← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Schedule scans and run updates. |
B | Quarantine infected systems. |
C | Enable System Restore. |
D | Remediate infected systems. |
E | Identify malware symptoms. |
F | Disable System Restore. |
Question 2 |
A | DDoS attack |
B | Phishing attack |
C | Brute force attack |
D | Social engineering |
E | Session hijacking attack |
Question 3 |
A | 512 MB |
B | 1 GB |
C | 2 GB |
D | 4 GB |
E | 6 GB |
Question 4 |
A | Stay calm and do your job to best of your ability. |
B | Request that you need to speak to a senior Supervisor. |
C | Quit your job because of this work environment is toxic. |
D | Take everyone out to lunch get their mind off of the problem. |
E | Refer your panicking Supervisor and co-workers to professional counseling services. |
Question 5 |
A | Computer Management |
B | Force quit |
C | Control Panel |
D | Tasklist |
E | Task Manager |
Question 6 |
A | Submit the changes to the change board for approval. |
B | Document the changes and perform the work. |
C | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
D | Notify the change team of the changes needed and perform the changes. |
E | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
Question 7 |
A | Notepad |
B | CMD |
C | MS PowerPoint |
D | MS Word |
E | MS Excel |
Question 8 |
A | setuperr.log |
B | setupact.log |
C | diskmgmt.msc |
D | unattend.xml |
Question 9 |
A | Healthy partition |
B | Disk 0 |
C | Disk 1 |
D | FAT32 partition |
E | Primary partition |
Question 10 |
A | Site Policy |
B | Local Security Policy |
C | Active Directory Policy |
D | OU Group Policy |
Question 11 |
A | Disconnect the Internet connection to the LAN. |
B | Install an intrusion detection system (IDS). |
C | Install a firewall and enforce rules. |
D | Install an antivirus on the main server. |
E | Disable the SSID broadcast. |
Question 12 |
A | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
B | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
C | This PC is running low on memory resources with a very high percentage is committed. |
D | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
E | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
Question 13 |
A | exFAT |
B | NTFS |
C | ext4 |
D | FAT32 |
Question 14 |
A | Replace the router with an upgraded unit. |
B | Factory reset the gaming consoles. |
C | Replace the IP camera system with a new one. |
D | Reconfigure the gaming consoles' network interfaces. |
E | Power cycle the network appliances. |
F | Configure router QoS engine with service priority for gaming applications. |
Question 15 |
A | Systemroot |
B | System32 |
C | Program Files (x86) |
D | Program Files |
Question 16 |
A | Ubuntu |
B | Android |
C | Mac OS |
D | iOS |
E | Windows 10 |
Question 17 |
A | Reinstall the Windows OS. |
B | Reinstall the CAD program. |
C | Check the RAM configuration. |
D | Upgrade the video drivers. |
E | Replace the hard drive. |
Question 18 |
A | MFA |
B | SSO |
C | Propagation |
D | Secure Shell |
E | Inheritance |
Question 19 |
A | reg |
B | hives |
C | regedit |
D | registry |
E | winreg |
Question 20 |
A | Performance Monitor |
B | Component Services |
C | Device Manager |
D | Local Security Policy |
Question 21 |
A | Extended partition |
B | USB drive |
C | Dynamic partition |
D | Secondary partition |
E | Primary partition |
Question 22 |
A | Run Chkdsk. |
B | Run Msconfig. |
C | Check the System log. |
D | Remove the network card. |
E | Boot into the Safe Mode. |
Question 23 |
A | Server and gateway |
B | IP address and DNS |
C | IP address and domain |
D | Server and domain |
Question 24 |
A | Initialize the drive. |
B | Unplug the power and re-plug it without powering down the workstation. |
C | Format and partition the drive. |
D | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
E | Run Windows updates. |
Question 25 |
A | Personal license |
B | Corporate license |
C | Volume license |
D | Enterprise license |
E | Open license |
Question 26 |
A | Move the folder to another location on the server, and notify the local authorities |
B | Ask the owner to move the files from the server to a local computer |
C | Promptly notify the administrator's immediate supervisor |
D | Rename the folder on the server, and notify the information security officer |
Question 27 |
A | perfmon |
B | dxdiag |
C | taskmgr |
D | regd |
E | msconfig |
Question 28 |
A | Check the temperature at which the solder should be applied. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Consult the MSDS for the solder spool. |
D | Do not attempt to repair a motherboard. It is better to buy a new one. |
Question 29 |
A | chkdsk C: /R |
B | chkdsk C: /C |
C | chkdsk C: /F |
D | chkdsk /sec |
E | chkdsk C: /I |
Question 30 |
A | Disk 1 |
B | Disk 0 - 500 MB NTFS |
C | None of the partitions can be dismounted without crashing the system. |
D | Disk 0 - 465.27 MB NTFS |
Question 31 |
A | Research the virus and how to remove it. |
B | Disconnect the computer from the office network. |
C | Rollback OS and driver updates. |
D | Run a System Restore. |
E | Reboot the computer in order to make sure all other programs are terminated. |
Question 32 |
A | Event Viewer |
B | Task Manager |
C | Task Scheduler |
D | Services |
Question 33 |
A | Services console |
B | Windows Registry |
C | Task Manager |
D | File Explorer |
E | Device Manager |
Question 34 |
A | .js |
B | .bat |
C | .vbs |
D | .sh |
Question 35 |
A | Enterprise license |
B | Seat license |
C | Commercial license |
D | Open source license |
Question 36 |
A | dir /a |
B | dir /? |
C | dir /d |
D | dir -1 |
E | dir /o |
Question 37 |
A | Security log |
B | System log |
C | Tasker log |
D | Setup log |
E | Application log |
Question 38 |
A | Task Manager |
B | Command Prompt |
C | MMC |
D | Control Panel |
Question 39 |
A | Disable UAC. |
B | Change the location of the system32 |
C | Enable TPM in the BIOS/UEFI. |
D | Defrag the hard drive. |
E | Convert the file system to NTFS. |
Question 40 |
A | \%systemroot%\Windows\System32\Con
fig |
B | \%systemroot%\System32\Config |
C | \%systemroot%\System32 |
D | \%systemroot%\Windows |
Question 41 |
A | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
B | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
C | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
D | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
Question 42 |
A | Security Policy |
B | Local Users and Groups |
C | System Configuration |
D | Component Services |
Question 43 |
A | Location, RFID |
B | Domain name, location, IP address |
C | Domain name, location, asset ID |
D | Asset ID, MAC address |
Question 44 |
A | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
B | Reboot the network cameras. |
C | Revert the computer back to the last stable Windows service pack. |
D | Uninstall firewall applications and disable all firewall rules. |
E | Reboot the router. |
Question 45 |
A | worm |
B | spyware |
C | spam bot |
D | trojan |
Question 46 |
A | Propagation |
B | MFA |
C | Inheritance |
D | Secure Shell |
E | SSO |
Question 47 |
A | .ps |
B | .py1 |
C | .vbs |
D | .py |
E | .ps1 |
Question 48 |
A | ASCII |
B | Unicode |
C | PS1 |
D | ITU-T |
E | EBCDIC |
Question 49 |
A | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
B | It would be very difficualt and will require specialized laborotory to recover the data. |
C | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
D | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
Question 50 |
A | Windows+M |
B | Windows+L |
C | Ctrl+Alt+Del |
D | Windows+pause break |
E | Windows+R |
Question 51 |
A | System Management |
B | Disk Management |
C | Gparted |
D | Event Viewer |
E | DiskPart |
Question 52 |
A | Data execution prevention |
B | Processor scheduling |
C | Page-file size |
D | Visual effects |
Question 53 |
A | Completely erase the old drive prior to disposal. |
B | Open the old hard drive case and use ESD to destory the circuitry. |
C | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
D | Format the old hard drive multiple times before deposal. |
Question 54 |
A | Run Windows Update |
B | Disable System Restore |
C | Run the CHKDSK /R command |
D | Disable network cards |
E | Disable all non-administrator accounts. |
Question 55 |
A | /D |
B | /S |
C | /sub-1 |
D | /B |
E | /RCOPY |
F | /DCOPY:T |
Question 56 |
A | Format command |
B | Disk Cleanup utility |
C | Computer Management |
D | Disk Management |
Question 57 |
A | Organization security and content policy must follow the legal policies of the country which the company operates. |
B | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
C | Organization security and content policy supersede all other legal policies of the country which the company operates. |
D | Organization security and content policy typically do not apply to executive staff. |
E | Organization security and content policies are not part of the majority of government organizations. |
Question 58 |
A | Contact a lawyer as this breaches the professional conduct policies. |
B | Contact HR immediately and seek advice. |
C | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
D | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
E | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
Question 59 |
A | diskpart |
B | cleanmgr |
C | chkdsk |
D | defrag |
Question 60 |
A | NTFS supports larger volumes. |
B | NTFS supports more file formats. |
C | NTFS supports larger file sizes. |
D | NTFS supports file encryption. |
Question 61 |
A | Rooting |
B | Jailbreaking |
C | VirusBarrier |
D | Open shell access |
E | Grant superadmin |
Question 62 |
A | MBR |
B | Dynamic drive |
C | GPT |
D | FAT32 |
Question 63 |
A | Drive wipe |
B | Standard format |
C | Low-level format |
D | Degauss |
Question 64 |
A | devmgmt.msc |
B | perfmon.exe |
C | eventvwr.msc |
D | wintask |
E | systempropertiesadvanced.exe |
Question 65 |
A | Set up dehumidifiers. |
B | Increase the closet's airflow. |
C | Install grounding bars. |
D | Plug and check if the equipment is working. |
E | Implement a fire suppression system. |
Question 66 |
A | chain of custody |
B | incident response |
C | official documentation |
D | MSDS |
E | Incident Response Life Cycle |
Question 67 |
A | iCloud |
B | Microsoft OneDrive |
C | Google Cloud Platform |
D | Local NAS |
Question 68 |
A | /D |
B | /DCOPY:T |
C | /E |
D | /sub-1 |
E | /B |
F | /S |
Question 69 |
A | exFAT |
B | FAT32 |
C | NTFS |
D | FAT16 |
Question 70 |
A | .sdk |
B | api |
C | .apk |
D | .exe |
E | .ipa |
Question 71 |
A | Pro |
B | Enterprise |
C | Home |
D | Standard |
Question 72 |
A | ipconfig |
B | ping |
C | netstat |
D | ipconfig /all |
E | ipconfig /renew |
Question 73 |
A | Microsoft |
B | IBM |
C | WWF |
D | CompTIA |
E | Apple |
Question 74 |
A | passwords |
B | keys |
C | tokens |
D | root CA |
Question 75 |
A | Whaling |
B | Impersonation |
C | Spoofing |
D | Spear phishing |
Question 76 |
A | 4 GB |
B | 6 GB |
C | 2 GB |
D | 512 MB |
E | 1 GB |
Question 77 |
A | Install to a USB drive |
B | Install to a DVD-RW |
C | Install to a secondary internal HDD |
D | Install to a network drive |
Question 78 |
A | Power user |
B | Guest |
C | Domain Admin |
D | Administrator |
Question 79 |
A | pad and chmod |
B | ls and chown |
C | sudo and vi |
D | ps and kill |
E | cp and rm |
Question 80 |
A | Display Settings |
B | Sync Center |
C | User Accounts |
D | Folder Options |
Question 81 |
A | CMD |
B | devmgmt.msc |
C | mtg |
D | secpol.msc |
E | MMC |
Question 82 |
A | Delete and clear Java Temporary Internet Files. |
B | Reinstall Java on the affected workstation. |
C | Ask the customer to use a different web browser. |
D | Ask the customer to find an application that does not use Java. |
Question 83 |
A | Snap-ins |
B | Files |
C | Applets |
D | Directories |
Question 84 |
A | Sysprep |
B | Image Copy |
C | Robocopy |
D | Ghost |
E | Image Clone |
Question 85 |
A | Hard drive/SSD |
B | CD-ROM |
C | Memory |
D | Driver |
Question 86 |
A | VPN |
B | WLAN |
C | VLAN |
D | 5G LTE |
E | WWAN |
Question 87 |
A | PowerShell |
B | DOS |
C | Command Prompt |
D | VB Script |
Question 88 |
A | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
B | Windows user account authentication is more secure than BitLocker. |
C | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
D | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
E | Windows user account authentication can only be used with a Windows Server Domain Controller. |
Question 89 |
A | Volume license |
B | Corporate license |
C | Enterprise license |
D | Open license |
E | Personal license |
Question 90 |
A | loop , run |
B | conditional statement , iteration |
C | conditional statement , run |
D | loop , iteration |
Question 91 |
A | Android |
B | iOS |
C | Windows 98 |
D | Windows 10 |
E | macOS |
Question 92 |
A | Taskkill |
B | Mac Management |
C | Time Machine |
D | Task Manager |
E | Force quit |
Question 93 |
A | Windows Aero |
B | HomeGroup |
C | Windows Defender |
D | Sync Center |
E | Windows Domain |
Question 94 |
A | Run a driver update check for the specified software. |
B | Invoice the customer. |
C | Document your solution. |
D | Move on to the server to a different node or VLAN on the network. |
Question 95 |
A | Backout plan |
B | Plan for change |
C | Business processes |
D | End-user acceptance |
E | Request for proposal |
F | Risk analysis |
Question 96 |
A | VNC |
B | SSH |
C | RDP |
D | Telnet |
Question 97 |
A | HKEY_LOCAL_MACHINE |
B | HKEY_CURRENT_CONFIG |
C | HKEY_CLASSES_ROOT |
D | HKEY_USERS |
Question 98 |
A | PowerShell |
B | Windows Firewall |
C | OneDrive |
D | Compatibility mode |
Question 99 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | Brute force attack |
B | DDoS attack |
C | HTTP attack |
D | Malicious attack |
E | Session hijacking attack |
Question 100 |
A | SD |
B | MD |
C | CD |
D | RD |
E | dir |
Question 101 |
A | Logon times |
B | User access control |
C | UEFI boot mode |
D | Date and time |
Question 102 |
A | BIOS password |
B | Windows administrator user account |
C | Windows user account |
D | BitDefender |
E | BitLocker |
Question 103 |
A | dirc |
B | Passwd |
C | Ls |
D | Chmod |
E | Chown |
Question 104 |
A | System Information |
B | Msconfig |
C | Chkdsk |
D | Task Manager |
Question 105 |
A | ipconfig help |
B | ipconfig /? |
C | ipconfig man |
D | man ipconfig |
Question 106 |
A | Boot the workstation in safe mode and disable the graphics driver system tray menu |
B | Boot the workstation in safe mode and disable Windows driver signing requirements |
C | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
D | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
Question 107 |
A | deltask |
B | process -del |
C | process -k |
D | taskkill |
E | delprocess |
Question 108 |
A | boot |
B | Program Files |
C | Users |
D | Windows |
E | System32 |
Question 109 |
A | Enabling sharing |
B | Adding ports |
C | Modifying spool settings |
D | Pausing printing |
Question 110 |
A | The Android Kernel version must be different bvetwen the manufactures. |
B | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
C | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
D | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
E | Each manufacturer has their own customized Launchers that modify the GUI. |
Question 111 |
A | Within the Start menu |
B | In the System Properties dialog box |
C | On the taskbar |
D | In the System32 folder |
Question 112 |
A | Trusted Mobile Platform (TMP) |
B | App Store |
C | Spotlight |
D | Google Play |
E | iTunes |
Question 113 |
A | Roll back the OS upgrade. Continue using the older version of Windows |
B | Update the SATA controller driver from the manufacturers website |
C | Perform a full backup and replace the hard drive |
D | Reset the PC to its factory conditions. Perform the OS upgrade again |
Question 114 |
A | Windows Task Manager |
B | Windows Task Scheduler |
C | Windows Control Panel |
D | Performance Monitor |
E | Windows Registry |
Question 115 |
A | Reprimand the user and apply a content filter
to the user’s profile. |
B | Document the incident and purge all policy-violating materials. |
C | Immediately delete all unauthorized materials. |
D | Secure the workstation in a limited access
facility. |
E | Delete the bit torrent application and contact the affected copyright holders. |
Question 116 |
A | Reset Your PC |
B | Windows Registry |
C | System Restore |
D | File History |
E | Startup Repair |
Question 117 |
A | Seat license |
B | Open source license |
C | Commercial license |
D | Enterprise license |
Question 118 |
A | Network-level firewall policies |
B | Domain-level group policies |
C | Antivirus domain-level policies |
D | Local-level user policies |
E | Local-level firewall policies |
Question 119 |
A | Ver |
B | Dir |
C | MD |
D | CD |
E | Ping |
Question 120 |
A | Rebuild the users mail profile |
B | Check for and apply software updates |
C | Add the user to the local administrators group |
D | Perform repair installation on the application |
Question 121 |
A | Do nothing. |
B | Educate the customer on how to avoid malware. |
C | Reinstall the antivirous and malware software. |
D | Change the user account permissions to restrict access. |
E | Replace the hard drive. |
Question 122 |
A | Using msconfig Services tab. |
B | Using msconfig Boot tab. |
C | Using msconfig Tools tab. |
D | Using msconfig General tab. |
Question 123 |
A | Look for program features and the minimum hardware requirements. |
B | Update the Windows drivers on the computer. |
C | Verify that the install is allowed under the company’s licensing agreements. |
D | Read the manual on how HR is going to use the software. |
Question 124 |
A | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
B | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
C | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
D | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
Question 125 |
A | Ask Sara why she has this type of folder on her work computer. |
B | Install the software and ignore the folder. |
C | Contact the Manager of the company immediately. |
D | Open the folder to investigate the content, but do not open the images. |
E | Open the folder and enjoy the images. |
Question 126 |
A | Mobile Device Management (MDM) policies |
B | VPN configuration or inactive VPN. |
C | Anti-virous and anti-malware software intefrence. |
D | Unsigned drivers or untrusted software. |
Question 127 |
A | Minimum password age |
B | Enforce password history |
C | Minimum password length |
D | Complexity requirements |
Question 128 |
A | Power users |
B | Guest |
C | Standard user |
D | Administrator |
Question 129 |
A | Set a strong password that requires a renewal every 30 days. |
B | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
C | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
D | Display a message on lock screen advising users how importnat to lock their computer. |
E | Create a group policy to set minimum password standards. |
Question 130 |
A | Windows 10 Home |
B | Windows 10 Education |
C | Windows 10 Enterprise |
D | Windows 10 Pro |
Question 131 |
A | Task Manager |
B | Device Manager |
C | TRIM |
D | Power plans |
E | Display properties |
Question 132 |
A | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
B | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
C | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
D | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
Question 133 |
A | Brute force |
B | Session hijacking |
C | Phishing |
D | DDoS |
E | Malicious attack |
Question 134 |
A | Regedit |
B | gettingstarted |
C | DxDiag |
D | perfmon.msc |
E | Ipconfig |
Question 135 |
A | winload.exe |
B | shell.adb |
C | startup.exe |
D | system32.exe |
E | setup.exe |
Question 136 |
A | Safe Mode |
B | Task Manager |
C | ifconfig |
D | Msconfig |
Question 137 |
