← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Sync Center |
B | HomeGroup |
C | Windows Aero |
D | Windows Domain |
E | Windows Defender |
Question 2 |
A | SSH |
B | VNC |
C | RDP |
D | Telnet |
Question 3 |
A | Reprimand the user and apply a content filter
to the user’s profile. |
B | Secure the workstation in a limited access
facility. |
C | Document the incident and purge all policy-violating materials. |
D | Immediately delete all unauthorized materials. |
E | Delete the bit torrent application and contact the affected copyright holders. |
Question 4 |
A | .py |
B | .ps |
C | .ps1 |
D | .vbs |
E | .py1 |
Question 5 |
A | MS PowerPoint |
B | Notepad |
C | MS Word |
D | CMD |
E | MS Excel |
Question 6 |
A | 5G LTE |
B | WWAN |
C | WLAN |
D | VLAN |
E | VPN |
Question 7 |
A | Local-level user policies |
B | Network-level firewall policies |
C | Antivirus domain-level policies |
D | Domain-level group policies |
E | Local-level firewall policies |
Question 8 |
A | End-user acceptance |
B | Request for proposal |
C | Backout plan |
D | Plan for change |
E | Business processes |
F | Risk analysis |
Question 9 |
A | Ping |
B | CD |
C | MD |
D | Dir |
E | Ver |
Question 10 |
A | ifconfig |
B | Task Manager |
C | Safe Mode |
D | Msconfig |
Question 11 |
A | Disconnect the computer from the office network. |
B | Rollback OS and driver updates. |
C | Reboot the computer in order to make sure all other programs are terminated. |
D | Run a System Restore. |
E | Research the virus and how to remove it. |
Question 12 |
A | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
B | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
C | It would be very difficualt and will require specialized laborotory to recover the data. |
D | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
Question 13 |
A | Partition the drive. |
B | Run chkdsk. |
C | Defragment the drive. |
D | Copy system files. |
Question 14 |
A | Disable network cards |
B | Disable System Restore |
C | Disable all non-administrator accounts. |
D | Run the CHKDSK /R command |
E | Run Windows Update |
Question 15 |
A | robocopy |
B | chkdsk /F |
C | diskpart |
D | tracert /w |
Question 16 |
A | Reconfigure the gaming consoles' network interfaces. |
B | Configure router QoS engine with service priority for gaming applications. |
C | Replace the IP camera system with a new one. |
D | Replace the router with an upgraded unit. |
E | Power cycle the network appliances. |
F | Factory reset the gaming consoles. |
Question 17 |
A | ls |
B | ipaddr /all |
C | chown |
D | ipconfig /all |
E | ifconfig |
Question 18 |
A | Document your solution. |
B | Run a driver update check for the specified software. |
C | Move on to the server to a different node or VLAN on the network. |
D | Invoice the customer. |
Question 19 |
A | Contact the Manager of the company immediately. |
B | Ask Sara why she has this type of folder on her work computer. |
C | Open the folder and enjoy the images. |
D | Open the folder to investigate the content, but do not open the images. |
E | Install the software and ignore the folder. |
Question 20 |
A | UEFI boot mode |
B | User access control |
C | Date and time |
D | Logon times |
Question 21 |
A | \%systemroot%\Windows\System32\Con
fig |
B | \%systemroot%\System32 |
C | \%systemroot%\System32\Config |
D | \%systemroot%\Windows |
Question 22 |
A | Close all running applications |
B | Reconnect the wireless network connection |
C | Hard reset the cell phone |
D | Remove and reinstall the application |
Question 23 |
A | Check the temperature at which the solder should be applied. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Consult the MSDS for the solder spool. |
D | Do not attempt to repair a motherboard. It is better to buy a new one. |
Question 24 |
A | Enable TPM in the BIOS/UEFI. |
B | Change the location of the system32 |
C | Disable UAC. |
D | Defrag the hard drive. |
E | Convert the file system to NTFS. |
Question 25 |
