← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | SD |
B | MD |
C | RD |
D | CD |
E | dir |
Question 2 |
A | diskmgmt.msc |
B | setupact.log |
C | setuperr.log |
D | unattend.xml |
Question 3 |
A | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
B | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
C | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
D | Contact a lawyer as this breaches the professional conduct policies. |
E | Contact HR immediately and seek advice. |
Question 4 |
A | Plug and check if the equipment is working. |
B | Install grounding bars. |
C | Increase the closet's airflow. |
D | Implement a fire suppression system. |
E | Set up dehumidifiers. |
Question 5 |
A | diskmgmt.msc |
B | setuperr.log |
C | unattend.xml |
D | setupact.log |
Question 6 |
A | Grant superadmin |
B | VirusBarrier |
C | Open shell access |
D | Rooting |
E | Jailbreaking |
Question 7 |
A | Gparted |
B | Disk Management |
C | Event Viewer |
D | System Management |
E | DiskPart |
Question 8 |
A | Msconfig |
B | Chkdsk |
C | System Information |
D | Task Manager |
Question 9 |
A | eventvwr.msc |
B | wintask |
C | systempropertiesadvanced.exe |
D | devmgmt.msc |
E | perfmon.exe |
Question 10 |
A | VLAN |
B | VPN |
C | 5G LTE |
D | WLAN |
E | WWAN |
Question 11 |
A | chkdsk C: /R |
B | chkdsk /sec |
C | chkdsk C: /F |
D | chkdsk C: /I |
E | chkdsk C: /C |
Question 12 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /fixmbr |
B | bootrec /fixboot |
C | boot\bcd |
D | bootrec /restore |
E | bootrec /rebuildbcd |
Question 13 |
A | Windows Registry |
B | File Explorer |
C | Task Manager |
D | Device Manager |
E | Services console |
Question 14 |
A | Pausing printing |
B | Modifying spool settings |
C | Adding ports |
D | Enabling sharing |
Question 15 |
A | Primary partition |
B | Healthy partition |
C | Disk 0 |
D | Disk 1 |
E | FAT32 partition |
Question 16 |
A | Net time set |
B | Net time |
C | Timeset |
D | Time |
E | Net timer |
Question 17 |
A | Display Settings |
B | Sync Center |
C | User Accounts |
D | Folder Options |
Question 18 |
A | SSO |
B | Inheritance |
C | Secure Shell |
D | MFA |
E | Propagation |
Question 19 |
A | Task Manager |
B | Device Manager |
C | Power plans |
D | TRIM |
E | Display properties |
Question 20 |
A | Initialize the drive. |
B | Format and partition the drive. |
C | Unplug the power and re-plug it without powering down the workstation. |
D | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
E | Run Windows updates. |
Question 21 |
A | Domain Admin |
B | Administrator |
C | Power user |
D | Guest |
Question 22 |
A | trojan |
B | worm |
C | spam bot |
D | spyware |
Question 23 |
A | Complexity requirements |
B | Minimum password age |
C | Enforce password history |
D | Minimum password length |
Question 24 |
A | Computer Management |
B | Force quit |
C | Task Manager |
D | Tasklist |
E | Control Panel |
Question 25 |
A | Enterprise |
B | Standard |
C | Home |
D | Pro |
Question 26 |
A | System Restore |
B | Startup Repair |
C | Windows Registry |
D | File History |
E | Reset Your PC |
Question 27 |
A | Reboot the network cameras. |
B | Uninstall firewall applications and disable all firewall rules. |
C | Revert the computer back to the last stable Windows service pack. |
D | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
E | Reboot the router. |
Question 28 |
A | Ask Sara why she has this type of folder on her work computer. |
B | Open the folder to investigate the content, but do not open the images. |
C | Install the software and ignore the folder. |
D | Contact the Manager of the company immediately. |
E | Open the folder and enjoy the images. |
Question 29 |
A | MS Word |
B | MS PowerPoint |
C | CMD |
D | Notepad |
E | MS Excel |
Question 30 |
A | Close all running applications |
B | Hard reset the cell phone |
C | Reconnect the wireless network connection |
D | Remove and reinstall the application |
Question 31 |
A | Run Windows Update |
B | Disable network cards |