A | Execute the file as3final.py in notepad++ |
B | Open file as3final.py file using the program notepad++ |
C | Change the file name from notepad to as3final.py |
D | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
E | Execute the file notepad++ in as3final.py |
Question 138 |
A | Compatibility across different OS providers such as Windows, Linux and Mac. |
B | Better driver encryption and support for cryptology. |
C | Support for single large files over 4GB. |
D | Low drive failure rates. |
E | Lower power consumption. |
Question 139 |
A | Administrative Tools |
B | Task Manager |
C | Disk Management |
D | Msconfig |
Question 140 |
A | MD |
B | RD |
C | dir |
D | SD |
E | CD |
Question 141 |
A | Windows Task Scheduler |
B | MS-DOS Control Panel |
C | Windows Registry |
D | Windows Task Manager |
E | Windows Control Panel |
Question 142 |
A | CompTIA |
B | WWF |
C | IBM |
D | Microsoft |
E | Apple |
Question 143 |
A | The 64-bit architecture has an upper RAM limit of 128 GB. |
B | The 32-bit architecture has an upper RAM limit of 64 GB. |
C | The 64-bit version is also known as x86. |
D | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
E | Windows 10 only comes in 64-bit version. |
Question 144 |
A | Folder Redirection |
B | Security Groups |
C | Group Policy |
D | Home Folder |
Question 145 |
A | diskpart |
B | robocopy |
C | chkdsk /F |
D | tracert /w |
Question 146 |
A | It may result in damage to the device. |
B | It may interfere with other signed drivers installed on the device. |
C | It may result in random reboots. |
D | It may lead to instability issues. |
Question 147 |
A | Dxdiag |
B | Sigverif |
C | Regedit |
D | Ping |
E | Msconfig |
Question 148 |
A | REM |
B | Rebuild |
C | Replace |
D | Convert |
E | Recover |
Question 149 |
A | Copy system files. |
B | Run chkdsk. |
C | Defragment the drive. |
D | Partition the drive. |
Question 150 |
A | CONVERT |
B | CHKNTFS |
C | IPCONFIG |
D | NETDOM |
Question 151 |
A | Disconnect and then reconnect the stylus |
B | Disable and then reenable Bluetooth |
C | Restart the tablet |
D | Calibrate the touchscreen sensor |
Question 152 |
A | chkdsk C: /R |
B | chkdsk C: /I |
C | chkdsk /sec |
D | chkdsk C: /F |
E | chkdsk C: /C |
Question 153 |
A | sbin |
B | ls |
C | cat |
D | bash |
Question 154 |
A | Net time |
B | Net timer |
C | Timeset |
D | Net time set |
E | Time |
Question 155 |
A | First left |
B | Center |
C | First right |
D | None of the answers are correct |
Question 156 |
A | Disable logon time restrictions |
B | Block all unused ports on the LAN smart switch |
C | Enforce password complexity |
D | Put the terminal server into the routers DMZ |
E | Change the default access port |
F | Use the local client certificate for server authentication |
Question 157 |
A | Ubuntu OS |
B | Chrome OS |
C | macOS |
D | Android OS |
E | Windows 10 |
Question 158 |
A | Multi-boot |
B | Dynamic |
C | PXE |
D | GPT |
Question 159 |
A | Remove and reinstall the application |
B | Reconnect the wireless network connection |
C | Hard reset the cell phone |
D | Close all running applications |
Question 160 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /fixmbr |
B | bootrec /fixboot |
C | boot\bcd |
D | bootrec /rebuildbcd |
E | bootrec /restore |
Question 161 |
A | setupact.log |
B | setuperr.log |
C | unattend.xml |
D | diskmgmt.msc |
Question 162 |
A | ls |
B | ifconfig |
C | ipconfig /all |
D | ipaddr /all |
E | chown |
Question 163 |
A | C:\Users\%root%\Documents |
B | C:\Documents and Settings\%username%\Documents |
C | C:\Users\System32\Documents |
D | C:\Users\%username%\Documents |
Question 164 |
A | Rooting |
B | Grant superadmin |
C | Open shell access |
D | VirusBarrier |
E | Jailbreaking |
Question 165 |
A | The printing system is running. |
B | Windows Update is running. |
C | Drivers are being downloaded by the Device Manager. |
D | Hyper-Threading has been disabled. |
E | Virus infection of the C drive. |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.