Unit 4 - Practice Quiz

CAP321 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following represents the first step in the standard CompTIA A+ troubleshooting methodology?

A. Identify the problem
B. Document findings, actions, and outcomes
C. Test the theory to determine cause
D. Establish a theory of probable cause

2 During the boot process, the computer emits a series of beeps and fails to start. What is the most likely cause of this issue?

A. The network cable is disconnected
B. A hardware failure detected during the Power-On Self-Test (POST)
C. The hard drive is fragmented
D. The operating system is corrupted

3 What is the primary purpose of booting a Windows PC into 'Safe Mode'?

A. To load only essential drivers and services for troubleshooting
B. To automatically defragment the hard drive
C. To bypass the BIOS password
D. To format the primary partition

4 A user reports that their computer continuously reboots itself after a few minutes of usage, especially during heavy processing. Which hardware issue is most likely?

A. Faulty RAM module
B. Fragmented hard drive
C. Corrupted printer driver
D. Processor overheating

5 What does a 'Blue Screen of Death' (BSOD) typically indicate in a Windows operating system?

A. A successful firmware update
B. A fatal system error or hardware crash
C. The monitor has lost its video signal
D. The system is entering hibernation

6 If a PC loses its correct date and time settings every time it is unplugged, which component needs replacing?

A. The CMOS battery
B. The hard drive
C. The system RAM
D. The power supply unit (PSU)

7 A laser printer is producing pages with ghost images (faint images of previously printed pages). What is the most likely cause?

A. A scratched photosensitive drum or failing wiper blade
B. Low toner levels
C. A stuck paper path roller
D. Incorrect IP address on the printer

8 When an application sends a print job but nothing prints, and there are no error lights on the printer, what software component should a technician check first?

A. The Print Spooler service
B. The system registry
C. The BIOS settings
D. The Task Scheduler

9 Which of the following is the most appropriate initial fix for a recurring paper jam in an inkjet printer?

A. Update the printer firmware
B. Clean the pickup rollers
C. Replace the ink cartridges
D. Reinstall the printer driver

10 A user prints a document, but the output consists of garbled text and random characters. What is the most probable cause?

A. The printer is out of paper
B. The fuser assembly is broken
C. An incorrect or corrupted printer driver
D. The print spooler is paused

11 Which command-line tool is used to verify network connectivity between two hosts using ICMP echo requests?

A. nslookup
B. tracert
C. ipconfig
D. ping

12 What is the primary function of a DHCP server on a local network?

A. To route packets between different subnets
B. To automatically assign IP addresses and network parameters to client devices
C. To block unauthorized incoming network traffic
D. To translate domain names to IP addresses

13 A user cannot connect to a Wi-Fi network. The technician notices the network name is no longer listed in the available networks. What is the network name technically called?

A. WEP Key
B. BSSID
C. SSID
D. MAC Address

14 In the $2.4$ GHz Wi-Fi band, which sets of channels are considered non-overlapping and best for avoiding interference?

A. $2, 4, 8$
B. $1, 6, 11$
C. $5, 10, 14$
D. $1, 2, 3$

15 A user is unable to access the internet. A technician runs ipconfig and sees an IP address of $169.254.15.22$. What does this address signify?

A. The computer has successfully connected to the internet
B. The computer could not reach the DHCP server and assigned itself an APIPA address
C. The computer has received a static IP address
D. The computer is experiencing a DNS failure

16 Which of the following IP addresses belongs to a Class A network?

A. $10.15.20.25$
B. $172.16.0.1$
C. $224.0.0.5$
D. $192.168.1.1$

17 What is the default subnet mask for a Class C IP address?

A. $255.255.255.255$
B. $255.0.0.0$
C. $255.255.255.0$
D. $255.255.0.0$

18 How many usable host IP addresses are available in a standard Class C network?

A. $256$
B. $65,534$
C. $254$
D. $16,777,214$

19 The IP address range $224.0.0.0$ to $239.255.255.255$ is reserved for which class of IP addresses?

A. Class C
B. Class D
C. Class B
D. Class E

20 Which of the following addresses is considered the IPv4 loopback address used for testing the local TCP/IP stack?

A. $127.0.0.1$
B. $0.0.0.0$
C. $255.255.255.255$
D. $192.168.0.1$

21 Which IP address class is designated strictly for experimental purposes and future use?

A. Class C
B. Class D
C. Class E
D. Class B

22 What is the primary function of a network firewall?

A. To provide wireless access to wired devices
B. To filter incoming and outgoing network traffic based on security rules
C. To store backups of system files
D. To increase the speed of network traffic

23 Which of the following describes a hardware firewall compared to a software firewall?

A. It protects the entire network and operates independently of the host OS
B. It cannot block specific ports
C. It is installed on individual client operating systems
D. It is generally less secure than a software firewall

24 A system administrator wants to prevent users from accessing unsecured HTTP websites. Which port should be blocked on the firewall?

A. Port $443$
B. Port $25$
C. Port $21$
D. Port $80$

25 Which firewall feature allows a user to map an external IP and port to an internal IP and port, commonly used to host game servers?

A. DHCP Snooping
B. Port Forwarding
C. MAC Filtering
D. Stateful Inspection

26 Which wireless security protocol is currently considered the most secure and should be configured on a Wi-Fi router?

A. WPA2
B. WPA3
C. WPA
D. WEP

27 What does a 'stateful' firewall do that a 'stateless' firewall does not?

A. It keeps track of the state of active network connections
B. It cannot block UDP packets
C. It only operates at the physical layer of the OSI model
D. It filters traffic based solely on IP addresses

28 When installing anti-virus software on a computer, what is the most critical step to perform immediately after installation?