C | Disable System Restore |
D | Run the CHKDSK /R command |
E | Disable all non-administrator accounts. |
Question 32 |
A | Task Manager |
B | Disk Management |
C | Msconfig |
D | Administrative Tools |
Question 33 |
A | NTFS |
B | exFAT |
C | FAT32 |
D | ext4 |
Question 34 |
A | .py |
B | .ps1 |
C | .py1 |
D | .ps |
E | .vbs |
Question 35 |
A | It may interfere with other signed drivers installed on the device. |
B | It may result in damage to the device. |
C | It may result in random reboots. |
D | It may lead to instability issues. |
Question 36 |
A | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
B | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
C | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
D | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
Question 37 |
A | Task Manager |
B | ifconfig |
C | Msconfig |
D | Safe Mode |
Question 38 |
A | Data execution prevention |
B | Visual effects |
C | Processor scheduling |
D | Page-file size |
Question 39 |
A | Dir |
B | CD |
C | MD |
D | Ver |
E | Ping |
Question 40 |
A | Phishing |
B | Malicious attack |
C | DDoS |
D | Session hijacking |
E | Brute force |
Question 41 |
A | sudo and vi |
B | ls and chown |
C | cp and rm |
D | pad and chmod |
E | ps and kill |
Question 42 |
A | .apk |
B | .sdk |
C | .ipa |
D | .exe |
E | api |
Question 43 |
A | SD |
B | dir |
C | MD |
D | CD |
E | RD |
Question 44 |
A | Verify that the install is allowed under the company’s licensing agreements. |
B | Read the manual on how HR is going to use the software. |
C | Look for program features and the minimum hardware requirements. |
D | Update the Windows drivers on the computer. |
Question 45 |
A | Setup log |
B | Tasker log |
C | System log |
D | Security log |
E | Application log |
Question 46 |
A | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
B | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
C | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
D | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
Question 47 |
A | FAT32 |
B | Dynamic drive |
C | GPT |
D | MBR |
Question 48 |
A | Factory reset the gaming consoles. |
B | Power cycle the network appliances. |
C | Replace the IP camera system with a new one. |
D | Reconfigure the gaming consoles' network interfaces. |
E | Configure router QoS engine with service priority for gaming applications. |
F | Replace the router with an upgraded unit. |
Question 49 |
A | bash |
B | cat |
C | ls |
D | sbin |
Question 50 |
A | gettingstarted |
B | Ipconfig |
C | perfmon.msc |
D | Regedit |
E | DxDiag |
Question 51 |
A | keys |
B | passwords |
C | tokens |
D | root CA |
Question 52 |
A | Quit your job because of this work environment is toxic. |
B | Stay calm and do your job to best of your ability. |
C | Request that you need to speak to a senior Supervisor. |
D | Refer your panicking Supervisor and co-workers to professional counseling services. |
E | Take everyone out to lunch get their mind off of the problem. |
Question 53 |
A | GPT |
B | Multi-boot |
C | PXE |
D | Dynamic |
Question 54 |
A | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
B | The 64-bit version is also known as x86. |
C | The 64-bit architecture has an upper RAM limit of 128 GB. |
D | The 32-bit architecture has an upper RAM limit of 64 GB. |
E | Windows 10 only comes in 64-bit version. |
Question 55 |
A | chkdsk |
B | defrag |
C | diskpart |
D | cleanmgr |
Question 56 |
A | Update the SATA controller driver from the manufacturers website |
B | Perform a full backup and replace the hard drive |
C | Roll back the OS upgrade. Continue using the older version of Windows |
D | Reset the PC to its factory conditions. Perform the OS upgrade again |
Question 57 |
A | boot |
B | Windows |
C | Users |
D | Program Files |
E | System32 |
Question 58 |
A | Domain-level group policies |
B | Local-level firewall policies |
C | Antivirus domain-level policies |
D | Network-level firewall policies |
E | Local-level user policies |
