← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
B | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
C | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
D | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
Question 2 |
A | Ask the customer to find an application that does not use Java. |
B | Ask the customer to use a different web browser. |
C | Reinstall Java on the affected workstation. |
D | Delete and clear Java Temporary Internet Files. |
Question 3 |
A | Domain-level group policies |
B | Network-level firewall policies |
C | Antivirus domain-level policies |
D | Local-level firewall policies |
E | Local-level user policies |
Question 4 |
A | Perform a full backup and replace the hard drive |
B | Roll back the OS upgrade. Continue using the older version of Windows |
C | Update the SATA controller driver from the manufacturers website |
D | Reset the PC to its factory conditions. Perform the OS upgrade again |
Question 5 |
A | dir /? |
B | dir -1 |
C | dir /a |
D | dir /o |
E | dir /d |
Question 6 |
A | ASCII |
B | Unicode |
C | EBCDIC |
D | ITU-T |
E | PS1 |
Question 7 |
A | Windows 10 Enterprise |
B | Windows 10 Pro |
C | Windows 10 Education |
D | Windows 10 Home |
Question 8 |
A | On the taskbar |
B | In the System Properties dialog box |
C | In the System32 folder |
D | Within the Start menu |
Question 9 |
A | worm |
B | trojan |
C | spyware |
D | spam bot |
Question 10 |
A | Volume license |
B | Personal license |
C | Corporate license |
D | Open license |
E | Enterprise license |
Question 11 |
A | DDoS |
B | Malicious attack |
C | Brute force |
D | Phishing |
E | Session hijacking |
Question 12 |
A | Ubuntu |
B | Windows 10 |
C | iOS |
D | Mac OS |
E | Android |
Question 13 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | Brute force attack |
B | HTTP attack |
C | DDoS attack |
D | Session hijacking attack |
E | Malicious attack |
Question 14 |
A | Rollback OS and driver updates. |
B | Research the virus and how to remove it. |
C | Run a System Restore. |
D | Reboot the computer in order to make sure all other programs are terminated. |
E | Disconnect the computer from the office network. |
Question 15 |
A | regd |
B | perfmon |
C | dxdiag |
D | taskmgr |
E | msconfig |
Question 16 |
A | Rename the folder on the server, and notify the information security officer |
B | Ask the owner to move the files from the server to a local computer |
C | Promptly notify the administrator's immediate supervisor |
D | Move the folder to another location on the server, and notify the local authorities |
Question 17 |
A | Security Policy |
B | System Configuration |
C | Local Users and Groups |
D | Component Services |
Question 18 |
A | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
B | This PC is running low on memory resources with a very high percentage is committed. |
C | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
D | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
E | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
Question 19 |
A | CD-ROM |
B | Hard drive/SSD |
C | Driver |
D | Memory |
Question 20 |
A | Unplug the power and re-plug it without powering down the workstation. |
B | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
C | Format and partition the drive. |
D | Initialize the drive. |
E | Run Windows updates. |
Question 21 |
A | Directories |
B | Snap-ins |
C | Files |
D | Applets |
Question 22 |
A | FAT32 |
B | NTFS |
C | ext4 |
D | exFAT |
Question 23 |
A | Program Files |
B | Program Files (x86) |
C | Systemroot |
D | System32 |
Question 24 |
A | Personal license |
B | Corporate license |
C | Enterprise license |
D | Volume license |
E | Open license |
Question 25 |
A | Telnet |
B | SSH |
C | VNC |
D | RDP |
Question 26 |
A | Consult the MSDS for the solder spool. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Check the temperature at which the solder should be applied. |
D | Do not attempt to repair a motherboard. It is better to buy a new one. |
