IT CertificationsComprehensive Study Set

Professor Messer Comptia A+ Practice Test

100 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following technologies includes an extra register between the RAM module and the memory controller? A) Registered memory B) CPU cache C) ECC RAM D) Parity memory E) Multi-channel memory F) The self-checkout register

ANSWER

A) Registered memory Registered memory is also called buffered memory because of the additional register between the memory module and the memory controller. Registered (also called buffered) memory modules have a register between the DRAM modules and the system's memory controller. They place less electrical load on the memory controller and allow single systems to remain stable with more memory modules than they would have otherwise. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-unexpected-item-in-the-bagging-area/

QUESTION 2

When you view your drive status in Disk Management, the drive is marked as "Regenerating." Which of these would best describe this drive status? A) Data on the drive is moving to align with the beginning of a cluster B) A RAID 5 volume is recreating data based on the parity information C) Data blocks are being moved to create contiguous file sectors D) Data is being restored from a backup tape E) Data is read and re-written to each sector to refresh the magnetic polarities F) I'm growing a new tail

ANSWER

B) A RAID 5 volume is recreating data based on the parity information If a drive in a RAID 5 array fails, the replacement will need to regenerate data to rebuild the array. Once the regeneration process is complete, the drive will return to the "Healthy" status. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-it-was-a-close-call/

QUESTION 3

Which of the following would describe RAID 1? A) Files are striped across multiple drives with a parity block B) File blocks are duplicated between two or more physical drives C) Files are striped across multiple drives D) Parity information is calculated and stored across multiple drives E) A spare drive is enabled if a production drive fails F) I'm still out of drive space

ANSWER

B) File blocks are duplicated between two or more physical drives RAID 1 is drive mirroring, where an exactly duplicate of information is written to multiple drives. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-must-have-every-high-res-texture-pack/

QUESTION 4

Which of the following features are not available when using Windows Easy Transfer to migrate to a Windows 8.1 system? A) External USB flash drive B) Microsoft OneDrive C) Local network connection D) External hard disk E) I usually need something hard to bang my head upon

ANSWER

C) Local network connection In Windows 8.1, Microsoft removed the local network and Easy Transfer cable options, and instead relies on a local storage device or Microsoft One Drive to complete the migration. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-an-os-migration-with-a-pinch-of-wrenches/

QUESTION 5

What is the maximum storage space available on a single-layer DVD-ROM? A) 8.5 GB B) 700 MB C) 25 GB D) 4.7 GB E) 50 GB F) And it's never enough room

ANSWER

D) 4.7 GB A single-layer DVD-ROM can store a maximum of 4.7 GB, and a dual-layer DVD-ROM can store 8.5 GB. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-time-to-delete-all-the-pictures-of-my-paper-clip-collection/

QUESTION 6

Which of these would be the best choice for resizing an NTFS volume? A) Windows Recovery Console B) Disk Management C) System Configuration D) Disk Check E) RAID F) I use a vice and some rubber bands

ANSWER

B) Disk Management The Disk Management utility allows you to shrink, extend, split, and make other changes to Windows volumes. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-not-as-effective-as-you-might-think/

QUESTION 7

Which of the following would be the most secure Windows Firewall configuration on an open WiFi network? A) Block all outgoing connections B) Build a custom rule for each application in use C) Block all incoming connections D) Turn on Windows Firewall with the default settings E) Windows Firewall is not necessary on an open network F) Pour coffee over your keyboard

ANSWER

C) Block all incoming connections Windows Firewall can "Block all incoming connections," which prevents all connections from other devices. On an open network, this firewall configuration would be the most aggressive security posture. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-ultimate-in-secure-computing/

QUESTION 8

Which of the following would best describe DRM? A) The number of cycles occurring in a second B) The quality of a received signal C) Licensing of a video file D) Digital signal modulation E) The loss of signal over a given distance F) It's large with a lot of fur

ANSWER

C) Licensing of a video file DRM (Digital Rights Management) is the method used to control the licensing and management of digital media. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-think-thats-a-dog/

QUESTION 9

What maximum transmission speed would be most associated with USB 2.0? A) 1.5 megabits per second B) 12 megabits per second C) 480 megabits per second D) 5 gigabits per second E) 10 gigabits per second F) This flash drive is never large enough

ANSWER

C) 480 megabits per second USB 1.1 transmits at 1.5 megabits per second and 12 megabits per second, USB 2.0 transmits at 480 megabits per second, and USB 3.0 can transmit at a maximum of 5 gigabits per second. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-need-a-backup-for-my-backup/

QUESTION 10

Which of these best describes the DNS settings in the Windows IP address configuration? A) Provides a local loopback address B) Identifies the IP address of the local router C) Automatically configures the other IP address settings D) Converts domain names to IP addresses E) Provides connectivity when a DHCP server is not available F) Uses hypnosis to make me forget my password. Again.

ANSWER

D) Converts domain names to IP addresses DNS (Domain Name Services) settings are used to convert from domain names to IP addresses. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-lost-my-yellow-sticky/

QUESTION 11

Which of these would best describe multiple voltage rails? A) Provides multiple voltages over the same wires B) Improves the overall power load regulation C) Can automatically power down unused devices D) Provides power to multiple computers E) Decreases overall power consumption F) Makes me cry when my power bill arrives

ANSWER

B) Improves the overall power load regulation Multiple power rails can be configured to regulate a voltage supply across multiple devices, which provides better overall power management inside of the computer. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-it-costs-a-lot-to-keep-this-phone-charged/

QUESTION 12

Which of the following would best describe a VPN? A) Filter traffic based on a category of URL B) Drop network traffic containing a known exploit C) Provide a network connection for virtual systems D) Limit the network throughput of certain applications E) Securely communicate across a public network F) I could use a ride to work

ANSWER

E) Securely communicate across a public network A VPN (Virtual Private Network) is commonly used to encrypt all traffic sent between two points. This allows you to securely communicate to a remote site, even if you're using an open WiFi hotspot. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-not-that-kind-of-transportation/