Question 59 |
A | FAT32 |
B | FAT16 |
C | NTFS |
D | exFAT |
Question 60 |
A | Incident Response Life Cycle |
B | official documentation |
C | chain of custody |
D | MSDS |
E | incident response |
Question 61 |
A | IBM |
B | Microsoft |
C | Apple |
D | WWF |
E | CompTIA |
Question 62 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | HTTP attack |
B | DDoS attack |
C | Brute force attack |
D | Session hijacking attack |
E | Malicious attack |
Question 63 |
A | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
B | Organization security and content policy typically do not apply to executive staff. |
C | Organization security and content policy must follow the legal policies of the country which the company operates. |
D | Organization security and content policy supersede all other legal policies of the country which the company operates. |
E | Organization security and content policies are not part of the majority of government organizations. |
Question 64 |
A | MMC |
B | secpol.msc |
C | devmgmt.msc |
D | mtg |
E | CMD |
Question 65 |
A | Do nothing. |
B | Educate the customer on how to avoid malware. |
C | Change the user account permissions to restrict access. |
D | Reinstall the antivirous and malware software. |
E | Replace the hard drive. |
Question 66 |
A | None of the partitions can be dismounted without crashing the system. |
B | Disk 0 - 465.27 MB NTFS |
C | Disk 1 |
D | Disk 0 - 500 MB NTFS |
Question 67 |
A | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
B | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
C | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
D | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
Question 68 |
A | chkdsk C: /F |
B | chkdsk C: /R |
C | chkdsk C: /C |
D | chkdsk C: /I |
E | chkdsk /sec |
Question 69 |
A | Component Services |
B | Local Security Policy |
C | Performance Monitor |
D | Device Manager |
Question 70 |
A | CONVERT |
B | IPCONFIG |
C | NETDOM |
D | CHKNTFS |
Question 71 |
A | End-user acceptance |
B | Risk analysis |
C | Business processes |
D | Backout plan |
E | Plan for change |
F | Request for proposal |
Question 72 |
A | ifconfig |
B | ipconfig /all |
C | ls |
D | chown |
E | ipaddr /all |
Question 73 |
A | dir /d |
B | dir /? |
C | dir -1 |
D | dir /a |
E | dir /o |
Question 74 |
A | Windows user account authentication can only be used with a Windows Server Domain Controller. |
B | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
C | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
D | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
E | Windows user account authentication is more secure than BitLocker. |
Question 75 |
A | Dynamic partition |
B | USB drive |
C | Primary partition |
D | Secondary partition |
E | Extended partition |
Question 76 |
A | Install an antivirus on the main server. |
B | Install an intrusion detection system (IDS). |
C | Install a firewall and enforce rules. |
D | Disconnect the Internet connection to the LAN. |
E | Disable the SSID broadcast. |
Question 77 |
A | Windows Task Scheduler |
B | Performance Monitor |
C | Windows Registry |
D | Windows Control Panel |
E | Windows Task Manager |
Question 78 |
A | First right |
B | Center |
C | None of the answers are correct |
D | First left |
Question 79 |
A | Corporate license |
B | Enterprise license |
C | Personal license |
D | Open license |
E | Volume license |
Question 80 |
A | Open license |
B | Enterprise license |
C | Volume license |
D | Personal license |
E | Corporate license |
Question 81 |
A | Check the temperature at which the solder should be applied. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Do not attempt to repair a motherboard. It is better to buy a new one. |
D | Consult the MSDS for the solder spool. |
Question 82 |
A | In the System32 folder |
B | In the System Properties dialog box |
C | Within the Start menu |
D | On the taskbar |
Question 83 |
A | Use the local client certificate for server authentication |
B | Disable logon time restrictions |
C | Put the terminal server into the routers DMZ |
D | Change the default access port |
E | Block all unused ports on the LAN smart switch |
F | Enforce password complexity |
Question 84 |
A | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
B | The Android Kernel version must be different bvetwen the manufactures. |
C | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
D | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
E | Each manufacturer has their own customized Launchers that modify the GUI. |
Question 85 |
A | CD-ROM |
B | Memory |
C | Hard drive/SSD |
D | Driver |
Question 86 |
A | Ctrl+Alt+Del |
B | Windows+L |
C | Windows+R |
D | Windows+pause break |
E | Windows+M |
Question 87 |
A | Task Manager |
B | Control Panel |
C | Command Prompt |
D | MMC |
Question 88 |
A | Reinstall the Windows OS. |
B | Reinstall the CAD program. |
C | Replace the hard drive. |
D | Check the RAM configuration. |
E | Upgrade the video drivers. |
Question 89 |
A | Windows 10 |
B | Android |
C | Windows 98 |
D | iOS |
E | macOS |
Question 90 |
A | Grant superadmin |
B | Jailbreaking |
C | VirusBarrier |
D | Open shell access |
E | Rooting |
Question 91 |
A | man ipconfig |
B | ipconfig help |
C | ipconfig man |
D | ipconfig /? |
Question 92 |
A | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
B | Boot the workstation in safe mode and disable the graphics driver system tray menu |
C | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
D | Boot the workstation in safe mode and disable Windows driver signing requirements |
Question 93 |
A | Ubuntu OS |
B | macOS |
C | Windows 10 |
D | Chrome OS |
E | Android OS |
Question 94 |
A | Open the old hard drive case and use ESD to destory the circuitry. |
B | Format the old hard drive multiple times before deposal. |
C | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
D | Completely erase the old drive prior to disposal. |
Question 95 |
A | Mac OS |
B | Android |
C | Ubuntu |
D | Windows 10 |
E | iOS |
Question 96 |
A | NTFS supports larger file sizes. |
B | NTFS supports more file formats. |
C | NTFS supports larger volumes. |
D | NTFS supports file encryption. |
Question 97 |
A | Disable UAC. |
B | Convert the file system to NTFS. |
C | Defrag the hard drive. |
D | Change the location of the system32 |
E | Enable TPM in the BIOS/UEFI. |
Question 98 |
A | Security Policy |
B | Local Users and Groups |
C | Component Services |
D | System Configuration |
Question 99 |
A | \%systemroot%\System32 |
B | \%systemroot%\Windows\System32\Con
fig |
C | \%systemroot%\System32\Config |
D | \%systemroot%\Windows |
Question 100 |
A | winreg |
B | reg |
C | regedit |
D | registry |
E | hives |
Question 101 |
A | Replace |
B | Convert |
C | REM |
D | Rebuild |
E | Recover |
Question 102 |
A | .bat |
B | .js |
C | .sh |
D | .vbs |
Question 103 |
A | Rename the folder on the server, and notify the information security officer |
B | Move the folder to another location on the server, and notify the local authorities |
C | Ask the owner to move the files from the server to a local computer |
D | Promptly notify the administrator's immediate supervisor |
Question 104 |
A | PowerShell |
B | OneDrive |
C | Windows Firewall |
D | Compatibility mode |
Question 105 |
A | Open file as3final.py file using the program notepad++ |
B | Change the file name from notepad to as3final.py |
C | Execute the file notepad++ in as3final.py |
D | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
E | Execute the file as3final.py in notepad++ |
Question 106 |
A | Run Chkdsk. |
B | Run Msconfig. |
C | Boot into the Safe Mode. |
D | Check the System log. |
E | Remove the network card. |
Question 107 |
A | Notify the change team of the changes needed and perform the changes. |
B | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
C | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
D | Document the changes and perform the work. |
E | Submit the changes to the change board for approval. |
