IT CertificationsComprehensive Study Set

Comptia A+ 1001 Vs 1002

111 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Laptop memory: DDR and DDR2 Have how many SODIMM pins?

ANSWER

200

QUESTION 2

Laptop memory: DDR3 has how many SODIMM pins?

ANSWER

204

QUESTION 3

Laptop Memory: DDR4 Has How many SODIMM pins?

ANSWER

240

QUESTION 4

Name this drive: -All Memory, no moving parts -Silent, fast access time, less latency -2.5 and 1.8 inch form factors

ANSWER

SSD (Solid State Drive)

QUESTION 5

Name this drive: -Combines Flash Memory and Hard Drive Storage -SSD catches the hard drive data

ANSWER

SSHD (Solid State Hybrid Drive)

QUESTION 6

Software is most often proprietary that is distributed at no monetary cost to the end user. There is no agreed-upon set of rights, license, or EULA that defines this software unambiguously; every publisher defines its own rules. For instance, modification, redistribution by third parties, and reverse engineering without the author's permission are permitted by some publishers but prohibited by others. Unlike with free and open-source software, which are also often distributed free of charge, the source code for this software is typically not made available.

ANSWER

Freeware

QUESTION 7

Name that Laser Printer Part: -Responsible for melting toner and bonding it to paper -if toner rubs off or smears then the part is most likely not receiving enough heat and the part may need to be replaced.

ANSWER

Fuser Assembly

QUESTION 8

Name the Laser Printer problem. Solution: -Clean the Corona Wire -shake the toner cartridge to dislodge the clog

ANSWER

White vertical lines

QUESTION 9

The sharing of a mobile device's Internet connection with other connected computers, such as laptops. Supported connections include -USB -WiFi -Bluetooth

ANSWER

Tethering

QUESTION 10

After performing maintenance and booting up a computer, it reports that no bootable device has been found and windows fails to start. What is the most likely reason?

ANSWER

Loose SATA cable. (may have become disconnected during maintenance)

QUESTION 11

Name that acronym: A logical interface used by PCIe-based SSD drives to communicate with the bus.

ANSWER

NVMHCI (Non-Volatile Memory Host Controller Interface) or NVMe (Non-Volatile Memory Express)

QUESTION 12

You install memory into an ATX motherboard that supports duel channel memory. In order to utilize this feature which slots should you install the memory into?

ANSWER

Different colored slots

QUESTION 13

Name that acronym: A network service provided by the router or proxy server used normally to hide private IP addresses behind a single public IP address.

ANSWER

NAT (Network Address Translation)

QUESTION 14

Name that acronym: Programming that creates a safe and encrypted connection over a less secure network, such as the public internet.

ANSWER

VPN (Virtual Private Network)

QUESTION 15

Name that acronym: Part of the Active Directory Object Management and configuration infrastructure. Used to configure software deployment , Windows settings, and, through the use of administrative Templates, custom Registry settings. These settings can also be configured on a per-user per-computer basis. A means of applying security settings (as well as other administrative settings) across a range of computers and users.

ANSWER

GPO (Group Policy Object)

QUESTION 16

Name that acronym: A strategy for protecting data and preventing users from giving sensitive and critical data to unauthorized recipients.

ANSWER

DLP (Data Loss Prevention)

QUESTION 17

-saves user names, passwords, credit card information and WiFi network information across any Apple device you enable -can also keep email, contacts, calendar entries, and messages up to date across all of a users MAC computers.

ANSWER

iCloud keychain

QUESTION 18

Name that term: A complete copy of your entire data set. Often this is more time consuming and requires more space then other forms of backup.

ANSWER

Full backup

QUESTION 19

Name that term: Only backs up data that has changed since the previous backup.

ANSWER

Incremental backup

QUESTION 20

Name that acronym: -Contains the best source of information about the safe disposal or recycling of potentially hazardous components. -Contains information about exposure hazards, precautions, and first aid information. -Some manufactures provide this data on their websites otherwise information is widely distributed on the internet.

