1Which of the following represents the first step in the standard CompTIA A+ troubleshooting methodology?
A.Identify the problem
B.Document findings, actions, and outcomes
C.Test the theory to determine cause
D.Establish a theory of probable cause
Correct Answer: Identify the problem
Explanation:
The standard troubleshooting methodology begins with identifying the problem. This involves questioning the user, identifying any changes made, and reviewing system logs.
Incorrect! Try again.
2During the boot process, the computer emits a series of beeps and fails to start. What is the most likely cause of this issue?
A.The network cable is disconnected
B.A hardware failure detected during the Power-On Self-Test (POST)
C.The hard drive is fragmented
D.The operating system is corrupted
Correct Answer: A hardware failure detected during the Power-On Self-Test (POST)
Explanation:
Beep codes are used by the BIOS/UEFI to communicate hardware issues encountered during POST before the video card is initialized.
Incorrect! Try again.
3What is the primary purpose of booting a Windows PC into 'Safe Mode'?
A.To load only essential drivers and services for troubleshooting
B.To automatically defragment the hard drive
C.To bypass the BIOS password
D.To format the primary partition
Correct Answer: To load only essential drivers and services for troubleshooting
Explanation:
Safe Mode loads Windows with a minimal set of drivers and services, making it easier to isolate and resolve software or driver conflicts.
Incorrect! Try again.
4A user reports that their computer continuously reboots itself after a few minutes of usage, especially during heavy processing. Which hardware issue is most likely?
A.Faulty RAM module
B.Fragmented hard drive
C.Corrupted printer driver
D.Processor overheating
Correct Answer: Processor overheating
Explanation:
Overheating, particularly of the CPU, often causes a computer to reboot automatically as a protective measure to prevent permanent thermal damage.
Incorrect! Try again.
5What does a 'Blue Screen of Death' (BSOD) typically indicate in a Windows operating system?
A.A successful firmware update
B.A fatal system error or hardware crash
C.The monitor has lost its video signal
D.The system is entering hibernation
Correct Answer: A fatal system error or hardware crash
Explanation:
A BSOD, also known as a STOP error, indicates a fatal system error where the OS has reached a condition where it can no longer operate safely, usually due to driver or hardware issues.
Incorrect! Try again.
6If a PC loses its correct date and time settings every time it is unplugged, which component needs replacing?
A.The CMOS battery
B.The hard drive
C.The system RAM
D.The power supply unit (PSU)
Correct Answer: The CMOS battery
Explanation:
The CMOS battery maintains the real-time clock and BIOS settings when the PC is disconnected from its main power source.
Incorrect! Try again.
7A laser printer is producing pages with ghost images (faint images of previously printed pages). What is the most likely cause?
A.A scratched photosensitive drum or failing wiper blade
B.Low toner levels
C.A stuck paper path roller
D.Incorrect IP address on the printer
Correct Answer: A scratched photosensitive drum or failing wiper blade
Explanation:
Ghosting in a laser printer is typically caused by the imaging drum not discharging properly or the wiper blade failing to clean off excess toner from the previous revolution.
Incorrect! Try again.
8When an application sends a print job but nothing prints, and there are no error lights on the printer, what software component should a technician check first?
A.The Print Spooler service
B.The system registry
C.The BIOS settings
D.The Task Scheduler
Correct Answer: The Print Spooler service
Explanation:
The Print Spooler service manages print jobs sent to the printer. If it crashes or stalls, print jobs will queue up but fail to print.
Incorrect! Try again.
9Which of the following is the most appropriate initial fix for a recurring paper jam in an inkjet printer?
A.Update the printer firmware
B.Clean the pickup rollers
C.Replace the ink cartridges
D.Reinstall the printer driver
Correct Answer: Clean the pickup rollers
Explanation:
Paper jams are predominantly mechanical issues. Dust or wear on the pickup rollers often causes them to fail at feeding paper correctly, so cleaning them is the first step.
Incorrect! Try again.
10A user prints a document, but the output consists of garbled text and random characters. What is the most probable cause?
A.The printer is out of paper
B.The fuser assembly is broken
C.An incorrect or corrupted printer driver
D.The print spooler is paused
Correct Answer: An incorrect or corrupted printer driver
Explanation:
Garbled text usually means the computer is sending data in a language the printer does not understand, which is almost always a driver issue.
Incorrect! Try again.
11Which command-line tool is used to verify network connectivity between two hosts using ICMP echo requests?
