← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | File History |
B | Startup Repair |
C | Reset Your PC |
D | Windows Registry |
E | System Restore |
Question 2 |
A | Quarantine infected systems. |
B | Identify malware symptoms. |
C | Remediate infected systems. |
D | Enable System Restore. |
E | Disable System Restore. |
F | Schedule scans and run updates. |
Question 3 |
A | MD |
B | Ping |
C | Dir |
D | CD |
E | Ver |
Question 4 |
A | ls and chown |
B | cp and rm |
C | pad and chmod |
D | sudo and vi |
E | ps and kill |
Question 5 |
A | Dynamic drive |
B | GPT |
C | FAT32 |
D | MBR |
Question 6 |
A | Using msconfig Services tab. |
B | Using msconfig Boot tab. |
C | Using msconfig General tab. |
D | Using msconfig Tools tab. |
Question 7 |
A | App Store |
B | Spotlight |
C | iTunes |
D | Trusted Mobile Platform (TMP) |
E | Google Play |
Question 8 |
A | Unicode |
B | ASCII |
C | ITU-T |
D | EBCDIC |
E | PS1 |
Question 9 |
A | Domain-level group policies |
B | Local-level firewall policies |
C | Local-level user policies |
D | Network-level firewall policies |
E | Antivirus domain-level policies |
Question 10 |
A | VPN configuration or inactive VPN. |
B | Mobile Device Management (MDM) policies |
C | Anti-virous and anti-malware software intefrence. |
D | Unsigned drivers or untrusted software. |
Question 11 |
A | conditional statement , iteration |
B | loop , run |
C | conditional statement , run |
D | loop , iteration |
Question 12 |
A | NTFS supports file encryption. |
B | NTFS supports larger volumes. |
C | NTFS supports larger file sizes. |
D | NTFS supports more file formats. |
Question 13 |
A | /RCOPY |
B | /B |
C | /sub-1 |
D | /S |
E | /D |
F | /DCOPY:T |
Question 14 |
A | Update the Windows drivers on the computer. |
B | Look for program features and the minimum hardware requirements. |
C | Verify that the install is allowed under the company’s licensing agreements. |
D | Read the manual on how HR is going to use the software. |
Question 15 |
A | \%systemroot%\System32 |
B | \%systemroot%\Windows |
C | \%systemroot%\System32\Config |
D | \%systemroot%\Windows\System32\Con
fig |
Question 16 |
A | Rename the folder on the server, and notify the information security officer |
B | Ask the owner to move the files from the server to a local computer |
C | Move the folder to another location on the server, and notify the local authorities |
D | Promptly notify the administrator's immediate supervisor |
Question 17 |
A | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
B | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
C | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
D | It would be very difficualt and will require specialized laborotory to recover the data. |
Question 18 |
A | Multi-boot |
B | GPT |
C | PXE |
D | Dynamic |
Question 19 |
A | wintask |
B | perfmon.exe |
C | systempropertiesadvanced.exe |
D | devmgmt.msc |
E | eventvwr.msc |
Question 20 |
A | Seat license |
B | Open source license |
C | Commercial license |
D | Enterprise license |
Question 21 |
A | unattend.xml |
B | diskmgmt.msc |
C | setuperr.log |
D | setupact.log |
Question 22 |
A | chkdsk C: /I |
B | chkdsk C: /C |
C | chkdsk C: /R |
D | chkdsk C: /F |
E | chkdsk /sec |
Question 23 |
A | NETDOM |
B | CHKNTFS |
C | CONVERT |
D | IPCONFIG |
Question 24 |
A | Convert the file system to NTFS. |
B | Disable UAC. |
C | Change the location of the system32 |
D | Defrag the hard drive. |
E | Enable TPM in the BIOS/UEFI. |
Question 25 |
A | Folder Redirection |
B | Home Folder |
C | Security Groups |
D | Group Policy |
Question 26 |
A | /sub-1 |
B | /E |
C | /S |
D | /B |
E | /D |
F | /DCOPY:T |
Question 27 |
A | Windows administrator user account |
B | Windows user account |
C | BIOS password |
D | BitLocker |
E | BitDefender |
Question 28 |
A | Rebuild the users mail profile |
B | Add the user to the local administrators group |
C | Perform repair installation on the application |
D | Check for and apply software updates |