ANSWER

MSDS (Material Safety Data Sheet)

QUESTION 21

Name that acronym: - a device that once inserted allows a computer to recognize that the device is there without user input -The user does not have to manually install drivers for the device or even tell the computer that a new device has been added. -usually refers to computer peripheral devices, such as keyboards and mice, it can also be used to describe internal hardware. For example, a video card or hard drive.

ANSWER

PnP

QUESTION 22

Name that acronym: -A security device that provides a broad range of security services to a network. -Often comes packaged with security appliances that help protect a network from malware and spam., contains firewall and intrusion prevention technology.

ANSWER

UTM (Unified Threat Management)

QUESTION 23

Name that tool: The first name of this tool refers to the routing of electronic signals, digital data streams, or flows of items back to their source without intentional processing or modification. It is used for testing the communication structure. It involves connecting pin 1 to pin 3 and pin 2 connects to pin 6. When you connect the tool to the port you should see a solid connection LED.

ANSWER

Loopback Plug

QUESTION 24

Name that term: VMs connected to this type of virtual switch cannot communicate with the Hyper-V Parent partition. You can create any number of these regardless of how many physical Network Interface Cards you may have.

ANSWER

Hyper-V Private Switch

QUESTION 25

What is the native resolution of a 4k UHD (Ultra High Definition) display. Also referred to as a 4k2k.

ANSWER

3840x2160 (pixels)

QUESTION 26

What are these file extensions examples of: .aif .cda .mid or .midi .mp3 .mpa .ogg .wav .wma .wpl

ANSWER

Audio file formats.

QUESTION 27

What are these file extensions examples of: .7z .arj .deb .pkg .rar .rpm .tar .z .zip

ANSWER

Compressed files.

QUESTION 28

How do you create a boot log the next time a Windows OS based computer starts up?

ANSWER

Run Msconfig

QUESTION 29

When programmed to do so under what file name does Windows store a boot log the next time it starts up?

ANSWER

ntbtlog.txt

QUESTION 30

What other connection method can be enabled if a computer tries to connect with a DHCP server and one cannot be found?

ANSWER

IP Alternate Configuration

QUESTION 31

Name that acronym: A form of cloud computing that provides virtualization computing resources over the internet. The cloud provider hosts the components traditionally present in on premises data centers such as servers, storage, and networking hardware, as well as virtualization or hypervisor layers. With this type of cloud computing service organizations often find it easier, faster and more cost-efficient to operate a workload without having to buy, manage and support the underlying infrastructure. A business can simply rent or lease that infrastructure from another business

ANSWER

IaaS (Infrastructure as a Service)

QUESTION 32

What is the term: -when giving file permissions to a copy on the same or a different partition -permissions that are given to an object because it is a child of a parent object.

ANSWER

inherited permissions

QUESTION 33

Applications that are configured to launch automatically on start up can be enabled or disabled here.

ANSWER

Task Manager Startup Tab

QUESTION 34

Name that term: _______ _______ ________ returns the computer to its factory image but preserves user data, user accounts, windows store applications, and any applications that came installed on the computer, but not third party applications.

ANSWER

Push Button Refresh

QUESTION 35

Name that term: _____ _____ _____ re-installs the factory image but any changes are lost. This includes any user accounts, all data, and every installed application.

ANSWER

Push Button Reset

QUESTION 36

Name that utility: -its like putting puzzle pieces together. -normally running this utility helps solve problems with performance issues during disk sensitive activities that has gotten worse over time. -this has no effect on a Solid State Drive and will actually shorten its lifespan. ONLY use it on a HDD

ANSWER

Defrag

QUESTION 37

A touch sensitive glass panel covering a LCD screen. The panel converts touch to digital signals that can be interpreted as different types of input Examples: smart screens, tablets. Often used with a stylus.