QUESTION 13

What motherboard component would most likely be powered with a 6-pin or an 8-pin connector? A) CPU B) SATA drive C) Case fan D) PCI Express adapter E) USB interface F) My coffee warmer

ANSWER

D) PCI Express adapter A PCI Express adapter can use additional power from the computer power supply with a 6-pin (75 watt) or 8-pin (150 watt) connector. These are commonly used for high-end graphics cards that require more power than what is normally available through the motherboard's PCI Express adapter slot. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-thats-a-good-cup-of-joe/

QUESTION 14

Which of the following would be the best way to view all of the configured shares on a Windows system? A) Control Panel / Administrative Tools / Computer Management B) Control Panel / Network and Sharing Center C) Control Panel / Computer Management D) Accessories / Network and Sharing Center E) Control Panel / Administrative Tools / System Information F) You'll need enough for everyone in the class

ANSWER

A) Control Panel / Administrative Tools / Computer Management The Computer Management utility provides a list of all of the visible and hidden shares on a Windows system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-time-to-read-bazooka-joe/

QUESTION 15

Which of the following would best describe a workstation with specialized audio and video, a large fast storage drive, and dual monitors? A) Virtualization workstation B) Home theater PC C) Thin client D) Audio/Video editing workstation E) Home server PC F) That sounds awesome, I'll take two.

ANSWER

D) Audio/Video editing workstation An audio/video editing system requires the best audio and video possible, as well as fast and large storage devices. It's also common to use two monitors to assist with the extensive editing process. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-ill-put-it-on-your-tab/

QUESTION 16

What wireless authentication is commonly seen in an enterprise environment? A) WPA2 B) 802.11n C) TLS D) 802.1X E) MAC F) I remember you from yesterday

ANSWER

D) 802.1X 802.1X integration provides a way to authenticate users with a centralized database. When using 802.1X on a wireless network, there's no need to use shared passphrases for everyone. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-my-computer-knows-me-so-well/

QUESTION 17

Which of the following would be most associated with OLED? A) Requires a cooldown process after use B) Does not use a backlight C) Has poor viewing angles D) Uses an array of backlights behind the screen E) Uses a combination of noble gas and mercury F) Tastes great with a glass of cold milk

ANSWER

B) Does not use a backlight An OLED (Organic Light Emitting Diode) display is thin, does not require a backlight, and emits light by powering an organic compound. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-nope-thats-not-even-close/

QUESTION 18

Which of the following would be a valid APIPA address? A) 192.168.22.5 B) 10.5.80.2 C) 169.254.77.120 D) 172.16.22.4 E) 172.0.0.1 F) It's two blocks over, just past the diner

ANSWER

C) 169.254.77.120 APIPA addresses are automatically assigned to devices when a DHCP server is not available and a static address has not been assigned. APIPA addresses can communicate on the local subnet, but cannot be routed outside of the local network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-not-that-kind-of-address/

QUESTION 19

What would you expect to occur if you change your LCD display to a resolution that's different than the native resolution? A) The screen will show a black screen B) The text and graphics on the screen will be slightly distorted C) The display will power down D) Windows will only operate in VGA mode E) The input method will need to be changed from the default F) Your content creation will appear much more intelligent and humorous

ANSWER

B) The text and graphics on the screen will be slightly distorted The native resolution will ensure that the information on the screen is crisp and clear. If the resolution is changed from the native resolution, the resulting display will appear fuzzy and slightly distorted. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-if-only-it-was-that-easy/

QUESTION 20

Which of the following would you expect to see using a mini-DIN connector? A) External storage device B) DVD-ROM drive C) Keyboard D) Speakers E) Internal accessory power F) I was with you until I realized it wasn't mini-Doughnuts

ANSWER

C) Keyboard The mini-DIN connector is commonly seen on older PS/2 keyboard and mouse connections. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-coffee-for-dunking/

QUESTION 21

Which of the following would be most likely if there was an Ethernet duplex mismatch? A) The network performance would be slower than normal B) The network connection would not transmit any data C) Network performance would increase D) Traffic would not route from the local IP subnet E) The network performance would be unchanged F) It would combine stripes and polka dots

ANSWER

A) The network performance would be slower than normal A duplex mismatch would cause a significant slowdown to network traffic. For the best performance, make sure the duplex matches on both sides of the Ethernet connection. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-none-of-them-would-be-the-same-color/

QUESTION 22

What is the most common connector used for component video? A) mini-DIN B) TRRS C) RCA D) DB-15 E) USB F) I'm not sure where all this dust came from

ANSWER

C) RCA It's very common to use colored RCA cables to connect component video devices. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-havent-been-back-here-in-a-while/

QUESTION 23

Which of the following would you expect S.M.A.R.T. to identify? A) Incorrect NTFS file permissions B) Corrupted Master Boot Record C) Disk read errors D) Invalid Windows Boot Configuration Data store E) EFS protected files F) Only the ripest produc

ANSWER

C) Disk read errors S.M.A.R.T (Self-Monitoring, Analysis, and Reporting Technology) is a storage drive technology that can provide detailed information about the physical drive characteristics. Logical problems with the file system would not be identified through S.M.A.R.T. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-a-technological-thumper/

QUESTION 24

Which of these would be the best way to start System Restore when booting? A) Start your computer with the Windows installation media B) Start the system in VGA mode C) Boot from a USB flash drive D) Launch System Restore from the BIOS settings E) Press F8 and select Repair F) This hammer doesn't work as well as it used to

ANSWER

E) Press F8 and select Repair The System Restore utility can be accessed during started by using the Windows F8 key to launch the Advanced Boot Options. The System Restore utility will be available under the Repair option. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-feel-better-though/

QUESTION 25

Which of the following standards is most associated with Thunderbolt? A) HDMI B) DisplayPort C) USB D) VGA E) DVI F) Looks like rain

ANSWER

B) DisplayPort Thunderbolt connections carry both DisplayPort video and PCI Express data. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-not-that-kind-of-thunder/

