Career Academy CompTIA A+ Exam

Description

This is a compilation of all the quizzes from Career Academy CompTIA A+ training
Dakota Welch
Quiz by Dakota Welch, updated more than 1 year ago
Dakota Welch
Created by Dakota Welch over 7 years ago
90
4

Resource summary

Question 1

Question
How do you read into the information configured in BIOS from within Windows?
Answer
  • Device Manager
  • Control Panel -> BIOS config
  • MS Config
  • None of the above

Question 2

Question
Firmware contains code to fix errors or support new hardware.
Answer
  • True
  • False

Question 3

Question
It is not necessary to remove the power cord from the PC to install an Expansion Card, as long as the computer has been shut down.
Answer
  • True
  • False

Question 4

Question
Firmware upgrades include:
Answer
  • Security patches
  • Performance updates
  • Known issue updates
  • All of the above

Question 5

Question
Hard drives and optical drives can be configured through the system BIOS.
Answer
  • True
  • False

Question 6

Question
Which of the following are valid form factors?
Answer
  • Tower
  • Mini tower
  • Desktop
  • All of the above

Question 7

Question
Replacing the CMOS battery will reset which of the following?
Answer
  • Device drivers
  • Operating system
  • System date and time
  • All of the above

Question 8

Question
Heat sinks and thermal pastes are types of cooling systems.
Answer
  • True
  • False

Question 9

Question
Weighing out the pros and cons of performance and price is a CPU selection factor.
Answer
  • True
  • False

Question 10

Question
What are some examples of internal components of a computer?
Answer
  • Motherboard
  • Expansion slots
  • Riser cards
  • All of the above

Question 11

Question
What are some examples of devices that could be installed with an expansion card?
Answer
  • SATA drive
  • Video card
  • Network card
  • B and C

Question 12

Question
Bus speeds determine how fast data is transmitted.
Answer
  • True
  • False

Question 13

Question
Motherboard installation considerations include:
Answer
  • Checking manufacturer’s requirements
  • Verifying that the board fits your case
  • Checking any specific system requirements
  • All of the above

Question 14

Question
SDRAM is much faster than DDR
Answer
  • True
  • False

Question 15

Question
RAM Parity checking is the storing of redundant parity bit representing the parity of a small amount of computer data, to detect whether a data error has occurred.
Answer
  • True
  • False

Question 16

Question
Single-sided memory has all of its memory accessible at one time.
Answer
  • True
  • False

Question 17

Question
ECC is used only in upper-end systems such as high-end workstations and servers.
Answer
  • True
  • False

Question 18

Question
How many pins does a male serial connector have?
Answer
  • 9
  • 15
  • 21
  • 28

Question 19

Question
What is the purpose of a PATA connection?
Answer
  • IDE hard drives
  • Floppy drives
  • A and B
  • SATA drives

Question 20

Question
Wireless device connections include:
Answer
  • Bluetooth
  • IR
  • RF
  • All of the above

Question 21

Question
Analog transmissions carry information as continuous waves of electromagnetic or optical energy.
Answer
  • True
  • False

Question 22

Question
Which of the following are valid speeds for a magnetic hard drive?
Answer
  • 5400
  • 7200
  • 10000
  • All of the above

Question 23

Question
Compact flash is a solid state drive.
Answer
  • True
  • False

Question 24

Question
A USB adapter connects the Compact Flash reader to the computer.
Answer
  • True
  • False

Question 25

Question
What is the storage capacity of a Blu-ray?
Answer
  • 4.7 GB –17.08 GB
  • 128 GB
  • 5 TB
  • 8.5 GB

Question 26

Question
Which of the following is a type of optical disk?
Answer
  • CD-ROM
  • Dual Layer DVD-RW
  • BD-RE
  • All of the above

Question 27

Question
Which of the following are characteristics of a CPU?
Answer
  • Speed
  • Core
  • Cache size
  • All of the above

Question 28

Question
A heat sink is a method of cooling a CPU.
Answer
  • True
  • False

Question 29

Question
The current USB standard is which of the following?
Answer
  • 2.x
  • 3.x
  • 7.x
  • 10.x

