Professor Messer Comptia A+ Practice Test
100 questions across 0 topics. Use the find bar or section chips to jump to what you need.
Which of the following technologies includes an extra register between the RAM module and the memory controller? A) Registered memory B) CPU cache C) ECC RAM D) Parity memory E) Multi-channel memory F) The self-checkout register
A) Registered memory Registered memory is also called buffered memory because of the additional register between the memory module and the memory controller. Registered (also called buffered) memory modules have a register between the DRAM modules and the system's memory controller. They place less electrical load on the memory controller and allow single systems to remain stable with more memory modules than they would have otherwise. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-unexpected-item-in-the-bagging-area/
When you view your drive status in Disk Management, the drive is marked as "Regenerating." Which of these would best describe this drive status? A) Data on the drive is moving to align with the beginning of a cluster B) A RAID 5 volume is recreating data based on the parity information C) Data blocks are being moved to create contiguous file sectors D) Data is being restored from a backup tape E) Data is read and re-written to each sector to refresh the magnetic polarities F) I'm growing a new tail
B) A RAID 5 volume is recreating data based on the parity information If a drive in a RAID 5 array fails, the replacement will need to regenerate data to rebuild the array. Once the regeneration process is complete, the drive will return to the "Healthy" status. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-it-was-a-close-call/
Which of the following would describe RAID 1? A) Files are striped across multiple drives with a parity block B) File blocks are duplicated between two or more physical drives C) Files are striped across multiple drives D) Parity information is calculated and stored across multiple drives E) A spare drive is enabled if a production drive fails F) I'm still out of drive space
B) File blocks are duplicated between two or more physical drives RAID 1 is drive mirroring, where an exactly duplicate of information is written to multiple drives. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-must-have-every-high-res-texture-pack/
Which of the following features are not available when using Windows Easy Transfer to migrate to a Windows 8.1 system? A) External USB flash drive B) Microsoft OneDrive C) Local network connection D) External hard disk E) I usually need something hard to bang my head upon
C) Local network connection In Windows 8.1, Microsoft removed the local network and Easy Transfer cable options, and instead relies on a local storage device or Microsoft One Drive to complete the migration. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-an-os-migration-with-a-pinch-of-wrenches/
What is the maximum storage space available on a single-layer DVD-ROM? A) 8.5 GB B) 700 MB C) 25 GB D) 4.7 GB E) 50 GB F) And it's never enough room
D) 4.7 GB A single-layer DVD-ROM can store a maximum of 4.7 GB, and a dual-layer DVD-ROM can store 8.5 GB. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-time-to-delete-all-the-pictures-of-my-paper-clip-collection/
Which of these would be the best choice for resizing an NTFS volume? A) Windows Recovery Console B) Disk Management C) System Configuration D) Disk Check E) RAID F) I use a vice and some rubber bands
B) Disk Management The Disk Management utility allows you to shrink, extend, split, and make other changes to Windows volumes. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-not-as-effective-as-you-might-think/
Which of the following would be the most secure Windows Firewall configuration on an open WiFi network? A) Block all outgoing connections B) Build a custom rule for each application in use C) Block all incoming connections D) Turn on Windows Firewall with the default settings E) Windows Firewall is not necessary on an open network F) Pour coffee over your keyboard
C) Block all incoming connections Windows Firewall can "Block all incoming connections," which prevents all connections from other devices. On an open network, this firewall configuration would be the most aggressive security posture. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-ultimate-in-secure-computing/
Which of the following would best describe DRM? A) The number of cycles occurring in a second B) The quality of a received signal C) Licensing of a video file D) Digital signal modulation E) The loss of signal over a given distance F) It's large with a lot of fur
C) Licensing of a video file DRM (Digital Rights Management) is the method used to control the licensing and management of digital media. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-think-thats-a-dog/
What maximum transmission speed would be most associated with USB 2.0? A) 1.5 megabits per second B) 12 megabits per second C) 480 megabits per second D) 5 gigabits per second E) 10 gigabits per second F) This flash drive is never large enough
C) 480 megabits per second USB 1.1 transmits at 1.5 megabits per second and 12 megabits per second, USB 2.0 transmits at 480 megabits per second, and USB 3.0 can transmit at a maximum of 5 gigabits per second. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-need-a-backup-for-my-backup/
Which of these best describes the DNS settings in the Windows IP address configuration? A) Provides a local loopback address B) Identifies the IP address of the local router C) Automatically configures the other IP address settings D) Converts domain names to IP addresses E) Provides connectivity when a DHCP server is not available F) Uses hypnosis to make me forget my password. Again.
D) Converts domain names to IP addresses DNS (Domain Name Services) settings are used to convert from domain names to IP addresses. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-lost-my-yellow-sticky/
Which of these would best describe multiple voltage rails? A) Provides multiple voltages over the same wires B) Improves the overall power load regulation C) Can automatically power down unused devices D) Provides power to multiple computers E) Decreases overall power consumption F) Makes me cry when my power bill arrives
B) Improves the overall power load regulation Multiple power rails can be configured to regulate a voltage supply across multiple devices, which provides better overall power management inside of the computer. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-it-costs-a-lot-to-keep-this-phone-charged/
Which of the following would best describe a VPN? A) Filter traffic based on a category of URL B) Drop network traffic containing a known exploit C) Provide a network connection for virtual systems D) Limit the network throughput of certain applications E) Securely communicate across a public network F) I could use a ride to work
E) Securely communicate across a public network A VPN (Virtual Private Network) is commonly used to encrypt all traffic sent between two points. This allows you to securely communicate to a remote site, even if you're using an open WiFi hotspot. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-not-that-kind-of-transportation/
What motherboard component would most likely be powered with a 6-pin or an 8-pin connector? A) CPU B) SATA drive C) Case fan D) PCI Express adapter E) USB interface F) My coffee warmer
D) PCI Express adapter A PCI Express adapter can use additional power from the computer power supply with a 6-pin (75 watt) or 8-pin (150 watt) connector. These are commonly used for high-end graphics cards that require more power than what is normally available through the motherboard's PCI Express adapter slot. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-thats-a-good-cup-of-joe/
Which of the following would be the best way to view all of the configured shares on a Windows system? A) Control Panel / Administrative Tools / Computer Management B) Control Panel / Network and Sharing Center C) Control Panel / Computer Management D) Accessories / Network and Sharing Center E) Control Panel / Administrative Tools / System Information F) You'll need enough for everyone in the class
A) Control Panel / Administrative Tools / Computer Management The Computer Management utility provides a list of all of the visible and hidden shares on a Windows system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-time-to-read-bazooka-joe/
Which of the following would best describe a workstation with specialized audio and video, a large fast storage drive, and dual monitors? A) Virtualization workstation B) Home theater PC C) Thin client D) Audio/Video editing workstation E) Home server PC F) That sounds awesome, I'll take two.
D) Audio/Video editing workstation An audio/video editing system requires the best audio and video possible, as well as fast and large storage devices. It's also common to use two monitors to assist with the extensive editing process. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-ill-put-it-on-your-tab/
What wireless authentication is commonly seen in an enterprise environment? A) WPA2 B) 802.11n C) TLS D) 802.1X E) MAC F) I remember you from yesterday
D) 802.1X 802.1X integration provides a way to authenticate users with a centralized database. When using 802.1X on a wireless network, there's no need to use shared passphrases for everyone. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-my-computer-knows-me-so-well/
Which of the following would be most associated with OLED? A) Requires a cooldown process after use B) Does not use a backlight C) Has poor viewing angles D) Uses an array of backlights behind the screen E) Uses a combination of noble gas and mercury F) Tastes great with a glass of cold milk
B) Does not use a backlight An OLED (Organic Light Emitting Diode) display is thin, does not require a backlight, and emits light by powering an organic compound. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-nope-thats-not-even-close/
Which of the following would be a valid APIPA address? A) 192.168.22.5 B) 10.5.80.2 C) 169.254.77.120 D) 172.16.22.4 E) 172.0.0.1 F) It's two blocks over, just past the diner
C) 169.254.77.120 APIPA addresses are automatically assigned to devices when a DHCP server is not available and a static address has not been assigned. APIPA addresses can communicate on the local subnet, but cannot be routed outside of the local network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-not-that-kind-of-address/
What would you expect to occur if you change your LCD display to a resolution that's different than the native resolution? A) The screen will show a black screen B) The text and graphics on the screen will be slightly distorted C) The display will power down D) Windows will only operate in VGA mode E) The input method will need to be changed from the default F) Your content creation will appear much more intelligent and humorous
B) The text and graphics on the screen will be slightly distorted The native resolution will ensure that the information on the screen is crisp and clear. If the resolution is changed from the native resolution, the resulting display will appear fuzzy and slightly distorted. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-if-only-it-was-that-easy/
Which of the following would you expect to see using a mini-DIN connector? A) External storage device B) DVD-ROM drive C) Keyboard D) Speakers E) Internal accessory power F) I was with you until I realized it wasn't mini-Doughnuts
C) Keyboard The mini-DIN connector is commonly seen on older PS/2 keyboard and mouse connections. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-coffee-for-dunking/
Which of the following would be most likely if there was an Ethernet duplex mismatch? A) The network performance would be slower than normal B) The network connection would not transmit any data C) Network performance would increase D) Traffic would not route from the local IP subnet E) The network performance would be unchanged F) It would combine stripes and polka dots
A) The network performance would be slower than normal A duplex mismatch would cause a significant slowdown to network traffic. For the best performance, make sure the duplex matches on both sides of the Ethernet connection. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-none-of-them-would-be-the-same-color/
What is the most common connector used for component video? A) mini-DIN B) TRRS C) RCA D) DB-15 E) USB F) I'm not sure where all this dust came from
C) RCA It's very common to use colored RCA cables to connect component video devices. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-havent-been-back-here-in-a-while/
Which of the following would you expect S.M.A.R.T. to identify? A) Incorrect NTFS file permissions B) Corrupted Master Boot Record C) Disk read errors D) Invalid Windows Boot Configuration Data store E) EFS protected files F) Only the ripest produc
C) Disk read errors S.M.A.R.T (Self-Monitoring, Analysis, and Reporting Technology) is a storage drive technology that can provide detailed information about the physical drive characteristics. Logical problems with the file system would not be identified through S.M.A.R.T. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-a-technological-thumper/
Which of these would be the best way to start System Restore when booting? A) Start your computer with the Windows installation media B) Start the system in VGA mode C) Boot from a USB flash drive D) Launch System Restore from the BIOS settings E) Press F8 and select Repair F) This hammer doesn't work as well as it used to
E) Press F8 and select Repair The System Restore utility can be accessed during started by using the Windows F8 key to launch the Advanced Boot Options. The System Restore utility will be available under the Repair option. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-feel-better-though/
Which of the following standards is most associated with Thunderbolt? A) HDMI B) DisplayPort C) USB D) VGA E) DVI F) Looks like rain
B) DisplayPort Thunderbolt connections carry both DisplayPort video and PCI Express data. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-not-that-kind-of-thunder/
Which of the following is commonly used to automate software updates in the Linux operating system? A) tar B) update C) yum D) rsync E) gzip F) I'm not even sure what I'm updating
C) yum The Linux yum and apt-get commands are commonly used to provide on-demand and automated updates of operating system patches and applications. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-often-a-mystery/
Which of the following utilities can you use in Mac OS to perform First Aid on a drive partition? A) Time Machine B) Disk Management C) System Information D) Check Disk E) Disk Utility F) I've misplaced my bandages
E) Disk Utility The Disk Utility in Mac OS can be used to manage drive partitions, get information, and perform first aid to storage drives. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-box-is-always-empty/
Which of the following would be the best way to integrate a mouse into a laptop computer? A) Motion sensor B) Touch pad C) USB trackball D) Smart card reader E) Use a PS/2 connector F) I only use key combinations
B) Touch pad It's common to integrate a mouse into the small real-estate of a laptop keyboard through the use of a touch pad. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-it-adds-another-difficulty-level-to-minesweeper/
Which of the following would most commonly describe a traditional MIDI interface? A) RJ45 B) DIN C) TRS D) Centronics E) Molex F) Why is the dog howling?
B) DIN Although it's common to see USB-connected MIDI devices, you'll also find some devices still using the more-traditional DIN connectors. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-such-beautiful-music/
Which of these interfaces is commonly used to connect external speakers to a PC? A) FireWire B) USB C) Coax D) Two-wire E) TRS F) I can't find the right cable
E) TRS TRS (tip-ring-sleeve) connectors are commonly used to connect analog audio components. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-then-youll-have-to-untangle/
Which of these best describes the extension of an Apple Disk Image file? A) .img B) .tar C) .zip D) .dmg E) .iso F) At least I can't lose the disk this way
D) .dmg An Apple Disk Image file is labeled with a .dmg file extension, and will mount in the operating system as a normal file system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-ill-bet-i-still-could/
With which of the following would you be most likely to use a Centronics connector? A) Network connections between switches B) Older mouse and keyboard connections C) Between a computer and printer D) Analog display connection E) Between a computer and a musical instrument F) It takes a long time to untangle these cables
C) Between a computer and printer A Centronics connector is commonly seen on older printers that are not equipped with USB connections. The Centronics connector is on the printer, and a DB-25 parallel port is used to connect to the computer. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-thats-why-they-make-chain-saws/
Which of the following would be the best way to terminate a Linux process by name? A) kill B) halt C) taskkill D) killall E) net stop F) I'll be back
D) killall The Linux killall command allows you to terminate a process by name instead of using the process ID (PID). http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-he-said-theres-a-storm-coming-in/
Which of these would commonly use a transfer belt and roller? A) Hard drive B) Laser printer C) Scanner D) Thermal printer E) DVD-ROM drive F) We'll have a barrel of fun
B) Laser printer A transfer belt and roller is commonly used in color laser printers to transfer the image from all color cartridges to a single belt. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-gangs-all-here/
Which Mac OS feature displays all running applications into a single zoomed-out view on the desktop? A) Mission Control B) Spaces C) Spotlight D) Iconify E) Finder F) I can't do the arm thing
A) Mission Control The Mission Control feature in Mac OS can be activated with the Mission Control hotkey or by pressing the Mission Control icon in the Apple Dock. The Spaces feature is used to create multiple independent desktop views. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-come-on-and-zoom/
The colors on your inkjet printer do not appear to be overlapping properly, with some of the colors visibly misaligned. Which of the following would be the best way to resolve this issue? A) Replace the print head B) Replace the problematic ink cartridge C) Perform a printer calibration D) Use a higher weight paper E) Adjust the printer carriage F) Consider using watercolors
C) Perform a printer calibration The inkjet printer calibration process ensures that the separate print heads create crisp separations and properly align the colors. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-these-revenue-charts-are-beautiful/
You need to find a file that contains a customer's account number. Which of the following Linux commands would be the best choice? A) locate B) apt-get C) grep D) ls E) chmod F) It's time for more coffee
C) grep The Linux grep command (Globally search a Regular Expression and Print) is commonly used to locate files that contact a specific text string. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-it-only-_seems_-faster/
Which of the following would be considered an advantage of thermal printers? A) Replacement ink is commonly available B) Thermal printers are very quiet when printing C) There are many color printing options D) The print toner uses easy to replace cartridges E) Many paper types can be used in thermal printers F) They're handy on a cold winter's night
B) Thermal printers are very quiet when printing Thermal printers use heat to print instead of ink or toner and there's no moving print head. The motor that moves the paper is often louder than the printing process itself! http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-crowd-around-the-printer-with-some-hot-chocolate/
Which of the following would best describe the pwd command? A) Change a user account password B) Move the printer page forward C) Print the current working directory D) Changes the ownership of a file or directory E) Displays the processor's working CPU distribution F) It's my favorite Linux jumble word game
C) Print the current working directory The pwd command "prints" or displays the current working directory on the screen. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-try-to-use-it-in-a-sentence/
Which of the these would be the best use of an impact printer? A) Create multiple copies at the same time B) Print in a noise-sensitive area C) Create high-quality graphical output D) Output a digital file to print at a later time E) Create poster-sized output F) It tenderizes the steak
A) Create multiple copies at the same time The physical pins hitting the printed page allow an impact printer to create multiple copies of a form at the same time. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-perfect-printer-for-your-summer-grilling/
Which of the following would best describe a hypervisor? A) Increases the overall CPU efficiency of your computer B) Improves the throughput of network communication C) Manages the resources required for virtualization D) Prevents malware from executing in secure areas of memory E) Caches CPU transactions to provide an overall faster response time F) It's like a regular visor, but more energetic
C) Manages the resources required for virtualization A hypervisor manages the platform and guest operating systems in a virtual environment. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-time-to-try-the-de-caf-2/
What's the best way to use a document that's "printed" to a printer driver file? A) Open and use in any PDF reader B) Use the XML Paper Specification to view the output C) Use the copy command to send the file to a printer D) View the file in a graphics editor E) Load the file into the application that originally created it F) Send the file to everyone on the internal mailing list and hope for the best
C) Use the copy command to send the file to a printer If you're printing to a print driver file, the resulting file will be saved in a language that only the printer can understand. You might use this feature if you were in a place without a printer and you wanted to print later, or you wanted to send the file to someone else for printing. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-reply-to-all/
What cloud-based service provides you with hardware, but still requires you to setup, configure, and manage the software? A) Hybrid Cloud B) SaaS C) IaaS D) Private Cloud E) PaaS F) I'm going to need a pilot's license when all of this is done
C) IaaS IaaS (Infrastructure as a Service) is a cloud-based architecture that provides hardware, but not much else. You would still be responsible for installing operating systems and applications, and you're still responsible for the ongoing management of the applications. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-please-place-applications-in-their-full-upright-position/
Which of the following would not commonly be included in a laser printer maintenance kit? A) Fuser unit B) Feed rollers C) Separation pad D) Toner cartridge E) Cleaning cloths and gloves
D) Toner cartridge Although it's common to check the toner levels when performing maintenance on a laser printer, it's not necessary to replace the toner cartridge before it's empty. The maintenance of a laser printer occurs at predefined checkpoints in the lifetime of a printer, and the toner cartridges are simply replaced when they are depleted. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-im-in-maintenance-mode/
Which of these network services would commonly be used for URL filtering? A) Proxy server B) Authentication server C) IPS D) Web server E) DNS server F) A fine mesh strainer
A) Proxy server A proxy server is commonly used as an intermediate server between an end-user and the rest of the Internet. Since the proxy server is effectively in the middle of the conversation, you can perform many checks of the traffic before it reaches the end user. It's common to use proxy servers for virus scanning, URL filtering, access control, caching and more. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-network-with-pasta-and-red-sauce/
Which of the following tasks is commonly performed when maintaining a thermal printer? A) Replace the fuser assembly B) Wipe out the printer with a damp cloth C) Replace the print head D) Run a printer calibration E) Replace the ribbon F) Shovel more coal into the boiler
B) Wipe out the printer with a damp cloth Thermal printers have relatively simple printing mechanisms compared to laser printer or inkjet printers. There's no moving print head and no ink or toner, so the maintenance tasks tend to focus on cleaning and keeping the paper path moving freely. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-this-train-isnt-moving-very-quickly/
Which of the following is not true of WiFi Calling? A) Uses voice over IP technology B) Uses a special app to work properly with your wireless provider C) Your mobile carrier must support WiFi calling D) Can be used when there's no wireless carrier signal E) Requires an Internet-connected WiFi network
B) Uses a special app to work properly with your wireless provider The WiFi calling feature is built into the operating system of your mobile device and does not require a separate app. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-for-those-important-pizza-orders/
Which of these are common maintenance tasks for an impact printer? A) Replace the print head B) Run a color calibration C) Replace the toner cartridge D) Clean the heating element with isopropyl alcohol E) Check the ink cartridge for clogs F) My new job is a tractor feed paper hole remover
A) Replace the print head The print head of an impact printer is constantly hitting the ribbon and paper. Eventually some pins will stop firing, and sometimes the entire print head will stop working altogether. It's common to replace this heavily used part during the normal maintenance cycle. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-thought-it-had-something-to-do-with-farming/
Which of the following would be disabled when using airplane mode? A) Cellular B) Bluetooth C) WiFi D) NFC E) None of these radios are disabled when using airplane mode F) All of these radios are disabled when using airplane mode
F) All of these radios are disabled when using airplane mode Airplane mode is a simple one-click feature that automatically disables every radio in your mobile device. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-like-to-have-the-whole-can/
Which of these best describes the key cartridge in an inkjet printer? A) The cartridge used to unlock the other cartridges B) The key color, which is usually black C) The first cartridge that prints during the print cycle D) The cartridge used for calibration E) The first cartridge that must be replaced when the ink is low F) I can't remember where I left my key cartridge
B) The key color, which is usually black The cartridges in an inkjet printer are often referenced as CMYK, for cyan, magenta, yellow, and key (black). Some printers have individual cartridges for each color, while other printers will combine the colors together into a single replaceable cartridge. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-always-the-last-place-you-look-almost-always/
Which port number is commonly used by IMAPS? A) tcp/143 B) tcp/993 C) tcp/443 D) tcp/8080 E) tcp/995 F) I don't need a port to look at maps
B) tcp/993 IMAP over SSL, or IMAPS, commonly uses TCP port 993 to communicate between the client and server. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-not-that-kind-of-map/
Which of these devices would commonly connect to a 6P2C connector? A) Ethernet adapter B) Keyboard or mouse C) Modem D) LCD monitor E) DS3 WAN link F) I can connect to anything with seven adapters and enough time
C) Modem A 6P2C (6 position, 2 conductor) connector is commonly used to connect to POTS (plain-old telephone system) lines. If you're connecting an analog phone or analog modem, you're probably using a cable with 6P2C connectors on it. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-im-going-to-need-a-couple-of-cable-ties/
Which of the following are not a requirement when synchronizing a mobile device to the desktop? A) Enough RAM to support the mobile device desktop application B) An operating system that can run the mobile device desktop application C) High-speed Internet access D) Free storage space on your computer E) A synchronization cable that's three inches longer than the one I'm currently using
C) High-speed Internet access When you're synchronizing and backing up your mobile device to your local computer, you won't need the high-speed Internet access that's required for cloud-based backups. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-just-a-bit-more/
What is the minimum category of cable required for 10BASE-T networks? A) Category 3 B) Category 5 C) Category 5e D) Category 6 E) Category 6A F) Category 7 G) I always use the one that isn't all tangled
A) Category 3 10BASE-T networks are Ethernet networks using twisted pair and run at 10 megabits per second. The minimum category of cable required for these networks is Category 3, although today it would be difficult to find any twisted pair cable manufactured to those older specifications. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-nothing-a-few-wire-snips-wont-fix/
Which of these would best describe malware that infects your system by pretending that it's something else? A) Worm B) Rootkit C) Ransomware D) Trojan Horse E) Phishing F) My operating system
D) Trojan Horse A trojan horse is software that pretends to do one thing, but behind the scenes it's busy infecting your computer. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-there-are-days-when-its-fighting-me/
Which of these would be a common symptom of network signal loss? A) Windows Stop Error B) Slow file download times C) Word processor spell check is not working D) DVD-ROM reader will not play movies E) Podcast audio volume is low F) Warmer soda than usual
B) Slow file download times A network signal loss will result in either no network connection, or very slow access over the current network link. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-sky-is-less-blue-grass-is-less-green/
Which of these would be the best way to prevent the disclosure of information in a public place? A) Key fob B) Spam filter C) ACLs D) BitLocker E) Privacy filter F) Stick to bottled water
E) Privacy filter A privacy filter on a laptop screen makes the contents appear completely black to anyone who's not directly in front of the screen. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-loose-lips-sink-ships/
What is the compressed IPv6 address for fe80:0000:0000:0000:0076:4000:f050:27c6? A) fe80::76:4:f5:27c6 B) fe80::76:4000:f050:27c6 C) fe80::76:4::f05:27c6 D) fe80::0076:4000:f050:27c6 E) fe80:76:4000:f050:27c6 F) Now your IPv6 can fit in your suitcase
B) fe80::76:4000:f050:27c6 The two big rules when compressing IPv6 addresses is to remove all leading zeros and abbreviate two or more groups of zeros with a double colon. Non-leading zeros will remain in the address, and only one set of double colons can be in a single address. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-just-add-water/
Which of the following would you most likely associate with DLP? A) Additional authentication is required when connecting to the VPN B) Switch ports are disabled until a successful authentication C) Medical records are blocked at the firewall D) You must have a physical ID card to gain access to the network E) Passwords must include a special character F) It's twice the LP
C) Medical records are blocked at the firewall DLP (Data Loss Prevention) blocks any data transfer or "leakage" of personal data such as Social Security Numbers, credit card numbers, or medical records. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-need-more-league-points/
Which of the following removed the restrictions created by classful subnet masks? A) DNS B) DHCP C) IPv6 D) CIDR E) RADIUS F) Don't bother following those silly TCP/IP rules
D) CIDR CIDR (Classless Inter-Domain Routing) was created in the 90s to allow for flexibility when subnetting IP networks. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-this-wont-work-very-well/
Which of the following would you expect to find in an AUP? A) Specific rules for network use B) A list of available files C) A database of blocked and allowed URLs D) A schedule for operating system updates E) A consolidated set of event logs F) The conversion rate is never as good as you would hope
A) Specific rules for network use An AUP (Acceptable Use Policy) is usually provided to each person in an organization that connects or communicates through the corporate network. These policies provide a specific set of rules so that everyone knows exactly what type of use is acceptable when using the organization's computing resources. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-im-not-sure-what-to-do-with-all-of-these-coins/
You need to configure a firewall to allow Mac OS devices to find other Mac OS services by name. Which ports should you enable in the firewall? A) tcp/427 and udp/427 B) udp/137 C) tcp/53 and udp/53 D) tcp/548 E) tcp/445 F) If you allow all ports, everything works great
A) tcp/427 and udp/427 Apple's Service Location Protocol uses both tcp/427 and udp/427 to populate the list of available services in the operating system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-best-security-ever/
Which of these would commonly be used to view the list of an organization's employees? A) SNMP B) DHCP C) SMB D) LDAP E) SSH F) We used to put these things in big books
D) LDAP LDAP (Lightweight Directory Access Protocol) is a standard method of querying a directory of objects. It's common to use LDAP databases to store the list of users for authentication to the network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-need-another-three-ring-binder/
Which of the following is true of Windows permissions? A) Inherited permissions are propagated from the child object to the parent object B) Explicit permissions take precedence over inherited permissions C) You must set permissions of each individual object D) You cannot set a deny permission for a Windows share E) Inherited and explicit permissions are combined to create the effective permissions F) I prefer to ask for permission afterwards
B) Explicit permissions take precedence over inherited permissions A permission that has been explicitly assigned to an object always takes precedence over inherited permissions, even deny permissions that were inherited. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-an-exceptionally-bad-idea/
Which of these would be the best reason for frequently changing your password? A) Makes it more difficult to brute force your password B) Creates a new Security ID each time the password is updated C) Limits the use of a compromised account D) Encrypts your files with a different passphrase E) Limits the permissions associated with your account F) Because you need one more thing to remember
E) Limits the permissions associated with your account Frequent updates to a password don't make it any more difficult to brute force, but it does limit the amount of time that a compromised account could be used by the bad guys. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-or-not-as-the-case-may-be/
Which of these wireless standards support a single-stream throughput of almost 900 megabits per second? A) 802.11g B) 802.11ac C) 802.11n D) 802.11a E) 802.11b F) Now I can't blame lag
B) 802.11ac 802.11ac networking supports a per-stream maximum theoretical throughput of 866.7 megabits per second. The maximum of 8 allowable streams provides almost 7 gigabits per second of throughput. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-this-controller-is-bad/
Which of the following is an advantage of using an authenticator app? A) Encrypts the authentication process B) Securely stores all of your passwords in one database C) Adds an additional factor during the authentication process D) Replaces your username and password with a single login token E) Assures that you are not using weak passwords when authenticating F) One additional thing that I can't keep charged
C) Adds an additional factor during the authentication process Authenticator apps are commonly used as another authentication factor to use during the login process. Since the authenticator app is on your personal mobile device, it can be included during the authentication process as something you own or possess. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-yes-i-want-to-use-low-power-mode/
Which of these wireless encryption methods would commonly integrate with a centralized authentication database? A) WPA2 B) WPA2-AUTH C) WPA2-Enterprise D) WEP-AUTH E) 802.11ac F) I have to change my password every time my favorite player is traded
C) WPA2-Enterprise WPA2-Enterprise uses 802.1X to authenticate users to a central database instead of using a shared passphrase for everyone on the network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-im-still-not-on-the-winning-team/
What kind of hard drive drive formatting clears the file table, but does not physically erase any of the data? A) Table format B) Quick format C) Regular format D) File format E) Low-level format F) I can now recover all of that data that I didn't want to begin with
B) Quick format As the name implies, a quick format occurs very quickly, and a large hard drive can be formatted in just a few seconds. Since all of the data is left in place, a third-party unerase utility can usually recover the data. If you want to be sure the data is gone forever, you'll want to use a regular format or a third-party secure erase utility. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-so-much-for-that-comprehensive-80s-music-collection/
Which of these would you configure on your router to provide 24 by 7 Internet access to a home video surveillance system? A) NAT B) Port triggering C) WPA2 D) QoS E) Port forwarding F) Say cheese
E) Port forwarding Port forwarding configures a permanent association between your external Internet-facing IP address and a service running on your internal network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-my-hair-is-a-mess/
Which of these would be the best reason to avoid WPS on your wireless network? A) The encryption process has a cryptographic vulnerability B) The encryption method is not supported by newer access points C) The frequencies used are easily absorbed by surrounding objects D) Access to the network can be trivially brute-forced E) The overhead slows down all network transactions F) It means that I have to get work done now
D) Access to the network can be trivially brute-forced WPS (Wi-Fi Protected Setup) was an authentication method for wireless networks that was intended to make it easy to securely connect to a wireless network. Unfortunately, the PIN process was found to be easily brute-forced, and it only takes a few hours to try all of the possible combinations and gain access to a WPS-enabled network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-weekend-is-so-short/
Which of these would be the best example of a line-of-sight service? A) ISDN B) DSL C) WiMAX D) Cable modem E) Fiber Ethernet F) Now I need line-of-power and line-of-snacks
C) WiMAX WiMAX (Worldwide Interoperability for Microwave Access) is a wireless service that requires a line-of-sight to communicate from antenna to antenna. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-nearly-perfect/
When you start Windows, you receive the message "Device not starting." Which of these would be the best next troubleshooting step? A) Check Device Manager and Event Viewer B) Install all pending Windows updates C) Reseat all adapter cards D) Update the BIOS to the latest version E) Power down the computer and restart F) Get some coffee and pretend the problem isn't happening
A) Check Device Manager and Event Viewer The generic message of "Device not starting" doesn't give you much information to start troubleshooting, so you need to check the Event Viewer for detailed information and check your Device Manager to see what devices are not operating properly. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-close-your-eyes-tight/
What kind of network would you commonly use to connect two corporate offices in different cities? A) MAN B) WAN C) PAN D) LAN E) Let's just get a really long cable
B) WAN A WAN (Wide Area Network) is used to connect sites that are located across large geographical distances. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-youll-get-a-bonus-for-those-cost-savings/
Which of these would be the most common use of REGSVR32? A) Modify the startup programs in the Windows Registry B) Collect long-term system statistics C) View the list of running applications and services D) Enable or disable startup services E) Register and unregister a DLL F) It keeps my World of Warcraft installation up to date
E) Register and unregister a DLL REGSVR32 is the Microsoft Register Server, and it's commonly used to register and unregister DLLs from the Windows operating system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-dont-have-time-for-all-of-these-dailies/
What kind of device is used to convert between analog and digital signals? A) Switch B) Line driver C) WAP D) Modem E) PoE F) A converterator
D) Modem A modem (modulator/demodulator) is used to convert between analog and digital signals. It's common to have modems on each side of a connection to provide the transfer of digital information. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-an-upgrade-from-the-switcheroo/
Which of the following would provide the best long-term analysis of application crashes? A) Process Monitor B) Event Log C) Reliability Monitor D) Recovery Console E) Performance Monitor F) I'm glad my misspelling doesn't cause app crashes
C) Reliability Monitor Reliability Monitor is a utility can summarizes and displays graphs that show the reliability of all applications running in Windows. With Reliability Monitor, you can get a visual representation of every crash and application problem, which makes it easy to identify ongoing problems with an application. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-id-have-constant-reboots/
Which of these would be the best choice to identify crossed wires in an Ethernet cable? A) Loopback plug B) Crimper C) Toner probe D) Cable tester E) Multimeter F) This is a different situation than when my own wires are crossed
D) Cable tester A crossed wire or broken connection in a cable can easily be identified by using a cable tester. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-thought-it-was-thursday/
Which of the following would be a common use of an LVM snapshot? A) Real-time backups of Linux servers B) Restore a Windows Server from an image C) Enable or disable services before Windows starts D) Get information about security events E) Refresh Windows without changing personal files and settings F) Makes great pictures in low-light
A) Real-time backups of Linux servers The Linux LVM (Logical Volume Manager) is similar to the Windows System Restore feature. Information can be backed up on a Linux device and restored very quickly based on a snapshot or point in time. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-yet-another-sunset-picture/
You have a laptop that does not have an integrated Bluetooth radio. Which of these would be the best option to provide Bluetooth connectivity? A) Tether the laptop to your mobile phone B) Use a Bluetooth hotspot C) Install a USB to Bluetooth adapter D) Use a Thunderbolt to Bluetooth adapter E) Replace the 802.11 adapter with a Bluetooth adapter F) Paint the laptop blue
C) Install a USB to Bluetooth adapter A USB to Bluetooth adapter is easy to install and fits almost invisibly into an existing USB interface. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-dont-think-my-headset-is-going-to-work/
Why would you delete all of the restore points when removing malware? A) The restore points don't contain any useful information B) Malware can't operate when restore points are present on the system C) All user files and documents must be deleted D) Restore points are original entry point for the malware E) The restore points may be infected with the malware F) I need the drive space
E) The restore points may be infected with the malware Malware is written to not only infect the current running operating system, but many malware variants will also infect the stored restore points. If you try to remove the malware by restoring from a previous restore point, you'll still have an infected system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-too-many-vacation-pictures/
Which of these would be an advantage of using an SSHD? A) No moving parts B) Large-scale offline storage C) Built-in redundancy D) High-speed network connectivity E) The speed of an SSD and the storage capacity of a traditional hard drive F) It's a floor polish and a dessert topping
E) The speed of an SSD and the storage capacity of a traditional hard drive An SSHD (solid-state hybrid drive) combines an SSD as a high-speed cache and a traditional spinning hard drive for large storage capacities. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-tastes-terrific/
You've forgotten your unlock pattern on your Android phone, and now the phone is locked down. Which of these would be the best way to recover from this lockout? A) Perform a factory reset and restore your data B) Use debug mode to access the phone's file system C) Move the phone to a known-good wireless network D) Unlock the phone with your Google credentials E) Have your mobile phone company perform a remote reset F) Maybe it's time to go outside and walk around
D) Unlock the phone with your Google credentials If you are locked out of you Android phone after too many unsuccessful screen unlock attempts, you can restore access to the device by using your Google username and password. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-look-a-tree/
Which type of LCD display would be the best choice for gaming? A) LED B) IPS C) TN D) XPS E) OLED F) The largest one
C) TN A TN (Twisted Nematic) LCD display suffers from poor viewing angles, but the screen response times are very fast. It's common to prefer TN displays when gaming or when the applications require a very fast response time. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-size-of-that-wall-is-just-right/
You suspect that a mobile application is using more CPU and network than usual. Which of these would be the best way to check the app for any security issues? A) Start the app in debug mode B) Check the app in an online App scanner C) Connect to a local wireless network instead of the cellular network D) Restart the app in sandbox mode E) Restart the mobile device F) My abacas app is still working
B) Check the app in an online App scanner An app scanner can check the validity of an application against historical tests and scans. If someone else has already determined that this app is a security concern, you can view these results in the app scanner. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-ill-send-you-a-can-and-string/
Which of the following would be the most common use of a laptop docking station? A) Increase the laptop startup speed B) Use a full-size adapter card with a laptop C) Improve the laptop video resolution D) Increase the amount of laptop RAM E) Double the amount of CPU power F) Tune in those distant radio stations
B) Use a full-size adapter card with a laptop A laptop docking station is used to extend the capabilities of a laptop computer. Many docking stations include a chassis for expansion cards, allowing you to extend the capabilities of your laptop with full-size adapter cards. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-that-must-be-some-antenna/
Which of the following would be the best use of an anti-static bag? A) Protect an installed PCI express adapter card B) Minimize electrostatic discharge when working inside of a laptop C) Cushion components during shipping D) Prevent electrostatic discharge when storing components E) Dissipates static electricity when walking through a doorway F) It's a better choice than plastic for all of your groceries
D) Prevent electrostatic discharge when storing components An anti-static bag contains chemicals that dissipate static electricity. It's common to store components in an anti-static bag when not installed in a computer. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-bananas-are-on-sale/
Which of these would be the best way to connect a smartphone to an automobile and a smartwatch? A) Bluetooth B) Lightning C) IR D) Micro-USB E) 802.11 F) Super glue
A) Bluetooth Bluetooth provides high-speed wireless connectivity over short distances, so it's the best choice for simultaneously connecting many mobile devices together. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-im-never-losing-these-again/
Which of these would be the best way to dispose of a depleted toner cartridge? A) Use a third-party to dispose using incineration B) Recycle the cartridge C) Throw the cartridge in the normal trash bin D) Send the cartridge to be shredded E) Dispose at your local hazardous waste facility F) Stack the used cartridges together to make a toner fort
B) Recycle the cartridge Many toner cartridge companies provide a way to recycle and refill the cartridge, and many office supply stores provide a drop-off and a discount for purchasing new cartridges. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-fort-paper-cassette-load-letter/
Which of these would be the best way to turn a mobile device into a point of sale terminal? A) Scan QR codes with the built-in camera B) Connect a Bluetooth-connected printer C) Use the camera to capture credit card numbers D) Store all transactions on a microSD card E) Connect a credit card reader to the TRRS jack F) Keep me away from the technology isle
E) Connect a credit card reader to the TRRS jack It's common to use the TRRS connector as a magnetic card reader. An Internet connection on the mobile device can approve the transaction, and customers can use their finger to "sign" on the mobile device touchscreen. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-but-i-need-that-gadget/
Which of the following would you expect to find on an MSDS? A) UPS switchover time B) Total memory capacity C) First aid measures D) Available storage space E) CPU clock speed F) The latest weather report
C) First aid measures An MSDS (Material Safety Data Sheet) provides information about ingredients, hazard information, first aid measures, handling and storage, and more. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-clear-and-sunny/
When you power up your computer, the screen remains blank and you hear a series of beeps. Which of these should be your first troubleshooting step? A) Replace the RAM B) Upgrade the BIOS C) Check the video connection D) Check the documentation for beep codes E) Open the case and check for loose connections F) Check to see if it's quitting time
D) Check the documentation for beep codes If there's a problem with the POST (power on self-test) process, your computer may provide diagnostic information through the use of beep codes. Each BIOS uses a different set of codes, so it's important to refer to your computer's documentation to know exactly what the beeps are referencing on your device. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-itll-still-be-here-when-you-get-back/
Which of the following is commonly renewed each year? A) Personal software license B) EULA C) Virtual machines D) FOSS E) Enteprise software license F) Did I forget to renew my license tag again?
E) Enterprise software license Enterprise software licenses are often purchased on a per-seat basis for a large number of users in an organization. Instead of a single one-time purchase, enterprise software licenses commonly are sold as multi-year licenses that require ongoing renewal. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-we-should-really-have-an-online-system-for-this/
Where would you most commonly connect a POST card? A) Serial port B) PCI Express slot C) One side of a loopback plug D) Ethernet adapter E) Any available video output F) The mailbox
B) PCI Express slot A POST (power on self-test) card is used to help troubleshooting hardware problems, and it's commonly connected to a motherboard expansion slot interface. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-wish-you-were-here/
Which of these would be a best practice when communicating with your end users? A) Refer the end user to the manual when using jargon B) Problems can be solved faster if interruptions are allowed C) Repeat your understanding of the problem back to the end user D) There's no reason to constantly update when there's a normal shipping delay E) Documentation is optional if the problem is a known issue F) I need to make sure my battery is charged
C) Repeat your understanding of the problem back to the end user After a problem has been described, it's always a good idea to repeat your understanding of the issue to the end user. This allows the customer to know that you fully understand the issue, and any clarifications can be made before the troubleshooting process begins. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-this-might-be-a-long-phone-call/
You're experiencing hard drive errors on your laptop computer. Which of these should be your best next troubleshooting step? A) Check for overheating B) Confirm the laptop's power supply is providing enough voltage C) Run a hard drive diagnostic D) Perform a drive backup E) Check for loose cables F) Check the price on new laptops
D) Perform a drive backup If you're ever having any issues relating to your storage device, your first step should always be to perform a full backup of the drive. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-always-over-my-budget/
When troubleshooting a problem, you've tested a theory and found that your tests appear to resolve the issue. Which of these would be your best next step? A) Build a plan of action to correct the issue B) Document your findings C) Gather symptoms that best describe the problem D) Perform additional tests E) Contact the manufacturer's technical support line F) Make the intern do it
A) Build a plan of action to correct the issue Once you've tested and verified how the issue could be resolved, it's time to put your tests into production. The implementation may be simple or complex, so it's useful to build a plan for the implementation of the solution. In a production environment, this plan includes both the implementation of the fix as well as a plan to revert back if the fix doesn't actually work. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-it-gets-fixed-twice-as-fast/
Which of these would be the best way to recover a file that has been deleted from the Windows Recycle Bin? A) Perform a drive defragmentation B) Run CHKDSK with the /R option C) Perform a sector-level backup of the drive D) Use the BOOTREC utility from the Windows recovery console E) Use specialized file recovery software F) Keep scrolling through File Manager in horror
E) Use specialized file recovery software The process of deleting files in Windows only removes the pointer to the file and not the actual file data. To recover the original data, you can often use third-party file recovery software to search through the drive and recover any data that might not have been overwritten yet. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-really-gone/
Which of these Windows Vista editions would not support BitLocker? A) Windows Vista Home Basic B) Windows Vista Business C) Windows Vista Enterprise D) Windows Vista Home Premium E) I can rest assured that my vacation photos are safe
C) Windows Vista Enterprise BitLocker's full-disk encryption is only supported in Windows Vista Enterprise and Ultimate. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-were-climbing-the-mountain-were-at-the-top-were-climbing-down/
Which BOOTREC flag creates a new Boot Configuration Data store? A) /FixBoot B) /RebuildBcd C) /ScanOS D) /FixBcd E) /BCD F) I don't wear boots
B) /RebuildBcd The Windows "recovery console" command prompt provides a way to troubleshoot and modify a Windows configuration before the operating system has started. The BOOTREC /RebuildBcd command will scan the disks for Windows installations and create a new BCD store based on what it finds. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-need-some-new-socks/
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials