The A+ Certification & PC Repair Handbook (Charles River Media Networking/Security)

Bonus A+ Certification Practice Questions!

The following A+ Certification Practice Questions are in place to get you ready for Part II of the book. It is likely that you have not seen this material yet. If you can correctly answer the following questions, you have a very good chance of passing the current A+ exams. Good luck.

1.

System Monitor in Windows 9x can be used to monitor which information? (Choose Three)

  1. RAID configurations

  2. Virtual memory

  3. Network client resources (on local computer)

  4. Network server memory (on local computer)

  5. Differential backup scenarios

  6. Windows NT audit trails

2.

The Dr. Watson utility offers two ways to view information that it has logged. What are they?

  1. Diagnostic View and Report View

  2. Standard View and Advanced View

  3. Standard View and Graphics View

  4. Text View and GUI View

3.

Which devices can be shared on a network using Windows 98? (Choose Three)

  1. Monitor

  2. Printer

  3. Modem

  4. CD-ROM

  5. Mouse

  6. Keyboard

4.

Which protocols can be used to share printers in Windows 9x? (Choose Three)

  1. NetBEUI

  2. TCP/IP

  3. IPX/SPX

  4. NetBIOS

  5. TCP/IPRINT

  6. PTPTPC

5.

Which TCP/IP utility command would you use from a Windows NT command prompt to see your workstation’s IP address, subnet mask, and default gateway?

  1. IPCONFIG

  2. WINIPCFG

  3. PING

  4. TRACERT

6.

Which TCP/IP utility command would you use from a Windows NT command prompt to test a connection that includes several computers and routers between you and a destination computer?

  1. NETSTAT

  2. WINIPCFG

  3. PING

  4. TRACERT

7.

What does Dr. Watson do?

  1. Provides access to “the Blue Screen of Death”

  2. Takes a picture or “snapshot” of a system during an error state or fault

  3. Automatically resets the Event Log files when run from a command prompt

  4. Does a full system and registry scan for spyware

8.

Where in Windows NT would you go to join a workgroup or a domain?

  1. Control Panel > System > Network > Change

  2. Right click on Network Neighborhood > Select Properties > Under the Identification tab select Change...

  3. Start > Run > Command > Join

  4. Right click on My Computer > Properties > Advanced > Environment

9.

What protocol is used to communicate with Macintosh systems?

  1. TCP/IP

  2. AppleTalk

  3. IPX/SPX

  4. SMTP

  5. None of the above

10.

Which of the following are built-in power schemes available from the drop-down menu in the Power Options Properties/Power Schemes window in Windows 2000? (Choose Six)

  1. Home/Office Desk

  2. Portable/Laptop

  3. Presentation

  4. Always On

  5. Minimal Power Management

  6. Max Battery

  7. Always Off

  8. Car/Air port

11.

An unattended installation of Windows XP requires which kind of file?

  1. Question

  2. INI

  3. UDF

  4. Answer

12.

Which kind of file do you use to override specific settings created for an unattended installation?

  1. Question

  2. INI

  3. UDF

  4. Answer

13.

A hardware abstraction layer (HAL) provides secured, restrictive access to which of the following? (Choose Two)

  1. The registry

  2. Software

  3. IRQ

  4. I/O addresses

14.

When upgrading to Windows Me, you are prompted to save your system files. Should you not choose to save these files, you will be unable to:

  1. Revert back to your previous operating system once Windows Me is installed.

  2. Continue the upgrade installation.

  3. Use programs associated with the older operating system you are installing over.

  4. Use REGEDIT to update your registry once Windows Me has been installed.

15.

Which of the following operating systems are considered a part of the Windows 9x family? (Choose Two)

  1. Windows 98SE

  2. Windows CE

  3. Windows XP

  4. Windows Me

16.

What component of a dot matrix printer strikes a ribbon and leaves a character, number, or symbol on the paper?

  1. A print hammer

  2. A toner impaction device

  3. A pin

  4. A ribbon presser

17.

You have collected several used laser printer toner cartridges. What is a standard procedure for disposal of such items?

  1. Place them in the dumpster out back.

  2. Send them back to the manufacturer.

  3. Do not dispose of them. Shake the cartridges to free up loose toner. Toner is very expensive.

  4. Empty toner into a half-used cartridge. Place the empty toner cartridge into a recycle bin.

18.

How many pins does a dot matrix print head typically have?

  1. 9 or 24

  2. 27 or 16

  3. 14 or 7

  4. 1 or 4

19.

What are the stages of the laser printing process collectively known as?

  1. Electric Photo Magnetic Process

  2. Electronic Laser Photographic Process

  3. Electro Photographic Process

  4. ELO Imaging Process

20.

Which of the following are considered to be valid parallel port standards? (Choose Three)

  1. Bi-directional

  2. ECP

  3. Encapsulated Postscript

  4. Reverse DNS lookup

  5. EPP

  6. Serial

21.

At what stage of the laser printing process is an image melted onto the paper?

  1. Writing

  2. Developing

  3. Conditioning

  4. Fusing

22.