A. Defragment the hard drive
B. Format the USB ports
C. Create a new local user account
D. Update the virus definition/signature database

29 How does anti-virus software primarily use 'heuristics'?

A. By encrypting network traffic to prevent malware downloads
B. By isolating infected files in a hidden folder
C. By analyzing the behavior of a program to identify unknown or zero-day threats
D. By matching file hashes to a known database of viruses

30 When an anti-virus program 'quarantines' a file, what is it actually doing?

A. Moving the file to a secure, isolated location where it cannot execute
B. Cleaning the malicious code out of the file and restoring it
C. Permanently deleting the file from the hard drive
D. Sending the file to the software vendor for analysis

31 Which type of malware actively encrypts a user's files and demands payment for the decryption key?

A. Rootkit
B. Ransomware
C. Spyware
D. Adware

32 Why are USB flash drives considered a significant security risk for spreading malware?

A. They cannot be scanned by traditional anti-virus software
B. Malware can exploit the OS AutoRun/AutoPlay features to execute silently upon insertion
C. They use outdated encryption standards
D. They generate electromagnetic interference that corrupts data

33 What is a recommended security best practice regarding USB drives in a corporate environment?

A. Only use USB drives formatted with the FAT32 file system
B. Disable AutoRun/AutoPlay and force anti-virus scans upon insertion
C. Connect USB drives to the network router instead of PCs
D. Store passwords in plaintext on the USB drive

34 What is a 'Zero-Day' vulnerability in the context of computer security?

A. A software flaw that is unknown to the vendor and has no patch available
B. A hardware failure that occurs on the first day of use
C. A vulnerability that has been patched for zero days
D. A virus that deletes files precisely at midnight

35 Which of the following describes a 'False Positive' in anti-virus scanning?

A. The anti-virus crashes while scanning a file
B. The anti-virus fails to detect a piece of malware
C. The anti-virus incorrectly identifies a safe, legitimate file as malicious
D. The anti-virus successfully detects and removes a virus

36 What is the primary purpose of a Windows 'Restore Point'?

A. To reset the computer to its factory default settings
B. To recover deleted files from the Recycle Bin
C. To save the state of the operating system, registry, and system files for recovery
D. To back up all personal user documents, photos, and emails

37 Which Windows service is essential for System Restore and the creation of restore points?

A. Windows Update
B. Remote Desktop Service
C. Print Spooler
D. Volume Shadow Copy Service (VSS)

38 If a user restores their PC to a restore point created three days ago, what will happen to a Word document they created yesterday?

A. It will be permanently deleted
B. It will be moved to the Recycle Bin
C. It will remain entirely unaffected
D. It will be encrypted

39 When is it most highly recommended to manually create a System Restore point?

A. Right after emptying the Recycle Bin
B. Before installing a new, unverified driver or software application
C. Every time you open a web browser
D. Before formatting a secondary hard drive

40 How can a user access the System Restore utility if Windows fails to boot into the normal desktop?

A. Through the system BIOS/UEFI settings
B. Through the Device Manager
C. By replacing the CMOS battery
D. By booting into the Windows Recovery Environment (WinRE) or Safe Mode

41 Which feature is a narrower alternative to System Restore if a user only wants to revert a recently updated hardware driver?

A. Roll Back Driver
B. System File Checker (SFC)
C. Disk Cleanup
D. Chkdsk

42 Which system performance tool in Windows provides real-time information about CPU, memory, disk, and network usage?

A. Registry Editor
B. Event Viewer
C. Disk Defragmenter
D. Task Manager

43 What is the purpose of the Windows 'Disk Defragmenter' utility?

A. To delete temporary files and free up space
B. To encrypt the hard drive for security
C. To scan the hard drive for physical bad sectors
D. To reorganize fragmented data on a magnetic hard drive so files are stored contiguously

44 Why should Disk Defragmentation NOT be routinely run on a Solid State Drive (SSD)?

A. SSDs do not have a file system
B. SSDs cannot store fragmented files
C. Defragmenting an SSD will format the drive
D. Defragmenting an SSD degrades its lifespan by adding unnecessary write cycles without performance benefits

45 A user's computer is running out of storage space on the drive. Which built-in Windows utility is specifically designed to safely delete temporary files, cache, and old Windows update files?

A. Format
B. Disk Cleanup
C. System Information
D. Chkdsk

46 If a computer is crashing randomly and the technician suspects a failing hard drive, which command-line utility should be run to scan for and repair file system errors and bad sectors?

A. sfc /scannow
B. diskpart
C. chkdsk /r
D. ipconfig /flushdns

47 Which Windows tool should an administrator use to view detailed logs of system errors, warnings, and application crashes?

A. Control Panel
B. Event Viewer
C. Device Manager
D. Resource Monitor

48 Which tool provides a more detailed, granular view of hardware resource consumption by individual processes than Task Manager?

A. Services.msc
B. Resource Monitor
C. Performance Monitor
D. System Information

49 A user wants to monitor custom system metrics over a long period to establish a baseline for PC performance. Which tool is most appropriate?

A. Disk Management
B. Performance Monitor (PerfMon)
C. System Configuration (MSConfig)
D. Task Manager

50 When troubleshooting a Windows startup issue, which utility is commonly used to disable third-party startup programs and services?

A. Command Prompt
B. System Configuration (MSConfig) / Task Manager
C. Event Viewer
D. Diskpart