QUESTION 26

Which of the following is commonly used to automate software updates in the Linux operating system? A) tar B) update C) yum D) rsync E) gzip F) I'm not even sure what I'm updating

ANSWER

C) yum The Linux yum and apt-get commands are commonly used to provide on-demand and automated updates of operating system patches and applications. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-often-a-mystery/

QUESTION 27

Which of the following utilities can you use in Mac OS to perform First Aid on a drive partition? A) Time Machine B) Disk Management C) System Information D) Check Disk E) Disk Utility F) I've misplaced my bandages

ANSWER

E) Disk Utility The Disk Utility in Mac OS can be used to manage drive partitions, get information, and perform first aid to storage drives. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-box-is-always-empty/

QUESTION 28

Which of the following would be the best way to integrate a mouse into a laptop computer? A) Motion sensor B) Touch pad C) USB trackball D) Smart card reader E) Use a PS/2 connector F) I only use key combinations

ANSWER

B) Touch pad It's common to integrate a mouse into the small real-estate of a laptop keyboard through the use of a touch pad. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-it-adds-another-difficulty-level-to-minesweeper/

QUESTION 29

Which of the following would most commonly describe a traditional MIDI interface? A) RJ45 B) DIN C) TRS D) Centronics E) Molex F) Why is the dog howling?

ANSWER

B) DIN Although it's common to see USB-connected MIDI devices, you'll also find some devices still using the more-traditional DIN connectors. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-such-beautiful-music/

QUESTION 30

Which of these interfaces is commonly used to connect external speakers to a PC? A) FireWire B) USB C) Coax D) Two-wire E) TRS F) I can't find the right cable

ANSWER

E) TRS TRS (tip-ring-sleeve) connectors are commonly used to connect analog audio components. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-then-youll-have-to-untangle/

QUESTION 31

Which of these best describes the extension of an Apple Disk Image file? A) .img B) .tar C) .zip D) .dmg E) .iso F) At least I can't lose the disk this way

ANSWER

D) .dmg An Apple Disk Image file is labeled with a .dmg file extension, and will mount in the operating system as a normal file system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-ill-bet-i-still-could/

QUESTION 32

With which of the following would you be most likely to use a Centronics connector? A) Network connections between switches B) Older mouse and keyboard connections C) Between a computer and printer D) Analog display connection E) Between a computer and a musical instrument F) It takes a long time to untangle these cables

ANSWER

C) Between a computer and printer A Centronics connector is commonly seen on older printers that are not equipped with USB connections. The Centronics connector is on the printer, and a DB-25 parallel port is used to connect to the computer. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-thats-why-they-make-chain-saws/

QUESTION 33

Which of the following would be the best way to terminate a Linux process by name? A) kill B) halt C) taskkill D) killall E) net stop F) I'll be back

ANSWER

D) killall The Linux killall command allows you to terminate a process by name instead of using the process ID (PID). http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-he-said-theres-a-storm-coming-in/

QUESTION 34

Which of these would commonly use a transfer belt and roller? A) Hard drive B) Laser printer C) Scanner D) Thermal printer E) DVD-ROM drive F) We'll have a barrel of fun

ANSWER

B) Laser printer A transfer belt and roller is commonly used in color laser printers to transfer the image from all color cartridges to a single belt. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-gangs-all-here/

QUESTION 35

Which Mac OS feature displays all running applications into a single zoomed-out view on the desktop? A) Mission Control B) Spaces C) Spotlight D) Iconify E) Finder F) I can't do the arm thing

ANSWER

A) Mission Control The Mission Control feature in Mac OS can be activated with the Mission Control hotkey or by pressing the Mission Control icon in the Apple Dock. The Spaces feature is used to create multiple independent desktop views. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-come-on-and-zoom/

QUESTION 36

The colors on your inkjet printer do not appear to be overlapping properly, with some of the colors visibly misaligned. Which of the following would be the best way to resolve this issue? A) Replace the print head B) Replace the problematic ink cartridge C) Perform a printer calibration D) Use a higher weight paper E) Adjust the printer carriage F) Consider using watercolors

ANSWER

C) Perform a printer calibration The inkjet printer calibration process ensures that the separate print heads create crisp separations and properly align the colors. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-these-revenue-charts-are-beautiful/

QUESTION 37

You need to find a file that contains a customer's account number. Which of the following Linux commands would be the best choice? A) locate B) apt-get C) grep D) ls E) chmod F) It's time for more coffee

ANSWER

C) grep The Linux grep command (Globally search a Regular Expression and Print) is commonly used to locate files that contact a specific text string. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-it-only-_seems_-faster/

QUESTION 38

Which of the following would be considered an advantage of thermal printers? A) Replacement ink is commonly available B) Thermal printers are very quiet when printing C) There are many color printing options D) The print toner uses easy to replace cartridges E) Many paper types can be used in thermal printers F) They're handy on a cold winter's night

ANSWER

B) Thermal printers are very quiet when printing Thermal printers use heat to print instead of ink or toner and there's no moving print head. The motor that moves the paper is often louder than the printing process itself! http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-crowd-around-the-printer-with-some-hot-chocolate/

QUESTION 39

Which of the following would best describe the pwd command? A) Change a user account password B) Move the printer page forward C) Print the current working directory D) Changes the ownership of a file or directory E) Displays the processor's working CPU distribution F) It's my favorite Linux jumble word game

ANSWER

C) Print the current working directory The pwd command "prints" or displays the current working directory on the screen. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-try-to-use-it-in-a-sentence/

QUESTION 40

Which of the these would be the best use of an impact printer? A) Create multiple copies at the same time B) Print in a noise-sensitive area C) Create high-quality graphical output D) Output a digital file to print at a later time E) Create poster-sized output F) It tenderizes the steak

ANSWER

A) Create multiple copies at the same time The physical pins hitting the printed page allow an impact printer to create multiple copies of a form at the same time. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-perfect-printer-for-your-summer-grilling/