Question 27 |
A | CMD |
B | devmgmt.msc |
C | mtg |
D | MMC |
E | secpol.msc |
Question 28 |
A | regedit |
B | registry |
C | hives |
D | reg |
E | winreg |
Question 29 |
A | 512 MB |
B | 1 GB |
C | 2 GB |
D | 4 GB |
E | 6 GB |
Question 30 |
A | wintask |
B | perfmon.exe |
C | eventvwr.msc |
D | devmgmt.msc |
E | systempropertiesadvanced.exe |
Question 31 |
A | dir |
B | CD |
C | MD |
D | RD |
E | SD |
Question 32 |
A | Partition the drive. |
B | Copy system files. |
C | Run chkdsk. |
D | Defragment the drive. |
Question 33 |
A | Site Policy |
B | Active Directory Policy |
C | OU Group Policy |
D | Local Security Policy |
Question 34 |
A | Windows administrator user account |
B | BitDefender |
C | BIOS password |
D | BitLocker |
E | Windows user account |
Question 35 |
A | Rebuild the users mail profile |
B | Check for and apply software updates |
C | Perform repair installation on the application |
D | Add the user to the local administrators group |
Question 36 |
A | CHKNTFS |
B | CONVERT |
C | IPCONFIG |
D | NETDOM |
Question 37 |
A | Ping |
B | MD |
C | Dir |
D | Ver |
E | CD |
Question 38 |
A | Dynamic drive |
B | MBR |
C | FAT32 |
D | GPT |
Question 39 |
A | Robocopy |
B | Image Clone |
C | Sysprep |
D | Ghost |
E | Image Copy |
Question 40 |
A | unattend.xml |
B | setuperr.log |
C | setupact.log |
D | diskmgmt.msc |
Question 41 |
A | Disable System Restore. |
B | Quarantine infected systems. |
C | Remediate infected systems. |
D | Schedule scans and run updates. |
E | Identify malware symptoms. |
F | Enable System Restore. |
Question 42 |
A | Disable network cards |
B | Run the CHKDSK /R command |
C | Run Windows Update |
D | Disable all non-administrator accounts. |
E | Disable System Restore |
Question 43 |
A | Ask Sara why she has this type of folder on her work computer. |
B | Contact the Manager of the company immediately. |
C | Open the folder to investigate the content, but do not open the images. |
D | Install the software and ignore the folder. |
E | Open the folder and enjoy the images. |
Question 44 |
A | Phishing attack |
B | Social engineering |
C | Brute force attack |
D | Session hijacking attack |
E | DDoS attack |
Question 45 |
A | Do nothing. |
B | Reinstall the antivirous and malware software. |
C | Replace the hard drive. |
D | Change the user account permissions to restrict access. |
E | Educate the customer on how to avoid malware. |
Question 46 |
A | Execute the file notepad++ in as3final.py |
B | Open file as3final.py file using the program notepad++ |
C | Execute the file as3final.py in notepad++ |
D | Change the file name from notepad to as3final.py |
E | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
Question 47 |
A | Spoofing |
B | Spear phishing |
C | Impersonation |
D | Whaling |
Question 48 |
A | Disk 0 - 500 MB NTFS |
B | Disk 0 - 465.27 MB NTFS |
C | Disk 1 |
D | None of the partitions can be dismounted without crashing the system. |
Question 49 |
A | Power cycle the network appliances. |
B | Replace the router with an upgraded unit. |
C | Replace the IP camera system with a new one. |
D | Reconfigure the gaming consoles' network interfaces. |
E | Configure router QoS engine with service priority for gaming applications. |
F | Factory reset the gaming consoles. |
Question 50 |
A | Drivers are being downloaded by the Device Manager. |
B | Windows Update is running. |
C | Hyper-Threading has been disabled. |
D | The printing system is running. |
E | Virus infection of the C drive. |
Question 51 |
A | Chmod |
B | dirc |
C | Chown |
D | Passwd |
E | Ls |
Question 52 |
A | Task Manager |
B | TRIM |
C | Display properties |
D | Device Manager |
E | Power plans |
Question 53 |
A | Delete the bit torrent application and contact the affected copyright holders. |
B | Reprimand the user and apply a content filter
to the user’s profile. |
C | Document the incident and purge all policy-violating materials. |
D | Secure the workstation in a limited access