Question 29 |
A | Organization security and content policy typically do not apply to executive staff. |
B | Organization security and content policy must follow the legal policies of the country which the company operates. |
C | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
D | Organization security and content policies are not part of the majority of government organizations. |
E | Organization security and content policy supersede all other legal policies of the country which the company operates. |
Question 30 |
A | The 64-bit version is also known as x86. |
B | The 64-bit architecture has an upper RAM limit of 128 GB. |
C | The 32-bit architecture has an upper RAM limit of 64 GB. |
D | Windows 10 only comes in 64-bit version. |
E | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
Question 31 |
A | Disconnect and then reconnect the stylus |
B | Restart the tablet |
C | Calibrate the touchscreen sensor |
D | Disable and then reenable Bluetooth |
Question 32 |
A | First right |
B | First left |
C | Center |
D | None of the answers are correct |
Question 33 |
A | ipconfig /all |
B | ls |
C | ifconfig |
D | chown |
E | ipaddr /all |
Question 34 |
A | Delete and clear Java Temporary Internet Files. |
B | Ask the customer to find an application that does not use Java. |
C | Reinstall Java on the affected workstation. |
D | Ask the customer to use a different web browser. |
Question 35 |
A | Do not attempt to repair a motherboard. It is better to buy a new one. |
B | Consult the MSDS for the solder spool. |
C | Check the temperature at which the solder should be applied. |
D | Call the building supervisor to make sure there is enough solder for others. |
Question 36 |
A | CD |
B | RD |
C | dir |
D | SD |
E | MD |
Question 37 |
A | Msconfig |
B | System Information |
C | Chkdsk |
D | Task Manager |
Question 38 |
A | Administrator |
B | Power user |
C | Domain Admin |
D | Guest |
Question 39 |
A | Enforce password history |
B | Minimum password age |
C | Complexity requirements |
D | Minimum password length |
Question 40 |
A | .py1 |
B | .vbs |
C | .ps1 |
D | .py |
E | .ps |
Question 41 |
A | RD |
B | dir |
C | CD |
D | MD |
E | SD |
Question 42 |
A | Local NAS |
B | Microsoft OneDrive |
C | Google Cloud Platform |
D | iCloud |
Question 43 |
A | Support for single large files over 4GB. |
B | Better driver encryption and support for cryptology. |
C | Low drive failure rates. |
D | Compatibility across different OS providers such as Windows, Linux and Mac. |
E | Lower power consumption. |
Question 44 |
A | Windows Task Manager |
B | Performance Monitor |
C | Windows Registry |
D | Windows Control Panel |
E | Windows Task Scheduler |
Question 45 |
A | Time Machine |
B | Taskkill |
C | Mac Management |
D | Task Manager |
E | Force quit |
Question 46 |
A | startup.exe |
B | system32.exe |
C | winload.exe |
D | shell.adb |
E | setup.exe |
Question 47 |
A | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
B | Run Windows updates. |
C | Unplug the power and re-plug it without powering down the workstation. |
D | Format and partition the drive. |
E | Initialize the drive. |
Question 48 |
A | taskkill |
B | process -del |
C | process -k |
D | delprocess |
E | deltask |
Question 49 |
A | Invoice the customer. |
B | Run a driver update check for the specified software. |
C | Document your solution. |
D | Move on to the server to a different node or VLAN on the network. |
Question 50 |
A | MSDS |
B | Incident Response Life Cycle |
C | incident response |
D | official documentation |
E | chain of custody |
Question 51 |
A | Boot the workstation in safe mode and disable Windows driver signing requirements |
B | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
C | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
D | Boot the workstation in safe mode and disable the graphics driver system tray menu |
Question 52 |
A | Corporate license |
B | Enterprise license |
C | Personal license |
D | Volume license |
E | Open license |