Question 30

Question
Up to 63 devices can be attached using Firewire.
Answer
  • True
  • False

Question 31

Question
What is the range for near field communication?
Answer
  • 100 feet
  • 500 feet
  • A few centimeters to a few inches
  • One mile

Question 32

Question
IR can penetrate walls.
Answer
  • True
  • False

Question 33

Question
You must have an HDMI physical connection for a Blu-Ray player.
Answer
  • True
  • False

Question 34

Question
The basic function of a power supply is to convert the electrical power from a wall socket to one that a PC can use.
Answer
  • True
  • False

Question 35

Question
The power supply in a conventional desktop system is designed to convert either 110 V (nominal) 80 Hz AC (alternating current) or 280 V (nominal) 60 Hz AC power into +3.3 V, +5 V, and +12 V DC (direct current) power.
Answer
  • True
  • False

Question 36

Question
Power supply safety recommendations include:
Answer
  • Checking for UL certification
  • Keeping the computer case closed during normal operation
  • Protecting the power supply
  • All of the above

Question 37

Question
Which of the two hardware configurations are most important to a gaming PC?
Answer
  • CPU
  • Hard drive space
  • Video card
  • A and C

Question 38

Question
The purpose of virtualization is to condense hardware servers down to a single hardware server
Answer
  • True
  • False

Question 39

Question
What are the two types of standard clients?
Answer
  • Short and Tall
  • Thin and Thick
  • Round and Square
  • None of the above

Question 40

Question
Thin client requirements include fast network connection and specialized software for server access.
Answer
  • True
  • False

Question 41

Question
Thick client requirements include access to local storage locations and robust hardware to meet application needs.
Answer
  • True
  • False

Question 42

Question
HDMI interface is electronically identical and compatible with the video-only DVI interface
Answer
  • True
  • False

Question 43

Question
The power wire of a USB interface can supply up to 750 milliamps of power at 5 volts.
Answer
  • True
  • False

Question 44

Question
If a cable box or PC has DVI out, but the TV or monitor only has HDMI in, a DVI-to-HDMI adapter cable is used to connect the video.
Answer
  • True
  • False

Question 45

Question
USB Standard supports how many devices?
Answer
  • 10
  • 55
  • 127
  • 200

Question 46

Question
Standard keyboards always include the full number pad to the right.
Answer
  • True
  • False

Question 47

Question
Where do you go to configure multiple displays?
Answer
  • Control Panel - Appearance and Personalization – Display
  • Control Panel – Screens
  • Control Panel – Display config
  • None of the above

Question 48

Question
Multimedia devices are either peripheral or internal components that transfer sound, images, or a combination of both from a personal computer.
Answer
  • True
  • False

Question 49

Question
An interactive whiteboard would be considered a specialized input device.
Answer
  • True
  • False

Question 50

Question
Expansion card configuration methods include:
Answer
  • Use plug - and - play installation
  • Install the manufacturer’s driver
  • Use the Add Hardware wizard
  • All of the above

Question 51

Question
SOHO networks are self - maintaining and do not need a firewall.
Answer
  • True
  • False

Question 52

Question
Which of the following features will you find on a wireless router?
Answer
  • Reset button
  • LAN Ethernet ports
  • WAN Ethernet ports
  • All of the above

Question 53

Question
Basic QoS is a set of parameters that controls the quality provided to network traffic
Answer
  • True
  • False

Question 54

Question
Basic QoS parameters include:
Answer
  • Delay amounts
  • Signal loss
  • Noise limits
  • All of the above

Question 55

Question
Which of the following is NOT a common SOHO security method?
Answer
  • Change default user name and password
  • Enable MAC filtering
  • Enable ports
  • Assign static IP addresses

Question 56

Question
Which of the following are valid types of printer technologies?
Answer
  • MFD
  • Laser printer
  • Thermal printer
  • All of the above