ANSWER

Digitizer

QUESTION 38

Name that acronym: -A cloud application service. -This service is the most commonly utilized option for businesses in the cloud market -it utilizes the internet to deliver applications,which are managed by third party vendors It is sometimes referred to as "on-demand software", "Web-based software", and "hosted software"

ANSWER

SaaS (Software as a Service)

QUESTION 39

Name that file extension: 7 A Linux or unix Shell Script File

ANSWER

.sh

QUESTION 40

Name that file extension: A Java Script file that excutes in a web browser.

ANSWER

.js

QUESTION 41

Name that file extension: a updated version of DOS/Windows .bat file. the primary difference being .bat runs under command.com and this file extension runs under cmd.com

ANSWER

.cmd

QUESTION 42

Name that file extension: A PowerShell script used to run PowerShell commands in Windows

ANSWER

.ps1

QUESTION 43

Name that term: -A feature of Windows NT operating systems. -Controls the working environment of user accounts and computer accounts. -Provides centralized management and configuration of OS, applications, and user settings in a Active Directory environment.

ANSWER

Group Policy

QUESTION 44

Name the Motherboard form factor: Size: 9.6 by 9.6 inches (244mm x244mm) Has up to 4 expansion Slots

ANSWER

Micro-ATX

QUESTION 45

-A security feature in most modern Android phones. -When enabled it helps users locate and if needed remotely lock or wipe the device -In order to work the device must be linked to the user's Google account.

ANSWER

Android Device Manager

QUESTION 46

Name that acronym: -This contains Intel specifications for memory expanding upon, and above, the standard SPD specifications. -It is intended to make overclocking easier and more accessible to new users and has pre-defined overclocking configurations known to be stable.

ANSWER

XPS (Extreme Memory Profiles)

QUESTION 47

Name that acronym: -A standardized way to access information about a memory module. -is a memory hardware feature that makes it possible for the computer to know what memory is present, and what timings to use to access the memory.

ANSWER

SPD (Serial Presence Detect)

QUESTION 48

-A Microsoft server, that is a mail server and calendaring server developed by Microsoft. It runs exclusively on Windows Server operating systems. -The Server primarily uses a proprietary protocol called MAPI to talk to email clients, but subsequently added support for POP3, IMAP, and EAS. The standard SMTP protocol is used to communicate to other Internet mail servers. -it is usually an integrated provider option and clients can auto discover and sync information between devices. Normally a password and username are required. A domain and server name may also. Used to sync Email, contacts, calendar, tasks and notes.

ANSWER

Microsoft Exchange.

QUESTION 49

Name that acronym: A database built by CDMA service providers to indicate which radio bands should be used when connecting to a cell tower.

ANSWER

PRL (Preferred Roaming List)

QUESTION 50

Name that acronym: is a channel access method used by various radio communications technologies. Allows information to be simultaneously sent by several transmitters over a single communication channel it is associated with Sprint and Verizon cellular phone networks.

ANSWER

CDMA (Code-Division Multiple Access)

QUESTION 51

Name that acronym: A standard for peer-to-peer (2-way) radio communications over a very short (usually around 4 inches) distances. Commonly used in contactless payment and similar technologies. ____ is based on RFID.

ANSWER

NFC (Near Field Communication)

QUESTION 52

Name that acronym: This utility is used to create a connection with a remote desktop session host (RD SessionHost) or another remote computer.

ANSWER

MSTSC (Microsoft Terminal Service Client)

QUESTION 53

Name that utility: A command line disk partitioning utility included in Windows 2000 and later. This utility prevents multi-partition creation for removable media such as flash drives. It is also used for partitioning internal hard drives.

ANSWER

diskpart

QUESTION 54

Name that utility: A command line utility in Windows 7,8,10 and Windows server 2008R2, Windows Server 2012. The command line is used to perform backups and restores from operating systems drive volumes, computer files, folders and applications from a command line interface.