When working on the inside of a laser printer, what should you never touch based on its extremely high temperatures?

  1. A toner cartridge

  2. The print head

  3. The fuser

  4. The power supply

23.

What is the minimum category cable type that can be used to support 100BaseTX?

  1. Category6

  2. Category43

  3. Category4

  4. Category5

24.

What technological communication method is most popular with PDAs today?

  1. USB

  2. 10BaseT

  3. The fourth OSI layer

  4. Infrared technology

25.

What types of connectors are used with coaxial cable? (Choose Two)

  1. BNC

  2. RJ-45

  3. RJ-11

  4. BNC T

26.

Name three characteristics of a peer-to-peer network. (Choose Three)

  1. Password protected shares.

  2. 10 or fewer workstations.

  3. Individual workstations can act as both client and server.

  4. A user must authenticate with a security accounts manager database.

27.

What device would you use to extend the length of your 10base2 bus segment?

  1. A gateway

  2. A bridge

  3. A hub

  4. A repeater

28.

A star typology typically uses which type of cable to connect workstations?

  1. Token Ring cable

  2. FDDI cable

  3. Twisted pair

  4. Fiber optic

29.

A 10Base2 would be implemented in which type of network typology?

  1. Ring

  2. Bus

  3. Star

  4. FDDI

30.

What type of network would be implemented if users must be authenticated before they could access resources?

  1. Peer-to-peer

  2. Stand alone

  3. Server based

  4. Share level permission

31.

Which of the following is usually posted in a hazardous area?

  1. ESD wrist strap

  2. APW Hose

  3. Uninterruptible Power Supply

  4. Halon gas warning

  5. MSDS

32.

What is a common name used to describe a single device that combines printing, scanning, copying, and faxing capabilities?

  1. PSCAF (Printing, Scan, Copy, and Fax)

  2. MFD (Multifunction Device)

  3. Hub

  4. Sublimation Device

  5. None of the above

33.

What is WEP?

  1. A wireless transceiver that transmits and receives RF signals.

  2. WEP is a standard for Windows Enterprise Programming.

  3. Wireless security protocol specified under the IEEE 802.11b.2.

  4. Windows Standard for Encapsulated Post Script.

  5. None of the above.

34.

Which of the following is a non-routable, small, efficient, Transport layer protocol meant for use in small networks with 1–200 workstations?

  1. NetBEUI

  2. TCP/IP

  3. IPX/SPX

  4. LDAP

  5. WEP

  6. All of the above

35.

What does a DNS server do?

  1. Allows Web pages to be formatted with graphics and symbols other than plain text

  2. Converts fully qualified domain names to IP addresses

  3. Offers developers and designers more flexibility in creating Web pages through the use of call tags

  4. Connects different network typologies together, such as Token Ring and Ethernet

  5. None of the above

Answers

1.

B, C, and D—Chapter 24, “Utilities and Settings”

2.

B—Chapter 24, “Utilities and Settings”

3.

B, C, and D—Chapter 24, “Printers”

4.

A, B, and C—Chapter 24, “Windows 9x Networking”

5.

A—Chapter 25, “Utilities and Settings”

6.

D—Chapter 25, “Utilities and Settings”

7.

B—Chapter 25, “Diagnosing and Troubleshooting Test Tips”

8.

B—Chapter 25, “Diagnosing and Troubleshooting Test Tips”

9.

B—Chapter 26, “Diagnosing and Troubleshooting Test Tips”

10.

A, B, C, D, E, and F —Chapter 26, “Windows 2000 Tools and Utilities”

11.

D—Chapter 28, “Windows XP Installation Process”

12.

C—Chapter 28, “Windows XP Installation Process”

13.

C and D—Chapter 28, “Windows XP Start-up Process”

14.

A—Chapter 27, “Windows Me Installation Process”

15.

A and D—Chapter 27, “Windows Me Introduction”

16.

C—Chapter 19, “Dot Matrix and Ink-jet Printers”

17.

B—Chapter 19, “Laser Printers”

18.

A—Chapter 19, “Dot Matrix and Inkjet Printers”

19.

C—Chapter 19, “Laser Printers”

20.

A, B, and E—Chapter 19, “Parallel Port Standards”

21.

D—Chapter 19, “Laser Printers”

22.

C—Chapter 19, “Laser Printers”

23.

D—Chapter 21, “Networking Connectors and Cables”

24.

D—Chapter 21, “Wireless Connectivity”

25.

A and D—Chapter 21, “Networking Connectors and Cables”

26.

A, B, and C—Chapter 22, “Network Categories”

27.

D—Chapter 22, “Network Topology”

28.

C—Chapter 22, “Network Topology”

29.

B—Chapter 22, “Network Topology”

30.

C—Chapter 22, “Network Categories”

31.

E—Chapter 15, “Preventive Maintenance and Safety”

32.

B—Chapter 19, “Laser Printers”

33.

C—Chapter 21, “Wireless Connectivity”

34.

A—Chapter 22, “Protocols”

35.

B—Chapter 22, “The Internet and Viruses”

Категории