Question 57

Question
Which of the following printer technologies use heat transfer to produce an image on paper?
Answer
  • Inkjet
  • Laserjet
  • Impact printers
  • None of the above

Question 58

Question
Thermal printers can produce photo-quality output.
Answer
  • True
  • False

Question 59

Question
Printer toner is made up of which of the following?
Answer
  • Dried pigment
  • Iron, carbon and resin
  • Powdered ink
  • None of the above

Question 60

Question
Which of the following are valid Printer Driver types?
Answer
  • PPD
  • PCL
  • UDP
  • All of the above

Question 61

Question
Drivers are available on installation discs, or can be downloaded from the manufacturer’s website
Answer
  • True
  • False

Question 62

Question
Printers can be shared:
Answer
  • Via USB or Ethernet
  • Using Bluetooth, 802.11x, or IR
  • Using a printer server to manage the print queue for network shared printers
  • All of the above

Question 63

Question
A client server networking model is where all the computers in the network share responsibilities, management, and file sharing
Answer
  • True
  • False

Question 64

Question
A Network Interface Card has which of the following features?
Answer
  • Physical network address
  • Network connection port
  • Status indicator lights
  • All of the above

Question 65

Question
How many pins are in one twisted pair connector?
Answer
  • 2
  • 4
  • 8
  • 10

Question 66

Question
Fiber optic cable types include:
Answer
  • Single-mode fiber
  • Step index multimode fiber
  • Graded index multimode fiber
  • All of the above

Question 67

Question
Which of the following are part of the TCP/IP Suite of protocols?
Answer
  • TCP
  • UUP
  • SMTP
  • A and C

Question 68

Question
In the subnet mask 255.255.255.0 for the IP Address, what would be the network ID of the following IP Address: 10.1.1.1?
Answer
  • 10.0000
  • 10.1.1.1
  • 10.0.10.1
  • 10.0.0.0

Question 69

Question
Gateways are implemented as hardware, software, or both.
Answer
  • True
  • False

Question 70

Question
IPv4 uses 128 bit addresses and IPv6 uses 32 bit addresses.
Answer
  • True
  • False

Question 71

Question
Client-side DNS enables clients to perform basic DNS lookups without connecting to a server.
Answer
  • True
  • False

Question 72

Question
To send a connectionless datagram the application would have to be written to TCP.
Answer
  • True
  • False

Question 73

Question
The SMTP Protocol uses port 25.
Answer
  • True
  • False

Question 74

Question
What type of ports range from 1,024 to 49,151?
Answer
  • Well-known ports
  • Registered ports
  • Dynamic or private ports
  • None of the above

Question 75

Question
What port does HTTP use?
Answer
  • 22
  • 53
  • 80
  • 443

Question 76

Question
Which IEEE standard speaks to wireless standards?
Answer
  • 802.11
  • 802.12
  • 802.13
  • 802.15

Question 77

Question
If you wanted a more recent implementation of wireless, that supported an indoor signal range of 225 feet, which technology would you use?
Answer
  • 802.11n
  • 802.15n
  • 802.12g
  • 802.11g

Question 78

Question
There is no difference in max data rate between 802.11a and 802.11ac.
Answer
  • True
  • False

Question 79

Question
Which of the following ports would you find on a SOHO wireless router?
Answer
  • LAN
  • WAN
  • Ethernet
  • All of the above

Question 80

Question
When you create an object to represent a node on the network in the firewall tables, what is it called?
Answer
  • NAT
  • DMZ
  • Address Object
  • None of the above

Question 81

Question
Address objects define segments or hosts of your network by IP Address.
Answer
  • True
  • False

Question 82

Question
If you need to connect remotely with an encrypted connection to your office, which of the following internet connection types would you use?
Answer
  • MAN
  • VPN
  • Ethernet
  • EAN

Question 83

Question
The connection from your ISP to your office is called a WAN, and the connection from the router to the PC’s in the office network is called a LAN.
Answer
  • True
  • False

Question 84

Question
Internet connection types and features include:
Answer
  • DSL
  • ISDN
  • WiMAX
  • All of the above