QUESTION 41

Which of the following would best describe a hypervisor? A) Increases the overall CPU efficiency of your computer B) Improves the throughput of network communication C) Manages the resources required for virtualization D) Prevents malware from executing in secure areas of memory E) Caches CPU transactions to provide an overall faster response time F) It's like a regular visor, but more energetic

ANSWER

C) Manages the resources required for virtualization A hypervisor manages the platform and guest operating systems in a virtual environment. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-time-to-try-the-de-caf-2/

QUESTION 42

What's the best way to use a document that's "printed" to a printer driver file? A) Open and use in any PDF reader B) Use the XML Paper Specification to view the output C) Use the copy command to send the file to a printer D) View the file in a graphics editor E) Load the file into the application that originally created it F) Send the file to everyone on the internal mailing list and hope for the best

ANSWER

C) Use the copy command to send the file to a printer If you're printing to a print driver file, the resulting file will be saved in a language that only the printer can understand. You might use this feature if you were in a place without a printer and you wanted to print later, or you wanted to send the file to someone else for printing. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-reply-to-all/

QUESTION 43

What cloud-based service provides you with hardware, but still requires you to setup, configure, and manage the software? A) Hybrid Cloud B) SaaS C) IaaS D) Private Cloud E) PaaS F) I'm going to need a pilot's license when all of this is done

ANSWER

C) IaaS IaaS (Infrastructure as a Service) is a cloud-based architecture that provides hardware, but not much else. You would still be responsible for installing operating systems and applications, and you're still responsible for the ongoing management of the applications. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-please-place-applications-in-their-full-upright-position/

QUESTION 44

Which of the following would not commonly be included in a laser printer maintenance kit? A) Fuser unit B) Feed rollers C) Separation pad D) Toner cartridge E) Cleaning cloths and gloves

ANSWER

D) Toner cartridge Although it's common to check the toner levels when performing maintenance on a laser printer, it's not necessary to replace the toner cartridge before it's empty. The maintenance of a laser printer occurs at predefined checkpoints in the lifetime of a printer, and the toner cartridges are simply replaced when they are depleted. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-im-in-maintenance-mode/

QUESTION 45

Which of these network services would commonly be used for URL filtering? A) Proxy server B) Authentication server C) IPS D) Web server E) DNS server F) A fine mesh strainer

ANSWER

A) Proxy server A proxy server is commonly used as an intermediate server between an end-user and the rest of the Internet. Since the proxy server is effectively in the middle of the conversation, you can perform many checks of the traffic before it reaches the end user. It's common to use proxy servers for virus scanning, URL filtering, access control, caching and more. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-network-with-pasta-and-red-sauce/

QUESTION 46

Which of the following tasks is commonly performed when maintaining a thermal printer? A) Replace the fuser assembly B) Wipe out the printer with a damp cloth C) Replace the print head D) Run a printer calibration E) Replace the ribbon F) Shovel more coal into the boiler

ANSWER

B) Wipe out the printer with a damp cloth Thermal printers have relatively simple printing mechanisms compared to laser printer or inkjet printers. There's no moving print head and no ink or toner, so the maintenance tasks tend to focus on cleaning and keeping the paper path moving freely. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-this-train-isnt-moving-very-quickly/

QUESTION 47

Which of the following is not true of WiFi Calling? A) Uses voice over IP technology B) Uses a special app to work properly with your wireless provider C) Your mobile carrier must support WiFi calling D) Can be used when there's no wireless carrier signal E) Requires an Internet-connected WiFi network

ANSWER

B) Uses a special app to work properly with your wireless provider The WiFi calling feature is built into the operating system of your mobile device and does not require a separate app. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-for-those-important-pizza-orders/

QUESTION 48

Which of these are common maintenance tasks for an impact printer? A) Replace the print head B) Run a color calibration C) Replace the toner cartridge D) Clean the heating element with isopropyl alcohol E) Check the ink cartridge for clogs F) My new job is a tractor feed paper hole remover

ANSWER

A) Replace the print head The print head of an impact printer is constantly hitting the ribbon and paper. Eventually some pins will stop firing, and sometimes the entire print head will stop working altogether. It's common to replace this heavily used part during the normal maintenance cycle. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-thought-it-had-something-to-do-with-farming/

QUESTION 49

Which of the following would be disabled when using airplane mode? A) Cellular B) Bluetooth C) WiFi D) NFC E) None of these radios are disabled when using airplane mode F) All of these radios are disabled when using airplane mode

ANSWER

F) All of these radios are disabled when using airplane mode Airplane mode is a simple one-click feature that automatically disables every radio in your mobile device. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-like-to-have-the-whole-can/

QUESTION 50

Which of these best describes the key cartridge in an inkjet printer? A) The cartridge used to unlock the other cartridges B) The key color, which is usually black C) The first cartridge that prints during the print cycle D) The cartridge used for calibration E) The first cartridge that must be replaced when the ink is low F) I can't remember where I left my key cartridge

ANSWER

B) The key color, which is usually black The cartridges in an inkjet printer are often referenced as CMYK, for cyan, magenta, yellow, and key (black). Some printers have individual cartridges for each color, while other printers will combine the colors together into a single replaceable cartridge. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-always-the-last-place-you-look-almost-always/

QUESTION 51

Which port number is commonly used by IMAPS? A) tcp/143 B) tcp/993 C) tcp/443 D) tcp/8080 E) tcp/995 F) I don't need a port to look at maps

ANSWER

B) tcp/993 IMAP over SSL, or IMAPS, commonly uses TCP port 993 to communicate between the client and server. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-not-that-kind-of-map/

QUESTION 52

Which of these devices would commonly connect to a 6P2C connector? A) Ethernet adapter B) Keyboard or mouse C) Modem D) LCD monitor E) DS3 WAN link F) I can connect to anything with seven adapters and enough time

ANSWER

C) Modem A 6P2C (6 position, 2 conductor) connector is commonly used to connect to POTS (plain-old telephone system) lines. If you're connecting an analog phone or analog modem, you're probably using a cable with 6P2C connectors on it. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-im-going-to-need-a-couple-of-cable-ties/