ANSWER

WBAdmin

QUESTION 55

You have been tasked with shutting down or disabling all unused ports on a network switch. For what reason would you be so tasked?

ANSWER

Security

QUESTION 56

Name that command line: this command supports several options for filtering file copies including file attributes. -It can also be used to set for remove attributes during the the file copy process.

ANSWER

Robocopy

QUESTION 57

A utility in Windows systems that allows users to scan for and restore corruptions in system files. This utility is in Windows 98, Win 2000 and all subsequent versions of Windows NT family Operating Systems.

ANSWER

SFC (System File Checker)

QUESTION 58

This utility prevents the replacement of essential system files, folders, and registry keys that are installed as part of the operating system -SFC in windows Vista , 7, and 10 has been integrated into this Windows based utility.

ANSWER

WRP (Windows Resource Protection)

QUESTION 59

Name that device acronym: This device quickly breaks an electrical circuit to prevent serious harm from on ongoing electric shock It is also known as Residual Current Device or RCD in the United Kingdom.

ANSWER

GFI (Ground Fault interrupter)

QUESTION 60

Name that device: -This device is designed to ensure clean power on a incoming AC line. -It protects against short duration over and under voltage conditions. -It does not however protect against power loss.

ANSWER

Line conditioner

QUESTION 61

Name that term: -A brief over voltage condition.

ANSWER

Power Spike

QUESTION 62

Name that device: -An inexpensive way to protect against over voltage. -Does not supply power to connected devices

ANSWER

Surge Suppressor

QUESTION 63

A windows recovery tool that can fix certain system problems that might prevent Windows from starting To access this recovery tool do the following: 1 first boot to Advanced Startup Options 2 click on trouble shoot 3 click on advanced options 4 click on ______ ______

ANSWER

Startup Repair

QUESTION 64

A Windows proprietary Remote Desktop service that allows users to access RemoteApp and Desktop Connection through the start menu or a Web Browser. This feature is available in windows server 2008 R2, and windows Server 2012

ANSWER

Remote Desktop Web Access

QUESTION 65

Name that acronym: This is a large scale attack in which a targeted computer is flooded with traffic from many compromised systems infected with malware and Trojan viruses. Since the incoming traffic flooding the victim originates from different sources, it may be impossible to stop the attack simply by using ingress filtering. It also makes it difficult to distinguish legitimate user traffic from attack traffic when spread across multiple points of origin.

ANSWER

DDoS (Distributed Denial-of-Service )

QUESTION 66

A 32 bit OS can acess how much Physical Ram?

ANSWER

4GB

QUESTION 67

A 64 bit OS can theoretically access a maximum memory threshold of how many exabytes?

ANSWER

16EB

QUESTION 68

Name that acronym: An agreement that refers to what a purchaser can and cannot do with software and hardware. Including restrictions on a mobile app so that it can be used on specific providers phones only.

ANSWER

DRM (Digital Rights Management)

QUESTION 69

Name that acronym: An agreement between an individual purchaser and a software manufacture that describes how the software can and cant not be used. It also contains other licencing terms, such as limits on the manufacturers liability.

ANSWER

EULA (End User Licence Agreement)

QUESTION 70

This is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems.

ANSWER

System Restore

QUESTION 71

A full volume encryption feature included with MS Windows starting with Windows Vista. -It uses the AES encryption System in a Ciper Block Chaining (CBC) or XTS mode with a 128 or 256 bit key. Requirements: TPM version 1.2 or later Two NTFS partitions Note: A TPM is not required if the BIOS or UEFI firmware has the ability to read a USB containing the __________ start up key Windows 8 was the earliest version to provide support.

ANSWER

BitLocker

QUESTION 72

Desktop Memory: DDR has how many DIMM notch pins?

ANSWER

184

QUESTION 73

Desktop Memory: DDR2 and DDR3 have how many DIMM notch pins?

