1Which of the following represents the first step in the standard CompTIA A+ troubleshooting methodology?
A.Identify the problem
B.Establish a theory of probable cause
C.Document findings, actions, and outcomes
D.Test the theory to determine cause
Correct Answer: Identify the problem
Explanation:
The standard troubleshooting methodology begins with identifying the problem. This involves questioning the user, identifying any changes made, and reviewing system logs.
Incorrect! Try again.
2During the boot process, the computer emits a series of beeps and fails to start. What is the most likely cause of this issue?
A.A hardware failure detected during the Power-On Self-Test (POST)
B.The network cable is disconnected
C.The operating system is corrupted
D.The hard drive is fragmented
Correct Answer: A hardware failure detected during the Power-On Self-Test (POST)
Explanation:
Beep codes are used by the BIOS/UEFI to communicate hardware issues encountered during POST before the video card is initialized.
Incorrect! Try again.
3What is the primary purpose of booting a Windows PC into 'Safe Mode'?
A.To format the primary partition
B.To automatically defragment the hard drive
C.To bypass the BIOS password
D.To load only essential drivers and services for troubleshooting
Correct Answer: To load only essential drivers and services for troubleshooting
Explanation:
Safe Mode loads Windows with a minimal set of drivers and services, making it easier to isolate and resolve software or driver conflicts.
Incorrect! Try again.
4A user reports that their computer continuously reboots itself after a few minutes of usage, especially during heavy processing. Which hardware issue is most likely?
A.Faulty RAM module
B.Processor overheating
C.Corrupted printer driver
D.Fragmented hard drive
Correct Answer: Processor overheating
Explanation:
Overheating, particularly of the CPU, often causes a computer to reboot automatically as a protective measure to prevent permanent thermal damage.
Incorrect! Try again.
5What does a 'Blue Screen of Death' (BSOD) typically indicate in a Windows operating system?
A.A successful firmware update
B.A fatal system error or hardware crash
C.The system is entering hibernation
D.The monitor has lost its video signal
Correct Answer: A fatal system error or hardware crash
Explanation:
A BSOD, also known as a STOP error, indicates a fatal system error where the OS has reached a condition where it can no longer operate safely, usually due to driver or hardware issues.
Incorrect! Try again.
6If a PC loses its correct date and time settings every time it is unplugged, which component needs replacing?
A.The system RAM
B.The hard drive
C.The power supply unit (PSU)
D.The CMOS battery
Correct Answer: The CMOS battery
Explanation:
The CMOS battery maintains the real-time clock and BIOS settings when the PC is disconnected from its main power source.
Incorrect! Try again.
7A laser printer is producing pages with ghost images (faint images of previously printed pages). What is the most likely cause?
A.A stuck paper path roller
B.A scratched photosensitive drum or failing wiper blade
C.Incorrect IP address on the printer
D.Low toner levels
Correct Answer: A scratched photosensitive drum or failing wiper blade
Explanation:
Ghosting in a laser printer is typically caused by the imaging drum not discharging properly or the wiper blade failing to clean off excess toner from the previous revolution.
Incorrect! Try again.
8When an application sends a print job but nothing prints, and there are no error lights on the printer, what software component should a technician check first?
A.The Task Scheduler
B.The system registry
C.The Print Spooler service
D.The BIOS settings
Correct Answer: The Print Spooler service
Explanation:
The Print Spooler service manages print jobs sent to the printer. If it crashes or stalls, print jobs will queue up but fail to print.
Incorrect! Try again.
9Which of the following is the most appropriate initial fix for a recurring paper jam in an inkjet printer?
A.Replace the ink cartridges
B.Reinstall the printer driver
C.Clean the pickup rollers
D.Update the printer firmware
Correct Answer: Clean the pickup rollers
Explanation:
Paper jams are predominantly mechanical issues. Dust or wear on the pickup rollers often causes them to fail at feeding paper correctly, so cleaning them is the first step.
Incorrect! Try again.
10A user prints a document, but the output consists of garbled text and random characters. What is the most probable cause?
A.The print spooler is paused
B.The printer is out of paper
C.An incorrect or corrupted printer driver
D.The fuser assembly is broken
Correct Answer: An incorrect or corrupted printer driver
Explanation:
Garbled text usually means the computer is sending data in a language the printer does not understand, which is almost always a driver issue.
Incorrect! Try again.
11Which command-line tool is used to verify network connectivity between two hosts using ICMP echo requests?
