A+ 901 Test 1 Flashcards

cert

1
Q

The main functionality of the Basic Input/Output System (BIOS) is to perform the initial hardware checks after the computer is powered on and start up the operating system.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following resources can be used by an Operating System (OS) to communicate with hardware?
Device Manager
Secure Shell (SSH)
Device Drivers
System BIOS
Command-Line Interface (CLI)
A

Device Drivers

System BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In modern PCs, the procedure of replacing BIOS contents is sometimes referred to as:

A

Flashing the BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BIOS updates are performed in order to:

A

Repair damaged BIOS
Provide support for new types of attached hardware
Fix known programming errors discovered in the current BIOS version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following terms refer to BIOS types that can be updated without removing the BIOS chip from a motherboard?
EEPROM
ROM
Plug and Play (PNP)
EPROM
Flash Memory
A

EEPROM

Flash Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Microsoft Windows OS utility can be used to view basic information about computer’s BIOS?

A

MSINFO32.EXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Power failure during BIOS upgrade can be the cause of irreversible damage to the computer system.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After a normal system shutdown, when the computer is turned off, contents of the memory used to store BIOS settings are:

A

Retained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?

A

POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After replacing a modular hardware component inside computer case, the updated information about specific parameters of the new device can be stored in:

A

Flash Memory

CMOS RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred to as:

A

Boot sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In order to work, an integrated component such as Network Interface Card (NIC) on a newly assembled computer system may need to be first:

A

Enabled in the advance BIOS settings menu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After launching Windows Virtual PC application technician receives error message stating that the Hardware-Assisted Virtualization (HAV) feature is not enabled on thecomputer. Which of the following steps might help in fixing this problem?

A

Getting into the CMOS setup utility and enabling the virtualization technology setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The CMOS setup utility can be accessed by pressing:

A

The key set by the motherboard manufacturer for accessing CMOS setup utility during boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CMOS settings can be set to factory defaults by:

A

Using a jumper that can be found on the motherboard
Reseating the CMOS battery on the motherboard
Choosing the default configuration option in the CMOS setup utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to a firmware interface designed as a replacement for BIOS?

A

UEFI

17
Q

What kind of user permission restrictions can be set in BIOS?

A

User password required to proceed when the computer is powered on
Password-restricted access to the BIOS setup utility

18
Q

Which of the following statements is true?
Aborted BIOS update can be resumed by the transaction recovery system
A common security measure is to store BIOS on a non-rewritable memory chip
The process of BIOS update can be aborted and resumed at a later time
Aborted BIOS update could render the computer unusable

A

Aborted BIOS update could render the computer unusable

19
Q

Which type of password provides the highest level of permissions in BIOS?

A

Supervisor

20
Q

What is LoJack?

A

Security feature used for locating stolen desktops, laptops, or tablets

21
Q
Which of the following terms refers to a technology that allows for storing passwords, certificates, or encryption keys in a hardware chip?
Access Control List (ACL)
Encrypting File System (EFS)
User Account Control (UAC)
Trusted Platform Module (TPM)
A

Trusted Platform Module (TPM)

22
Q

While trying to enable the entire drive encryption feature in Windows technician receives the following error message: “A compatible Trusted Platform Module (TPM) Security Device must be present on this computer, but a TPM was not found”. Knowing that the system has a TPM chip installed, which of the following steps might help in solving this problem?
Re-installation of the OS
Enabling the TPM security feature in CMOS setup menu
Hard drive replacement
Enabling the TPM security feature in Windows Control Panel

A

Enabling the TPM security feature in CMOS setup menu

23
Q

Which of the answer listed below describes the features of UEFI?
DRM Support
GUI mode
Mouse support
support for hard drives with a max of 4 partitions per drive
Secure boot
Support for particians/hard drives of up to 2TB
Network access

A
DRM support
GUI mode
Mouse support
Secure boot
Network Access
24
Q

A computer supporting LoJack technology has 2 main components installed: an Application Agent residing in the operating system which sends tracking signals to the monitoring center allowing the law enforcement to locate and recover stolen device, and Persistence Module which restores the Application Agent and allows it to survive operating system re-installation of hard drive format. The highest level of security offered by LoJack can be achieved when Persistence Module resides in:

A

Computer’s BIOS

25
Q

A UEFI functionality designed to prevent the loading of malware and unauthorized OSs during system startup is known as:

A

Secure boot