ANSWER

240

QUESTION 74

Desktop Memory: DDR4 has how many DIMM notch pins?

ANSWER

288

QUESTION 75

What does SODIMM stand for?

ANSWER

Small Outline DIMM

QUESTION 76

What does DIMM stand for?

ANSWER

Dual In-Line Memory Module

QUESTION 77

What is another acronym for Non-Volatile Memory Host Controller Interface?

ANSWER

NVMe

QUESTION 78

Name that acronym: This memory uses 8 bits for memory and 1 bit to check parity for errors. This type of memory is a type of computer data storage that can detect and correct the most-common kinds of internal data corruption. This memory is used in most computers where data corruption cannot be tolerated under any circumstances, such as for scientific or financial computing. This memory has an extra chip and an 72-bit data bus rather then 64-bit. The motherboard must support this type of memory and it cant not be mixed with other types of memory.

ANSWER

ECC (Error Checking and Correcting)

QUESTION 79

Name that acronym: This is the standard means of attaching internal storage drives to a desktop PC. It has superseded Parallel advanced technology attachment.

ANSWER

SATA (Serial Advanced Technology Attachment)

QUESTION 80

Name that SATA Revision: 1.5 Gb/s. The bandwidth throughput, which is supported by the interface, is up to 150MB/s.

ANSWER

SATA 1 (or revision 1.x)

QUESTION 81

Name that SATA Revision: 3.0 Gb/s. The bandwidth throughput, which is supported by the interface, is up to 300MB/s.

ANSWER

SATA 2 (or revision 2.x)

QUESTION 82

Name that ATA Revision: 6.0Gb/s. The bandwidth throughput, which is supported by the interface, is up to 600MB/s.

ANSWER

SATA 3 (or revision 3.x)

QUESTION 83

What is the Acronym for the expected number of hours that a device should operate under optimal performance before a critical incident can be expected? This the predicted elapsed time between inherent failures of a mechanical or electronic system, during normal system operation.

ANSWER

MTBF (Mean Time Between Failures)

QUESTION 84

Name that acronym: A monitoring system included in computer hard disk drives (HDDs), solid-state drives (SSDs),[1] and eMMC drives. Its primary function is to detect and report various indicators of drive reliability with the intent of anticipating imminent hardware failures.

ANSWER

SMART (Self-Monitoring, Analysis and Reporting Technology)

QUESTION 85

Name that acronym: -A parallel bus -One Host Bus Adapter (HBA) can control multible devices -has a command language that allows the host adapter to identify which devices are connected to the bus and how they are accessed. -These devices were typically used on server -class hardware rather then on desktop PCs -Originally supported 8 devices but ultimately suported up to 16 (with the host adapter counting as 1 device.)

ANSWER

SCSI (Small Computer System Interface)

QUESTION 86

Name that acronym: -features a 40-pin port but typicaly uses 80-wire shield cables. -the cable is up to 46cm (18 inces) long -supports up to 2 devices and has 3 connectors, one for the motherboard itself and one for each device.

ANSWER

PATA (Parallel Advanced Technology Attachment)

QUESTION 87

Name that acronym: -Supports over 16,000 devices -offers point to pint links as opposed to shared bandwidth -supports bandwidths up to 12 Gbps

ANSWER

SAS (Serial Attached SCSI)

QUESTION 88

Name that term: -a technique where data is divided into blocks and spread in a fixed order among all the disks in the array.

ANSWER

Disk Striping

QUESTION 89

Name that RAID Level: -requires at least two two hard disks -principal advantage is to improve performance by spreading disk I/O over multiple drives. -Provides no redundancy -if any physical disk in the array fails the whole logical volume will fail.

ANSWER

RAID 0 (Striping without Parity)

QUESTION 90

Name that RAID level: -requires at least 2 hard disks. -the data on disk 1 is exactly the same on disk 2 -if one disk fails another takes over with little impact on performance -Because all information is copied disk space is reduced by half.