A.nslookup
B.ipconfig
C.ping
D.tracert
Correct Answer: ping
Explanation:
The ping command sends Internet Control Message Protocol (ICMP) Echo Request messages to verify connectivity and measure round-trip time.
Incorrect! Try again.
12What is the primary function of a DHCP server on a local network?
A.To route packets between different subnets
B.To automatically assign IP addresses and network parameters to client devices
C.To block unauthorized incoming network traffic
D.To translate domain names to IP addresses
Correct Answer: To automatically assign IP addresses and network parameters to client devices
Explanation:
Dynamic Host Configuration Protocol (DHCP) automates the assignment of IP addresses, subnet masks, and default gateways to devices on a network.
Incorrect! Try again.
13A user cannot connect to a Wi-Fi network. The technician notices the network name is no longer listed in the available networks. What is the network name technically called?
A.WEP Key
B.MAC Address
C.BSSID
D.SSID
Correct Answer: SSID
Explanation:
The Service Set Identifier (SSID) is the technical term for a Wi-Fi network's name.
Incorrect! Try again.
14In the $2.4$ GHz Wi-Fi band, which sets of channels are considered non-overlapping and best for avoiding interference?
A.$1, 2, 3$
B.$2, 4, 8$
C.$1, 6, 11$
D.$5, 10, 14$
Correct Answer: $1, 6, 11$
Explanation:
In the $2.4$ GHz band, channels $1$, $6$, and $11$ are the only channels that do not overlap with one another, making them ideal for minimizing co-channel interference.
Incorrect! Try again.
15A user is unable to access the internet. A technician runs ipconfig and sees an IP address of $169.254.15.22$. What does this address signify?
A.The computer has successfully connected to the internet
B.The computer could not reach the DHCP server and assigned itself an APIPA address
C.The computer has received a static IP address
D.The computer is experiencing a DNS failure
Correct Answer: The computer could not reach the DHCP server and assigned itself an APIPA address
Explanation:
The range is reserved for Automatic Private IP Addressing (APIPA), indicating the device failed to obtain an IP from a DHCP server.
Incorrect! Try again.
16Which of the following IP addresses belongs to a Class A network?
A.$10.15.20.25$
B.$224.0.0.5$
C.$192.168.1.1$
D.$172.16.0.1$
Correct Answer: $10.15.20.25$
Explanation:
Class A IP addresses range from $1.0.0.0$ to $126.255.255.255$. The IP $10.15.20.25$ falls within this range.
Incorrect! Try again.
17What is the default subnet mask for a Class C IP address?
A.$255.255.0.0$
B.$255.0.0.0$
C.$255.255.255.255$
D.$255.255.255.0$
Correct Answer: $255.255.255.0$
Explanation:
A Class C network uses $24$ bits for the network portion, which translates to a default subnet mask of $255.255.255.0$.
Incorrect! Try again.
18How many usable host IP addresses are available in a standard Class C network?
A.$256$
B.$65,534$
C.$254$
D.$16,777,214$
Correct Answer: $254$
Explanation:
A standard Class C network has $8$ host bits. The formula for usable hosts is . Thus, usable hosts.
Incorrect! Try again.
19The IP address range $224.0.0.0$ to $239.255.255.255$ is reserved for which class of IP addresses?
A.Class D
B.Class E
C.Class B
D.Class C
Correct Answer: Class D
Explanation:
Class D IP addresses are reserved exclusively for multicast traffic, ranging from $224.0.0.0$ to $239.255.255.255$.
Incorrect! Try again.
20Which of the following addresses is considered the IPv4 loopback address used for testing the local TCP/IP stack?
A.$0.0.0.0$
B.$255.255.255.255$
C.$127.0.0.1$
D.$192.168.0.1$
Correct Answer: $127.0.0.1$
Explanation:
The block is reserved for loopback routing. The address $127.0.0.1$ is used to test the local machine's TCP/IP protocol stack.
Incorrect! Try again.
21Which IP address class is designated strictly for experimental purposes and future use?
A.Class E
B.Class D
C.Class B
D.Class C
Correct Answer: Class E
Explanation:
Class E addresses span from $240.0.0.0$ to $255.255.255.255$ and are reserved by the IETF for experimental and research purposes.
Incorrect! Try again.
22What is the primary function of a network firewall?
