← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Calibrate the touchscreen sensor |
B | Restart the tablet |
C | Disable and then reenable Bluetooth |
D | Disconnect and then reconnect the stylus |
Question 2 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | boot\bcd |
B | bootrec /rebuildbcd |
C | bootrec /fixmbr |
D | bootrec /fixboot |
E | bootrec /restore |
Question 3 |
A | Modifying spool settings |
B | Pausing printing |
C | Adding ports |
D | Enabling sharing |
Question 4 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | HTTP attack |
B | DDoS attack |
C | Malicious attack |
D | Session hijacking attack |
E | Brute force attack |
Question 5 |
A | Document your solution. |
B | Move on to the server to a different node or VLAN on the network. |
C | Run a driver update check for the specified software. |
D | Invoice the customer. |
Question 6 |
A | Reinstall the antivirous and malware software. |
B | Replace the hard drive. |
C | Do nothing. |
D | Change the user account permissions to restrict access. |
E | Educate the customer on how to avoid malware. |
Question 7 |
A | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
B | Each manufacturer has their own customized Launchers that modify the GUI. |
C | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
D | The Android Kernel version must be different bvetwen the manufactures. |
E | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
Question 8 |
A | Corporate license |
B | Enterprise license |
C | Personal license |
D | Volume license |
E | Open license |
Question 9 |
A | Open file as3final.py file using the program notepad++ |
B | Execute the file as3final.py in notepad++ |
C | Execute the file notepad++ in as3final.py |
D | Change the file name from notepad to as3final.py |
E | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
Question 10 |
A | Consult the MSDS for the solder spool. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Check the temperature at which the solder should be applied. |
D | Do not attempt to repair a motherboard. It is better to buy a new one. |
Question 11 |
A | UEFI boot mode |
B | User access control |
C | Logon times |
D | Date and time |
Question 12 |
A | Windows 10 Enterprise |
B | Windows 10 Pro |
C | Windows 10 Education |
D | Windows 10 Home |
Question 13 |
A | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
B | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
C | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
D | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
Question 14 |
A | Jailbreaking |
B | Open shell access |
C | Grant superadmin |
D | Rooting |
E | VirusBarrier |
Question 15 |
A | Disk 1 |
B | None of the partitions can be dismounted without crashing the system. |
C | Disk 0 - 465.27 MB NTFS |
D | Disk 0 - 500 MB NTFS |
Question 16 |
A | ls and chown |
B | cp and rm |
C | ps and kill |
D | sudo and vi |
E | pad and chmod |
Question 17 |
A | Perform repair installation on the application |
B | Rebuild the users mail profile |
C | Add the user to the local administrators group |
D | Check for and apply software updates |
Question 18 |
A | Visual effects |
B | Data execution prevention |
C | Page-file size |
D | Processor scheduling |
Question 19 |
A | delprocess |
B | process -k |
C | deltask |
D | taskkill |
E | process -del |
Question 20 |
A | MS Excel |
B | MS PowerPoint |
C | Notepad |
D | CMD |
E | MS Word |
Question 21 |
A | Commercial license |
B | Open source license |
C | Seat license |
D | Enterprise license |
Question 22 |
A | chkdsk C: /C |
B | chkdsk C: /F |
C | chkdsk /sec |
D | chkdsk C: /I |
E | chkdsk C: /R |
Question 23 |
A | Phishing |
B | Session hijacking |
C | DDoS |
D | Malicious attack |
E | Brute force |
Question 24 |
A | SSO |
B | Inheritance |
C | Secure Shell |
D | Propagation |
E | MFA |
Question 25 |
A | Microsoft |
B | IBM |
C | Apple |
D | CompTIA |
E | WWF |
Question 26 |
A | Submit the changes to the change board for approval. |
B | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
C | Document the changes and perform the work. |
D | Notify the change team of the changes needed and perform the changes. |
E | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
Question 27 |
A | It would be very difficualt and will require specialized laborotory to recover the data. |
B | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
C | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
D | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
Question 28 |
A | system32.exe |
B | setup.exe |
C | shell.adb |
D | winload.exe |
E | startup.exe |
Question 29 |
A | Read the manual on how HR is going to use the software. |
B | Look for program features and the minimum hardware requirements. |
C | Update the Windows drivers on the computer. |
D | Verify that the install is allowed under the company’s licensing agreements. |
Question 30 |
A | MMC |
B | Command Prompt |
C | Control Panel |
D | Task Manager |
Question 31 |
A | Sigverif |
B | Regedit |
C | Msconfig |
D | Ping |
E | Dxdiag |
Question 32 |
A | /DCOPY:T |
B | /RCOPY |
C | /B |
D | /sub-1 |
E | /S |
F | /D |
Question 33 |
A | setupact.log |
B | setuperr.log |
C | diskmgmt.msc |
D | unattend.xml |
Question 34 |
A | 4 GB |
B | 2 GB |
C | 512 MB |
D | 1 GB |
E | 6 GB |
Question 35 |
A | Brute force attack |
B | DDoS attack |
C | Phishing attack |
D | Session hijacking attack |
E | Social engineering |
Question 36 |
A | Open the old hard drive case and use ESD to destory the circuitry. |
B | Completely erase the old drive prior to disposal. |
C | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
D | Format the old hard drive multiple times before deposal. |
Question 37 |
A | C:\Documents and Settings\%username%\Documents |
B | C:\Users\System32\Documents |
C | C:\Users\%username%\Documents |
D | C:\Users\%root%\Documents |
Question 38 |
A | Run Chkdsk. |
B | Boot into the Safe Mode. |
C | Remove the network card. |
D | Check the System log. |
E | Run Msconfig. |
Question 39 |
A | Trusted Mobile Platform (TMP) |
B | Google Play |
C | iTunes |
D | Spotlight |
E | App Store |
Question 40 |
A | 6 GB |
B | 512 MB |
C | 4 GB |
D | 1 GB |
E | 2 GB |
Question 41 |
A | RD |
B | CD |
C | dir |
D | SD |
E | MD |
Question 42 |
A | Ubuntu |
B | iOS |
C | Mac OS |
D | Android |
E | Windows 10 |
Question 43 |
A | hives |
B | regedit |
C | winreg |
D | reg |
E | registry |
Question 44 |
A | Power user |
B | Administrator |
C | Guest |
D | Domain Admin |
Question 45 |
A | .apk |
B | .exe |
C | .ipa |
D | .sdk |
E | api |
Question 46 |
A | Windows Control Panel |
B | Windows Task Manager |
C | Windows Registry |
D | MS-DOS Control Panel |
E | Windows Task Scheduler |
Question 47 |
A | Dynamic drive |
B | MBR |
C | GPT |
D | FAT32 |
Question 48 |
A | TRIM |
B | Display properties |
C | Device Manager |
D | Power plans |
E | Task Manager |
Question 49 |
A | Program Files |
B | System32 |
C | Program Files (x86) |
D | Systemroot |
Question 50 |
A | passwords |
B | root CA |
C | tokens |
D | keys |
Question 51 |
A | Disable System Restore |
B | Run the CHKDSK /R command |
C | Disable network cards |
D | Disable all non-administrator accounts. |
E | Run Windows Update |
Question 52 |
A | User Accounts |
B | Display Settings |
C | Sync Center |
D | Folder Options |
Question 53 |
A | Remove and reinstall the application |
B | Close all running applications |
C | Hard reset the cell phone |
D | Reconnect the wireless network connection |
Question 54 |
A | Disk 0 |
B | FAT32 partition |
C | Disk 1 |
D | Primary partition |
E | Healthy partition |
Question 55 |
A | \%systemroot%\System32\Config |
B | \%systemroot%\System32 |
C | \%systemroot%\Windows |
D | \%systemroot%\Windows\System32\Con
fig |
Question 56 |
A | Microsoft OneDrive |
B | Local NAS |
C | iCloud |
D | Google Cloud Platform |
Question 57 |
A | Implement a fire suppression system. |
B | Plug and check if the equipment is working. |
C | Install grounding bars. |