A.nslookup
B.tracert
C.ipconfig
D.ping
Correct Answer: ping
Explanation:
The ping command sends Internet Control Message Protocol (ICMP) Echo Request messages to verify connectivity and measure round-trip time.
Incorrect! Try again.
12What is the primary function of a DHCP server on a local network?
A.To route packets between different subnets
B.To automatically assign IP addresses and network parameters to client devices
C.To block unauthorized incoming network traffic
D.To translate domain names to IP addresses
Correct Answer: To automatically assign IP addresses and network parameters to client devices
Explanation:
Dynamic Host Configuration Protocol (DHCP) automates the assignment of IP addresses, subnet masks, and default gateways to devices on a network.
Incorrect! Try again.
13A user cannot connect to a Wi-Fi network. The technician notices the network name is no longer listed in the available networks. What is the network name technically called?
A.WEP Key
B.BSSID
C.SSID
D.MAC Address
Correct Answer: SSID
Explanation:
The Service Set Identifier (SSID) is the technical term for a Wi-Fi network's name.
Incorrect! Try again.
14In the $2.4$ GHz Wi-Fi band, which sets of channels are considered non-overlapping and best for avoiding interference?
A.$2, 4, 8$
B.$1, 6, 11$
C.$5, 10, 14$
D.$1, 2, 3$
Correct Answer: $1, 6, 11$
Explanation:
In the $2.4$ GHz band, channels $1$, $6$, and $11$ are the only channels that do not overlap with one another, making them ideal for minimizing co-channel interference.
Incorrect! Try again.
15A user is unable to access the internet. A technician runs ipconfig and sees an IP address of $169.254.15.22$. What does this address signify?
A.The computer has successfully connected to the internet
B.The computer could not reach the DHCP server and assigned itself an APIPA address
C.The computer has received a static IP address
D.The computer is experiencing a DNS failure
Correct Answer: The computer could not reach the DHCP server and assigned itself an APIPA address
Explanation:
The range is reserved for Automatic Private IP Addressing (APIPA), indicating the device failed to obtain an IP from a DHCP server.
Incorrect! Try again.
16Which of the following IP addresses belongs to a Class A network?
A.$10.15.20.25$
B.$172.16.0.1$
C.$224.0.0.5$
D.$192.168.1.1$
Correct Answer: $10.15.20.25$
Explanation:
Class A IP addresses range from $1.0.0.0$ to $126.255.255.255$. The IP $10.15.20.25$ falls within this range.
Incorrect! Try again.
17What is the default subnet mask for a Class C IP address?
A.$255.255.255.255$
B.$255.0.0.0$
C.$255.255.255.0$
D.$255.255.0.0$
Correct Answer: $255.255.255.0$
Explanation:
A Class C network uses $24$ bits for the network portion, which translates to a default subnet mask of $255.255.255.0$.
Incorrect! Try again.
18How many usable host IP addresses are available in a standard Class C network?
A.$256$
B.$65,534$
C.$254$
D.$16,777,214$
Correct Answer: $254$
Explanation:
A standard Class C network has $8$ host bits. The formula for usable hosts is . Thus, usable hosts.
Incorrect! Try again.
19The IP address range $224.0.0.0$ to $239.255.255.255$ is reserved for which class of IP addresses?
A.Class C
B.Class D
C.Class B
D.Class E
Correct Answer: Class D
Explanation:
Class D IP addresses are reserved exclusively for multicast traffic, ranging from $224.0.0.0$ to $239.255.255.255$.
Incorrect! Try again.
20Which of the following addresses is considered the IPv4 loopback address used for testing the local TCP/IP stack?
A.$127.0.0.1$
B.$0.0.0.0$
C.$255.255.255.255$
D.$192.168.0.1$
Correct Answer: $127.0.0.1$
Explanation:
The block is reserved for loopback routing. The address $127.0.0.1$ is used to test the local machine's TCP/IP protocol stack.
Incorrect! Try again.
21Which IP address class is designated strictly for experimental purposes and future use?
A.Class C
B.Class D
C.Class E
D.Class B
Correct Answer: Class E
Explanation:
Class E addresses span from $240.0.0.0$ to $255.255.255.255$ and are reserved by the IETF for experimental and research purposes.
Incorrect! Try again.
22What is the primary function of a network firewall?