A.To increase the speed of network traffic
B.To store backups of system files
C.To provide wireless access to wired devices
D.To filter incoming and outgoing network traffic based on security rules
Correct Answer: To filter incoming and outgoing network traffic based on security rules
Explanation:
A firewall acts as a barrier between a trusted internal network and an untrusted external network, filtering traffic based on predefined security rules.
Incorrect! Try again.
23Which of the following describes a hardware firewall compared to a software firewall?
A.It is installed on individual client operating systems
B.It protects the entire network and operates independently of the host OS
C.It is generally less secure than a software firewall
D.It cannot block specific ports
Correct Answer: It protects the entire network and operates independently of the host OS
Explanation:
Hardware firewalls are dedicated physical devices placed at the network perimeter to protect all internal devices, independent of the individual hosts' operating systems.
Incorrect! Try again.
24A system administrator wants to prevent users from accessing unsecured HTTP websites. Which port should be blocked on the firewall?
A.Port $25$
B.Port $21$
C.Port $80$
D.Port $443$
Correct Answer: Port $80$
Explanation:
Port $80$ is the default port used for unsecured HTTP web traffic. Blocking it prevents unencrypted web browsing.
Incorrect! Try again.
25Which firewall feature allows a user to map an external IP and port to an internal IP and port, commonly used to host game servers?
A.Stateful Inspection
B.DHCP Snooping
C.MAC Filtering
D.Port Forwarding
Correct Answer: Port Forwarding
Explanation:
Port Forwarding (or Destination NAT) allows external devices to access computers and services on a private network by mapping external ports to internal IP addresses.
Incorrect! Try again.
26Which wireless security protocol is currently considered the most secure and should be configured on a Wi-Fi router?
A.WPA
B.WPA3
C.WEP
D.WPA2
Correct Answer: WPA3
Explanation:
WPA3 is the latest and most secure Wi-Fi security protocol, providing stronger encryption and better protection against brute-force attacks compared to WPA2 and older standards.
Incorrect! Try again.
27What does a 'stateful' firewall do that a 'stateless' firewall does not?
A.It filters traffic based solely on IP addresses
B.It keeps track of the state of active network connections
C.It only operates at the physical layer of the OSI model
D.It cannot block UDP packets
Correct Answer: It keeps track of the state of active network connections
Explanation:
A stateful firewall tracks the operating state and characteristics of network connections traversing it, allowing it to distinguish legitimate packets for different types of connections.
Incorrect! Try again.
28When installing anti-virus software on a computer, what is the most critical step to perform immediately after installation?
A.Defragment the hard drive
B.Create a new local user account
C.Format the USB ports
D.Update the virus definition/signature database
Correct Answer: Update the virus definition/signature database
Explanation:
Updating the virus signatures ensures the anti-virus software has the latest information to detect and remove newly discovered malware threats.
Incorrect! Try again.
29How does anti-virus software primarily use 'heuristics'?
A.By analyzing the behavior of a program to identify unknown or zero-day threats
B.By isolating infected files in a hidden folder
C.By encrypting network traffic to prevent malware downloads
D.By matching file hashes to a known database of viruses
Correct Answer: By analyzing the behavior of a program to identify unknown or zero-day threats
Explanation:
Heuristic analysis involves examining code for suspicious properties and behaviors, allowing the software to detect unknown or modified malware that doesn't yet have a known signature.
Incorrect! Try again.
30When an anti-virus program 'quarantines' a file, what is it actually doing?
A.Sending the file to the software vendor for analysis
B.Permanently deleting the file from the hard drive
C.Cleaning the malicious code out of the file and restoring it
D.Moving the file to a secure, isolated location where it cannot execute
Correct Answer: Moving the file to a secure, isolated location where it cannot execute
Explanation:
Quarantining a file securely isolates it so that it cannot run or infect the system, allowing the user to review it and decide whether to delete or restore it (if it was a false positive).
Incorrect! Try again.
31Which type of malware actively encrypts a user's files and demands payment for the decryption key?
A.Spyware
B.Rootkit
C.Adware
D.Ransomware
Correct Answer: Ransomware
Explanation:
Ransomware is malicious software that denies access to a system or its data by encrypting files, demanding a ransom to restore access.
Incorrect! Try again.
32Why are USB flash drives considered a significant security risk for spreading malware?
A.They generate electromagnetic interference that corrupts data
B.They use outdated encryption standards
C.Malware can exploit the OS AutoRun/AutoPlay features to execute silently upon insertion
D.They cannot be scanned by traditional anti-virus software
Correct Answer: Malware can exploit the OS AutoRun/AutoPlay features to execute silently upon insertion
Explanation:
Historically, viruses heavily exploited the AutoRun feature in Windows to automatically execute malicious code the moment a USB drive was plugged in.
Incorrect! Try again.
33What is a recommended security best practice regarding USB drives in a corporate environment?
A.Disable AutoRun/AutoPlay and force anti-virus scans upon insertion
B.Connect USB drives to the network router instead of PCs
C.Only use USB drives formatted with the FAT32 file system
D.Store passwords in plaintext on the USB drive
Correct Answer: Disable AutoRun/AutoPlay and force anti-virus scans upon insertion
Explanation:
Disabling AutoRun prevents malware from executing automatically, and scanning the drive ensures no dormant viruses are present before the user accesses the files.
Incorrect! Try again.
34What is a 'Zero-Day' vulnerability in the context of computer security?
A.A software flaw that is unknown to the vendor and has no patch available
B.A hardware failure that occurs on the first day of use
C.A virus that deletes files precisely at midnight
D.A vulnerability that has been patched for zero days
Correct Answer: A software flaw that is unknown to the vendor and has no patch available
Explanation:
A Zero-Day vulnerability is an undiscovered or unpatched flaw in software. It is called 'zero-day' because the vendor has had zero days to fix it before it could be exploited.
Incorrect! Try again.
35Which of the following describes a 'False Positive' in anti-virus scanning?
A.The anti-virus successfully detects and removes a virus
B.The anti-virus fails to detect a piece of malware
C.The anti-virus crashes while scanning a file
D.The anti-virus incorrectly identifies a safe, legitimate file as malicious
Correct Answer: The anti-virus incorrectly identifies a safe, legitimate file as malicious
Explanation:
A false positive occurs when security software incorrectly flags a benign file or action as a threat.
Incorrect! Try again.
36What is the primary purpose of a Windows 'Restore Point'?
A.To back up all personal user documents, photos, and emails
B.To reset the computer to its factory default settings
C.To save the state of the operating system, registry, and system files for recovery
D.To recover deleted files from the Recycle Bin
Correct Answer: To save the state of the operating system, registry, and system files for recovery
Explanation:
A restore point creates a snapshot of system files, Windows registry, and settings. It is used to roll back the system to a previous working state in case of a software or driver error.
Incorrect! Try again.
37Which Windows service is essential for System Restore and the creation of restore points?
A.Print Spooler
B.Volume Shadow Copy Service (VSS)
C.Remote Desktop Service
D.Windows Update
Correct Answer: Volume Shadow Copy Service (VSS)
Explanation:
The Volume Shadow Copy Service (VSS) coordinates the creation of snapshots (shadow copies) of data volumes, allowing System Restore to capture the state of system files.
Incorrect! Try again.
38If a user restores their PC to a restore point created three days ago, what will happen to a Word document they created yesterday?
A.It will be encrypted
B.It will be permanently deleted
C.It will remain entirely unaffected
D.It will be moved to the Recycle Bin
Correct Answer: It will remain entirely unaffected
Explanation:
System Restore only affects system files, drivers, registry settings, and installed programs. It does not modify, delete, or restore personal files like documents or photos.
Incorrect! Try again.
39When is it most highly recommended to manually create a System Restore point?
A.Every time you open a web browser
B.Before formatting a secondary hard drive
C.Before installing a new, unverified driver or software application
D.Right after emptying the Recycle Bin
Correct Answer: Before installing a new, unverified driver or software application
Explanation:
Creating a restore point before making significant system changes (like installing drivers or software) ensures you have a safe baseline to revert to if the installation causes system instability.
Incorrect! Try again.
40How can a user access the System Restore utility if Windows fails to boot into the normal desktop?
A.By booting into the Windows Recovery Environment (WinRE) or Safe Mode
B.By replacing the CMOS battery
C.Through the system BIOS/UEFI settings
D.Through the Device Manager
Correct Answer: By booting into the Windows Recovery Environment (WinRE) or Safe Mode
Explanation:
If Windows won't boot, System Restore can be accessed via the Advanced Startup Options in the Windows Recovery Environment (WinRE) or by entering Safe Mode.
Incorrect! Try again.
41Which feature is a narrower alternative to System Restore if a user only wants to revert a recently updated hardware driver?
