Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A virtual tunnel created between two endpoints over an untrusted network. The tunnel is created by encapsulating the packets within special packets for the tunnel. Other security methods are also usually applied to a VPN - such as encrypting the data






2. The classic PC serial port that complies with the Recommended Standard-232 (RS-232) in its circuitry - cabling - and connector design - and transfers data one bit at a time.






3. Aka thumb drive.






4. The bus within a CPU that connects the CPU to external components.






5. A data encryption technology used for securing data transmitted over the Internet. TLS succeeded SSL.






6. Also called 1000Base-T - this networking standard supports speeds up to 1 Gbps.






7. In networking - this is a set of rules for using network hardware and software. In most discussions about networks - this term is assigned to certain network software components.






8. Aka distributed denial of service attack.






9. A connector that is slightly larger than an RJ-11 connector and contains eight wires. RJ-45 connectors most commonly attach twisted-pair cables to Ethernet network cards.






10. A set of technologies that allow voice transmission over an IP network






11. The type of connector used in the ExpressCard interface.






12. A square snap coupling for fiber-optic cable - about 2.5 mm wide - used for cable-to-cable connections or to connect cables to network devices. It latches with a push-pull action similar to audio and video jacks.






13. A type of switched network used by phone companies.






14. A set of rules and practices describing how an organization protects and manages sensitive information. A security policy applies to all employees.






15. Aka floating-point unit.






16. An early technology for increasing the performance of DRAM.






17. A type of thermal printer in which a heated print head burns dots into the surface of heat-sensitive paper.






18. A drive that is mapped to an empty folder on an NTFS volume and is assigned a drive path rather than drive letters.






19. A file or folder name that breaks the 8.3 file-naming convention used in the FAT file system. This term continues to be used on newer file systems.






20. One or more lights (usually LEDs) on a device that indicate the device's operational status through the color of the light - by blinking or remaining steady or both.






21. In a CPU - the speed at which it can potentially execute instructions - measured in millions of cycles per second






22. The delivery of electricity (as from a wall outlet) in which the flow of electrons reverses periodically and has alternating positive and negative values.






23. A server containing source files for installing software onto client computers. The shared folder containing these files is a software distribution point.






24. The use of deceit and trickery to persuade someone to hand over money or valuables.






25. A motherboard form factor introduced in 2003 by Intel as the successor to ATX.






26. A WAN connection that uses existing copper telephone wire for the communication circuit. To accomplish this - a DSL modem splits the existing phone line into two bands; voice transmission uses the frequencies below 4000 Hz - whereas data transmission






27. The protocol for connecting optical drives and tape drives to an ATA channel.






28. A level of service offered by the telephone companies over a T-carrier circuit that provides full-duplex transmissions at 1.544 Mbps - carrying digital voice - data - or video signals.






29. Aka lit pixel.






30. A generic reference to a PC's serial communications port - in which the x represents the port number.






31. A way to monitor security-related events.






32. A fiber-optic connector that resembles an RJ-45 network connector and is less expensive and easier to work with than ST or SC connectors.






33. A more advanced and more expensive alternative to a port replicator. In addition to the ports normally found on a port replicator - a docking station may include full-size expansion slots and drives.






34. A very old expansion bus standard - seen in the early IBM PC.






35. A specialized type of scanner that reads bar codes - which are patterns of bars of varying widths printed on labels or directly on items. The bar pattern is converted into a numeric code that is transmitted to a computer as data.






36. The process of informing the software manufacturer who the official owner or user of the product is - and providing contact information such as name - address - company - phone number - e-mail address - and so on - about them. Registration is usually






37. The original version of the IEEE 1394 standard that supports speeds up to 400 Mbps.






38. The medium for a laser printer - which is normally packaged within a toner cartridge.






39. The black box that appears around an image - such as a widescreen video when it is displayed on a screen with a 4:3 aspect ratio.






40. A file used with a scripted unattended installation along with an answer file. The UDF file provides settings that are unique for each computer.






41. Aka Point-to-Point Tunneling Protocol.






42. A wireless network standard that defines speeds of up to 600 Mbps. It is downward-compatible with 802.11a - 802.11b - and 802.11g.






43. A depressed area on an optical disc that is alternated with raised areas to be interpreted as data.






44. On a Microsoft Windows network - a resource - such as a file folder or printer - that is available on the network.






45. The act of writing to two disk drives at the same time - creating identical drives.






46. An icon that represents a link to any object that an icon can represent. Activating a shortcut (by double-clicking it) is a quick way to access an object or to launch a program from the desktop without having to find the actual location of the object






47. A type of display device that includes a touch-sensitive face to accept input from the user.






48. A file attribute set by the OS when a file is created or modified. Backup software often removes this attribute when backing up a file in order to mark it as a backed-up file.






49. Aka permanent virtual circuit.






50. Aka customer premises equipment.