A.To provide wireless access to wired devices
B.To filter incoming and outgoing network traffic based on security rules
C.To store backups of system files
D.To increase the speed of network traffic
Correct Answer: To filter incoming and outgoing network traffic based on security rules
Explanation:
A firewall acts as a barrier between a trusted internal network and an untrusted external network, filtering traffic based on predefined security rules.
Incorrect! Try again.
23Which of the following describes a hardware firewall compared to a software firewall?
A.It protects the entire network and operates independently of the host OS
B.It cannot block specific ports
C.It is installed on individual client operating systems
D.It is generally less secure than a software firewall
Correct Answer: It protects the entire network and operates independently of the host OS
Explanation:
Hardware firewalls are dedicated physical devices placed at the network perimeter to protect all internal devices, independent of the individual hosts' operating systems.
Incorrect! Try again.
24A system administrator wants to prevent users from accessing unsecured HTTP websites. Which port should be blocked on the firewall?
A.Port $443$
B.Port $25$
C.Port $21$
D.Port $80$
Correct Answer: Port $80$
Explanation:
Port $80$ is the default port used for unsecured HTTP web traffic. Blocking it prevents unencrypted web browsing.
Incorrect! Try again.
25Which firewall feature allows a user to map an external IP and port to an internal IP and port, commonly used to host game servers?
A.DHCP Snooping
B.Port Forwarding
C.MAC Filtering
D.Stateful Inspection
Correct Answer: Port Forwarding
Explanation:
Port Forwarding (or Destination NAT) allows external devices to access computers and services on a private network by mapping external ports to internal IP addresses.
Incorrect! Try again.
26Which wireless security protocol is currently considered the most secure and should be configured on a Wi-Fi router?
A.WPA2
B.WPA3
C.WPA
D.WEP
Correct Answer: WPA3
Explanation:
WPA3 is the latest and most secure Wi-Fi security protocol, providing stronger encryption and better protection against brute-force attacks compared to WPA2 and older standards.
Incorrect! Try again.
27What does a 'stateful' firewall do that a 'stateless' firewall does not?
A.It keeps track of the state of active network connections
B.It cannot block UDP packets
C.It only operates at the physical layer of the OSI model
D.It filters traffic based solely on IP addresses
Correct Answer: It keeps track of the state of active network connections
Explanation:
A stateful firewall tracks the operating state and characteristics of network connections traversing it, allowing it to distinguish legitimate packets for different types of connections.
Incorrect! Try again.
28When installing anti-virus software on a computer, what is the most critical step to perform immediately after installation?
A.Defragment the hard drive
B.Format the USB ports
C.Create a new local user account
D.Update the virus definition/signature database
Correct Answer: Update the virus definition/signature database
Explanation:
Updating the virus signatures ensures the anti-virus software has the latest information to detect and remove newly discovered malware threats.
Incorrect! Try again.
29How does anti-virus software primarily use 'heuristics'?
A.By encrypting network traffic to prevent malware downloads
B.By isolating infected files in a hidden folder
C.By analyzing the behavior of a program to identify unknown or zero-day threats
D.By matching file hashes to a known database of viruses
Correct Answer: By analyzing the behavior of a program to identify unknown or zero-day threats
Explanation:
Heuristic analysis involves examining code for suspicious properties and behaviors, allowing the software to detect unknown or modified malware that doesn't yet have a known signature.
Incorrect! Try again.
30When an anti-virus program 'quarantines' a file, what is it actually doing?
A.Moving the file to a secure, isolated location where it cannot execute
B.Cleaning the malicious code out of the file and restoring it
C.Permanently deleting the file from the hard drive
D.Sending the file to the software vendor for analysis
Correct Answer: Moving the file to a secure, isolated location where it cannot execute
Explanation:
Quarantining a file securely isolates it so that it cannot run or infect the system, allowing the user to review it and decide whether to delete or restore it (if it was a false positive).
Incorrect! Try again.
31Which type of malware actively encrypts a user's files and demands payment for the decryption key?
A.Rootkit
B.Ransomware
C.Spyware
D.Adware
Correct Answer: Ransomware
Explanation:
Ransomware is malicious software that denies access to a system or its data by encrypting files, demanding a ransom to restore access.
Incorrect! Try again.
32Why are USB flash drives considered a significant security risk for spreading malware?
