CompTIA A+ Practical Application 220-702, Exam 1

Missed certblaster questions

30 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
Most Laser print cartridges contain several components. Which choice is not part of the replacement cartridge?

Primary corona ,Drum,Toner, transfer corona scraper blade
Transfer corona
Explanation:
Most replacement laser cartridges contain The Primary corona, the Drum, Toner, and scraper blade. The transfer corona is a printer component.
Which component in a laser printer is responsible for the transfer of toner from the drum to the paper?
Transfer corona
Explanation:
The Transfer corona is charged at around +600 volts DC. The image on the drum is toner charged at less than -600 Volts DC. The electrical difference draws the toner from the drum to the paper. A light print image that is not due to low toner could be attributed to a faulty transfer corona.
How is the drum erased during the cleaning phase of the laser print cycle?
LED light
Explanation:
A set of LED's totally expose the drum, thus erasing the image on it.
Which backup method is quickest and requires the least amount of backup storage space?
Incremental
Explanation:
Incremental backups only back up the files that have changed since last backup. Incremental backup is the quickest backup method.
Which of the following can provide some protection for your network from outside invaders? (Choose three)
Firewalls
- Proxy Servers
- Packet-Filtering Routers
Explanation:
A firewall can greatly improve network security and reduce risks to hosts \non the subnet by filtering inherently insecure services. As a result, the subnet network environment is exposed to fewer risks, since only selected protocols will be able to pass through the firewall. A firewall also provides the ability to control access to site systems. For example, some hosts can be made reachable from outside networks, whereas others can be effectively sealed off from unwanted access. Privacy is of great concern to certain sites, since what would normally be considered innocuous information might actually contain clues that would be useful to an attacker. Using a firewall, some sites wish to block services such as finger and Domain Name Service. If all access to and from the Internet passes through a firewall, the firewall can log accesses and provide valuable statistics about network usage. A firewall, with appropriate alarms that sound when suspicious activity occurs can also provide details on whether the firewall and network are being probed or attacked.
The Windows 2000 ____ feature, which can only be used with NTFS, uses a public key encryption scheme to encrypt files and folders.
EFS
Explanation:
The Windows 2000/XP Encrypted File System incorporates public key encryption to enable users to create private files that can't be read be other users.
What is the main difference between xcopy and xcopy /s entered at the command prompt?
- Xcopy /s copies files and subdirectories
Explanation:
The /S parameter of the Xcopy command forces Xcopy to copy the\nsubdirectories as well.
IP addresses that are assigned to a node each time it connects to the network are called ____ IP addresses.
Dynamic
Explanation:
A DHCP server assigns IP addresses to client computers every time they request it. The computer that participates in a network asks for it's IP address at startup. This is very often used in enterprise networks to reduce the configuration effort.
You have installed a DSL router in your home office to prevent unauthorized access. This Router has its own DHCP server. You reboot your computer and are unable to access the Internet. Your IP address is shown as 192.168.1.1by ipconfig. What is the problem? Choose 2
The router has to be configured to permit Internet access
- The router has overridden the ISP assigned DHCP address
Explanation:
Remember, all access through a router is blocked by default. It can be configured to allow or disallow access by IP addresses and ports.
Choosing the incremental backup type will backup which of the following:
All files with the archive bit turned on
Explanation:
Remember, an incremental backup will only backup those files with the archive bit turned on and when it is done it resets the archive bit. This way the second incremental backup only backs up the files that have changed because these files will have their archive bits back on. For more information go to: http://support.microsoft.com/support/kb/articles/Q136/6/21.asp?LN=EN-US&SD=gn&FR=0&qry=archive%20bit&rnk=1&src=DHCS_MSPSS_gn_SRCH&SPR=W95
Which protocol relies on MAC addresses as part of it's network address ?
IPX/SPX
Explanation:
In IPX/SPX the network layer embeds the MAC address in the network-layer address.
What part of a dot matrix printer can you burn your finger on?
Print head
Explanation:
The print head gets extremely hot from the firing of the pins.
You have just installed a 128 MB 168 pin DIMM on an ATX motherboard. The board already has 128 MB installed in 72 pin SIMM slots. When your system boots it only recognizes 128 MB of the RAM in installed. Which of the following are possible causes? (Choose three)
BIOS is not set to Read both types of memory.
- You need to update or upgrade your BIOS.
- The motherboard only supports one type of memory at a time.
Explanation:
The BIOS might need configuration in order to use both memory types.\n If we are unlucky the BIOS will only support one memory type at a time.
Which keystroke will close an open application in Windows
Alt+F4
Explanation:
Closes active window. ALT+F4 at the Desktop will bring up the Shutdown menu.
A user wants to delete some selected files but does not want them to go to the Recycle Bin. How can this be accomplished? (Choose two)
Hold down the key then press delete
- Right click on the Recycle Bin icon, select properties, select Do not move files to the recycle bin
Explanation:
Once files have been deleted in this way, they are permanently removed .