Question 53 |
A | unattend.xml |
B | setupact.log |
C | setuperr.log |
D | diskmgmt.msc |
Question 54 |
A | Task Manager |
B | Force quit |
C | Control Panel |
D | Tasklist |
E | Computer Management |
Question 55 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /fixboot |
B | bootrec /fixmbr |
C | boot\bcd |
D | bootrec /restore |
E | bootrec /rebuildbcd |
Question 56 |
A | 2 GB |
B | 512 MB |
C | 4 GB |
D | 1 GB |
E | 6 GB |
Question 57 |
A | Install a firewall and enforce rules. |
B | Install an antivirus on the main server. |
C | Install an intrusion detection system (IDS). |
D | Disconnect the Internet connection to the LAN. |
E | Disable the SSID broadcast. |
Question 58 |
A | api |
B | .apk |
C | .sdk |
D | .ipa |
E | .exe |
Question 59 |
A | Asset ID, MAC address |
B | Location, RFID |
C | Domain name, location, IP address |
D | Domain name, location, asset ID |
Question 60 |
A | robocopy |
B | diskpart |
C | chkdsk /F |
D | tracert /w |
Question 61 |
A | IBM |
B | Apple |
C | CompTIA |
D | Microsoft |
E | WWF |
Question 62 |
A | Plug and check if the equipment is working. |
B | Install grounding bars. |
C | Set up dehumidifiers. |
D | Increase the closet's airflow. |
E | Implement a fire suppression system. |
Question 63 |
A | .vbs |
B | .js |
C | .sh |
D | .bat |
Question 64 |
A | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
B | Windows user account authentication is more secure than BitLocker. |
C | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
D | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
E | Windows user account authentication can only be used with a Windows Server Domain Controller. |
Question 65 |
A | It may interfere with other signed drivers installed on the device. |
B | It may lead to instability issues. |
C | It may result in random reboots. |
D | It may result in damage to the device. |
Question 66 |
A | Task Manager |
B | Event Viewer |
C | Task Scheduler |
D | Services |
Question 67 |
A | Secondary partition |
B | Dynamic partition |
C | Extended partition |
D | Primary partition |
E | USB drive |
Question 68 |
A | Dxdiag |
B | Sigverif |
C | Regedit |
D | Msconfig |
E | Ping |
Question 69 |
A | Check the RAM configuration. |
B | Reinstall the CAD program. |
C | Replace the hard drive. |
D | Upgrade the video drivers. |
E | Reinstall the Windows OS. |
Question 70 |
A | Device Manager |
B | Performance Monitor |
C | Local Security Policy |
D | Component Services |
Question 71 |
A | Command Prompt |
B | Task Manager |
C | MMC |
D | Control Panel |
Question 72 |
A | Windows |
B | boot |
C | System32 |
D | Program Files |
E | Users |
Question 73 |
A | Commercial license |
B | Open source license |
C | Enterprise license |
D | Seat license |
Question 74 |
A | Standard format |
B | Drive wipe |
C | Low-level format |
D | Degauss |
Question 75 |
A | Install to a DVD-RW |
B | Install to a network drive |
C | Install to a secondary internal HDD |
D | Install to a USB drive |
Question 76 |
A | Disable all non-administrator accounts. |
B | Run the CHKDSK /R command |
C | Disable network cards |
D | Disable System Restore |
E | Run Windows Update |
Question 77 |
A | Modifying spool settings |
B | Pausing printing |
C | Enabling sharing |
D | Adding ports |
Question 78 |
A | Defragment the drive. |
B | Copy system files. |
C | Run chkdsk. |
D | Partition the drive. |
Question 79 |
A | msconfig |
B | regd |
C | perfmon |
D | dxdiag |
E | taskmgr |
Question 80 |
A | Page-file size |
B | Processor scheduling |
C | Visual effects |
D | Data execution prevention |
Question 81 |
A | dir /? |
B | dir /a |
C | dir /d |
D | dir -1 |
E | dir /o |
Question 82 |
A | winreg |
B | reg |
C | registry |
D | hives |
E | regedit |
Question 83 |
A | Sync Center |
B | Display Settings |
C | User Accounts |
D | Folder Options |
Question 84 |
A | keys |
B | tokens |
C | root CA |
D | passwords |
Question 85 |
A | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
B | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
C | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
D | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
Question 86 |
A | Execute the file as3final.py in notepad++ |
B | Change the file name from notepad to as3final.py |
C | Execute the file notepad++ in as3final.py |
D | Open file as3final.py file using the program notepad++ |
E | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
Question 87 |
A | Disk 1 |
B | Disk 0 - 465.27 MB NTFS |
C | None of the partitions can be dismounted without crashing the system. |
D | Disk 0 - 500 MB NTFS |
Question 88 |
A | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
B | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
C | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
D | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
Question 89 |
A | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
B | Each manufacturer has their own customized Launchers that modify the GUI. |
C | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
D | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
E | The Android Kernel version must be different bvetwen the manufactures. |
Question 90 |
A | WWAN |
B | WLAN |
C | VPN |
D | 5G LTE |
E | VLAN |
Question 91 |
A | Server and gateway |
B | IP address and domain |
C | Server and domain |
D | IP address and DNS |
Question 92 |
A | On the taskbar |
B | Within the Start menu |
C | In the System Properties dialog box |
D | In the System32 folder |
Question 93 |
A | Program Files (x86) |
B | Systemroot |
C | Program Files |
D | System32 |
Question 94 |
A | chkdsk C: /R |
B | chkdsk C: /F |
C | chkdsk C: /C |
D | chkdsk /sec |
E | chkdsk C: /I |
Question 95 |
A | Phishing |
B | Brute force |
C | Session hijacking |
D | DDoS |
E | Malicious attack |
Question 96 |
A | Take everyone out to lunch get their mind off of the problem. |
B | Quit your job because of this work environment is toxic. |
C | Request that you need to speak to a senior Supervisor. |
D | Refer your panicking Supervisor and co-workers to professional counseling services. |
E | Stay calm and do your job to best of your ability. |
Question 97 |
A | Put the terminal server into the routers DMZ |
B | Disable logon time restrictions |
C | Use the local client certificate for server authentication |
D | Block all unused ports on the LAN smart switch |
E | Change the default access port |
F | Enforce password complexity |
Question 98 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | HTTP attack |
B | Brute force attack |
C | DDoS attack |
D | Malicious attack |
E | Session hijacking attack |
Question 99 |
A | Reboot the router. |
B | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
C | Reboot the network cameras. |
D | Uninstall firewall applications and disable all firewall rules. |
E | Revert the computer back to the last stable Windows service pack. |
Question 100 |
A | HKEY_CURRENT_CONFIG |
B | HKEY_USERS |
C | HKEY_CLASSES_ROOT |
D | HKEY_LOCAL_MACHINE |
Question 101 |
A | Research the virus and how to remove it. |
B | Run a System Restore. |
C | Disconnect the computer from the office network. |
D | Reboot the computer in order to make sure all other programs are terminated. |
E | Rollback OS and driver updates. |
Question 102 |
A | Session hijacking attack |
B | Social engineering |
C | Phishing attack |
D | DDoS attack |
E | Brute force attack |
Question 103 |
A | DOS |
B | Command Prompt |
C | PowerShell |
D | VB Script |
Question 104 |
A | Windows Aero |
B | Windows Defender |
C | HomeGroup |
D | Windows Domain |
E | Sync Center |
Question 105 |
A | Factory reset the gaming consoles. |
B | Replace the IP camera system with a new one. |
C | Power cycle the network appliances. |
D | Replace the router with an upgraded unit. |
E | Configure router QoS engine with service priority for gaming applications. |
F | Reconfigure the gaming consoles' network interfaces. |
Question 106 |
A | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
B | Document the changes and perform the work. |
C | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
D | Submit the changes to the change board for approval. |
E | Notify the change team of the changes needed and perform the changes. |
Question 107 |
A | C:\Documents and Settings\%username%\Documents |
B | C:\Users\System32\Documents |
C | C:\Users\%root%\Documents |
D | C:\Users\%username%\Documents |
Question 108 |
A | VNC |
B | SSH |
C | RDP |
D | Telnet |
Question 109 |
A | Microsoft |
B | Apple |
C | IBM |
D | CompTIA |
E | WWF |
Question 110 |
A | Reprimand the user and apply a content filter
to the user’s profile. |
B | Secure the workstation in a limited access
facility. |
C | Document the incident and purge all policy-violating materials. |
D | Immediately delete all unauthorized materials. |
E | Delete the bit torrent application and contact the affected copyright holders. |
Question 111 |
A | Task Manager |
B | Display properties |
C | Device Manager |
D | TRIM |
E | Power plans |
Question 112 |
A | ipconfig /all |
B | ipconfig |
C | ping |
D | ipconfig /renew |
E | netstat |
Question 113 |
A | 2 GB |
B | 6 GB |
C | 1 GB |
D | 4 GB |
E | 512 MB |
Question 114 |
A | ipconfig man |
B | ipconfig /? |
C | man ipconfig |
D | ipconfig help |
Question 115 |
A | Do nothing. |
B | Reinstall the antivirous and malware software. |
C | Replace the hard drive. |
D | Educate the customer on how to avoid malware. |
E | Change the user account permissions to restrict access. |
Question 116 |
A | iOS |
B | Android |
C | macOS |
D | Windows 98 |
E | Windows 10 |
Question 117 |
A | cat |
B | bash |
C | ls |
D | sbin |
Question 118 |
A | Driver |
B | Hard drive/SSD |
C | Memory |
D | CD-ROM |
Question 119 |
A | Ghost |
B | Sysprep |
C | Robocopy |
D | Image Copy |
E | Image Clone |
Question 120 |
A | Computer Management |
B | Disk Cleanup utility |
C | Disk Management |
D | Format command |
Question 121 |
A | Chmod |
B | dirc |
C | Passwd |
D | Chown |
E | Ls |
Question 122 |
A | Chrome OS |
B | Ubuntu OS |
C | Windows 10 |
D | Android OS |
E | macOS |
Question 123 |
A | Backout plan |
B | Risk analysis |
C | End-user acceptance |
D | Request for proposal |
E | Business processes |
F | Plan for change |
Question 124 |
A | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
B | Create a group policy to set minimum password standards. |
C | Display a message on lock screen advising users how importnat to lock their computer. |
D | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
E | Set a strong password that requires a renewal every 30 days. |
Question 125 |
A | Jailbreaking |
B | VirusBarrier |
C | Grant superadmin |
D | Rooting |
E | Open shell access |
Question 126 |
A | perfmon.msc |
B | Ipconfig |
C | Regedit |
D | DxDiag |
E | gettingstarted |
Question 127 |
A | Task Manager |
B | Msconfig |
C | Administrative Tools |
D | Disk Management |
Question 128 |
A | Application log |
B | Tasker log |
C | System log |
D | Security log |
E | Setup log |
Question 129 |
A | Gparted |
B | DiskPart |
C | Disk Management |
D | System Management |
E | Event Viewer |
Question 130 |
A | Hard reset the cell phone |
B | Reconnect the wireless network connection |
C | Remove and reinstall the application |
D | Close all running applications |
Question 131 |
A | Primary partition |
B | Healthy partition |
C | Disk 1 |
D | FAT32 partition |
E | Disk 0 |
Question 132 |
A | Spoofing |
B | Impersonation |
C | Spear phishing |
D | Whaling |
Question 133 |
A | Windows 10 Pro |
B | Windows 10 Home |
C | Windows 10 Enterprise |
D | Windows 10 Education |
Question 134 |
A | Contact a lawyer as this breaches the professional conduct policies. |
B | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
C | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
D | Contact HR immediately and seek advice. |
E | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
Question 135 |
A | Propagation |
B | MFA |
C | Secure Shell |
D | Inheritance |
E | SSO |