A.Chkdsk
B.Roll Back Driver
C.System File Checker (SFC)
D.Disk Cleanup
Correct Answer: Roll Back Driver
Explanation:
The 'Roll Back Driver' feature in Device Manager allows a user to uninstall a newly installed driver and revert to the previously installed version without affecting the rest of the system.
Incorrect! Try again.
42Which system performance tool in Windows provides real-time information about CPU, memory, disk, and network usage?
A.Task Manager
B.Registry Editor
C.Event Viewer
D.Disk Defragmenter
Correct Answer: Task Manager
Explanation:
Task Manager provides a real-time overview of system resource usage (CPU, RAM, Disk, Network) and allows users to terminate unresponsive applications.
Incorrect! Try again.
43What is the purpose of the Windows 'Disk Defragmenter' utility?
A.To delete temporary files and free up space
B.To reorganize fragmented data on a magnetic hard drive so files are stored contiguously
C.To scan the hard drive for physical bad sectors
D.To encrypt the hard drive for security
Correct Answer: To reorganize fragmented data on a magnetic hard drive so files are stored contiguously
Explanation:
Disk Defragmenter rearranges fragmented data on mechanical Hard Disk Drives (HDDs) so that files occupy contiguous storage locations, reducing read head travel time and improving performance.
Incorrect! Try again.
44Why should Disk Defragmentation NOT be routinely run on a Solid State Drive (SSD)?
A.SSDs do not have a file system
B.Defragmenting an SSD will format the drive
C.Defragmenting an SSD degrades its lifespan by adding unnecessary write cycles without performance benefits
D.SSDs cannot store fragmented files
Correct Answer: Defragmenting an SSD degrades its lifespan by adding unnecessary write cycles without performance benefits
Explanation:
SSDs use flash memory with no moving parts, so fragmented data is read just as quickly as contiguous data. The excessive read/write cycles of defragmentation degrade the flash memory's lifespan.
Incorrect! Try again.
45A user's computer is running out of storage space on the drive. Which built-in Windows utility is specifically designed to safely delete temporary files, cache, and old Windows update files?
A.Chkdsk
B.System Information
C.Format
D.Disk Cleanup
Correct Answer: Disk Cleanup
Explanation:
Disk Cleanup is a maintenance utility that searches for and safely deletes unneeded files, such as temporary internet files, system cache, and old update files to free up disk space.
Incorrect! Try again.
46If a computer is crashing randomly and the technician suspects a failing hard drive, which command-line utility should be run to scan for and repair file system errors and bad sectors?
A.diskpart
B.chkdsk /r
C.ipconfig /flushdns
D.sfc /scannow
Correct Answer: chkdsk /r
Explanation:
The chkdsk /r command locates bad sectors on the disk and recovers readable information, as well as fixing logical file system errors.
Incorrect! Try again.
47Which Windows tool should an administrator use to view detailed logs of system errors, warnings, and application crashes?
A.Resource Monitor
B.Control Panel
C.Device Manager
D.Event Viewer
Correct Answer: Event Viewer
Explanation:
Event Viewer is a centralized log service that records application, system, and security events. It is a vital tool for diagnosing the root cause of crashes and errors.
Incorrect! Try again.
48Which tool provides a more detailed, granular view of hardware resource consumption by individual processes than Task Manager?
A.Performance Monitor
B.Services.msc
C.Resource Monitor
D.System Information
Correct Answer: Resource Monitor
Explanation:
Resource Monitor provides an in-depth, granular look at exactly how hardware resources (CPU, Disk, Network, Memory) are being utilized by individual active processes.
Incorrect! Try again.
49A user wants to monitor custom system metrics over a long period to establish a baseline for PC performance. Which tool is most appropriate?
A.Performance Monitor (PerfMon)
B.Task Manager
C.Disk Management
D.System Configuration (MSConfig)
Correct Answer: Performance Monitor (PerfMon)
Explanation:
Performance Monitor allows administrators to capture custom metrics using Data Collector Sets over extended periods to establish performance baselines and identify bottlenecks.
Incorrect! Try again.
50When troubleshooting a Windows startup issue, which utility is commonly used to disable third-party startup programs and services?
A.Event Viewer
B.Diskpart
C.Command Prompt
D.System Configuration (MSConfig) / Task Manager
Correct Answer: System Configuration (MSConfig) / Task Manager
Explanation:
MSConfig (and the Startup tab in Task Manager in newer Windows versions) is used to manage and disable startup applications and services to perform a 'clean boot' for troubleshooting.