A.They cannot be scanned by traditional anti-virus software
B.Malware can exploit the OS AutoRun/AutoPlay features to execute silently upon insertion
C.They use outdated encryption standards
D.They generate electromagnetic interference that corrupts data
Correct Answer: Malware can exploit the OS AutoRun/AutoPlay features to execute silently upon insertion
Explanation:
Historically, viruses heavily exploited the AutoRun feature in Windows to automatically execute malicious code the moment a USB drive was plugged in.
Incorrect! Try again.
33What is a recommended security best practice regarding USB drives in a corporate environment?
A.Only use USB drives formatted with the FAT32 file system
B.Disable AutoRun/AutoPlay and force anti-virus scans upon insertion
C.Connect USB drives to the network router instead of PCs
D.Store passwords in plaintext on the USB drive
Correct Answer: Disable AutoRun/AutoPlay and force anti-virus scans upon insertion
Explanation:
Disabling AutoRun prevents malware from executing automatically, and scanning the drive ensures no dormant viruses are present before the user accesses the files.
Incorrect! Try again.
34What is a 'Zero-Day' vulnerability in the context of computer security?
A.A software flaw that is unknown to the vendor and has no patch available
B.A hardware failure that occurs on the first day of use
C.A vulnerability that has been patched for zero days
D.A virus that deletes files precisely at midnight
Correct Answer: A software flaw that is unknown to the vendor and has no patch available
Explanation:
A Zero-Day vulnerability is an undiscovered or unpatched flaw in software. It is called 'zero-day' because the vendor has had zero days to fix it before it could be exploited.
Incorrect! Try again.
35Which of the following describes a 'False Positive' in anti-virus scanning?
A.The anti-virus crashes while scanning a file
B.The anti-virus fails to detect a piece of malware
C.The anti-virus incorrectly identifies a safe, legitimate file as malicious
D.The anti-virus successfully detects and removes a virus
Correct Answer: The anti-virus incorrectly identifies a safe, legitimate file as malicious
Explanation:
A false positive occurs when security software incorrectly flags a benign file or action as a threat.
Incorrect! Try again.
36What is the primary purpose of a Windows 'Restore Point'?
A.To reset the computer to its factory default settings
B.To recover deleted files from the Recycle Bin
C.To save the state of the operating system, registry, and system files for recovery
D.To back up all personal user documents, photos, and emails
Correct Answer: To save the state of the operating system, registry, and system files for recovery
Explanation:
A restore point creates a snapshot of system files, Windows registry, and settings. It is used to roll back the system to a previous working state in case of a software or driver error.
Incorrect! Try again.
37Which Windows service is essential for System Restore and the creation of restore points?
A.Windows Update
B.Remote Desktop Service
C.Print Spooler
D.Volume Shadow Copy Service (VSS)
Correct Answer: Volume Shadow Copy Service (VSS)
Explanation:
The Volume Shadow Copy Service (VSS) coordinates the creation of snapshots (shadow copies) of data volumes, allowing System Restore to capture the state of system files.
Incorrect! Try again.
38If a user restores their PC to a restore point created three days ago, what will happen to a Word document they created yesterday?
A.It will be permanently deleted
B.It will be moved to the Recycle Bin
C.It will remain entirely unaffected
D.It will be encrypted
Correct Answer: It will remain entirely unaffected
Explanation:
System Restore only affects system files, drivers, registry settings, and installed programs. It does not modify, delete, or restore personal files like documents or photos.
Incorrect! Try again.
39When is it most highly recommended to manually create a System Restore point?
A.Right after emptying the Recycle Bin
B.Before installing a new, unverified driver or software application
C.Every time you open a web browser
D.Before formatting a secondary hard drive
Correct Answer: Before installing a new, unverified driver or software application
Explanation:
Creating a restore point before making significant system changes (like installing drivers or software) ensures you have a safe baseline to revert to if the installation causes system instability.
Incorrect! Try again.
40How can a user access the System Restore utility if Windows fails to boot into the normal desktop?
A.Through the system BIOS/UEFI settings
B.Through the Device Manager
C.By replacing the CMOS battery
D.By booting into the Windows Recovery Environment (WinRE) or Safe Mode
Correct Answer: By booting into the Windows Recovery Environment (WinRE) or Safe Mode
Explanation:
If Windows won't boot, System Restore can be accessed via the Advanced Startup Options in the Windows Recovery Environment (WinRE) or by entering Safe Mode.
Incorrect! Try again.
41Which feature is a narrower alternative to System Restore if a user only wants to revert a recently updated hardware driver?