ANSWER

RAID 1 (Mirroring)

QUESTION 91

Name that RAID level: -requires at least three drives but can be configured with more -data is distributed across all the disks in the array. -if one disk fails enough information is spread across the remaining disks to allow the data to be completely reconstructed. -however when a disk has failed the need to recover the data from the parity information degrades read performance. - as you add disks to the set fault tolerance decreases but the available disk space increases. Example: if you use 3 disks, 1/3rd of each disk would be set aside for parity. However if you use 4 only 1/4th would be used.

ANSWER

RAID 5 (Striping with Distributed Parity)

QUESTION 92

Name that RAID level: -needs at least 4 disks to create this configuration and there must be a even number of disks. -The logical striped volume is configured with mirrored arrays. -data is distributed across all disks -data is copied across all disks in a sub-volume

ANSWER

RAID 10 (also known as Raid 1+0)

QUESTION 93

A technician notices a networked cable has become flattened and untwisted. What affect could this type of damage cause to the networked equipment?

ANSWER

Slow Transfer Speeds.

QUESTION 94

You are unable to connect to the internet and when you enter ipconfig into command line prompt you receive a IP address of 169.254.100.1. What type of address is this called?

ANSWER

APIPA (Automatic Private IP Addressing)

QUESTION 95

You are trouble shooting a networked computer and need to see all the paths and hops taken from it to its desired destination of google.com. What command line prompt diagnostic tool will display this information?

ANSWER

tracert

QUESTION 96

What basic command line prompt diagnostic tool allows you determine if two computers can communicate with each other?

ANSWER

ping

QUESTION 97

This utility allows users to scan and restore corruptions within Windows system files.

ANSWER

System File Checker (SFC)

QUESTION 98

A document detailing how, what, and who was there to witness the destruction of a hard drive. it will contain serial numbers and provide detailed information regarding the chain of custody and handling.

ANSWER

certificate of destruction (COD)

QUESTION 99

A network protocol operating on Port 1812 that provides centralized authentication authorization and accounting management for users who connect and use a Network service.

ANSWER

RADIUS (remote authentication dial-in user service)

QUESTION 100

when used in a batch file this command creates a loop.

ANSWER

FOR(example FOR/L%%BIN(1,2,101)echo%%g)

QUESTION 101

This is something worn and used to prevent an electrical discharge from damaging sensitive components. One end is connected to the equipment being worked on and the other to the technician to ensure both are at the same ground potential.

ANSWER

ESD strap (electrostatic discharge strap also known as a anti-static strap)

QUESTION 102

a mini_pcie expansion slot is normally found in what types of devices?

ANSWER

laptops and mobile devices

QUESTION 103

what port is utilized by File Transfer Protocol (FTP) for data transfer?

ANSWER

port 20

QUESTION 104

what port is used by file transfer protocol (FTP) for control?

ANSWER

port 21

QUESTION 105

this is a protocol for receiving email by downloading it to your computer from a mailbox on the server of an internet service provider.

ANSWER

POP3

QUESTION 106

this is a Windows server edition that is only available in 64 bit.

ANSWER

windows 2016

QUESTION 107

this Mac OS system is only available in 64-bit

ANSWER

Mac OS X

QUESTION 108

this utility allows you to manage Windows startup and boot options

ANSWER

msconfig

QUESTION 109

this utility contain system hardware and software configuration information and should be should be used with extreme caution as editing may cause permanent damage if any mistakes or errors are inputted into it.

ANSWER

regedit

QUESTION 110

the order of devices listed in BIOS that the computer will look for operating system information on. By default most computers will have the the OS look for the information first on the hard drive however if you wish to alter this you can have it look on the CD, DVD, or flash drive.

ANSWER

Boot Sequence

QUESTION 111

this is a container with in a Microsoft active directory domain which can hold users, groups and computers. I can also be used as a target for applying group policies.

ANSWER

organizational unit (OU)

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials