CompTIA A+ Certification Practice Test 1 (Exam 220-901)
CompTIA A+ Certification Practice Test 1 (Exam 220-901)
CompTIA A+ Certification Practice Test 1 (Exam 220-901)
The main functionality of the Basic Input/output System (BIOS) is to perform the
initial hardware checks after the computer is powered on and start up the operating
system.
a) True
b) False
2.Which of the following resources can be used by an Operating System (OS) to
communicate with hardware? (Select 2 answers)
a) Device Manager
b) Secure Shell (SSH)
c) Device drivers
d) System BIOS
e) Command-Line Interface (CLI)
3.In modern PCs, the procedure of replacing BIOS contents is sometimes referred to
as:
a) Hard boot
b) Overclocking
c) Flashing the BIOS
d) Direct memory access (DMA)
4.BIOS updates are performed in order to: (Select all that apply)
a) Repair damaged BIOS
b) Fix physical hardware faults found in replaceable components inside the computer's case
c) Provide support for new types of attached hardware
d) Fix known programming errors discovered in the current BIOS version
5.Which of the following terms refer to BIOS types that can be updated without
removing the BIOS chip from a motherboard? (Select 2 answers)
a) EEPROM
b) ROM
c) Plug and Play (PnP)
d) EPROM
e) Flash Memory
6.Which Microsoft Windows OS utility can be used to view basic information about
computer's BIOS?
a) WINVER.EXE
b) MSINFO32.EXE
c) Control Panel
d) SERVICES.MSC
7.Power failure during BIOS upgrade can be the cause of irreversible damage to the
computer system.
a) True
b) False
8.After a normal system shutdown, when the computer is turned off, contents of the
memory used to store BIOS settings are:
a) Erased
b) Retained
c) Stored in a page file
d) Saved on a hard drive
9.Which of the acronyms listed below refers to a series of basic hardware diagnostic
tests performed by the startup BIOS after the computer is powered on?
a) IDE
b) POTS
c) QoS
d) POST
10.After replacing a modular hardware component inside computer case, the updated
information about specific parameters of the new device can be stored in: (Select 2
answers)
a) System BIOS
b) Flash memory
c) Startup BIOS
d) Secondary storage
e) CMOS RAM
11.After completing the initial diagnostics and assigning system resources, the startup
BIOS program checks for information about secondary storage devices that might
contain the OS. The list of devices and the order in which they should be checked can be
found and arranged in the CMOS setup utility, and this option is commonly referred to
as:
a) Boot record
b) Master Boot Record (MBR)
c) Partition table
d) Boot sequence
12.In order to work, an integrated component such as Network Interface Card (NIC) on
a newly assembled computer system may need to be first:
a) Enabled in Windows Control Panel
b) Updated with the latest driver in Device Manager
c) Checked against the Hardware Compatibility List (HCL)
d) Enabled in the advanced BIOS settings menu
13.After launching Windows Virtual PC application technician receives error message
stating that the Hardware-Assisted Virtualization (HAV) feature is not enabled on the
computer. Which of the following steps might help in fixing this problem?
a) Increasing the amount of physical RAM on the system
b) Re-installation of the Windows Virtual PC application
c) Getting into the CMOS setup utility and enabling the virtualization technology setting
d) Safe mode troubleshooting
14.The CMOS setup utility can be accessed by pressing:
a) Reset button on the front panel of a computer case
b) The key set by the motherboard manufacturer for accessing CMOS setup utility during boot
(Missed)
c) Del key during boot
d) F1 key while logged in Windows
15.CMOS settings can be set to factory defaults by: (Select all that apply)
a) Using a jumper that can be found on the motherboard
b) Changing settings in Windows Device Manager
c) Reseating the CMOS battery on the motherboard
d) Choosing the default configuration option in the CMOS setup utility
16.Which of the following answers refers to a firmware interface designed as a
replacement for BIOS?
a) UEFI
b) ACPI
c) CMOS
d) USMT
17.What kind of user permission restrictions can be set in BIOS? (Select all that apply)
a) Group Policy settings
b) Windows User Account Control (UAC) settings
c) User password required to proceed when the computer is powered on
d) Password-restricted access to the BIOS setup utility (Supervisor password)
18.Which of the following statements is true?
a) Aborted BIOS update can be resumed by the transaction recovery system
b) A common security measure is to store BIOS on a non-rewritable memory chip
c) The process of BIOS update can be aborted and resumed at a later time
d) Aborted BIOS update could render the computer unusable
19.Which type of password provides the highest level of permissions in BIOS?
a) root
b) Supervisor
c) Administrator
d) Power User
20.What is LoJack?
a) Loopback adapter
b) Security feature used for locating stolen desktops, laptops, or tablets
c) Connector standard
d) RJ-11 plug
21.Which of the following terms refers to a technology that allows for storing
passwords, certificates, or encryption keys in a hardware chip?
a) Access Control List (ACL)
b) Encrypting File System (EFS)
c) User Account Control (UAC)
d) Trusted Platform Module (TPM)
22.While trying to enable the entire drive encryption feature in Windows technician
receives the following error message: "A compatible Trusted Platform Module (TPM)
Security Device must be present on this computer, but a TPM was not found". Knowing
that the system has a TPM chip installed, which of the following steps might help in
solving this problem?
a) Re-installation of the OS
b) Enabling the TPM security feature in CMOS setup menu
c) Hard drive replacement
d) Enabling the TPM security feature in Windows Control Panel
23.Which of the answers listed below describe(s) the features of UEFI? (Select all that
apply)
a) DRM support
b) GUI mode
c) Mouse support
d) Support for hard drives with a maximum of 4 partitions per drive
e) Secure boot
f) Support for partitions/hard drives of up to 2TB
g) Network access
24.A computer supporting LoJack technology has two main components installed: an
Application Agent residing in the operating system which sends tracking signals to the
monitoring center allowing the law enforcement to locate and recover stolen device, and
Persistence Module which restores the Application Agent and allows it to survive
operating system re-installation or hard drive format. The highest level of security
offered by LoJack can be achieved when Persistence Module resides in:
a) Operating system
b) Partition gap on the hard drive
c) Computer's BIOS
d) USB key
25.A UEFI functionality designed to prevent the loading of malware and unauthorized
OSs during system start-up is known as:
a) LoJack
b) Bitlocker
c) Secure boot
d) Kerberos
1 A
2 CD
3 C
4 ACD
5 AE
6 B
7 A
8 B
9 D
10 BE
11 D
12 D
13 C
14 B
15 ACD
16 A
17 CD
18 D
19 B
20 B
21 D
22 B
23 ABCEG
24 C
25 C