Question 85

Question
In order to create your own Ethernet wires, you would use a toner probe to prep the ends of the cable with the clip that plugs into the device or wall.
Answer
  • True
  • False

Question 86

Question
A ____________ is used to correctly connect the wires in a wiring closet to the patch panel.
Answer
  • Multimeter
  • Toner probe
  • Crimper
  • Punch down tool

Question 87

Question
If you wished to have printer, monitor, and full sized keyboard always plugged in, and the ability to simply remove the laptop without the connections, which of the following would you use?
Answer
  • Laptop lock
  • Docking station
  • Patch panel
  • None of the above

Question 88

Question
Laptop power supply has an auto switch power adapter, and knows to switch to battery if the power source from the wall is disconnected.
Answer
  • True
  • False

Question 89

Question
Types of laptop displays include:
Answer
  • LCD
  • OLED
  • Plasma
  • All of the above

Question 90

Question
Which of the following are types of mobile devices?
Answer
  • Smart watches
  • Fitness monitors
  • Glasses
  • All of the above

Question 91

Question
GPS is not considered a mobile device.
Answer
  • True
  • False

Question 92

Question
Assume the same threats apply to mobile devices as desktop and laptop devices.
Answer
  • True
  • False

Question 93

Question
What is the first step in the Bluetooth Pairing Process?
Answer
  • Find the device for pairing
  • Determine if a pin code is needed
  • Enable Bluetooth
  • Test the connection

Question 94

Question
E-mail can be configured to sync with Microsoft Exchange.
Answer
  • True
  • False

Question 95

Question
NFC connections are used exclusively by Apple products.
Answer
  • True
  • False

Question 96

Question
If you have issues with mobile devices and keypads are not working, you cannot replace just the keyboard.
Answer
  • True
  • False

Question 97

Question
Proprietary vendor specific ports include:
Answer
  • Mini USB
  • Lightning
  • IR
  • All of the above

Question 98

Question
In a mobile phone, when we press a key and it works very slowly we should reload the software to solve the problem.
Answer
  • True
  • False

Question 99

Question
What is the most common problem with the power supply?
Answer
  • Flames
  • Noise
  • Fan
  • Odor

Question 100

Question
The reason for the documentation is to write down all of the hardware and software.
Answer
  • True
  • False

Question 101

Question
What is the first step of the troubleshooting theory?
Answer
  • Identify the problem
  • Establish a theory
  • Test the theory
  • Document

Question 102

Question
Beep codes are different per manufacturer.
Answer
  • True
  • False

Question 103

Question
Intermittent device failure could be due to:
Answer
  • Power
  • Heat
  • Motherboard
  • All of the above

Question 104

Question
What is the function of POST?
Answer
  • Indexes the type of data expected from the server
  • Formats the drive upon boot
  • Confirms the drive is available and functioning upon boot
  • All of the above

Question 105

Question
What is a RAID?
Answer
  • Redundant Array of Independent Disks
  • Redundant Action for Initialized Disks
  • Redundant Arrangement of Agile Disks
  • All of the above

Question 106

Question
Checking vendor specifications for the OS and software used is a troubleshooting tip for what?
Answer
  • PATA
  • SATA
  • SCSI
  • None of the above

Question 107

Question
What could be identified as the reason there is not a video display?
Answer
  • Video card
  • Physical damage
  • Power
  • All of the above

Question 108

Question
Color issues are only caused by application problems.
Answer
  • True
  • False

Question 109

Question
What does PING (Internet Control Message Protocol) do?
Answer
  • Make a sound to test audio
  • Send an echo request to confirm connection
  • Shut down an IP address on the network
  • All of the above

Question 110

Question
What is the purpose of the toner probe?
Answer
  • Communicate with the printer
  • Remotely turns on and off the network connection
  • Follow or trace a cable, through cable management
  • All of the above

Question 111

Question
The test pattern tool is used to monitor calibration.
Answer
  • True
  • False