Question 108 |
A | VNC |
B | SSH |
C | Telnet |
D | RDP |
Question 109 |
A | Install to a USB drive |
B | Install to a network drive |
C | Install to a secondary internal HDD |
D | Install to a DVD-RW |
Question 110 |
A | conditional statement , run |
B | loop , run |
C | conditional statement , iteration |
D | loop , iteration |
Question 111 |
A | Chown |
B | dirc |
C | Chmod |
D | Ls |
E | Passwd |
Question 112 |
A | dxdiag |
B | msconfig |
C | regd |
D | taskmgr |
E | perfmon |
Question 113 |
A | Snap-ins |
B | Files |
C | Applets |
D | Directories |
Question 114 |
A | SSO |
B | Propagation |
C | Inheritance |
D | Secure Shell |
E | MFA |
Question 115 |
A | Partition the drive. |
B | Defragment the drive. |
C | Run chkdsk. |
D | Copy system files. |
Question 116 |
A | Delete the bit torrent application and contact the affected copyright holders. |
B | Secure the workstation in a limited access
facility. |
C | Reprimand the user and apply a content filter
to the user’s profile. |
D | Immediately delete all unauthorized materials. |
E | Document the incident and purge all policy-violating materials. |
Question 117 |
A | Program Files |
B | Systemroot |
C | Program Files (x86) |
D | System32 |
Question 118 |
A | Disk Management |
B | Format command |
C | Computer Management |
D | Disk Cleanup utility |
Question 119 |
A | Perform repair installation on the application |
B | Add the user to the local administrators group |
C | Check for and apply software updates |
D | Rebuild the users mail profile |
Question 120 |
A | startup.exe |
B | setup.exe |
C | shell.adb |
D | system32.exe |
E | winload.exe |
Question 121 |
A | Restart the tablet |
B | Disconnect and then reconnect the stylus |
C | Disable and then reenable Bluetooth |
D | Calibrate the touchscreen sensor |
Question 122 |
A | Mac Management |
B | Force quit |
C | Time Machine |
D | Taskkill |
E | Task Manager |
Question 123 |
A | /DCOPY:T |
B | /B |
C | /S |
D | /sub-1 |
E | /RCOPY |
F | /D |
Question 124 |
A | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
B | Set a strong password that requires a renewal every 30 days. |
C | Display a message on lock screen advising users how importnat to lock their computer. |
D | Create a group policy to set minimum password standards. |
E | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
Question 125 |
A | ASCII |
B | EBCDIC |
C | ITU-T |
D | Unicode |
E | PS1 |
Question 126 |
A | Task Manager |
B | Event Viewer |
C | Services |
D | Task Scheduler |
Question 127 |
A | Asset ID, MAC address |
B | Domain name, location, IP address |
C | Location, RFID |
D | Domain name, location, asset ID |
Question 128 |
A | diskpart |
B | tracert /w |
C | robocopy |
D | chkdsk /F |
Question 129 |
A | Date and time |
B | Logon times |
C | UEFI boot mode |
D | User access control |
Question 130 |
A | Windows 10 Home |
B | Windows 10 Education |
C | Windows 10 Enterprise |
D | Windows 10 Pro |
Question 131 |
A | /DCOPY:T |
B | /sub-1 |
C | /E |
D | /D |
E | /S |
F | /B |
Question 132 |
A | CompTIA |
B | WWF |
C | IBM |
D | Apple |
E | Microsoft |
Question 133 |
A | Schedule scans and run updates. |
B | Quarantine infected systems. |
C | Enable System Restore. |
D | Disable System Restore. |
E | Identify malware symptoms. |
F | Remediate infected systems. |
Question 134 |
A | Command Prompt |
B | PowerShell |
C | DOS |
D | VB Script |
Question 135 |
A | DDoS attack |
B | Social engineering |
C | Brute force attack |
D | Phishing attack |
E | Session hijacking attack |
Question 136 |
A | Spear phishing |
B | Impersonation |
C | Whaling |
D | Spoofing |
Question 137 |
A | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
B | This PC is running low on memory resources with a very high percentage is committed. |
C | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
D | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
E | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
Question 138 |
A | Home Folder |
