Unit 4 - Practice Quiz

CAP321 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following represents the first step in the standard CompTIA A+ troubleshooting methodology?

A. Identify the problem
B. Establish a theory of probable cause
C. Document findings, actions, and outcomes
D. Test the theory to determine cause

2 During the boot process, the computer emits a series of beeps and fails to start. What is the most likely cause of this issue?

A. A hardware failure detected during the Power-On Self-Test (POST)
B. The network cable is disconnected
C. The operating system is corrupted
D. The hard drive is fragmented

3 What is the primary purpose of booting a Windows PC into 'Safe Mode'?

A. To format the primary partition
B. To automatically defragment the hard drive
C. To bypass the BIOS password
D. To load only essential drivers and services for troubleshooting

4 A user reports that their computer continuously reboots itself after a few minutes of usage, especially during heavy processing. Which hardware issue is most likely?

A. Faulty RAM module
B. Processor overheating
C. Corrupted printer driver
D. Fragmented hard drive

5 What does a 'Blue Screen of Death' (BSOD) typically indicate in a Windows operating system?

A. A successful firmware update
B. A fatal system error or hardware crash
C. The system is entering hibernation
D. The monitor has lost its video signal

6 If a PC loses its correct date and time settings every time it is unplugged, which component needs replacing?

A. The system RAM
B. The hard drive
C. The power supply unit (PSU)
D. The CMOS battery

7 A laser printer is producing pages with ghost images (faint images of previously printed pages). What is the most likely cause?

A. A stuck paper path roller
B. A scratched photosensitive drum or failing wiper blade
C. Incorrect IP address on the printer
D. Low toner levels

8 When an application sends a print job but nothing prints, and there are no error lights on the printer, what software component should a technician check first?

A. The Task Scheduler
B. The system registry
C. The Print Spooler service
D. The BIOS settings

9 Which of the following is the most appropriate initial fix for a recurring paper jam in an inkjet printer?

A. Replace the ink cartridges
B. Reinstall the printer driver
C. Clean the pickup rollers
D. Update the printer firmware

10 A user prints a document, but the output consists of garbled text and random characters. What is the most probable cause?

A. The print spooler is paused
B. The printer is out of paper
C. An incorrect or corrupted printer driver
D. The fuser assembly is broken

11 Which command-line tool is used to verify network connectivity between two hosts using ICMP echo requests?

A. nslookup
B. ipconfig
C. ping
D. tracert

12 What is the primary function of a DHCP server on a local network?

A. To route packets between different subnets
B. To automatically assign IP addresses and network parameters to client devices
C. To block unauthorized incoming network traffic
D. To translate domain names to IP addresses

13 A user cannot connect to a Wi-Fi network. The technician notices the network name is no longer listed in the available networks. What is the network name technically called?

A. WEP Key
B. MAC Address
C. BSSID
D. SSID

14 In the $2.4$ GHz Wi-Fi band, which sets of channels are considered non-overlapping and best for avoiding interference?

A. $1, 2, 3$
B. $2, 4, 8$
C. $1, 6, 11$
D. $5, 10, 14$

15 A user is unable to access the internet. A technician runs ipconfig and sees an IP address of $169.254.15.22$. What does this address signify?

A. The computer has successfully connected to the internet
B. The computer could not reach the DHCP server and assigned itself an APIPA address
C. The computer has received a static IP address
D. The computer is experiencing a DNS failure

16 Which of the following IP addresses belongs to a Class A network?

A. $10.15.20.25$
B. $224.0.0.5$
C. $192.168.1.1$
D. $172.16.0.1$

17 What is the default subnet mask for a Class C IP address?

A. $255.255.0.0$
B. $255.0.0.0$
C. $255.255.255.255$
D. $255.255.255.0$

18 How many usable host IP addresses are available in a standard Class C network?

A. $256$
B. $65,534$
C. $254$
D. $16,777,214$

19 The IP address range $224.0.0.0$ to $239.255.255.255$ is reserved for which class of IP addresses?

A. Class D
B. Class E
C. Class B
D. Class C

20 Which of the following addresses is considered the IPv4 loopback address used for testing the local TCP/IP stack?

A. $0.0.0.0$
B. $255.255.255.255$
C. $127.0.0.1$
D. $192.168.0.1$

21 Which IP address class is designated strictly for experimental purposes and future use?

A. Class E
B. Class D
C. Class B
D. Class C

22 What is the primary function of a network firewall?

A. To increase the speed of network traffic
B. To store backups of system files
C. To provide wireless access to wired devices
D. To filter incoming and outgoing network traffic based on security rules

23 Which of the following describes a hardware firewall compared to a software firewall?

A. It is installed on individual client operating systems
B. It protects the entire network and operates independently of the host OS
C. It is generally less secure than a software firewall
D. It cannot block specific ports

24 A system administrator wants to prevent users from accessing unsecured HTTP websites. Which port should be blocked on the firewall?

A. Port $25$
B. Port $21$
C. Port $80$
D. Port $443$

25 Which firewall feature allows a user to map an external IP and port to an internal IP and port, commonly used to host game servers?

A. Stateful Inspection
B. DHCP Snooping
C. MAC Filtering
D. Port Forwarding

26 Which wireless security protocol is currently considered the most secure and should be configured on a Wi-Fi router?

A. WPA
B. WPA3
C. WEP
D. WPA2

27 What does a 'stateful' firewall do that a 'stateless' firewall does not?

A. It filters traffic based solely on IP addresses
B. It keeps track of the state of active network connections
C. It only operates at the physical layer of the OSI model
D. It cannot block UDP packets

28 When installing anti-virus software on a computer, what is the most critical step to perform immediately after installation?