A | Execute the file as3final.py in notepad++ |
B | Change the file name from notepad to as3final.py |
C | Open file as3final.py file using the program notepad++ |
D | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
E | Execute the file notepad++ in as3final.py |
Question 26 |
A | Control Panel |
B | Command Prompt |
C | Task Manager |
D | MMC |
Question 27 |
A | Install a firewall and enforce rules. |
B | Disconnect the Internet connection to the LAN. |
C | Install an antivirus on the main server. |
D | Install an intrusion detection system (IDS). |
E | Disable the SSID broadcast. |
Question 28 |
A | Compatibility across different OS providers such as Windows, Linux and Mac. |
B | Better driver encryption and support for cryptology. |
C | Lower power consumption. |
D | Low drive failure rates. |
E | Support for single large files over 4GB. |
Question 29 |
A | 512 MB |
B | 6 GB |
C | 1 GB |
D | 4 GB |
E | 2 GB |
Question 30 |
A | Jailbreaking |
B | Grant superadmin |
C | VirusBarrier |
D | Rooting |
E | Open shell access |
Question 31 |
A | chkdsk C: /R |
B | chkdsk C: /C |
C | chkdsk C: /I |
D | chkdsk C: /F |
E | chkdsk /sec |
Question 32 |
A | 2 GB |
B | 512 MB |
C | 1 GB |
D | 6 GB |
E | 4 GB |
Question 33 |
A | Malicious attack |
B | Session hijacking |
C | DDoS |
D | Brute force |
E | Phishing |
Question 34 |
A | Drive wipe |
B | Degauss |
C | Standard format |
D | Low-level format |
Question 35 |
A | Grant superadmin |
B | Open shell access |
C | Jailbreaking |
D | Rooting |
E | VirusBarrier |
Question 36 |
A | The printing system is running. |
B | Virus infection of the C drive. |
C | Drivers are being downloaded by the Device Manager. |
D | Windows Update is running. |
E | Hyper-Threading has been disabled. |
Question 37 |
A | Contact HR immediately and seek advice. |
B | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
C | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
D | Contact a lawyer as this breaches the professional conduct policies. |
E | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
Question 38 |
A | Brute force attack |
B | Phishing attack |
C | DDoS attack |
D | Session hijacking attack |
E | Social engineering |
Question 39 |
A | Disk Management |
B | Msconfig |
C | Task Manager |
D | Administrative Tools |
Question 40 |
A | Administrator |
B | Standard user |
C | Guest |
D | Power users |
Question 41 |
A | Regedit |
B | Ping |
C | Msconfig |
D | Sigverif |
E | Dxdiag |
Question 42 |
A | C:\Users\%username%\Documents |
B | C:\Users\System32\Documents |
C | C:\Users\%root%\Documents |
D | C:\Documents and Settings\%username%\Documents |
Question 43 |
A | Windows 98 |
B | macOS |
C | Windows 10 |
D | Android |
E | iOS |
Question 44 |
A | Reset Your PC |
B | System Restore |
C | File History |
D | Windows Registry |
E | Startup Repair |
Question 45 |
A | Rename the folder on the server, and notify the information security officer |
B | Promptly notify the administrator's immediate supervisor |
C | Ask the owner to move the files from the server to a local computer |
D | Move the folder to another location on the server, and notify the local authorities |
Question 46 |
A | IBM |
B | Microsoft |
C | CompTIA |
D | WWF |
E | Apple |
Question 47 |
A | Commercial license |
B | Enterprise license |
C | Seat license |
D | Open source license |
Question 48 |
A | Check the RAM configuration. |
B | Reinstall the Windows OS. |
C | Upgrade the video drivers. |
D | Reinstall the CAD program. |
E | Replace the hard drive. |
Question 49 |
A | chkdsk C: /I |
B | chkdsk C: /F |
C | chkdsk C: /C |
D | chkdsk /sec |
E | chkdsk C: /R |
Question 50 |
A | HKEY_USERS |
B | HKEY_CURRENT_CONFIG |
C | HKEY_LOCAL_MACHINE |
D | HKEY_CLASSES_ROOT |
Question 51 |
A | trojan |
B | spam bot |
C | worm |
D | spyware |
Question 52 |
A | Open source license |
B | Commercial license |
C | Enterprise license |
D | Seat license |
Question 53 |
A | Increase the closet's airflow. |
B | Install grounding bars. |