facility. |
E | Immediately delete all unauthorized materials. |
Question 54 |
A | Performance Monitor |
B | Windows Task Scheduler |
C | Windows Task Manager |
D | Windows Control Panel |
E | Windows Registry |
Question 55 |
A | Disconnect and then reconnect the stylus |
B | Disable and then reenable Bluetooth |
C | Restart the tablet |
D | Calibrate the touchscreen sensor |
Question 56 |
A | NTFS supports larger volumes. |
B | NTFS supports larger file sizes. |
C | NTFS supports file encryption. |
D | NTFS supports more file formats. |
Question 57 |
A | It may lead to instability issues. |
B | It may result in damage to the device. |
C | It may result in random reboots. |
D | It may interfere with other signed drivers installed on the device. |
Question 58 |
A | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
B | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
C | Windows user account authentication is more secure than BitLocker. |
D | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
E | Windows user account authentication can only be used with a Windows Server Domain Controller. |
Question 59 |
A | Low drive failure rates. |
B | Better driver encryption and support for cryptology. |
C | Compatibility across different OS providers such as Windows, Linux and Mac. |
D | Lower power consumption. |
E | Support for single large files over 4GB. |
Question 60 |
A | \%systemroot%\System32\Config |
B | \%systemroot%\Windows\System32\Con
fig |
C | \%systemroot%\Windows |
D | \%systemroot%\System32 |
Question 61 |
A | Microsoft OneDrive |
B | Local NAS |
C | iCloud |
D | Google Cloud Platform |
Question 62 |
A | System Management |
B | Event Viewer |
C | Disk Management |
D | DiskPart |
E | Gparted |
Question 63 |
A | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
B | Boot the workstation in safe mode and disable the graphics driver system tray menu |
C | Boot the workstation in safe mode and disable Windows driver signing requirements |
D | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
Question 64 |
A | Change the default access port |
B | Put the terminal server into the routers DMZ |
C | Use the local client certificate for server authentication |
D | Enforce password complexity |
E | Block all unused ports on the LAN smart switch |
F | Disable logon time restrictions |
Question 65 |
A | Enterprise license |
B | Open source license |
C | Seat license |
D | Commercial license |
Question 66 |
A | Quit your job because of this work environment is toxic. |
B | Request that you need to speak to a senior Supervisor. |
C | Refer your panicking Supervisor and co-workers to professional counseling services. |
D | Stay calm and do your job to best of your ability. |
E | Take everyone out to lunch get their mind off of the problem. |
Question 67 |
A | Windows Aero |
B | Windows Domain |
C | Windows Defender |
D | HomeGroup |
E | Sync Center |
Question 68 |
A | Windows Control Panel |
B | Windows Task Manager |
C | Windows Registry |
D | MS-DOS Control Panel |
E | Windows Task Scheduler |
Question 69 |
A | Ctrl+Alt+Del |
B | Windows+M |
C | Windows+R |
D | Windows+L |
E | Windows+pause break |
Question 70 |
A | Defrag the hard drive. |
B | Convert the file system to NTFS. |
C | Change the location of the system32 |
D | Enable TPM in the BIOS/UEFI. |
E | Disable UAC. |
Question 71 |
A | Power users |
B | Administrator |
C | Standard user |
D | Guest |
Question 72 |
A | loop , run |
B | conditional statement , iteration |
C | loop , iteration |
D | conditional statement , run |
Question 73 |
A | Replace |
B | REM |
C | Rebuild |
D | Recover |
E | Convert |
Question 74 |
A | GPT |
B | PXE |
C | Multi-boot |
D | Dynamic |
Question 75 |
A | DxDiag |
B | gettingstarted |
C | Ipconfig |
D | perfmon.msc |
E | Regedit |
Question 76 |
A | Using msconfig General tab. |
B | Using msconfig Boot tab. |
C | Using msconfig Services tab. |
D | Using msconfig Tools tab. |
Question 77 |
A | tracert /w |