Question 112

Question
Which one of these tools is not best to use as a printer troubleshooting tool?
Answer
  • Compressed air
  • Your breath
  • Hair dryer
  • Toner vacuum

Question 113

Question
Printer maintenance kits are specific to the make and model of each printer.
Answer
  • True
  • False

Question 114

Question
You should vacuum toner with an ordinary vacuum.
Answer
  • True
  • False

Question 115

Question
Cortana is new to Windows 10.
Answer
  • True
  • False

Question 116

Question
When hardware has been released after the current OS version, then third party drivers are needed.
Answer
  • True
  • False

Question 117

Question
You do not need to review the documentation from the computer manufacturer before using the factory recovery partition.
Answer
  • True
  • False

Question 118

Question
The command prompt allows the user to perform the same amount of tasks as through the GUI. (Graphical User Interface)
Answer
  • True
  • False

Question 119

Question
What is the best command to run if you are looking to check the operating system’s system files?
Answer
  • Chkdsk
  • SFC
  • Fdisk
  • Robocopy

Question 120

Question
What is the best way to move your settings over to a new machine even when the operating system is different or upgraded?
Answer
  • USMT (User State Migration Tool)
  • Easy transfer
  • File and sending transfer
  • All of the above

Question 121

Question
Which of the run line utilities performs remote desktop?
Answer
  • mmc
  • dxdiag
  • mstsc
  • rem

Question 122

Question
Component services are used to configure and administer:
Answer
  • COM (Component Object Model)
  • COM + Applications
  • DTC (Distributed Transaction Coordinator)
  • All of the above

Question 123

Question
Administrative tools include iSCSI Initiator and Task Scheduler.
Answer
  • True
  • False

Question 124

Question
Share permissions apply only to actions, folders and one file or folder at a time.
Answer
  • True
  • False

Question 125

Question
Which type of user account gives you limited computer access?
Answer
  • Administrator
  • Power User
  • Standard User
  • Guest

Question 126

Question
Share permissions can include:
Answer
  • Read
  • Change
  • Full control
  • All of the above

Question 127

Question
The proxy server’s purpose is to speed up the connection of multiple machines connecting to the internet at the same time.
Answer
  • True
  • False

Question 128

Question
The Ethernet cable may also send an electrical current through what type of network connection?
Answer
  • Wake-on-LAN
  • Speed and duplex settings
  • PoE
  • QoS

Question 129

Question
When configuring a client computer to be used with a proxy the proxy server settings must be set to the correct address.
Answer
  • True
  • False

Question 130

Question
Which of the following are network connection types?
Answer
  • VPN
  • Dialup
  • WWAN cellular
  • All of the above

Question 131

Question
Recovery Image is a function in all Windows operating systems.
Answer
  • True
  • False

Question 132

Question
It is necessary to install all updates automatically instead of manually.
Answer
  • True
  • False

Question 133

Question
The rm command in Linux is the same as the:
Answer
  • copy in the command prompt
  • del in the command prompt
  • list in the command prompt
  • None of the above

Question 134

Question
Similar to Windows, Mac and Linux OS automatically run updates.
Answer
  • True
  • False

Question 135

Question
To Force Quit on Mac OS X, press Command-Option-Esc, then select unresponsive App in Force Quit Window.
Answer
  • True
  • False

Question 136

Question
The Grep command in Linux does what?
Answer
  • Change directories
  • Full text search
  • Copy a file
  • Move or change files

Question 137

Question
On the Mac OS X, Dock Apps are located on the right.
Answer
  • True
  • False

Question 138

Question
What is a good reason to run a virtual desktop infrastructure on the server?
Answer
  • The need to run multiple OS locally
  • The inability to run an OS on specific hardware
  • OS testing
  • All of the above

Question 139

Question
When setting up the client side virtual machine, it is not necessary to have the same configuration of hardware and memory as the host machine.
Answer
  • True
  • False

Question 140

Question
Virtualization requirements include:
Answer
  • Emulator to run the VMs
  • Security to protect VMs from unauthorized access
  • Network components needed to run the VDI
  • All of the above