C | Set up dehumidifiers. |
D | Plug and check if the equipment is working. |
E | Implement a fire suppression system. |
Question 54 |
A | Program Files |
B | System32 |
C | boot |
D | Users |
E | Windows |
Question 55 |
A | Pro |
B | Home |
C | Standard |
D | Enterprise |
Question 56 |
A | Server and gateway |
B | Server and domain |
C | IP address and domain |
D | IP address and DNS |
Question 57 |
A | Component Services |
B | System Configuration |
C | Local Users and Groups |
D | Security Policy |
Question 58 |
A | CD |
B | dir |
C | MD |
D | SD |
E | RD |
Question 59 |
A | Request that you need to speak to a senior Supervisor. |
B | Take everyone out to lunch get their mind off of the problem. |
C | Refer your panicking Supervisor and co-workers to professional counseling services. |
D | Quit your job because of this work environment is toxic. |
E | Stay calm and do your job to best of your ability. |
Question 60 |
A | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
B | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
C | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
D | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
Question 61 |
A | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
B | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
C | Create a group policy to set minimum password standards. |
D | Set a strong password that requires a renewal every 30 days. |
E | Display a message on lock screen advising users how importnat to lock their computer. |
Question 62 |
A | regedit |
B | registry |
C | hives |
D | winreg |
E | reg |
Question 63 |
A | Task Manager |
B | Msconfig |
C | System Information |
D | Chkdsk |
Question 64 |
A | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
B | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
C | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
D | Each manufacturer has their own customized Launchers that modify the GUI. |
E | The Android Kernel version must be different bvetwen the manufactures. |
Question 65 |
A | The 64-bit architecture has an upper RAM limit of 128 GB. |
B | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
C | The 64-bit version is also known as x86. |
D | The 32-bit architecture has an upper RAM limit of 64 GB. |
E | Windows 10 only comes in 64-bit version. |
Question 66 |
A | VB Script |
B | DOS |
C | PowerShell |
D | Command Prompt |
Question 67 |
A | diskmgmt.msc |
B | unattend.xml |
C | setuperr.log |
D | setupact.log |
Question 68 |
A | Program Files (x86) |
B | System32 |
C | Systemroot |
D | Program Files |
Question 69 |
A | Boot the workstation in safe mode and disable the graphics driver system tray menu |
B | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
C | Boot the workstation in safe mode and disable Windows driver signing requirements |
D | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
Question 70 |
A | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
B | Format the old hard drive multiple times before deposal. |
C | Open the old hard drive case and use ESD to destory the circuitry. |
D | Completely erase the old drive prior to disposal. |
Question 71 |
A | Group Policy |
B | Security Groups |
C | Folder Redirection |
D | Home Folder |
Question 72 |
A | Organization security and content policies are not part of the majority of government organizations. |
B | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
C | Organization security and content policy must follow the legal policies of the country which the company operates. |
D | Organization security and content policy typically do not apply to executive staff. |
E | Organization security and content policy supersede all other legal policies of the country which the company operates. |
Question 73 |
A | It may interfere with other signed drivers installed on the device. |
B | It may result in random reboots. |
C | It may lead to instability issues. |
D | It may result in damage to the device. |
Question 74 |
A | Windows+M |