A.Roll Back Driver
B.System File Checker (SFC)
C.Disk Cleanup
D.Chkdsk
Correct Answer: Roll Back Driver
Explanation:
The 'Roll Back Driver' feature in Device Manager allows a user to uninstall a newly installed driver and revert to the previously installed version without affecting the rest of the system.
Incorrect! Try again.
42Which system performance tool in Windows provides real-time information about CPU, memory, disk, and network usage?
A.Registry Editor
B.Event Viewer
C.Disk Defragmenter
D.Task Manager
Correct Answer: Task Manager
Explanation:
Task Manager provides a real-time overview of system resource usage (CPU, RAM, Disk, Network) and allows users to terminate unresponsive applications.
Incorrect! Try again.
43What is the purpose of the Windows 'Disk Defragmenter' utility?
A.To delete temporary files and free up space
B.To encrypt the hard drive for security
C.To scan the hard drive for physical bad sectors
D.To reorganize fragmented data on a magnetic hard drive so files are stored contiguously
Correct Answer: To reorganize fragmented data on a magnetic hard drive so files are stored contiguously
Explanation:
Disk Defragmenter rearranges fragmented data on mechanical Hard Disk Drives (HDDs) so that files occupy contiguous storage locations, reducing read head travel time and improving performance.
Incorrect! Try again.
44Why should Disk Defragmentation NOT be routinely run on a Solid State Drive (SSD)?
A.SSDs do not have a file system
B.SSDs cannot store fragmented files
C.Defragmenting an SSD will format the drive
D.Defragmenting an SSD degrades its lifespan by adding unnecessary write cycles without performance benefits
Correct Answer: Defragmenting an SSD degrades its lifespan by adding unnecessary write cycles without performance benefits
Explanation:
SSDs use flash memory with no moving parts, so fragmented data is read just as quickly as contiguous data. The excessive read/write cycles of defragmentation degrade the flash memory's lifespan.
Incorrect! Try again.
45A user's computer is running out of storage space on the drive. Which built-in Windows utility is specifically designed to safely delete temporary files, cache, and old Windows update files?
A.Format
B.Disk Cleanup
C.System Information
D.Chkdsk
Correct Answer: Disk Cleanup
Explanation:
Disk Cleanup is a maintenance utility that searches for and safely deletes unneeded files, such as temporary internet files, system cache, and old update files to free up disk space.
Incorrect! Try again.
46If a computer is crashing randomly and the technician suspects a failing hard drive, which command-line utility should be run to scan for and repair file system errors and bad sectors?
A.sfc /scannow
B.diskpart
C.chkdsk /r
D.ipconfig /flushdns
Correct Answer: chkdsk /r
Explanation:
The chkdsk /r command locates bad sectors on the disk and recovers readable information, as well as fixing logical file system errors.
Incorrect! Try again.
47Which Windows tool should an administrator use to view detailed logs of system errors, warnings, and application crashes?
A.Control Panel
B.Event Viewer
C.Device Manager
D.Resource Monitor
Correct Answer: Event Viewer
Explanation:
Event Viewer is a centralized log service that records application, system, and security events. It is a vital tool for diagnosing the root cause of crashes and errors.
Incorrect! Try again.
48Which tool provides a more detailed, granular view of hardware resource consumption by individual processes than Task Manager?
A.Services.msc
B.Resource Monitor
C.Performance Monitor
D.System Information
Correct Answer: Resource Monitor
Explanation:
Resource Monitor provides an in-depth, granular look at exactly how hardware resources (CPU, Disk, Network, Memory) are being utilized by individual active processes.
Incorrect! Try again.
49A user wants to monitor custom system metrics over a long period to establish a baseline for PC performance. Which tool is most appropriate?
A.Disk Management
B.Performance Monitor (PerfMon)
C.System Configuration (MSConfig)
D.Task Manager
Correct Answer: Performance Monitor (PerfMon)
Explanation:
Performance Monitor allows administrators to capture custom metrics using Data Collector Sets over extended periods to establish performance baselines and identify bottlenecks.
Incorrect! Try again.
50When troubleshooting a Windows startup issue, which utility is commonly used to disable third-party startup programs and services?
A.Command Prompt
B.System Configuration (MSConfig) / Task Manager
C.Event Viewer
D.Diskpart
Correct Answer: System Configuration (MSConfig) / Task Manager
Explanation:
MSConfig (and the Startup tab in Task Manager in newer Windows versions) is used to manage and disable startup applications and services to perform a 'clean boot' for troubleshooting.