D | Increase the closet's airflow. |
E | Set up dehumidifiers. |
Question 58 |
A | Reinstall the Windows OS. |
B | Upgrade the video drivers. |
C | Reinstall the CAD program. |
D | Replace the hard drive. |
E | Check the RAM configuration. |
Question 59 |
A | WLAN |
B | VLAN |
C | VPN |
D | WWAN |
E | 5G LTE |
Question 60 |
A | Antivirus domain-level policies |
B | Local-level user policies |
C | Domain-level group policies |
D | Network-level firewall policies |
E | Local-level firewall policies |
Question 61 |
A | diskpart |
B | chkdsk /F |
C | tracert /w |
D | robocopy |
Question 62 |
A | dir -1 |
B | dir /o |
C | dir /d |
D | dir /a |
E | dir /? |
Question 63 |
A | Standard user |
B | Administrator |
C | Power users |
D | Guest |
Question 64 |
A | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
B | Uninstall firewall applications and disable all firewall rules. |
C | Revert the computer back to the last stable Windows service pack. |
D | Reboot the router. |
E | Reboot the network cameras. |
Question 65 |
A | Folder Redirection |
B | Security Groups |
C | Home Folder |
D | Group Policy |
Question 66 |
A | Event Viewer |
B | Services |
C | Task Manager |
D | Task Scheduler |
Question 67 |
A | secpol.msc |
B | devmgmt.msc |
C | CMD |
D | MMC |
E | mtg |
Question 68 |
A | Net time set |
B | Time |
C | Net timer |
D | Net time |
E | Timeset |
Question 69 |
A | Document the incident and purge all policy-violating materials. |
B | Reprimand the user and apply a content filter
to the user’s profile. |
C | Secure the workstation in a limited access
facility. |
D | Delete the bit torrent application and contact the affected copyright holders. |
E | Immediately delete all unauthorized materials. |
Question 70 |
A | Quarantine infected systems. |
B | Enable System Restore. |
C | Remediate infected systems. |
D | Disable System Restore. |
E | Identify malware symptoms. |
F | Schedule scans and run updates. |
Question 71 |
A | MD |
B | CD |
C | Ver |
D | Ping |
E | Dir |
Question 72 |
A | sbin |
B | bash |
C | ls |
D | cat |
Question 73 |
A | CompTIA |
B | Microsoft |
C | IBM |
D | Apple |
E | WWF |
Question 74 |
A | Commercial license |
B | Enterprise license |
C | Seat license |
D | Open source license |
Question 75 |
A | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
B | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
C | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
D | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
Question 76 |
A | perfmon |
B | msconfig |
C | dxdiag |
D | regd |
E | taskmgr |
Question 77 |
A | Update the SATA controller driver from the manufacturers website |
B | Perform a full backup and replace the hard drive |
C | Roll back the OS upgrade. Continue using the older version of Windows |
D | Reset the PC to its factory conditions. Perform the OS upgrade again |
Question 78 |
A | ipconfig help |
B | man ipconfig |
C | ipconfig man |
D | ipconfig /? |
Question 79 |
A | Replace the IP camera system with a new one. |
B | Power cycle the network appliances. |
C | Replace the router with an upgraded unit. |
D | Reconfigure the gaming consoles' network interfaces. |
E | Factory reset the gaming consoles. |
F | Configure router QoS engine with service priority for gaming applications. |
Question 80 |
A | loop , run |
B | conditional statement , run |
C | loop , iteration |
D | conditional statement , iteration |
Question 81 |
A | Disk Management |
B | Event Viewer |
C | Gparted |
D | System Management |
E | DiskPart |
Question 82 |
A | IP address and domain |
B | Server and gateway |
C | IP address and DNS |
D | Server and domain |
Question 83 |
A | VPN configuration or inactive VPN. |
B | Mobile Device Management (MDM) policies |
C | Unsigned drivers or untrusted software. |
D | Anti-virous and anti-malware software intefrence. |
Question 84 |
A | chkdsk C: /F |
B | chkdsk C: /R |
C | chkdsk /sec |
D | chkdsk C: /C |
E | chkdsk C: /I |
Question 85 |
A | Delete and clear Java Temporary Internet Files. |