QUESTION 53

Which of the following are not a requirement when synchronizing a mobile device to the desktop? A) Enough RAM to support the mobile device desktop application B) An operating system that can run the mobile device desktop application C) High-speed Internet access D) Free storage space on your computer E) A synchronization cable that's three inches longer than the one I'm currently using

ANSWER

C) High-speed Internet access When you're synchronizing and backing up your mobile device to your local computer, you won't need the high-speed Internet access that's required for cloud-based backups. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-just-a-bit-more/

QUESTION 54

What is the minimum category of cable required for 10BASE-T networks? A) Category 3 B) Category 5 C) Category 5e D) Category 6 E) Category 6A F) Category 7 G) I always use the one that isn't all tangled

ANSWER

A) Category 3 10BASE-T networks are Ethernet networks using twisted pair and run at 10 megabits per second. The minimum category of cable required for these networks is Category 3, although today it would be difficult to find any twisted pair cable manufactured to those older specifications. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-nothing-a-few-wire-snips-wont-fix/

QUESTION 55

Which of these would best describe malware that infects your system by pretending that it's something else? A) Worm B) Rootkit C) Ransomware D) Trojan Horse E) Phishing F) My operating system

ANSWER

D) Trojan Horse A trojan horse is software that pretends to do one thing, but behind the scenes it's busy infecting your computer. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-there-are-days-when-its-fighting-me/

QUESTION 56

Which of these would be a common symptom of network signal loss? A) Windows Stop Error B) Slow file download times C) Word processor spell check is not working D) DVD-ROM reader will not play movies E) Podcast audio volume is low F) Warmer soda than usual

ANSWER

B) Slow file download times A network signal loss will result in either no network connection, or very slow access over the current network link. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-sky-is-less-blue-grass-is-less-green/

QUESTION 57

Which of these would be the best way to prevent the disclosure of information in a public place? A) Key fob B) Spam filter C) ACLs D) BitLocker E) Privacy filter F) Stick to bottled water

ANSWER

E) Privacy filter A privacy filter on a laptop screen makes the contents appear completely black to anyone who's not directly in front of the screen. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-loose-lips-sink-ships/

QUESTION 58

What is the compressed IPv6 address for fe80:0000:0000:0000:0076:4000:f050:27c6? A) fe80::76:4:f5:27c6 B) fe80::76:4000:f050:27c6 C) fe80::76:4::f05:27c6 D) fe80::0076:4000:f050:27c6 E) fe80:76:4000:f050:27c6 F) Now your IPv6 can fit in your suitcase

ANSWER

B) fe80::76:4000:f050:27c6 The two big rules when compressing IPv6 addresses is to remove all leading zeros and abbreviate two or more groups of zeros with a double colon. Non-leading zeros will remain in the address, and only one set of double colons can be in a single address. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-just-add-water/

QUESTION 59

Which of the following would you most likely associate with DLP? A) Additional authentication is required when connecting to the VPN B) Switch ports are disabled until a successful authentication C) Medical records are blocked at the firewall D) You must have a physical ID card to gain access to the network E) Passwords must include a special character F) It's twice the LP

ANSWER

C) Medical records are blocked at the firewall DLP (Data Loss Prevention) blocks any data transfer or "leakage" of personal data such as Social Security Numbers, credit card numbers, or medical records. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-need-more-league-points/

QUESTION 60

Which of the following removed the restrictions created by classful subnet masks? A) DNS B) DHCP C) IPv6 D) CIDR E) RADIUS F) Don't bother following those silly TCP/IP rules

ANSWER

D) CIDR CIDR (Classless Inter-Domain Routing) was created in the 90s to allow for flexibility when subnetting IP networks. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-this-wont-work-very-well/

QUESTION 61

Which of the following would you expect to find in an AUP? A) Specific rules for network use B) A list of available files C) A database of blocked and allowed URLs D) A schedule for operating system updates E) A consolidated set of event logs F) The conversion rate is never as good as you would hope

ANSWER

A) Specific rules for network use An AUP (Acceptable Use Policy) is usually provided to each person in an organization that connects or communicates through the corporate network. These policies provide a specific set of rules so that everyone knows exactly what type of use is acceptable when using the organization's computing resources. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-im-not-sure-what-to-do-with-all-of-these-coins/

QUESTION 62

You need to configure a firewall to allow Mac OS devices to find other Mac OS services by name. Which ports should you enable in the firewall? A) tcp/427 and udp/427 B) udp/137 C) tcp/53 and udp/53 D) tcp/548 E) tcp/445 F) If you allow all ports, everything works great

ANSWER

A) tcp/427 and udp/427 Apple's Service Location Protocol uses both tcp/427 and udp/427 to populate the list of available services in the operating system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-best-security-ever/

QUESTION 63

Which of these would commonly be used to view the list of an organization's employees? A) SNMP B) DHCP C) SMB D) LDAP E) SSH F) We used to put these things in big books

ANSWER

D) LDAP LDAP (Lightweight Directory Access Protocol) is a standard method of querying a directory of objects. It's common to use LDAP databases to store the list of users for authentication to the network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-need-another-three-ring-binder/

QUESTION 64

Which of the following is true of Windows permissions? A) Inherited permissions are propagated from the child object to the parent object B) Explicit permissions take precedence over inherited permissions C) You must set permissions of each individual object D) You cannot set a deny permission for a Windows share E) Inherited and explicit permissions are combined to create the effective permissions F) I prefer to ask for permission afterwards

ANSWER

B) Explicit permissions take precedence over inherited permissions A permission that has been explicitly assigned to an object always takes precedence over inherited permissions, even deny permissions that were inherited. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-an-exceptionally-bad-idea/

QUESTION 65

Which of these would be the best reason for frequently changing your password? A) Makes it more difficult to brute force your password B) Creates a new Security ID each time the password is updated C) Limits the use of a compromised account D) Encrypts your files with a different passphrase E) Limits the permissions associated with your account F) Because you need one more thing to remember

