CompTIA A+ 802 Practice Questions
B. Remote wipe Remote wipe is a security feature that allows a network administrator or device owner to send a command to a computing device and delete data.
A company would like to increase the security on their company's smart phones. Which of the following should be configured to ensure information stored on a smart phone can be removed if it is lost or stolen? A. Username and passwords B. Remote wipe C. Strong password complexity D. Failed login attempts restrictions
C. BSOD
A customer reports that their computer crashes during usage. Which of the following is a common acronym used to describe this condition? A. RAID B. VPN C. BSOD D. LAN
C. Control Panel > Add/Remove programs > Add/Remove Windows Components > select Accessories and Utilities > uncheck Games
A customer wants games from their child's Windows XP computer removed. Which of the following is the BEST way to accomplish this task? A. Control Panel > Game Controller > Select controller > click Remove B. Control Panel > Administrative Tools > Computer Management C. Control Panel > Add/Remove programs > Add/Remove Windows Components > select Accessories and Utilities > uncheck Games D. Programs menu > Right click Games > select Properties > select the Hidden check box
C. Proxy settings
A technician just finished removing spyware from a computer and now they are not able to connect to any websites. Which of the following is the MOST likely cause? A. Automatic configuration B. Network card driver is damaged C. Proxy settings D. The Internet is not functioning
D. Ask the user about any previous changes.
A user calls about their workstation not powering on in the morning. According to the troubleshooting theory, which of the following steps should the technician perform NEXT? A. Document the resolution to problem. B. Purchase the appropriate replacement part. C. Verify that the workstation is able to boot up. D. Ask the user about any previous changes.
C. setup a strong passcode.
A user wishes to secure their tablet from unauthorized access. The BEST option is to:? A. enable RFID authentication. B. establish a remote wipe policy. C. setup a strong passcode. D. establish strong email passwords.
B. malware.
Software threats to a computer are commonly referred to as: A. device drivers. B. malware. C. biometrics. D. SOHO.
A. Facial recognition & e) Fingerprint
Which of the following is a common type of biometric authentication on a laptop? (Select TWO) A. Facial recognition B. Blood sample C. Retinal D. Voice recognition E. Fingerprint
C. Switch
Which of the following network devices allows for full-duplex communication? A. Hub B. Bridge C. Switch D. Firewall
D. Scheduled Backups
Which of the following should be performed regularly in order to help restore a computer's data after a hard drive failure? A. Windows Memory Diagnostics B. Factory Restore C. System Restore D. Scheduled Backups
B. Guest
Which of the following user accounts has the LEAST access privileges? A. Standard B. Guest C. Administrator D. Power
B. A tablet is lightweight.
Which of the following is MOST likely an advantage that a tablet has over a laptop PC? A. A tablet is easily upgraded. B. A tablet is lightweight. C. A tablet has a larger screen. D. A tablet can natively run most software.
C. Hub to Hub (without uplink port) D. PC NIC to PIC NIC Normal patch cables won't work when connecting two PCs directly by their NICs. You can also use a crossover cable to connect two hubs that aren't using an uplink port.
What kind of network connection can you make with a crossover cable? (select two) A. PC NIC to a hub B. Hub to a modem. C. Hub to Hub (without uplink port) D. PC NIC to PIC NIC
D. Contact your local disposal authority for guidance. All laptop batteries should be considered hazardous material. Contact your local waste disposal authority.
What should you do with a worn-out Li-Ion battery? A. Recharge it B. Throw it away C. Return it to the manufacturer for a trade in. D. Contact your local disposal authority for guidance.
C. App Store An app store (application store) is an online portal through which software programs are made available for procurement and download. All major mobile operating system vendors, including Apple, Google, BlackBerry and Microsoft, run their own app stores, which gives them control over the software available on their respective platforms.
Which of the following application stores are compatible with iOS? A. Android Market B. Windows Marketplace C. App Store D. Amazon Appstore
B. /C - /C Defragment all local volumes on the computer. - /A Display a fragmentation analysis report for the specified volume without defragmenting it. - /H Run the operation at normal priority instead of the default low priority. Specify this option if a computer is not otherwise in use. - /E Defragment all local volumes on the computer except those specified.
Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS? A. /A B. /C C. /H D. /E
D. NIC PXE (Pre eXecution Environment), affectionately pronounced Pixie (as in fairy dust), is a method of having an end computer (client) boot using only its network card. This method of booting was created way back in 1999 and as long as the computer in question is connected to the network (and supports this standard), it is possible to circumvent the normal boot procedure (I.E. Power on -> BIOS -> HD/CD).
Which of the following does PXE use? A. USB B. DVD-ROM C. CD-ROM D. NIC