B | diskpart |
C | chkdsk /F |
D | robocopy |
Question 78 |
A | Home Folder |
B | Security Groups |
C | Folder Redirection |
D | Group Policy |
Question 79 |
A | Windows |
B | boot |
C | Users |
D | Program Files |
E | System32 |
Question 80 |
A | Propagation |
B | SSO |
C | MFA |
D | Secure Shell |
E | Inheritance |
Question 81 |
A | Inheritance |
B | Propagation |
C | SSO |
D | Secure Shell |
E | MFA |
Question 82 |
A | Disk 0 |
B | Healthy partition |
C | FAT32 partition |
D | Disk 1 |
E | Primary partition |
Question 83 |
A | Open the old hard drive case and use ESD to destory the circuitry. |
B | Completely erase the old drive prior to disposal. |
C | Format the old hard drive multiple times before deposal. |
D | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
Question 84 |
A | Enterprise |
B | Home |
C | Pro |
D | Standard |
Question 85 |
A | Microsoft |
B | WWF |
C | CompTIA |
D | Apple |
E | IBM |
Question 86 |
A | System Restore |
B | Windows Registry |
C | Startup Repair |
D | File History |
E | Reset Your PC |
Question 87 |
A | Hard reset the cell phone |
B | Reconnect the wireless network connection |
C | Remove and reinstall the application |
D | Close all running applications |
Question 88 |
A | Domain name, location, asset ID |
B | Asset ID, MAC address |
C | Location, RFID |
D | Domain name, location, IP address |
Question 89 |
A | /B |
B | /sub-1 |
C | /S |
D | /E |
E | /DCOPY:T |
F | /D |
Question 90 |
A | Install to a network drive |
B | Install to a USB drive |
C | Install to a DVD-RW |
D | Install to a secondary internal HDD |
Question 91 |
A | official documentation |
B | MSDS |
C | chain of custody |
D | incident response |
E | Incident Response Life Cycle |
Question 92 |
A | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
B | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
C | Contact a lawyer as this breaches the professional conduct policies. |
D | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
E | Contact HR immediately and seek advice. |
Question 93 |
A | Chkdsk |
B | System Information |
C | Task Manager |
D | Msconfig |
Question 94 |
A | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
B | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
C | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
D | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
Question 95 |
A | Time |
B | Net timer |
C | Net time set |
D | Net time |
E | Timeset |
Question 96 |
A | .apk |
B | .exe |
C | .sdk |
D | api |
E | .ipa |
Question 97 |
A | Performance Monitor |
B | Local Security Policy |
C | Component Services |
D | Device Manager |
Question 98 |
A | FAT16 |
B | FAT32 |
C | exFAT |
D | NTFS |
Question 99 |
A | ipconfig /all |
B | chown |
C | ifconfig |
D | ls |
E | ipaddr /all |
Question 100 |
A | 2 GB |
B | 512 MB |
C | 1 GB |
D | 4 GB |
E | 6 GB |
Question 101 |
A | Application log |
B | Security log |
C | Tasker log |
D | System log |
E | Setup log |
Question 102 |
A | Sigverif |
B | Ping |
C | Msconfig |
D | Dxdiag |
E | Regedit |
Question 103 |
A | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
B | Organization security and content policy typically do not apply to executive staff. |
C | Organization security and content policy supersede all other legal policies of the country which the company operates. |
D | Organization security and content policies are not part of the majority of government organizations. |
E | Organization security and content policy must follow the legal policies of the country which the company operates. |
Question 104 |
A | delprocess |
B | process -del |
C | process -k |
D | deltask |
E | taskkill |
Question 105 |
A | Task Scheduler |
B | Services |
C | Task Manager |
D | Event Viewer |
Question 106 |
A | .py1 |
B | .vbs |
C | .py |
D | .ps1 |
E | .ps |
Question 107 |
A | macOS |
B | iOS |
C | Windows 98 |
D | Android |
E | Windows 10 |
Question 108 |
A | First left |
B | First right |
C | Center |
D | None of the answers are correct |