ANSWER

E) Limits the permissions associated with your account Frequent updates to a password don't make it any more difficult to brute force, but it does limit the amount of time that a compromised account could be used by the bad guys. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-or-not-as-the-case-may-be/

QUESTION 66

Which of these wireless standards support a single-stream throughput of almost 900 megabits per second? A) 802.11g B) 802.11ac C) 802.11n D) 802.11a E) 802.11b F) Now I can't blame lag

ANSWER

B) 802.11ac 802.11ac networking supports a per-stream maximum theoretical throughput of 866.7 megabits per second. The maximum of 8 allowable streams provides almost 7 gigabits per second of throughput. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-this-controller-is-bad/

QUESTION 67

Which of the following is an advantage of using an authenticator app? A) Encrypts the authentication process B) Securely stores all of your passwords in one database C) Adds an additional factor during the authentication process D) Replaces your username and password with a single login token E) Assures that you are not using weak passwords when authenticating F) One additional thing that I can't keep charged

ANSWER

C) Adds an additional factor during the authentication process Authenticator apps are commonly used as another authentication factor to use during the login process. Since the authenticator app is on your personal mobile device, it can be included during the authentication process as something you own or possess. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-yes-i-want-to-use-low-power-mode/

QUESTION 68

Which of these wireless encryption methods would commonly integrate with a centralized authentication database? A) WPA2 B) WPA2-AUTH C) WPA2-Enterprise D) WEP-AUTH E) 802.11ac F) I have to change my password every time my favorite player is traded

ANSWER

C) WPA2-Enterprise WPA2-Enterprise uses 802.1X to authenticate users to a central database instead of using a shared passphrase for everyone on the network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-im-still-not-on-the-winning-team/

QUESTION 69

What kind of hard drive drive formatting clears the file table, but does not physically erase any of the data? A) Table format B) Quick format C) Regular format D) File format E) Low-level format F) I can now recover all of that data that I didn't want to begin with

ANSWER

B) Quick format As the name implies, a quick format occurs very quickly, and a large hard drive can be formatted in just a few seconds. Since all of the data is left in place, a third-party unerase utility can usually recover the data. If you want to be sure the data is gone forever, you'll want to use a regular format or a third-party secure erase utility. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-so-much-for-that-comprehensive-80s-music-collection/

QUESTION 70

Which of these would you configure on your router to provide 24 by 7 Internet access to a home video surveillance system? A) NAT B) Port triggering C) WPA2 D) QoS E) Port forwarding F) Say cheese

ANSWER

E) Port forwarding Port forwarding configures a permanent association between your external Internet-facing IP address and a service running on your internal network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-my-hair-is-a-mess/

QUESTION 71

Which of these would be the best reason to avoid WPS on your wireless network? A) The encryption process has a cryptographic vulnerability B) The encryption method is not supported by newer access points C) The frequencies used are easily absorbed by surrounding objects D) Access to the network can be trivially brute-forced E) The overhead slows down all network transactions F) It means that I have to get work done now

ANSWER

D) Access to the network can be trivially brute-forced WPS (Wi-Fi Protected Setup) was an authentication method for wireless networks that was intended to make it easy to securely connect to a wireless network. Unfortunately, the PIN process was found to be easily brute-forced, and it only takes a few hours to try all of the possible combinations and gain access to a WPS-enabled network. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-weekend-is-so-short/

QUESTION 72

Which of these would be the best example of a line-of-sight service? A) ISDN B) DSL C) WiMAX D) Cable modem E) Fiber Ethernet F) Now I need line-of-power and line-of-snacks

ANSWER

C) WiMAX WiMAX (Worldwide Interoperability for Microwave Access) is a wireless service that requires a line-of-sight to communicate from antenna to antenna. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-nearly-perfect/

QUESTION 73

When you start Windows, you receive the message "Device not starting." Which of these would be the best next troubleshooting step? A) Check Device Manager and Event Viewer B) Install all pending Windows updates C) Reseat all adapter cards D) Update the BIOS to the latest version E) Power down the computer and restart F) Get some coffee and pretend the problem isn't happening

ANSWER

A) Check Device Manager and Event Viewer The generic message of "Device not starting" doesn't give you much information to start troubleshooting, so you need to check the Event Viewer for detailed information and check your Device Manager to see what devices are not operating properly. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-close-your-eyes-tight/

QUESTION 74

What kind of network would you commonly use to connect two corporate offices in different cities? A) MAN B) WAN C) PAN D) LAN E) Let's just get a really long cable

ANSWER

B) WAN A WAN (Wide Area Network) is used to connect sites that are located across large geographical distances. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-youll-get-a-bonus-for-those-cost-savings/

QUESTION 75

Which of these would be the most common use of REGSVR32? A) Modify the startup programs in the Windows Registry B) Collect long-term system statistics C) View the list of running applications and services D) Enable or disable startup services E) Register and unregister a DLL F) It keeps my World of Warcraft installation up to date

ANSWER

E) Register and unregister a DLL REGSVR32 is the Microsoft Register Server, and it's commonly used to register and unregister DLLs from the Windows operating system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-dont-have-time-for-all-of-these-dailies/

QUESTION 76

What kind of device is used to convert between analog and digital signals? A) Switch B) Line driver C) WAP D) Modem E) PoE F) A converterator

ANSWER

D) Modem A modem (modulator/demodulator) is used to convert between analog and digital signals. It's common to have modems on each side of a connection to provide the transfer of digital information. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-an-upgrade-from-the-switcheroo/

QUESTION 77

Which of the following would provide the best long-term analysis of application crashes? A) Process Monitor B) Event Log C) Reliability Monitor D) Recovery Console E) Performance Monitor F) I'm glad my misspelling doesn't cause app crashes

ANSWER

C) Reliability Monitor Reliability Monitor is a utility can summarizes and displays graphs that show the reliability of all applications running in Windows. With Reliability Monitor, you can get a visual representation of every crash and application problem, which makes it easy to identify ongoing problems with an application. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-id-have-constant-reboots/

QUESTION 78

Which of these would be the best choice to identify crossed wires in an Ethernet cable? A) Loopback plug B) Crimper C) Toner probe D) Cable tester E) Multimeter F) This is a different situation than when my own wires are crossed

ANSWER

D) Cable tester A crossed wire or broken connection in a cable can easily be identified by using a cable tester. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-thought-it-was-thursday/

QUESTION 79

Which of the following would be a common use of an LVM snapshot? A) Real-time backups of Linux servers B) Restore a Windows Server from an image C) Enable or disable services before Windows starts D) Get information about security events E) Refresh Windows without changing personal files and settings F) Makes great pictures in low-light

ANSWER

A) Real-time backups of Linux servers The Linux LVM (Logical Volume Manager) is similar to the Windows System Restore feature. Information can be backed up on a Linux device and restored very quickly based on a snapshot or point in time. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-yet-another-sunset-picture/

QUESTION 80

You have a laptop that does not have an integrated Bluetooth radio. Which of these would be the best option to provide Bluetooth connectivity? A) Tether the laptop to your mobile phone B) Use a Bluetooth hotspot C) Install a USB to Bluetooth adapter D) Use a Thunderbolt to Bluetooth adapter E) Replace the 802.11 adapter with a Bluetooth adapter F) Paint the laptop blue

ANSWER

C) Install a USB to Bluetooth adapter A USB to Bluetooth adapter is easy to install and fits almost invisibly into an existing USB interface. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-dont-think-my-headset-is-going-to-work/

QUESTION 81

Why would you delete all of the restore points when removing malware? A) The restore points don't contain any useful information B) Malware can't operate when restore points are present on the system C) All user files and documents must be deleted D) Restore points are original entry point for the malware E) The restore points may be infected with the malware F) I need the drive space

ANSWER

E) The restore points may be infected with the malware Malware is written to not only infect the current running operating system, but many malware variants will also infect the stored restore points. If you try to remove the malware by restoring from a previous restore point, you'll still have an infected system. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-too-many-vacation-pictures/

QUESTION 82

Which of these would be an advantage of using an SSHD? A) No moving parts B) Large-scale offline storage C) Built-in redundancy D) High-speed network connectivity E) The speed of an SSD and the storage capacity of a traditional hard drive F) It's a floor polish and a dessert topping

ANSWER

E) The speed of an SSD and the storage capacity of a traditional hard drive An SSHD (solid-state hybrid drive) combines an SSD as a high-speed cache and a traditional spinning hard drive for large storage capacities. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-tastes-terrific/

QUESTION 83

You've forgotten your unlock pattern on your Android phone, and now the phone is locked down. Which of these would be the best way to recover from this lockout? A) Perform a factory reset and restore your data B) Use debug mode to access the phone's file system C) Move the phone to a known-good wireless network D) Unlock the phone with your Google credentials E) Have your mobile phone company perform a remote reset F) Maybe it's time to go outside and walk around

ANSWER

D) Unlock the phone with your Google credentials If you are locked out of you Android phone after too many unsuccessful screen unlock attempts, you can restore access to the device by using your Google username and password. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-look-a-tree/

QUESTION 84

Which type of LCD display would be the best choice for gaming? A) LED B) IPS C) TN D) XPS E) OLED F) The largest one

ANSWER

C) TN A TN (Twisted Nematic) LCD display suffers from poor viewing angles, but the screen response times are very fast. It's common to prefer TN displays when gaming or when the applications require a very fast response time. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-the-size-of-that-wall-is-just-right/

QUESTION 85

You suspect that a mobile application is using more CPU and network than usual. Which of these would be the best way to check the app for any security issues? A) Start the app in debug mode B) Check the app in an online App scanner C) Connect to a local wireless network instead of the cellular network D) Restart the app in sandbox mode E) Restart the mobile device F) My abacas app is still working

ANSWER

B) Check the app in an online App scanner An app scanner can check the validity of an application against historical tests and scans. If someone else has already determined that this app is a security concern, you can view these results in the app scanner. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-ill-send-you-a-can-and-string/

QUESTION 86

Which of the following would be the most common use of a laptop docking station? A) Increase the laptop startup speed B) Use a full-size adapter card with a laptop C) Improve the laptop video resolution D) Increase the amount of laptop RAM E) Double the amount of CPU power F) Tune in those distant radio stations

ANSWER

B) Use a full-size adapter card with a laptop A laptop docking station is used to extend the capabilities of a laptop computer. Many docking stations include a chassis for expansion cards, allowing you to extend the capabilities of your laptop with full-size adapter cards. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-that-must-be-some-antenna/

QUESTION 87

Which of the following would be the best use of an anti-static bag? A) Protect an installed PCI express adapter card B) Minimize electrostatic discharge when working inside of a laptop C) Cushion components during shipping D) Prevent electrostatic discharge when storing components E) Dissipates static electricity when walking through a doorway F) It's a better choice than plastic for all of your groceries

ANSWER

D) Prevent electrostatic discharge when storing components An anti-static bag contains chemicals that dissipate static electricity. It's common to store components in an anti-static bag when not installed in a computer. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-bananas-are-on-sale/

QUESTION 88

Which of these would be the best way to connect a smartphone to an automobile and a smartwatch? A) Bluetooth B) Lightning C) IR D) Micro-USB E) 802.11 F) Super glue

ANSWER

A) Bluetooth Bluetooth provides high-speed wireless connectivity over short distances, so it's the best choice for simultaneously connecting many mobile devices together. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-im-never-losing-these-again/

QUESTION 89

Which of these would be the best way to dispose of a depleted toner cartridge? A) Use a third-party to dispose using incineration B) Recycle the cartridge C) Throw the cartridge in the normal trash bin D) Send the cartridge to be shredded E) Dispose at your local hazardous waste facility F) Stack the used cartridges together to make a toner fort

ANSWER

B) Recycle the cartridge Many toner cartridge companies provide a way to recycle and refill the cartridge, and many office supply stores provide a drop-off and a discount for purchasing new cartridges. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-fort-paper-cassette-load-letter/

QUESTION 90

Which of these would be the best way to turn a mobile device into a point of sale terminal? A) Scan QR codes with the built-in camera B) Connect a Bluetooth-connected printer C) Use the camera to capture credit card numbers D) Store all transactions on a microSD card E) Connect a credit card reader to the TRRS jack F) Keep me away from the technology isle

ANSWER

E) Connect a credit card reader to the TRRS jack It's common to use the TRRS connector as a magnetic card reader. An Internet connection on the mobile device can approve the transaction, and customers can use their finger to "sign" on the mobile device touchscreen. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-but-i-need-that-gadget/

QUESTION 91

Which of the following would you expect to find on an MSDS? A) UPS switchover time B) Total memory capacity C) First aid measures D) Available storage space E) CPU clock speed F) The latest weather report

ANSWER

C) First aid measures An MSDS (Material Safety Data Sheet) provides information about ingredients, hazard information, first aid measures, handling and storage, and more. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-clear-and-sunny/

QUESTION 92

When you power up your computer, the screen remains blank and you hear a series of beeps. Which of these should be your first troubleshooting step? A) Replace the RAM B) Upgrade the BIOS C) Check the video connection D) Check the documentation for beep codes E) Open the case and check for loose connections F) Check to see if it's quitting time

ANSWER

D) Check the documentation for beep codes If there's a problem with the POST (power on self-test) process, your computer may provide diagnostic information through the use of beep codes. Each BIOS uses a different set of codes, so it's important to refer to your computer's documentation to know exactly what the beeps are referencing on your device. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-itll-still-be-here-when-you-get-back/

QUESTION 93

Which of the following is commonly renewed each year? A) Personal software license B) EULA C) Virtual machines D) FOSS E) Enteprise software license F) Did I forget to renew my license tag again?

ANSWER

E) Enterprise software license Enterprise software licenses are often purchased on a per-seat basis for a large number of users in an organization. Instead of a single one-time purchase, enterprise software licenses commonly are sold as multi-year licenses that require ongoing renewal. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-we-should-really-have-an-online-system-for-this/

QUESTION 94

Where would you most commonly connect a POST card? A) Serial port B) PCI Express slot C) One side of a loopback plug D) Ethernet adapter E) Any available video output F) The mailbox

ANSWER

B) PCI Express slot A POST (power on self-test) card is used to help troubleshooting hardware problems, and it's commonly connected to a motherboard expansion slot interface. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-wish-you-were-here/

QUESTION 95

Which of these would be a best practice when communicating with your end users? A) Refer the end user to the manual when using jargon B) Problems can be solved faster if interruptions are allowed C) Repeat your understanding of the problem back to the end user D) There's no reason to constantly update when there's a normal shipping delay E) Documentation is optional if the problem is a known issue F) I need to make sure my battery is charged

ANSWER

C) Repeat your understanding of the problem back to the end user After a problem has been described, it's always a good idea to repeat your understanding of the issue to the end user. This allows the customer to know that you fully understand the issue, and any clarifications can be made before the troubleshooting process begins. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-this-might-be-a-long-phone-call/

QUESTION 96

You're experiencing hard drive errors on your laptop computer. Which of these should be your best next troubleshooting step? A) Check for overheating B) Confirm the laptop's power supply is providing enough voltage C) Run a hard drive diagnostic D) Perform a drive backup E) Check for loose cables F) Check the price on new laptops

ANSWER

D) Perform a drive backup If you're ever having any issues relating to your storage device, your first step should always be to perform a full backup of the drive. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-always-over-my-budget/

QUESTION 97

When troubleshooting a problem, you've tested a theory and found that your tests appear to resolve the issue. Which of these would be your best next step? A) Build a plan of action to correct the issue B) Document your findings C) Gather symptoms that best describe the problem D) Perform additional tests E) Contact the manufacturer's technical support line F) Make the intern do it

ANSWER

A) Build a plan of action to correct the issue Once you've tested and verified how the issue could be resolved, it's time to put your tests into production. The implementation may be simple or complex, so it's useful to build a plan for the implementation of the solution. In a production environment, this plan includes both the implementation of the fix as well as a plan to revert back if the fix doesn't actually work. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-and-it-gets-fixed-twice-as-fast/

QUESTION 98

Which of these would be the best way to recover a file that has been deleted from the Windows Recycle Bin? A) Perform a drive defragmentation B) Run CHKDSK with the /R option C) Perform a sector-level backup of the drive D) Use the BOOTREC utility from the Windows recovery console E) Use specialized file recovery software F) Keep scrolling through File Manager in horror

ANSWER

E) Use specialized file recovery software The process of deleting files in Windows only removes the pointer to the file and not the actual file data. To recover the original data, you can often use third-party file recovery software to search through the drive and recover any data that might not have been overwritten yet. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-its-really-gone/

QUESTION 99

Which of these Windows Vista editions would not support BitLocker? A) Windows Vista Home Basic B) Windows Vista Business C) Windows Vista Enterprise D) Windows Vista Home Premium E) I can rest assured that my vacation photos are safe

ANSWER

C) Windows Vista Enterprise BitLocker's full-disk encryption is only supported in Windows Vista Enterprise and Ultimate. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-were-climbing-the-mountain-were-at-the-top-were-climbing-down/

QUESTION 100

Which BOOTREC flag creates a new Boot Configuration Data store? A) /FixBoot B) /RebuildBcd C) /ScanOS D) /FixBcd E) /BCD F) I don't wear boots

ANSWER

B) /RebuildBcd The Windows "recovery console" command prompt provides a way to troubleshoot and modify a Windows configuration before the operating system has started. The BOOTREC /RebuildBcd command will scan the disks for Windows installations and create a new BCD store based on what it finds. http://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/a-pop-quiz-i-need-some-new-socks/

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials