfigured on other mobile plans. T-Mobile and AT&T were the first networks to make use of the IMEI setup.
The other answer choices are not accepted terminologies.
51.
A customer brings a computer into the office and states that it turns off frequently, especially if he is trying to play video games. You turn the computer on and feel no airflow coming out of the back of the unit.
From this preliminary check, what is likely the issue?
-
Overheating
-
Failing hard drive
-
Bad RAM
-
Cracked CPU die
Correct answer: Overheating
One of the most damaging effects that can happen to computers is from the heat that they can generate. Without proper ventilation, computers are designed to shut down when they get too hot in order to protect themselves. Excessive heat can permanently ruin components, and in this case, the computer was shutting down when it got too warm to protect itself from further damage.
A failing hard drive will result in file reading and writing errors. Bad RAM can result in the Blue Screen of Death. If the CPU die is broken, it won't affect the airflow.
52.
To run Microsoft Configuration, what should be typed in the Run field?
-
msconfig
-
microsoftconfig
-
autorun
-
msedit
Correct answer: msconfig
To launch the Microsoft Configuration utility, type "msconfig" in the Run command line. This configuration utility controls start-up programs, boot configurations, and services.
The other options (microsoftconfig, autorun, and msedit) are not legitimate system commands.
53.
What is the name given to the computer operation used to retrieve and store data to the hard disk?
-
File management
-
Saving
-
Loading
-
Deleting
Correct answer: File management
A computer must be able to manage files on the hard disk to retrieve and store data properly. The operating system works with the hard drive for file management.
Saving a file stores it to the disk. Loading a file retrieves it from the disk. Deleting a file generally makes it inaccessible to the file system.
54.
An administrator for an architecture firm wants to set up a firewall to protect an internal network. The firewall should be configured so that all traffic is blocked unless specifically allowed by the administrator. Which type of firewall policy is this?
-
Default deny
-
Default allow
-
Host-based
-
Layer 2
Correct answer: Default deny
A default deny policy means that all traffic will be blocked unless specifically allowed by the administrator. An access control list can be created to tell the firewall which traffic to allow.
A default allow policy would allow all traffic except that which is specifically restricted. A host-based firewall only protects the system it is running on. A Layer 2 device only works with MAC addresses, and not IP addresses or applications.
55.
Which of the following is the BIGGEST concern for components when servicing a computer?
-
ESD
-
Heat
-
Gases
-
Data loss
Correct answer: ESD
Electrostatic discharge (ESD) is an extremely damaging yet invisible force that has the potential to destroy nearly all components in a computer. Even though you may not feel the discharge, the current is enough to cause stray paths which can end up wreaking havoc on the internal components. If a computer is acting strangely after you open up the case, it might be due to ESD damage.
Heat is an issue when a computer is running but not when the computer is being serviced. Computers do not emit any toxic gases. Data should be backed up before servicing.
56.
What does APIPA stand for?
-
Automatic Private Internet Protocol Address
-
Automatic Public Internal Peer Address
-
Address Pool Internet Protocol Assignment
-
Assignable Public Inter-routing Protocol Address
Correct answer: Automatic Private Internet Protocol Address
APIPA stands for Automatic Private Internet Protocol Address and is used in cases where computers are unable to reach a DHCP server for IP address assignment. Instead, the computer assigns itself an address, which is actually routable in networks where other computers are using APIPA addresses on the same subnet.
The other answer choices are not accepted terminologies.
57.
You receive the error, "Bootmgr is missing, Press Ctrl+Alt+Del to restart." What do you do?
-
Insert the operating system disc, then open the Recovery Console command prompt to repair the operating system.
-
Restart the computer with no changes because this error is temporary.
-
Insert the Windows disc and perform a reformat of the computer.
-
Insert the Windows operating system disc and reinstall Windows.
Correct answer: Insert the operating system disc, then open the Recovery Console command prompt to repair the operating system.
In versions of Windows Vista and newer, Microsoft has begun using the Boot Configuration Data store, which provides information to the BIOS and computer on how to load and boot the operating system. When the boot sector becomes corrupted, the operating system will display the error "Bootmgr is missing or corrupted," indicating that it is unable to even locate the files to begin booting. The "BOOTREC /REBUILDBCD" command, when entered into the Recovery Console's command prompt, will replace the boot sector and boot data to resolve this issue.
Restarting will not fix the problem if the system cannot boot. Using the Recovery Console should be tried first before reformatting or reinstalling Windows.
58.
Which of the following is a subscription service that includes applications like Word, Excel, and PowerPoint and a cloud service that can sync devices?
-
Microsoft 365
-
ActiveSync
-
Google Workspace
-
iCloud
Correct answer: Microsoft 365
ActiveSync is a protocol for accessing email, calendar, and contacts information across devices. Google Workspace is a collection of productivity apps from Google. iCloud is a cloud storage service from Apple.
59.
Antivirus programs use a database, also known as which of the following, to recognize viruses?
-
Definition
-
Console
-
Header
-
Footer
Correct answer: Definition
Antivirus programs keep a database of definitions, also called signatures, which tell the antivirus what to look for to identify a threat. This means that many new viruses that do not yet have a definition sometimes do not get detected right away.
The other answer choices are not accepted terminology in antivirus software.
60.
Which of the following security attacks sends numerous packets to a web server to overload resources and crash it?
-
DoS
-
Backdoor
-
Autorooter
-
Password attack
Correct answer: DoS
Denial-of-Service (DoS) is a cyber threat that sends multiple packets to a web server with forged source addresses. The packets overload server resources and crash them, which brings down the website and services.
A backdoor installs an entry that an attacker can use later. An autorooter is an attack that quickly scans and attacks systems to get root access. A password attack is when an attacker tries to log in using common password cracking techniques.