Question 141

Question
What is sometimes considered “on demand software”?
Answer
  • IaaS
  • SaaS
  • PaaS
  • None of the above

Question 142

Question
In IaaS (Infrastructure as Service), users are responsible for applications, data, runtime, middleware, and OS.
Answer
  • True
  • False

Question 143

Question
Resource pooling is a situation where providers serve multiple clients with provisioned and scalable services.
Answer
  • True
  • False

Question 144

Question
Measured service monitors the provisions of services for:
Answer
  • Billing
  • Effective use of resources
  • Predictive planning
  • All of the above

Question 145

Question
A web server and a file server have no features in common.
Answer
  • True
  • False

Question 146

Question
Which of the following is responsible for name resolution?
Answer
  • Web server
  • File server
  • DHCP server
  • DNS server

Question 147

Question
Open Source software is the same as Closed Source software, the only difference is where it is sold.
Answer
  • True
  • False

Question 148

Question
What do Office 365, iCloud, Google Apps and eBooks have in common?
Answer
  • They have mobile data synchronization
  • They are open source
  • They are only mobile based
  • All of the above

Question 149

Question
A gyroscope determines the orientation of the device with respect to Earth’s magnetic fields.
Answer
  • True
  • False

Question 150

Question
Bluetooth is most secure when it is paired.
Answer
  • True
  • False

Question 151

Question
Having your contacts from your e-mail server copied to your mobile device is a process known as:
Answer
  • Updating
  • Patching
  • Synchronizing
  • Confirming

Question 152

Question
Tethering is when you turn your smartphone into a mobile Wi-Fi hotspot.
Answer
  • True
  • False

Question 153

Question
IMSI stands for International Mobile Satellite Identity.
Answer
  • True
  • False

Question 154

Question
An attacker may obtain credentials only via their network connection.
Answer
  • True
  • False

Question 155

Question
Malware is software that attacks the hardware and shuts down or makes using the computer difficult.
Answer
  • True
  • False

Question 156

Question
Types of malware include:
Answer
  • Worms
  • Trojan horses
  • Logic bombs
  • All of the above

Question 157

Question
When an attacker obtains credentials from another user and then uses those credentials to mount an attack it is known as what?
Answer
  • Virus
  • Social engineering
  • Spam
  • None of the above

Question 158

Question
What is the purpose of a firewall?
Answer
  • To stop traffic coming in and going out
  • To alert the user of all traffic coming in and out
  • To prevent malware
  • All of the above

Question 159

Question
What is the best way to clear a hard drive and get rid of the information?
Answer
  • Low level formatting
  • Drilling a hole in the center of the hard drive
  • Standard formatting
  • Shredding the hard drive

Question 160

Question
Which of the following are physical security measures?
Answer
  • Video surveillance
  • Security guards
  • Physical barriers
  • All of the above

Question 161

Question
Fire and facility intrusions are events that can threaten physical security.
Answer
  • True
  • False

Question 162

Question
Host firewalls and personal firewalls are two common types of firewalls.
Answer
  • True
  • False

Question 163

Question
Which of the following user accounts have the permissions to install software?
Answer
  • Administrator
  • Power user
  • Guest
  • A and B

Question 164

Question
Which of the following represents an administrative share?
Answer
  • \\PC\C$
  • X:C$
  • \\PC\Admin$
  • None of the above

Question 165

Question
If you have a complex password, there is no reason to change it in regular intervals.
Answer
  • True
  • False

Question 166

Question
Which of the following are examples of user account restrictions?
Answer
  • Lockout
  • Login time restrictions
  • AutoRun
  • A and B

Question 167

Question
Which of the following are methods for locking a mobile device to secure it?
Answer
  • Screen locks
  • Face locks
  • Swipe locks
  • All of the above

Question 168

Question
A shredder can be used to physically destroy a device.
Answer
  • True
  • False

Question 169

Question
When troubleshooting a BSOD, which would be methods to use?
Answer
  • Safe mode / safe boot
  • Disabling a driver
  • Removing hardware
  • All of the above