B | Windows+pause break |
C | Ctrl+Alt+Del |
D | Windows+R |
E | Windows+L |
Question 75 |
A | cp and rm |
B | pad and chmod |
C | ls and chown |
D | sudo and vi |
E | ps and kill |
Question 76 |
A | Windows Control Panel |
B | Performance Monitor |
C | Windows Task Manager |
D | Windows Task Scheduler |
E | Windows Registry |
Question 77 |
A | ipconfig man |
B | ipconfig /? |
C | man ipconfig |
D | ipconfig help |
Question 78 |
A | Use the local client certificate for server authentication |
B | Change the default access port |
C | Disable logon time restrictions |
D | Put the terminal server into the routers DMZ |
E | Block all unused ports on the LAN smart switch |
F | Enforce password complexity |
Question 79 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /restore |
B | bootrec /fixmbr |
C | bootrec /rebuildbcd |
D | bootrec /fixboot |
E | boot\bcd |
Question 80 |
A | Ghost |
B | Robocopy |
C | Image Clone |
D | Image Copy |
E | Sysprep |
Question 81 |
A | PXE |
B | Dynamic |
C | Multi-boot |
D | GPT |
Question 82 |
A | dir /o |
B | dir /d |
C | dir /? |
D | dir /a |
E | dir -1 |
Question 83 |
A | /B |
B | /E |
C | /DCOPY:T |
D | /sub-1 |
E | /D |
F | /S |
Question 84 |
A | perfmon.exe |
B | systempropertiesadvanced.exe |
C | eventvwr.msc |
D | wintask |
E | devmgmt.msc |
Question 85 |
A | Disable and then reenable Bluetooth |
B | Disconnect and then reconnect the stylus |
C | Restart the tablet |
D | Calibrate the touchscreen sensor |
Question 86 |
A | Hard drive/SSD |
B | Memory |
C | Driver |
D | CD-ROM |
Question 87 |
A | winload.exe |
B | startup.exe |
C | system32.exe |
D | setup.exe |
E | shell.adb |
Question 88 |
A | RD |
B | SD |
C | MD |
D | dir |
E | CD |
Question 89 |
A | Chrome OS |
B | macOS |
C | Windows 10 |
D | Ubuntu OS |
E | Android OS |
Question 90 |
A | Update the SATA controller driver from the manufacturers website |
B | Reset the PC to its factory conditions. Perform the OS upgrade again |
C | Perform a full backup and replace the hard drive |
D | Roll back the OS upgrade. Continue using the older version of Windows |
Question 91 |
A | Identify malware symptoms. |
B | Enable System Restore. |
C | Remediate infected systems. |
D | Schedule scans and run updates. |
E | Disable System Restore. |
F | Quarantine infected systems. |
Question 92 |
A | diskmgmt.msc |
B | setupact.log |
C | setuperr.log |
D | unattend.xml |
Question 93 |
A | Unsigned drivers or untrusted software. |
B | Anti-virous and anti-malware software intefrence. |
C | Mobile Device Management (MDM) policies |
D | VPN configuration or inactive VPN. |
Question 94 |
A | Device Manager |
B | Component Services |
C | Local Security Policy |
D | Performance Monitor |
Question 95 |
A | passwords |
B | root CA |
C | tokens |
D | keys |
Question 96 |
A | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
B | Revert the computer back to the last stable Windows service pack. |
C | Uninstall firewall applications and disable all firewall rules. |
D | Reboot the router. |
E | Reboot the network cameras. |
Question 97 |
A | Using msconfig General tab. |
B | Using msconfig Services tab. |
C | Using msconfig Boot tab. |
D | Using msconfig Tools tab. |
Question 98 |
A | .js |
B | .sh |
C | .bat |
D | .vbs |
Question 99 |
A | Remove the network card. |
B | Run Chkdsk. |
C | Run Msconfig. |
D | Check the System log. |
E | Boot into the Safe Mode. |
Question 100 |
A | None of the answers are correct |
B | Center |
C | First left |
D | First right |
Question 101 |
A | Educate the customer on how to avoid malware. |
B | Do nothing. |
C | Reinstall the antivirous and malware software. |
D | Replace the hard drive. |
E | Change the user account permissions to restrict access. |
Question 102 |
A | diskpart |
B | defrag |
C | cleanmgr |
D | chkdsk |
Question 103 |
A | /S |
B | /B |
C | /sub-1 |
D | /DCOPY:T |
E | /RCOPY |
F | /D |
Question 104 |
A | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
B | Windows user account authentication is more secure than BitLocker. |
C | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
D | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
E | Windows user account authentication can only be used with a Windows Server Domain Controller. |
Question 105 |
A | Format command |
B | Disk Cleanup utility |
C | Disk Management |
D | Computer Management |
Question 106 |
A | Disk 0 |
B | Disk 1 |
C | FAT32 partition |
D | Healthy partition |
E | Primary partition |
Question 107 |
A | netstat |
B | ipconfig /renew |
C | ipconfig |
D | ipconfig /all |
E | ping |
Question 108 |
A | Open license |
B | Personal license |
C | Corporate license |
D | Volume license |
E | Enterprise license |
Question 109 |
A | Initialize the drive. |
B | Run Windows updates. |
C | Unplug the power and re-plug it without powering down the workstation. |
D | Format and partition the drive. |
E | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
Question 110 |
A | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
B | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
C | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
D | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
Question 111 |
A | mtg |
B | CMD |
C | secpol.msc |
D | MMC |
E | devmgmt.msc |
Question 112 |
A | conditional statement , iteration |
B | conditional statement , run |
C | loop , run |
D | loop , iteration |
Question 113 |
A | Spoofing |
B | Whaling |
C | Impersonation |
D | Spear phishing |
Question 114 |
A | Folder Options |
B | Sync Center |
C | Display Settings |
D | User Accounts |
Question 115 |
A | Data execution prevention |
B | Visual effects |
C | Processor scheduling |
D | Page-file size |
Question 116 |
A | Files |
B | Snap-ins |
C | Directories |
D | Applets |
Question 117 |
A | Install to a network drive |
B | Install to a secondary internal HDD |
C | Install to a USB drive |
D | Install to a DVD-RW |
Question 118 |
A | cat |
B | bash |
C | sbin |
D | ls |
Question 119 |
A | File Explorer |
B | Windows Registry |
C | Task Manager |
D | Device Manager |
E | Services console |
Question 120 |
A | Minimum password age |
B | Enforce password history |
C | Minimum password length |
D | Complexity requirements |
Question 121 |
A | Recover |
B | REM |
C | Rebuild |
D | Replace |
E | Convert |
Question 122 |
A | Ipconfig |
B | perfmon.msc |
C | DxDiag |
D | Regedit |
E | gettingstarted |
Question 123 |
A | CHKNTFS |
B | NETDOM |
C | IPCONFIG |
D | CONVERT |
Question 124 |
A | GPT |
B | FAT32 |
C | Dynamic drive |
D | MBR |
Question 125 |
A | Location, RFID |
B | Asset ID, MAC address |
C | Domain name, location, IP address |
D | Domain name, location, asset ID |
Question 126 |
A | On the taskbar |
B | Within the Start menu |
C | In the System32 folder |
D | In the System Properties dialog box |
Question 127 |
A | deltask |
B | delprocess |
C | process -k |
D | process -del |
E | taskkill |
Question 128 |
A | Task Scheduler |
B | Event Viewer |
C | Task Manager |
D | Services |
Question 129 |
A | Open license |
B | Corporate license |
C | Personal license |
D | Volume license |
E | Enterprise license |
Question 130 |
A | regd |
B | msconfig |
C | taskmgr |
D | perfmon |
E | dxdiag |
Question 131 |
A | Look for program features and the minimum hardware requirements. |
B | Update the Windows drivers on the computer. |
C | Read the manual on how HR is going to use the software. |
D | Verify that the install is allowed under the company’s licensing agreements. |
Question 132 |
A | Windows 10 Education |
B | Windows 10 Pro |
C | Windows 10 Home |
D | Windows 10 Enterprise |
Question 133 |
A | IBM |
B | Microsoft |
C | WWF |
D | CompTIA |
E | Apple |
Question 134 |
A | System Management |
B | DiskPart |
C | Disk Management |
D | Gparted |
E | Event Viewer |
Question 135 |
A | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
B | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
C | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
D | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
Question 136 |
A | OneDrive |
B | Windows Firewall |
C | PowerShell |
D | Compatibility mode |
Question 137 |
A | NTFS supports larger file sizes. |
B | NTFS supports larger volumes. |
C | NTFS supports more file formats. |
D | NTFS supports file encryption. |
Question 138 |
A | Ls |
B | dirc |
C | Chown |
D | Chmod |
E | Passwd |
Question 139 |
A | Secondary partition |
B | Primary partition |
C | USB drive |
D | Extended partition |
E | Dynamic partition |
Question 140 |
A | ext4 |
B | NTFS |
C | exFAT |
D | FAT32 |
Question 141 |
A | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
B | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
C | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
D | This PC is running low on memory resources with a very high percentage is committed. |
E | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
Question 142 |
A | official documentation |
B | Incident Response Life Cycle |
C | incident response |
D | chain of custody |
E | MSDS |
Question 143 |
A | Propagation |
B | MFA |
C | Secure Shell |
D | SSO |
E | Inheritance |
Question 144 |
A | Guest |
B | Administrator |
C | Domain Admin |
D | Power user |
Question 145 |
A | Application log |
B | System log |
C | Security log |
D | Setup log |
E | Tasker log |
Question 146 |
A | None of the partitions can be dismounted without crashing the system. |
B | Disk 0 - 465.27 MB NTFS |
C | Disk 1 |
D | Disk 0 - 500 MB NTFS |
Question 147 |
A | Mac OS |
B | Windows 10 |
C | Ubuntu |
D | Android |
E | iOS |
Question 148 |
A | Tasklist |
B | Force quit |
C | Control Panel |
D | Computer Management |
E | Task Manager |
Question 149 |
A | FAT16 |
B | exFAT |
C | NTFS |
D | FAT32 |
Question 150 |
A | Pausing printing |
B | Modifying spool settings |
C | Adding ports |
D | Enabling sharing |
Question 151 |
A | Reinstall Java on the affected workstation. |
B | Ask the customer to use a different web browser. |
C | Ask the customer to find an application that does not use Java. |
D | Delete and clear Java Temporary Internet Files. |
Question 152 |
A | Net timer |
B | Timeset |
C | Time |
D | Net time set |
E | Net time |
Question 153 |
A | Google Play |
B | App Store |
C | Trusted Mobile Platform (TMP) |
D | Spotlight |
E | iTunes |
Question 154 |
A | EBCDIC |
B | Unicode |
C | PS1 |
D | ITU-T |
E | ASCII |
Question 155 |
A | MS-DOS Control Panel |
B | Windows Registry |
C | Windows Control Panel |
D | Windows Task Scheduler |
E | Windows Task Manager |
Question 156 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | Session hijacking attack |
B | Malicious attack |
C | HTTP attack |
D | DDoS attack |
E | Brute force attack |
Question 157 |
A | .ipa |
B | .apk |
C | .exe |
D | api |
E | .sdk |
Question 158 |
A | TRIM |
B | Task Manager |
C | Display properties |
D | Device Manager |
E | Power plans |
Question 159 |
A | Google Cloud Platform |
B | Local NAS |
C | iCloud |
D | Microsoft OneDrive |
Question 160 |
A | BitLocker |
B | Windows administrator user account |
C | Windows user account |
D | BitDefender |
E | BIOS password |
Question 161 |
A | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
B | Document the changes and perform the work. |
C | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
D | Submit the changes to the change board for approval. |
E | Notify the change team of the changes needed and perform the changes. |
Question 162 |
A | Add the user to the local administrators group |
B | Check for and apply software updates |
C | Perform repair installation on the application |
D | Rebuild the users mail profile |
Question 163 |
A | Propagation |
B | MFA |
C | SSO |
D | Inheritance |
E | Secure Shell |
Question 164 |
A | OU Group Policy |
B | Local Security Policy |
C | Active Directory Policy |
D | Site Policy |
Question 165 |
A | Task Manager |
B | Taskkill |
C | Mac Management |
D | Time Machine |
E | Force quit |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.