A+ Certification Practice Set 1
Terms in this set (25)
The main functionality of the Basic Input/Output System (BIOS) is to perform the initial hardware checks after the computer is powered on and start up the operating system.
Which of the following resources can be used by an Operating System (OS) to communicate with hardware? (Select 2 answers)
Flashing the BIOS
In modern PCs, the procedure of replacing BIOS contents is sometimes referred to as:
Repair damaged BIOS
Provide Support for new types of attached hardware
Fix known programming errors discovered in the current BIOS version
BIOS updates are performed in order to: (Select all that apply)
Which of the following terms refer to BIOS types that can be updated without removing the BIOS chip from a motherboard? (Select 2 answers)
Which Microsoft Windows OS utility can be used to view basic information about computer's BIOS?
Power failure during BIOS upgrade can be the cause of irreversible damage to the computer system.
After a normal system shutdown, when the computer is turned off, contents of the memory used to store BIOS settings are:
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?
After replacing a modular hardware component inside computer case, the updated information about specific parameters of the new device can be stored in: (Select 2 answers)
After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred to as:
Enabled in advanced BIOS settings menu
In order to work, an integrated component such as Network Interface Card (NIC) on a newly assembled computer system may need to be first:
Getting into the CMOS setup utility and enabling the virtualization technology setting
After launching Windows Virtual PC application technician receives error message stating that the Hardware-Assisted Virtualization (HAV) feature is not enabled on the computer. Which of the following steps might help in fixing this problem?
The key set by the motherboard manufacturer for accessing CMOS setup utility during boot
The CMOS setup utility can be accessed by pressing:
Using a jumper that can be found on the motherboard
Reseating the CMOS battery on the motherboard
Choosing the default configuration option in the CMOS setup utility
CMOS settings can be set to factory defaults by: (Select all that apply)
Which of the following answers refers to a firmware interface designed as a replacement for BIOS?
User password required to proceed when the computer is powered on
Password-restricted access to the BIOS setup utility (Supervisor password)
What kind of user permission restrictions can be set in BIOS? (Select all that apply)
Aborted BIOS update could render the computer unusable
Which of the following statements is true?
Which type of password provides the highest level of permissions in BIOS?
Security feature used for locating stolen desktops, laptops, or tablets
What is LoJack?
Trusted Platform Module (TPM)
Which of the following terms refers to a technology that allows for storing passwords, certificates, or encryption keys in a hardware chip?
Enabling the TPM security feature in CMOS setup menu
While trying to enable the entire drive encryption feature in Windows technician receives the following error message: "A compatible Trusted Platform Module (TPM) Security Device must be present on this computer, but a TPM was not found". Knowing that the system has a TPM chip installed, which of the following steps might help in solving this problem?
Which of the answers listed below describe(s) the features of UEFI? (Select all that apply)
A computer supporting LoJack technology has two main components installed: an Application Agent residing in the operating system which sends tracking signals to the monitoring center allowing the law enforcement to locate and recover stolen device, and Persistence Module which restores the Application Agent and allows it to survive operating system re-installation or hard drive format. The highest level of security offered by LoJack can be achieved when Persistence Module resides in:
A UEFI functionality designed to prevent the loading of malware and unauthorized OSs during system start-up is known as:
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
Practice test 1
Comptia A+ Certification Practice Test 1 (Exam 220-901)
THIS SET IS OFTEN IN FOLDERS WITH...
A+ Certification Practice Set 2
CompTIA A+ Certification Practice Test 3 (Exam 220-901)
A+ 801 Certification Study