Question 170

Question
Where can you go to see logfiles with error codes for troubleshooting?
Answer
  • Errorlog.txt
  • BSOD
  • Event viewer
  • All of the above

Question 171

Question
Slow transfer speed is a common network issue.
Answer
  • True
  • False

Question 172

Question
Common network troubleshooting utilities include all the following except:
Answer
  • IPCONFIG
  • TRACERT
  • TRACKSTAT
  • NETSTAT

Question 173

Question
Always using trusted installation sources and websites is a malware removal best practice.
Answer
  • True
  • False

Question 174

Question
Which of the following are indicators of a virus?
Answer
  • Pop ups
  • Slow network connections
  • Slow PC
  • All of the above

Question 175

Question
What are some of the consequences of getting a virus?
Answer
  • Renamed files
  • Hijacked e-mail
  • Automated replies from unknown sent e-mail
  • All of the above

Question 176

Question
Which of the following are symptoms of mobile operating system issues?
Answer
  • Dim display
  • Apps not loading
  • Slow performance
  • All of the above

Question 177

Question
Which tools are available to use for mobile operating system troubleshooting?
Answer
  • Hard reset
  • Soft reset
  • Uninstall / reinstall apps
  • All of the above

Question 178

Question
If applications are not loading you can:
Answer
  • Check for updates to application
  • Force close the app and restart
  • Restart the phone
  • All of the above

Question 179

Question
To help counter extremely short battery life you can adjust your brightness settings.
Answer
  • True
  • False

Question 180

Question
Mobile devices slow down as internal storage fills up.
Answer
  • True
  • False

Question 181

Question
Electrical currents give off ozone gas.
Answer
  • True
  • False

Question 182

Question
Workplace security practices should include equipment storage and cable management.
Answer
  • True
  • False

Question 183

Question
You should always read the labels and follow instructions carefully when disposing of materials.
Answer
  • True
  • False

Question 184

Question
AUP stands for Audible Use Protocol.
Answer
  • True
  • False

Question 185

Question
Chemical hazards include:
Answer
  • Laser printer toner
  • Batteries
  • Capacitors
  • All of the above

Question 186

Question
Your basic PC toolkit should have which of the following?
Answer
  • Screwdrivers
  • Tweezers
  • Three prong pickup tool
  • All of the above

Question 187

Question
Which of the following are software diagnostic tools you can use for maintenance and troubleshooting?
Answer
  • Computer management
  • Event viewer
  • ERRORlog.txt
  • A and B

Question 188

Question
Software diagnostic tests can:
Answer
  • Detect problems
  • Repair problems
  • Prevent problems
  • All of the above

Question 189

Question
A hard drive self-test is a tool that enables a hard disk drive to test itself when the computer starts.
Answer
  • True
  • False

Question 190

Question
A compressed air canister is considered a cleaning compound or material.
Answer
  • True
  • False

Question 191

Question
Which of the following are valid licensing types?
Answer
  • Personal license
  • Open source license
  • Shared license
  • A and B

Question 192

Question
You only need backups when you are making large changes.
Answer
  • True
  • False

Question 193

Question
You should avoid talking to co-workers while with customers.
Answer
  • True
  • False

Question 194

Question
When dealing with difficult situations and customers you should rant on social media outlets.
Answer
  • True
  • False

Question 195

Question
Confidential materials can be located on a printer.
Answer
  • True
  • False
Show full summary Hide full summary

Similar

Power Supplies
Shelby Hartsell
Lesson 1.12
nayala2
POST (Power-On Self-Test) 1101-M5
Lyndsay Badding
Wireless Modes and Protocols 1102-M2
Lyndsay Badding
Hardware 1101-M1
Lyndsay Badding
Microsoft Commands and Features 1102-M1
Lyndsay Badding
Linux Commands 1102-M1
Lyndsay Badding
A+ 1102 Acronyms
Lyndsay Badding
A+ 1101 Acronyms
Lyndsay Badding
Input devices and peripherals
Tay H
Lesson 1.13
nayala2