Question 109 |
A | Boot into the Safe Mode. |
B | Run Msconfig. |
C | Check the System log. |
D | Remove the network card. |
E | Run Chkdsk. |
Question 110 |
A | Task Manager |
B | Services console |
C | Device Manager |
D | File Explorer |
E | Windows Registry |
Question 111 |
A | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
B | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
C | Create a group policy to set minimum password standards. |
D | Set a strong password that requires a renewal every 30 days. |
E | Display a message on lock screen advising users how importnat to lock their computer. |
Question 112 |
A | Notepad |
B | MS PowerPoint |
C | CMD |
D | MS Excel |
E | MS Word |
Question 113 |
A | Standard format |
B | Low-level format |
C | Degauss |
D | Drive wipe |
Question 114 |
A | .js |
B | .sh |
C | .vbs |
D | .bat |
Question 115 |
A | Disk Cleanup utility |
B | Computer Management |
C | Disk Management |
D | Format command |
Question 116 |
A | Server and domain |
B | IP address and domain |
C | Server and gateway |
D | IP address and DNS |
Question 117 |
A | Task Manager |
B | Control Panel |
C | Command Prompt |
D | MMC |
Question 118 |
A | Primary partition |
B | Dynamic partition |
C | USB drive |
D | Extended partition |
E | Secondary partition |
Question 119 |
A | ping |
B | ipconfig /all |
C | ipconfig |
D | ipconfig /renew |
E | netstat |
Question 120 |
A | Complexity requirements |
B | Minimum password age |
C | Minimum password length |
D | Enforce password history |
Question 121 |
A | chkdsk C: /C |
B | chkdsk C: /R |
C | chkdsk C: /I |
D | chkdsk C: /F |
E | chkdsk /sec |
Question 122 |
A | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
B | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
C | Document the changes and perform the work. |
D | Notify the change team of the changes needed and perform the changes. |
E | Submit the changes to the change board for approval. |
Question 123 |
A | Processor scheduling |
B | Page-file size |
C | Visual effects |
D | Data execution prevention |
Question 124 |
A | Run a driver update check for the specified software. |
B | Move on to the server to a different node or VLAN on the network. |
C | Document your solution. |
D | Invoice the customer. |
Question 125 |
A | sbin |
B | cat |
C | ls |
D | bash |
Question 126 |
A | UEFI boot mode |
B | Logon times |
C | User access control |
D | Date and time |
Question 127 |
A | Disk Management |
B | Administrative Tools |
C | Msconfig |
D | Task Manager |
Question 128 |
A | Domain Admin |
B | Administrator |
C | Power user |
D | Guest |
Question 129 |
A | Command Prompt |
B | VB Script |
C | PowerShell |
D | DOS |
Question 130 |
A | VPN configuration or inactive VPN. |
B | Anti-virous and anti-malware software intefrence. |
C | Unsigned drivers or untrusted software. |
D | Mobile Device Management (MDM) policies |
Question 131 |
A | Check the RAM configuration. |
B | Reinstall the Windows OS. |
C | Reinstall the CAD program. |
D | Upgrade the video drivers. |
E | Replace the hard drive. |
Question 132 |
A | ls and chown |
B | sudo and vi |
C | ps and kill |
D | pad and chmod |
E | cp and rm |
Question 133 |
A | iTunes |
B | Trusted Mobile Platform (TMP) |
C | Spotlight |
D | App Store |
E | Google Play |
Question 134 |
A | dir |
B | SD |
C | MD |
D | RD |
E | CD |
Question 135 |
A | Open shell access |
B | VirusBarrier |
C | Rooting |
D | Jailbreaking |
E | Grant superadmin |
Question 136 |
A | Mac Management |
B | Force quit |
C | Time Machine |
D | Taskkill |
E | Task Manager |
Question 137 |
A | system32.exe |
B | startup.exe |
C | winload.exe |
D | setup.exe |
E | shell.adb |
Question 138 |
A | Modifying spool settings |
B | Pausing printing |
C | Adding ports |
D | Enabling sharing |
Question 139 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /rebuildbcd |
B | bootrec /fixmbr |
C | bootrec /restore |
D | boot\bcd |
E | bootrec /fixboot |
Question 140 |
A | ifconfig |