B | Ask the customer to find an application that does not use Java. |
C | Ask the customer to use a different web browser. |
D | Reinstall Java on the affected workstation. |
Question 86 |
A | NTFS supports more file formats. |
B | NTFS supports file encryption. |
C | NTFS supports larger volumes. |
D | NTFS supports larger file sizes. |
Question 87 |
A | GPT |
B | PXE |
C | Dynamic |
D | Multi-boot |
Question 88 |
A | /E |
B | /D |
C | /DCOPY:T |
D | /B |
E | /sub-1 |
F | /S |
Question 89 |
A | Promptly notify the administrator's immediate supervisor |
B | Ask the owner to move the files from the server to a local computer |
C | Rename the folder on the server, and notify the information security officer |
D | Move the folder to another location on the server, and notify the local authorities |
Question 90 |
A | Directories |
B | Files |
C | Snap-ins |
D | Applets |
Question 91 |
A | eventvwr.msc |
B | wintask |
C | devmgmt.msc |
D | systempropertiesadvanced.exe |
E | perfmon.exe |
Question 92 |
A | BitDefender |
B | BitLocker |
C | BIOS password |
D | Windows administrator user account |
E | Windows user account |
Question 93 |
A | Ipconfig |
B | DxDiag |
C | Regedit |
D | perfmon.msc |
E | gettingstarted |
Question 94 |
A | Command Prompt |
B | VB Script |
C | PowerShell |
D | DOS |
Question 95 |
A | .bat |
B | .vbs |
C | .js |
D | .sh |
Question 96 |
A | Replace |
B | REM |
C | Rebuild |
D | Convert |
E | Recover |
Question 97 |
A | Whaling |
B | Impersonation |
C | Spear phishing |
D | Spoofing |
Question 98 |
A | ifconfig |
B | Msconfig |
C | Task Manager |
D | Safe Mode |
Question 99 |
A | Users |
B | System32 |
C | boot |
D | Windows |
E | Program Files |
Question 100 |
A | Corporate license |
B | Enterprise license |
C | Personal license |
D | Open license |
E | Volume license |
Question 101 |
A | ASCII |
B | ITU-T |
C | EBCDIC |
D | Unicode |
E | PS1 |
Question 102 |
A | Organization security and content policies are not part of the majority of government organizations. |
B | Organization security and content policy supersede all other legal policies of the country which the company operates. |
C | Organization security and content policy must follow the legal policies of the country which the company operates. |
D | Organization security and content policy typically do not apply to executive staff. |
E | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
Question 103 |
A | Device Manager |
B | Local Security Policy |
C | Component Services |
D | Performance Monitor |
Question 104 |
A | Computer Management |
B | Disk Management |
C | Disk Cleanup utility |
D | Format command |
Question 105 |
A | Domain name, location, IP address |
B | Asset ID, MAC address |
C | Domain name, location, asset ID |
D | Location, RFID |
Question 106 |
A | Windows+M |
B | Ctrl+Alt+Del |
C | Windows+L |
D | Windows+R |
E | Windows+pause break |
Question 107 |
A | Windows 10 only comes in 64-bit version. |
B | The 64-bit architecture has an upper RAM limit of 128 GB. |
C | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
D | The 32-bit architecture has an upper RAM limit of 64 GB. |
E | The 64-bit version is also known as x86. |
Question 108 |
A | Format and partition the drive. |
B | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
C | Initialize the drive. |
D | Unplug the power and re-plug it without powering down the workstation. |
E | Run Windows updates. |
Question 109 |
A | Install to a DVD-RW |
B | Install to a secondary internal HDD |
C | Install to a network drive |
D | Install to a USB drive |
Question 110 |
A | It may interfere with other signed drivers installed on the device. |
B | It may result in random reboots. |
C | It may result in damage to the device. |
D | It may lead to instability issues. |
Question 111 |
A | Disable UAC. |
B | Convert the file system to NTFS. |
C | Enable TPM in the BIOS/UEFI. |
D | Defrag the hard drive. |
E | Change the location of the system32 |
Question 112 |
A | Chkdsk |
B | Msconfig |
C | Task Manager |
D | System Information |
Question 113 |
A | Ls |
B | dirc |
C | Chown |
D | Chmod |
E | Passwd |
Question 114 |
A | Low drive failure rates. |
B | Lower power consumption. |
C | Compatibility across different OS providers such as Windows, Linux and Mac. |
D | Better driver encryption and support for cryptology. |
E | Support for single large files over 4GB. |
Question 115 |
A | Image Copy |
B | Ghost |
C | Image Clone |
D | Sysprep |
E | Robocopy |
Question 116 |
A | Display a message on lock screen advising users how importnat to lock their computer. |
B | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
C | Set a strong password that requires a renewal every 30 days. |
D | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
E | Create a group policy to set minimum password standards. |
Question 117 |
A | Research the virus and how to remove it. |
B | Rollback OS and driver updates. |
C | Reboot the computer in order to make sure all other programs are terminated. |
D | Run a System Restore. |
E | Disconnect the computer from the office network. |
Question 118 |
A | Windows Control Panel |
B | Windows Task Scheduler |
C | Windows Task Manager |
D | Performance Monitor |
E | Windows Registry |
Question 119 |
A | exFAT |
B | NTFS |
C | FAT32 |
D | ext4 |
Question 120 |
A | defrag |
B | diskpart |
C | chkdsk |
D | cleanmgr |
Question 121 |
A | Copy system files. |
B | Run chkdsk. |
C | Partition the drive. |
D | Defragment the drive. |
Question 122 |
A | Disk Management |
B | Task Manager |
C | Msconfig |
D | Administrative Tools |
Question 123 |
A | Install the software and ignore the folder. |
B | Open the folder and enjoy the images. |
C | Ask Sara why she has this type of folder on her work computer. |
D | Contact the Manager of the company immediately. |
E | Open the folder to investigate the content, but do not open the images. |
Question 124 |
A | Drivers are being downloaded by the Device Manager. |
B | Windows Update is running. |
C | Virus infection of the C drive. |
D | The printing system is running. |
E | Hyper-Threading has been disabled. |
Question 125 |
A | spam bot |
B | worm |
C | trojan |
D | spyware |
Question 126 |
A | Pro |
B | Standard |
C | Enterprise |
D | Home |
Question 127 |
A | Memory |
B | Hard drive/SSD |
C | CD-ROM |
D | Driver |
Question 128 |
A | iOS |
B | Android |
C | Windows 10 |
D | macOS |
E | Windows 98 |
Question 129 |
A | System Restore |
B | File History |
C | Reset Your PC |
D | Windows Registry |
E | Startup Repair |
Question 130 |
A | Low-level format |
B | Drive wipe |
C | Degauss |
D | Standard format |
Question 131 |
A | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
B | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
C | Windows user account authentication is more secure than BitLocker. |
D | Windows user account authentication can only be used with a Windows Server Domain Controller. |
E | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
Question 132 |
A | In the System Properties dialog box |
B | Within the Start menu |
C | In the System32 folder |
D | On the taskbar |
Question 133 |
A | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
B | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
C | Boot the workstation in safe mode and disable Windows driver signing requirements |
D | Boot the workstation in safe mode and disable the graphics driver system tray menu |
Question 134 |
A | Stay calm and do your job to best of your ability. |
B | Request that you need to speak to a senior Supervisor. |
C | Take everyone out to lunch get their mind off of the problem. |
D | Refer your panicking Supervisor and co-workers to professional counseling services. |
E | Quit your job because of this work environment is toxic. |
Question 135 |
A | Site Policy |
B | OU Group Policy |
C | Local Security Policy |
D | Active Directory Policy |
Question 136 |
A | None of the answers are correct |
B | Center |
C | First left |
D | First right |
Question 137 |
A | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
B | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
C | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
D | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
Question 138 |
A | setuperr.log |
B | setupact.log |
C | diskmgmt.msc |
D | unattend.xml |
Question 139 |
A | System Configuration |
B | Security Policy |
C | Local Users and Groups |
D | Component Services |
Question 140 |
A | ipconfig /all |
B | ls |
C | ipaddr /all |
D | ifconfig |
E | chown |
Question 141 |
A | Windows Aero |
B | Windows Domain |
C | Windows Defender |
D | HomeGroup |
E | Sync Center |
Question 142 |
A | SSO |
B | Secure Shell |
C | Propagation |
D | Inheritance |
E | MFA |
Question 143 |
A | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
B | Contact a lawyer as this breaches the professional conduct policies. |
C | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
D | Contact HR immediately and seek advice. |
E | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
Question 144 |
A | Risk analysis |
B | End-user acceptance |
C | Backout plan |
D | Business processes |
E | Plan for change |
F | Request for proposal |
Question 145 |
A | CD |
B | SD |
C | RD |
D | dir |
E | MD |
Question 146 |
A | VNC |
B | SSH |
C | Telnet |
D | RDP |
Question 147 |
A | chain of custody |
B | Incident Response Life Cycle |
C | incident response |
D | MSDS |
E | official documentation |
Question 148 |
A | .py1 |
B | .py |
C | .ps |
D | .ps1 |
E | .vbs |
Question 149 |
A | Disconnect the Internet connection to the LAN. |
B | Install an intrusion detection system (IDS). |
C | Disable the SSID broadcast. |
D | Install a firewall and enforce rules. |
E | Install an antivirus on the main server. |
Question 150 |
A | NTFS |
B | FAT16 |
C | exFAT |
D | FAT32 |
Question 151 |
A | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
B | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
C | This PC is running low on memory resources with a very high percentage is committed. |
D | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
E | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
Question 152 |
A | macOS |
B | Android OS |
C | Ubuntu OS |
D | Chrome OS |
E | Windows 10 |
Question 153 |
A | Control Panel |
B | Tasklist |
C | Computer Management |
D | Task Manager |
E | Force quit |
Question 154 |
A | Secondary partition |
B | Extended partition |
C | Primary partition |
D | USB drive |
E | Dynamic partition |
Question 155 |
A | netstat |
B | ping |
C | ipconfig /renew |
D | ipconfig /all |
E | ipconfig |
Question 156 |
A | HKEY_USERS |
B | HKEY_LOCAL_MACHINE |
C | HKEY_CLASSES_ROOT |
D | HKEY_CURRENT_CONFIG |
Question 157 |
A | Use the local client certificate for server authentication |
B | Enforce password complexity |
C | Disable logon time restrictions |
D | Put the terminal server into the routers DMZ |
E | Block all unused ports on the LAN smart switch |
F | Change the default access port |
Question 158 |
A | Security log |
B | Tasker log |
C | Setup log |
D | Application log |
E | System log |
Question 159 |
A | CHKNTFS |
B | CONVERT |
C | NETDOM |
D | IPCONFIG |
Question 160 |
A | Device Manager |
B | Windows Registry |
C | Services console |
D | Task Manager |
E | File Explorer |
Question 161 |
A | Windows Firewall |
B | OneDrive |
C | Compatibility mode |
D | PowerShell |
Question 162 |
A | Minimum password age |
B | Enforce password history |
C | Minimum password length |
D | Complexity requirements |
Question 163 |
A | Jailbreaking |
B | Open shell access |
C | Grant superadmin |
D | Rooting |
E | VirusBarrier |
Question 164 |
A | Taskkill |
B | Task Manager |
C | Time Machine |
D | Mac Management |
E | Force quit |
Question 165 |
A | Using msconfig General tab. |
B | Using msconfig Boot tab. |
C | Using msconfig Tools tab. |
D | Using msconfig Services tab. |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.