A+ Core 1
A+ Core 2
Network+
Security+
PBQs
100

What is true about an LED display in comparison to other types of monitors?

A. It consumes 50 percent more power than an LCD.

B. It is less efficient.

C. It provides a duller image as compared to an LCD.

D. It consumes 50 percent less power than an LCD.

D. It consumes 50 percent less power than an LCD.

An LED display is more efficient and consumes as much as 50 percent less power than an LCD. This makes it a more power-efficient option especially for mobile devices.

100

What is the Android equivalent to the term ’Jailbreaking’ in iOS?

A. Sideloading

B. Developer Mode

C. Rooting

D. Bootleg Application

C. Rooting

Rooting, like jailbreaking in iOS, refers to gaining top-level (root) access to the operating system’s files. This allows a user unrestricted access to the OS and its components, which could potentially risk the security of the device.

100

Which protocols provide connectionless delivery service at the Transport layer of the Open Systems Interconnection (OSI) model?

A. TCP

B. HTTP

C. UDP

D. ARP

C. UDP

It provides connectionless delivery at the Transport layer by sending data without establishing a connection first.

100

You have been directed to place fire extinguishers in the server room. Which control type is being used?

A. Compensating control

B. Detective control

C. Deterrent control

D. Corrective control

A. Compensating control

compensating controls are alternative measures used when the primary control is not feasible or practical. A fire extinguisher is an alternative measure when a comprehensive fire suppression system cannot be installed.

200

An old laptop’s screen has become very dim. However, when you attach an external display to the laptop, it functions correctly. Which of the following should you check first?

A. Microphone

B. Wifi antenna

C. Digitizer

D. Inverter

D. Inverter

An inverter powers the screen’s backlight, illuminating the screen. An LED doesn’t need an inverter. It was part of a CCFL (Cold Cathode Fluorescent Light) backlight-type screen.

200

What does Windows do if there are open files when you select the reboot option?

A. It forces a reboot without warning

B. It shuts down the app

C. It displays a warning

D. It automatically saves the open files

C. It displays a warning

Windows displays a warning if there are open files when you select the reboot option. This allows the user to either close the files, which is recommended, or to force a reboot which could lead to data loss or app corruption.

200

What is the purpose of traffic shaping in networking?

A. To increase the speed of the internet connection

B. To regulate data transfer to fit the speed of the connection

C. To add extra protective layer to the network traffic

D. To make sure the network traffic is encrypted

B. To regulate data transfer to fit the speed of the connection

Traffic shaping is used to control the volume of outgoing traffic on a network connection to meet the specified speed limit. In this context, it slows down the bit rate to 800 Mbps to avoid overage costs over 800 Mbps, not to increase the speed of the internet or to add an extra layer of protection or to encrypt the network traffic.

200

What is one way to thwart keyloggers as discussed in the text?

A. Using complex passwords

B. Changing passwords regularly

C. Using antivirus software

D. Using two-factor authentication (2FA)

D. Using two-factor authentication (2FA)

Two-factor authentication (2FA) requires two types of identification before allowing access. In this case, even if the keylogger captures a password, it won’t have access to the other form of identification required like the text message sent to the phone. This makes 2FA an effective way of thwarting keyloggers.

300

Which of the following is NOT a reason to upgrade from a magnetic disk (HDD) to an SSD?

A. SSDs are faster

B. SSDs use more power

C. SSDs are quieter

D. SSDs are available in M.2 design

B. SSDs use more power

SSDs use less power compared to traditional magnetic disk HDDs, not more. This makes them a more energy-efficient choice.

300

Which malware type is known for tricking users into downloading and installing security cleanup software while urging users to give additional permissions to it?

A. Techware

B. Ransomware

C. Scareware

D. Spoofware

C. Scareware

Scareware is a type of malware that tricks users into believing their computer has a virus and prompts them to download or purchase fake antivirus software, which is often a Trojan. The user is tricked into giving additional permissions to this software, allowing it to perform malicious activities.

300

A network card is not functioning properly. The card was purchased three years ago. You discover that the firmware is outdated and requires an upgrade. You call the vendor, but he refuses to provide an update. What is the reason for the refusal?

A. The date for End-Of-Life Support (EOLS) has been reached.

B. The date for End-Of-Support (EOS) has been reached.

C. The date for End-Of-Life (EOL) has been reached.

D. The vendor no longer sells the network card and doesn’t have any updated firmware for it.

B. The date for End-Of-Support (EOS) has been reached.

It refers to the point at which a vendor ceases to provide updates, including firmware, for a product. Reaching EOS means the company no longer maintains support, regardless of issues like outdated firmware.

300

An organization recently adopted a mobile strategy where employees are provided with company-owned devices. These devices are allowed for personal use, but the organization retains the ability to manage and monitor them. Which deployment model is this organization using?

A. Bring Your Own Device (BYOD)

B. Choose Your Own Device (CYOD)

C. Corporate-owned, Personally Enabled (COPE)

D. Public Device Deployment (PDD)

C. Corporate-owned, Personally Enabled (COPE)

In the COPE model, the organization provides the devices, allowing employees to use them for work and personal purposes while retaining control over management and monitoring.

400

Which remote printing doesn’t need device drivers, font and image compatibility, and print queue issues associated with traditional directly connected or LAN-based printing?

A. WAN printer

B. Bluetooth-enabled printer

C. Cloud printer

D. Fax printer

C. Cloud printer

A cloud printer can print from any device without installing drivers, font, and image settings, and does not have print queue problems.

400

A client experienced a DDoS attack from a network of computers and other systems within the city. Which DDoS purveyor is used in this attack?

A. Botnet

B. On-path

C. Zero-day

D. Spoofing

A. Botnet

A botnet is a network of compromised computers and devices (often referred to as “bots” or “zombies”) that are controlled by an attacker. These devices can be spread across different locations and are used collectively to launch DDoS attacks by overwhelming the target with traffic from multiple sources.

400

What is a soft phone in the context of Voice over IP (VoIP)?

A. A physical, networked device that lets you make and receive calls

B. A piece of software that mimics a physical phone

C. A wireless VoIP phone that can connect to the network wirelessly

D. A phone that can switch between VoIP and plain old telephone service

B. A piece of software that mimics a physical phone

A soft phone is a software solution that emulates the functionality of a physical phone, providing the ability to make and receive calls. It is built for maximum flexibility and is used by organizations to accommodate changing work dynamics such as remote and on-the-go work.

400

Your firm takes corrective actions in response to compliance alerts. It implements more robust encryption protocols for customer data and revises its access control policies. Its automated platform documents these actions, showing a record of proactive measures taken over time to maintain compliance. Which process is being implemented in this scenario?

A. Due care

B. Due diligence

C. Due controls

D. Cybersecurity framework

A. Due care

Due care refers to the organization’s responsibility to protect its assets, including taking actions like implementing robust encryption and revising access control policies to ensure compliance, as described in the scenario.

500

You are called to check on a networking issue with a server. The server is unreachable, although the cable is firmly inserted into an Ethernet port. Upon inspecting the RJ-45 connector, you observe that the wires are loose because the jacket is not properly inserted into the back end of the RJ-45 connector. Which tool(s) should you use to fix the problem?

A. A crimper and a cable stripper

B. Punch-down tool

C. Loop-back plug

D. Pliers and a cutter

A. A crimper and a cable stripper

A crimper attaches an RJ-45 connector securely to the end of an Ethernet cable. A cable stripper removes the outer jacket of the Ethernet cable, exposing the individual wires.

500

You want to collect the network configuration of 20 workstations and print it to replicate the configuration on other computers. How can you save the network configuration data in the system information tool as a file?

A. Saved as a .nfo file

B. Saved as a .exe file

C. Saved as a .txt file

D. Saved as a .sit file

A. Saved as a .nfo file

This system information file can be opened using the System Information tool in Windows. It provides a detailed overview of the system’s hardware and software configuration, which can be useful for troubleshooting or replicating settings.

500

Which of the following is the correct way to calculate the mean time between failure (MTBF) and the total time it takes to get the device fixed and back online?

A. Calculate the sum of mean time to failure (MTTR) and mean time to be online (MTBO)

B. Calculate the sum of mean time to repair (MTTR) and mean time to delivery (MTTD)

C. Calculate the sum of mean time to failure (MTTF) and mean time to repair (MTTR)

D. Calculate the sum of mean time between failure and repair (MTBFR) and mean time to delivery (MTTD)

C. Calculate the sum of mean time to failure (MTTF) and mean time to repair (MTTR)

MTBF is calculated as the sum of mean time to failure (MTTF), which measures the time devices operate before failure, and mean time to repair (MTTR), which measures the repair duration. This reflects the expected time between the start of one failure and the next.

500

Which significant concern can become challenging when implementing monitoring software for an extensive and complex infrastructure with various resources and huge datasets strewn across multiple campuses?

A. True Positives

B. False Positives

C. False Negatives

D. True Negatives

B. False Positives

False positives can overwhelm the system and staff with alerts that are not real issues, leading to wasted time and potential desensitization to genuine alerts.