B | Msconfig |
C | Task Manager |
D | Safe Mode |
Question 141 |
A | VLAN |
B | WLAN |
C | 5G LTE |
D | VPN |
E | WWAN |
Question 142 |
A | chkdsk C: /F |
B | chkdsk /sec |
C | chkdsk C: /R |
D | chkdsk C: /I |
E | chkdsk C: /C |
Question 143 |
A | Jailbreaking |
B | VirusBarrier |
C | Grant superadmin |
D | Rooting |
E | Open shell access |
Question 144 |
A | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
B | It would be very difficualt and will require specialized laborotory to recover the data. |
C | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
D | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
Question 145 |
A | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
B | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
C | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
D | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
Question 146 |
A | Disconnect the Internet connection to the LAN. |
B | Install a firewall and enforce rules. |
C | Install an antivirus on the main server. |
D | Install an intrusion detection system (IDS). |
E | Disable the SSID broadcast. |
Question 147 |
A | C:\Users\System32\Documents |
B | C:\Users\%root%\Documents |
C | C:\Users\%username%\Documents |
D | C:\Documents and Settings\%username%\Documents |
Question 148 |
A | ipconfig help |
B | man ipconfig |
C | ipconfig man |
D | ipconfig /? |
Question 149 |
A | Increase the closet's airflow. |
B | Plug and check if the equipment is working. |
C | Set up dehumidifiers. |
D | Implement a fire suppression system. |
E | Install grounding bars. |
Question 150 |
A | Commercial license |
B | Open source license |
C | Seat license |
D | Enterprise license |
Question 151 |
A | macOS |
B | Android OS |
C | Chrome OS |
D | Ubuntu OS |
E | Windows 10 |
Question 152 |
A | setuperr.log |
B | unattend.xml |
C | diskmgmt.msc |
D | setupact.log |
Question 153 |
A | tokens |
B | root CA |
C | passwords |
D | keys |
Question 154 |
A | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
B | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
C | The Android Kernel version must be different bvetwen the manufactures. |
D | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
E | Each manufacturer has their own customized Launchers that modify the GUI. |
Question 155 |
A | HKEY_CURRENT_CONFIG |
B | HKEY_USERS |
C | HKEY_CLASSES_ROOT |
D | HKEY_LOCAL_MACHINE |
Question 156 |
A | Windows Firewall |
B | PowerShell |
C | Compatibility mode |
D | OneDrive |
Question 157 |
A | The 32-bit architecture has an upper RAM limit of 64 GB. |
B | The 64-bit version is also known as x86. |
C | Windows 10 only comes in 64-bit version. |
D | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
E | The 64-bit architecture has an upper RAM limit of 128 GB. |
Question 158 |
A | Read the manual on how HR is going to use the software. |
B | Verify that the install is allowed under the company’s licensing agreements. |
C | Update the Windows drivers on the computer. |
D | Look for program features and the minimum hardware requirements. |
Question 159 |
A | /DCOPY:T |
B | /B |
C | /RCOPY |
D | /D |
E | /sub-1 |
F | /S |
Question 160 |
A | Sync Center |
B | Folder Options |
C | Display Settings |
D | User Accounts |
Question 161 |
A | Tasklist |
B | Computer Management |
C | Task Manager |
D | Force quit |
E | Control Panel |
Question 162 |
A | WWF |
B | Apple |
C | Microsoft |
D | CompTIA |
E | IBM |
Question 163 |
A | diskpart |
B | cleanmgr |
C | chkdsk |
D | defrag |
Question 164 |
A | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
B | Revert the computer back to the last stable Windows service pack. |
C | Reboot the network cameras. |
D | Reboot the router. |
E | Uninstall firewall applications and disable all firewall rules. |
Question 165 |
A | End-user acceptance |
B | Business processes |
C | Request for proposal |
D | Risk analysis |
E | Plan for change |
F | Backout plan |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.