SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol used with WPA wireless encryption that was broken by hackers.
interrupt request line (IRQ)
Temporal Key Integrity Protocol (TKIP)
asynchronous transfer mode (ATM)
Control Panel
2. A screen device for video output. Also called a monitor.
RAMBUS Inline Memory Module (RIMM)
display
chrominance
plain-old telephone service (POTS)
3. A technology for transferring serial data at high speeds. Also known as low-voltage differential signaling (LVDS).
CD-R (CD-Record)
low-voltage differential (LVD)
Service Set ID (SSID)
SATA
4. Aka Post Office Protocol.
POP
root key
read/write head
OCR
5. This attack occurs when a massive number (up to hundreds of thousands) of computers send DoS attacks to a server - making it unavailable.
SCSI ID
POTS
distributed denial of service (DDoS) attack
Point-to-Point Tunneling Protocol (PPTP)
6. The act of electronically upgrading BIOS.
MIMO (multiple input/multiple output)
Windows XP Files and Settings Transfer Wizard
flashing
transport layer security (TLS)
7. Aka Extended Video Graphics Array.
EVGA
cleaning
intranet
FAT16
8. Aka network address translation.
case fan
NAT
ZIF
network interface card (NIC)
9. The delivery of electricity (as from a wall outlet) in which the flow of electrons reverses periodically and has alternating positive and negative values.
auditing
alternating current
FAT16
local KVM switch
10. Aka asynchronous transfer mode.
Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)
ATM
social engineering
virtual circuit (VC)
11. The redirection of incoming traffic to the requesting internal hosts that initiated the communication with an external host.
passive matrix display
port triggering
power management
traces
12. On a Microsoft Windows network - a resource - such as a file folder or printer - that is available on the network.
System Configuration Utility
share
peer-to-peer network
ZIF
13. This occurs when someone collects personal information belonging to another person and uses that information to fraudulently make purchases - open new credit accounts - and even obtain new driver's licenses and other forms of identification in the vi
identity theft
thread
Simple Mail Transfer Protocol (SMTP)
PROM
14. An identifier assigned to a process when it starts.
Fast Ethernet
process ID
PCIe (peripheral component interconnect express)
CMOS settings
15. Things used for authentication - such as something you know - something you have - or something you are. Authentication involves one or more of these factors and can - therefore - be one-factor - two-factor - or three-factor authentication.
bridge
local area network (LAN)
authentication factor
MIDI
16. A process applied to digitally signed code to unencrypt the signature data and use the information to verify the program code was not modified since the signature was added.
router
file signature verification
communication network riser (CNR)
volatile
17. Aka ATA Packet Interface.
DVI-D
odd parity
ATAPI
DDR3 SDRAM
18. A set of wires used by data traveling into and out of a processor.
multiplexing
Trojan horse
processor bus
Balanced Technology eXtended
19. Aka logical block address.
LBA
Video Electronics Standards Organization (VESA)
System Monitor
low-voltage differential (LVD)
20. A WAN connection that uses an analog modem rather than a network card and uses standard phone cables rather than network cables.
dial-up
direct memory access (DMA) channel
Internet Protocol (IP)
PGA
21. Aka solid-state storage.
Serial Attached SCSI (SAS)
file signature verification
drive image
solid-state drive (SSD)
22. Aka serial ATA.
SATA
pin grid array (PGA)
ad hoc mode
Ultra DMA (UDMA)
23. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.
Integrated Service Digital Network (ISDN)
Trojan horse
ROM
Y
24. The hardware address of a network device - also called the Ethernet address (on Ethernet devices) or NIC address.
Compact Disc File System (CDFS)
Media Access Control (MAC) address
32-bit
SODIMM
25. Aka thread.
process ID
strong password
full-duplex
thread of execution
26. A CPU power-saving mode that allows a CPU to reduce its speed without losing its place so it does not stop working altogether. SMM also allows the CPU to trigger power saving in other components.
System Management Mode (SMM)
icon
LVD
SVGA
27. In a CPU - special memory that resides outside the CPU's core and is used to temporarily store instructions and data in order to increase the processing speed. Also called Level 2 (L2) cache and Level 3 (L3) cache - depending on the design of the CPU
external cache
system attribute
socket
patch
28. Aka Fast Ethernet.
Y
100Base-T
dynamic storage
Microsoft Windows XP Media Center
29. An internal bus in a CPU that connects it to memory and video.
InterNational Committee on Information Technology Standards (INCITS)
flash BIOS
front side bus (FSB)
terminating resistor
30. A type of solid-state storage that is commonly used in a variety of devices - such as digital cameras - which often use CompactFlash.
memory controller chip (MCC)
flash memory
SLD
attended installation
31. Aka double-data rate (DDR) SDRAM.
enhanced parallel port (EPP) mode
Point-to-Point Tunneling Protocol (PPTP)
DDR
NLX
32. A plug designed for testing a specific port type (e.g. - serial - parallel - or USB). The plug does not connect to a cable but reroutes the sending pins to the receiving pins. Using special software on the computer - a loopback test is performed in w
wireless access point (WAP)
primary partition
loopback plug
PROM
33. A device installed at the end of a SCSI chain to absorb signals so they do not bounce back along the cable.
social engineering
Directory Services Restore Mode
terminating resistor
I/O address
34. A key on a laptop that is pressed along with the FN key to change display modes so the output will be only to the laptop's display - only to an external display - or simultaneously to both displays. The DISPLAY MODE key is normally a function key - s
thermal printer
twisted-pair cable
Display Mode Key
register
35. The third version of the IEEE 1394 standard; it is a departure from the old standards in that it uses Category 5e twisted pair cable with RJ-45 connectors - combining Ethernet and FireWire.
expansion bus
patch
IEEE 1394c-2006
nickel metal hydride (NiMH) batteries
36. Two or more disks working together in one of the several RAID schemes.
RAID array
digital linear tape (DLT)
NAT
Windows Explorer
37. The fine copper lines that are the electronic circuits through which power - data - and control signals travel on a circuit board.
Advanced Technology (AT)
Audit Policy
DVD-RAM
traces
38. Aka microcode.
TRACERT
TV tuner card
sector translation
microprogram
39. A word used to describe memory that cannot work without a steady supply of power.
RAMBUS Inline Memory Module (RIMM)
Type III
drive path
volatile
40. A VESA standard for graphics adapters with a maximum graphics resolution of 1024
worm
point stick
Extended Video Graphics Array (EVGA)
DB-9
41. In Windows - an Advanced Option that is only available in Windows Servers in the role of domain controllers - although it appears on the menu in non-domain controllers.
security policy
InterNational Committee on Information Technology Standards (INCITS)
transferring
Directory Services Restore Mode
42. The read-only DVD discs sold at retail stores - containing video or software and having a maximum capacity of 15.9 GB of data. This term also applies to the drives that can only read DVDs.
DVD-ROM
System File Checker (SFC)
MIMO (multiple input/multiple output)
archive attribute
43. A set of behaviors including active listening and active speaking that shows you are fully engaged in the conversation and encourages the other person to also communicate in a positive manner.
capacity
Return To OS Choices menu
riser card
active communication
44. Aka lithium-ion (Li-ion) battery.
VC
PCIe Mini Card
Li-ion
identity theft
45. The style of partition on a basic disk - which includes primary and extended.
regional settings
partition type
single inline memory module (SIMM)
SMTP
46. Aka nickel-cadmium.
default gateway
NiCD
Last Known Good Configuration
Super Video
47. A file or folder name that breaks the 8.3 file-naming convention used in the FAT file system. This term continues to be used on newer file systems.
clock speed
long filename (LFN)
secure socket layer (SSL)
Integrated Service Digital Network (ISDN)
48. A connector used to attach coaxial cables to computers and network equipment. Origin of the term may be "Bayonet-Neill-Concelman" or "British Naval Connector."
BNC
SCSI
802.11g
monitor
49. A server running the Dynamic Host Configuration Protocol (DHCP) service. This server allocates IP addresses to DHCP client computers.
DHCP Server
dot matrix printer
dial-up modem
solid ink
50. A 20- or 24- pin connector that supplies power from a PC's power supply to the motherboard.
system board
data migration
P1 power connector
EFS