B | Group Policy |
C | Folder Redirection |
D | Security Groups |
Question 139 |
A | Seat license |
B | Commercial license |
C | Enterprise license |
D | Open source license |
Question 140 |
A | 512 MB |
B | 2 GB |
C | 4 GB |
D | 6 GB |
E | 1 GB |
Question 141 |
A | IP address and DNS |
B | IP address and domain |
C | Server and domain |
D | Server and gateway |
Question 142 |
A | Windows Task Scheduler |
B | MS-DOS Control Panel |
C | Windows Control Panel |
D | Windows Task Manager |
E | Windows Registry |
Question 143 |
A | Spotlight |
B | Google Play |
C | iTunes |
D | App Store |
E | Trusted Mobile Platform (TMP) |
Question 144 |
A | Windows user account |
B | Windows administrator user account |
C | BIOS password |
D | BitDefender |
E | BitLocker |
Question 145 |
A | Open source license |
B | Commercial license |
C | Seat license |
D | Enterprise license |
Question 146 |
A | Sigverif |
B | Dxdiag |
C | Ping |
D | Msconfig |
E | Regedit |
Question 147 |
A | Compatibility across different OS providers such as Windows, Linux and Mac. |
B | Low drive failure rates. |
C | Support for single large files over 4GB. |
D | Lower power consumption. |
E | Better driver encryption and support for cryptology. |
Question 148 |
A | Sync Center |
B | Windows Aero |
C | Windows Domain |
D | Windows Defender |
E | HomeGroup |
Question 149 |
A | 2 GB |
B | 6 GB |
C | 512 MB |
D | 1 GB |
E | 4 GB |
Question 150 |
A | Hyper-Threading has been disabled. |
B | Windows Update is running. |
C | Drivers are being downloaded by the Device Manager. |
D | The printing system is running. |
E | Virus infection of the C drive. |
Question 151 |
A | Reboot the computer in order to make sure all other programs are terminated. |
B | Disconnect the computer from the office network. |
C | Rollback OS and driver updates. |
D | Research the virus and how to remove it. |
E | Run a System Restore. |
Question 152 |
A | deltask |
B | process -del |
C | delprocess |
D | process -k |
E | taskkill |
Question 153 |
A | Drive wipe |
B | Low-level format |
C | Standard format |
D | Degauss |
Question 154 |
A | Standard user |
B | Administrator |
C | Power users |
D | Guest |
Question 155 |
A | HKEY_CURRENT_CONFIG |
B | HKEY_CLASSES_ROOT |
C | HKEY_USERS |
D | HKEY_LOCAL_MACHINE |
Question 156 |
A | Using msconfig General tab. |
B | Using msconfig Services tab. |
C | Using msconfig Tools tab. |
D | Using msconfig Boot tab. |
Question 157 |
A | Image Copy |
B | Sysprep |
C | Robocopy |
D | Image Clone |
E | Ghost |
Question 158 |
A | OU Group Policy |
B | Local Security Policy |
C | Site Policy |
D | Active Directory Policy |
Question 159 |
A | iCloud |
B | Microsoft OneDrive |
C | Local NAS |
D | Google Cloud Platform |
Question 160 |
A | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
B | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
C | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
D | It would be very difficualt and will require specialized laborotory to recover the data. |
Question 161 |
A | ipconfig |
B | ping |
C | ipconfig /all |
D | netstat |
E | ipconfig /renew |
Question 162 |
A | Run a driver update check for the specified software. |
B | Invoice the customer. |
C | Document your solution. |
D | Move on to the server to a different node or VLAN on the network. |
Question 163 |
A | Unsigned drivers or untrusted software. |
B | Anti-virous and anti-malware software intefrence. |
C | Mobile Device Management (MDM) policies |
D | VPN configuration or inactive VPN. |
Question 164 |
A | C:\Users\System32\Documents |
B | C:\Users\%username%\Documents |
C | C:\Documents and Settings\%username%\Documents |
D | C:\Users\%root%\Documents |
Question 165 |
A | Delete and clear Java Temporary Internet Files. |
B | Reinstall Java on the affected workstation. |
C | Ask the customer to find an application that does not use Java. |
D | Ask the customer to use a different web browser. |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.