Question 136 |
A | Guest |
B | Standard user |
C | Power users |
D | Administrator |
Question 137 |
A | Task Manager |
B | Msconfig |
C | ifconfig |
D | Safe Mode |
Question 138 |
A | MS PowerPoint |
B | CMD |
C | MS Excel |
D | Notepad |
E | MS Word |
Question 139 |
A | REM |
B | Replace |
C | Convert |
D | Recover |
E | Rebuild |
Question 140 |
A | Mac OS |
B | Android |
C | iOS |
D | Windows 10 |
E | Ubuntu |
Question 141 |
A | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
B | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
C | This PC is running low on memory resources with a very high percentage is committed. |
D | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
E | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
Question 142 |
A | Time |
B | Net time |
C | Net time set |
D | Timeset |
E | Net timer |
Question 143 |
A | secpol.msc |
B | mtg |
C | CMD |
D | MMC |
E | devmgmt.msc |
Question 144 |
A | Logon times |
B | User access control |
C | Date and time |
D | UEFI boot mode |
Question 145 |
A | Windows Registry |
B | Windows Task Scheduler |
C | Windows Task Manager |
D | MS-DOS Control Panel |
E | Windows Control Panel |
Question 146 |
A | Open the folder and enjoy the images. |
B | Ask Sara why she has this type of folder on her work computer. |
C | Install the software and ignore the folder. |
D | Contact the Manager of the company immediately. |
E | Open the folder to investigate the content, but do not open the images. |
Question 147 |
A | Device Manager |
B | Windows Registry |
C | Task Manager |
D | Services console |
E | File Explorer |
Question 148 |
A | worm |
B | spyware |
C | trojan |
D | spam bot |
Question 149 |
A | Directories |
B | Files |
C | Applets |
D | Snap-ins |
Question 150 |
A | OU Group Policy |
B | Active Directory Policy |
C | Site Policy |
D | Local Security Policy |
Question 151 |
A | Ctrl+Alt+Del |
B | Windows+L |
C | Windows+M |
D | Windows+pause break |
E | Windows+R |
Question 152 |
A | FAT32 |
B | ext4 |
C | NTFS |
D | exFAT |
Question 153 |
A | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
B | Format the old hard drive multiple times before deposal. |
C | Completely erase the old drive prior to disposal. |
D | Open the old hard drive case and use ESD to destory the circuitry. |
Question 154 |
A | Enterprise |
B | Home |
C | Standard |
D | Pro |
Question 155 |
A | Jailbreaking |
B | Rooting |
C | Grant superadmin |
D | Open shell access |
E | VirusBarrier |
Question 156 |
A | System Configuration |
B | Component Services |
C | Security Policy |
D | Local Users and Groups |
Question 157 |
A | Reset the PC to its factory conditions. Perform the OS upgrade again |
B | Perform a full backup and replace the hard drive |
C | Roll back the OS upgrade. Continue using the older version of Windows |
D | Update the SATA controller driver from the manufacturers website |
Question 158 |
A | Propagation |
B | SSO |
C | Secure Shell |
D | MFA |
E | Inheritance |
Question 159 |
A | FAT32 |
B | FAT16 |
C | NTFS |
D | exFAT |
Question 160 |
A | PowerShell |
B | OneDrive |
C | Windows Firewall |
D | Compatibility mode |
Question 161 |
A | Personal license |
B | Volume license |
C | Enterprise license |
D | Open license |
E | Corporate license |
Question 162 |
A | Windows Update is running. |
B | Drivers are being downloaded by the Device Manager. |
C | Virus infection of the C drive. |
D | The printing system is running. |
E | Hyper-Threading has been disabled. |
Question 163 |
A | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
B | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
C | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
D | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
Question 164 |
A | diskpart |
B | chkdsk |
C | cleanmgr |
D | defrag |
Question 165 |
A | Run Chkdsk. |
B | Run Msconfig. |
C | Boot into the Safe Mode. |
D | Check the System log. |
E | Remove the network card. |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.