A. Defragment the hard drive
B. Create a new local user account
C. Format the USB ports
D. Update the virus definition/signature database

29 How does anti-virus software primarily use 'heuristics'?

A. By analyzing the behavior of a program to identify unknown or zero-day threats
B. By isolating infected files in a hidden folder
C. By encrypting network traffic to prevent malware downloads
D. By matching file hashes to a known database of viruses

30 When an anti-virus program 'quarantines' a file, what is it actually doing?

A. Sending the file to the software vendor for analysis
B. Permanently deleting the file from the hard drive
C. Cleaning the malicious code out of the file and restoring it
D. Moving the file to a secure, isolated location where it cannot execute

31 Which type of malware actively encrypts a user's files and demands payment for the decryption key?

A. Spyware
B. Rootkit
C. Adware
D. Ransomware

32 Why are USB flash drives considered a significant security risk for spreading malware?

A. They generate electromagnetic interference that corrupts data
B. They use outdated encryption standards
C. Malware can exploit the OS AutoRun/AutoPlay features to execute silently upon insertion
D. They cannot be scanned by traditional anti-virus software

33 What is a recommended security best practice regarding USB drives in a corporate environment?

A. Disable AutoRun/AutoPlay and force anti-virus scans upon insertion
B. Connect USB drives to the network router instead of PCs
C. Only use USB drives formatted with the FAT32 file system
D. Store passwords in plaintext on the USB drive

34 What is a 'Zero-Day' vulnerability in the context of computer security?

A. A software flaw that is unknown to the vendor and has no patch available
B. A hardware failure that occurs on the first day of use
C. A virus that deletes files precisely at midnight
D. A vulnerability that has been patched for zero days

35 Which of the following describes a 'False Positive' in anti-virus scanning?

A. The anti-virus successfully detects and removes a virus
B. The anti-virus fails to detect a piece of malware
C. The anti-virus crashes while scanning a file
D. The anti-virus incorrectly identifies a safe, legitimate file as malicious

36 What is the primary purpose of a Windows 'Restore Point'?

A. To back up all personal user documents, photos, and emails
B. To reset the computer to its factory default settings
C. To save the state of the operating system, registry, and system files for recovery
D. To recover deleted files from the Recycle Bin

37 Which Windows service is essential for System Restore and the creation of restore points?

A. Print Spooler
B. Volume Shadow Copy Service (VSS)
C. Remote Desktop Service
D. Windows Update

38 If a user restores their PC to a restore point created three days ago, what will happen to a Word document they created yesterday?

A. It will be encrypted
B. It will be permanently deleted
C. It will remain entirely unaffected
D. It will be moved to the Recycle Bin

39 When is it most highly recommended to manually create a System Restore point?

A. Every time you open a web browser
B. Before formatting a secondary hard drive
C. Before installing a new, unverified driver or software application
D. Right after emptying the Recycle Bin

40 How can a user access the System Restore utility if Windows fails to boot into the normal desktop?

A. By booting into the Windows Recovery Environment (WinRE) or Safe Mode
B. By replacing the CMOS battery
C. Through the system BIOS/UEFI settings
D. Through the Device Manager

41 Which feature is a narrower alternative to System Restore if a user only wants to revert a recently updated hardware driver?

A. Chkdsk
B. Roll Back Driver
C. System File Checker (SFC)
D. Disk Cleanup

42 Which system performance tool in Windows provides real-time information about CPU, memory, disk, and network usage?

A. Task Manager
B. Registry Editor
C. Event Viewer
D. Disk Defragmenter

43 What is the purpose of the Windows 'Disk Defragmenter' utility?

A. To delete temporary files and free up space
B. To reorganize fragmented data on a magnetic hard drive so files are stored contiguously
C. To scan the hard drive for physical bad sectors
D. To encrypt the hard drive for security

44 Why should Disk Defragmentation NOT be routinely run on a Solid State Drive (SSD)?

A. SSDs do not have a file system
B. Defragmenting an SSD will format the drive
C. Defragmenting an SSD degrades its lifespan by adding unnecessary write cycles without performance benefits
D. SSDs cannot store fragmented files

45 A user's computer is running out of storage space on the drive. Which built-in Windows utility is specifically designed to safely delete temporary files, cache, and old Windows update files?

A. Chkdsk
B. System Information
C. Format
D. Disk Cleanup

46 If a computer is crashing randomly and the technician suspects a failing hard drive, which command-line utility should be run to scan for and repair file system errors and bad sectors?

A. diskpart
B. chkdsk /r
C. ipconfig /flushdns
D. sfc /scannow

47 Which Windows tool should an administrator use to view detailed logs of system errors, warnings, and application crashes?

A. Resource Monitor
B. Control Panel
C. Device Manager
D. Event Viewer

48 Which tool provides a more detailed, granular view of hardware resource consumption by individual processes than Task Manager?

A. Performance Monitor
B. Services.msc
C. Resource Monitor
D. System Information

49 A user wants to monitor custom system metrics over a long period to establish a baseline for PC performance. Which tool is most appropriate?

A. Performance Monitor (PerfMon)
B. Task Manager
C. Disk Management
D. System Configuration (MSConfig)

50 When troubleshooting a Windows startup issue, which utility is commonly used to disable third-party startup programs and services?

A. Event Viewer
B. Diskpart
C. Command Prompt
D. System Configuration (MSConfig) / Task Manager