Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol used with WPA wireless encryption that was broken by hackers.






2. A screen device for video output. Also called a monitor.






3. A technology for transferring serial data at high speeds. Also known as low-voltage differential signaling (LVDS).






4. Aka Post Office Protocol.






5. This attack occurs when a massive number (up to hundreds of thousands) of computers send DoS attacks to a server - making it unavailable.






6. The act of electronically upgrading BIOS.






7. Aka Extended Video Graphics Array.






8. Aka network address translation.






9. The delivery of electricity (as from a wall outlet) in which the flow of electrons reverses periodically and has alternating positive and negative values.






10. Aka asynchronous transfer mode.






11. The redirection of incoming traffic to the requesting internal hosts that initiated the communication with an external host.






12. On a Microsoft Windows network - a resource - such as a file folder or printer - that is available on the network.






13. This occurs when someone collects personal information belonging to another person and uses that information to fraudulently make purchases - open new credit accounts - and even obtain new driver's licenses and other forms of identification in the vi






14. An identifier assigned to a process when it starts.






15. Things used for authentication - such as something you know - something you have - or something you are. Authentication involves one or more of these factors and can - therefore - be one-factor - two-factor - or three-factor authentication.






16. A process applied to digitally signed code to unencrypt the signature data and use the information to verify the program code was not modified since the signature was added.






17. Aka ATA Packet Interface.






18. A set of wires used by data traveling into and out of a processor.






19. Aka logical block address.






20. A WAN connection that uses an analog modem rather than a network card and uses standard phone cables rather than network cables.






21. Aka solid-state storage.






22. Aka serial ATA.






23. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.






24. The hardware address of a network device - also called the Ethernet address (on Ethernet devices) or NIC address.






25. Aka thread.






26. A CPU power-saving mode that allows a CPU to reduce its speed without losing its place so it does not stop working altogether. SMM also allows the CPU to trigger power saving in other components.






27. In a CPU - special memory that resides outside the CPU's core and is used to temporarily store instructions and data in order to increase the processing speed. Also called Level 2 (L2) cache and Level 3 (L3) cache - depending on the design of the CPU






28. Aka Fast Ethernet.






29. An internal bus in a CPU that connects it to memory and video.






30. A type of solid-state storage that is commonly used in a variety of devices - such as digital cameras - which often use CompactFlash.






31. Aka double-data rate (DDR) SDRAM.






32. A plug designed for testing a specific port type (e.g. - serial - parallel - or USB). The plug does not connect to a cable but reroutes the sending pins to the receiving pins. Using special software on the computer - a loopback test is performed in w






33. A device installed at the end of a SCSI chain to absorb signals so they do not bounce back along the cable.






34. A key on a laptop that is pressed along with the FN key to change display modes so the output will be only to the laptop's display - only to an external display - or simultaneously to both displays. The DISPLAY MODE key is normally a function key - s






35. The third version of the IEEE 1394 standard; it is a departure from the old standards in that it uses Category 5e twisted pair cable with RJ-45 connectors - combining Ethernet and FireWire.






36. Two or more disks working together in one of the several RAID schemes.






37. The fine copper lines that are the electronic circuits through which power - data - and control signals travel on a circuit board.






38. Aka microcode.






39. A word used to describe memory that cannot work without a steady supply of power.






40. A VESA standard for graphics adapters with a maximum graphics resolution of 1024






41. In Windows - an Advanced Option that is only available in Windows Servers in the role of domain controllers - although it appears on the menu in non-domain controllers.






42. The read-only DVD discs sold at retail stores - containing video or software and having a maximum capacity of 15.9 GB of data. This term also applies to the drives that can only read DVDs.






43. A set of behaviors including active listening and active speaking that shows you are fully engaged in the conversation and encourages the other person to also communicate in a positive manner.






44. Aka lithium-ion (Li-ion) battery.






45. The style of partition on a basic disk - which includes primary and extended.






46. Aka nickel-cadmium.






47. A file or folder name that breaks the 8.3 file-naming convention used in the FAT file system. This term continues to be used on newer file systems.






48. A connector used to attach coaxial cables to computers and network equipment. Origin of the term may be "Bayonet-Neill-Concelman" or "British Naval Connector."






49. A server running the Dynamic Host Configuration Protocol (DHCP) service. This server allocates IP addresses to DHCP client computers.






50. A 20- or 24- pin connector that supplies power from a PC's power supply to the motherboard.