← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | FAT32 |
B | GPT |
C | MBR |
D | Dynamic drive |
Question 2 |
A | Reinstall the Windows OS. |
B | Reinstall the CAD program. |
C | Replace the hard drive. |
D | Check the RAM configuration. |
E | Upgrade the video drivers. |
Question 3 |
A | Spear phishing |
B | Spoofing |
C | Impersonation |
D | Whaling |
Question 4 |
A | Windows 10 Pro |
B | Windows 10 Home |
C | Windows 10 Enterprise |
D | Windows 10 Education |
Question 5 |
A | Windows Task Manager |
B | Performance Monitor |
C | Windows Control Panel |
D | Windows Task Scheduler |
E | Windows Registry |
Question 6 |
A | \%systemroot%\System32 |
B | \%systemroot%\System32\Config |
C | \%systemroot%\Windows |
D | \%systemroot%\Windows\System32\Con
fig |
Question 7 |
A | MD |
B | CD |
C | RD |
D | SD |
E | dir |
Question 8 |
A | REM |
B | Convert |
C | Replace |
D | Recover |
E | Rebuild |
Question 9 |
A | MMC |
B | devmgmt.msc |
C | mtg |
D | CMD |
E | secpol.msc |
Question 10 |
A | System Information |
B | Chkdsk |
C | Msconfig |
D | Task Manager |
Question 11 |
A | Open the old hard drive case and use ESD to destory the circuitry. |
B | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
C | Completely erase the old drive prior to disposal. |
D | Format the old hard drive multiple times before deposal. |
Question 12 |
A | Install an intrusion detection system (IDS). |
B | Disable the SSID broadcast. |
C | Install a firewall and enforce rules. |
D | Disconnect the Internet connection to the LAN. |
E | Install an antivirus on the main server. |
Question 13 |
A | System Management |
B | Event Viewer |
C | Gparted |
D | DiskPart |
E | Disk Management |
Question 14 |
A | Files |
B | Snap-ins |
C | Directories |
D | Applets |
Question 15 |
A | Using msconfig Tools tab. |
B | Using msconfig Boot tab. |
C | Using msconfig Services tab. |
D | Using msconfig General tab. |
Question 16 |
A | chkdsk C: /I |
B | chkdsk C: /C |
C | chkdsk C: /R |
D | chkdsk C: /F |
E | chkdsk /sec |
Question 17 |
A | Minimum password length |
B | Minimum password age |
C | Enforce password history |
D | Complexity requirements |
Question 18 |
A | Home |
B | Standard |
C | Pro |
D | Enterprise |
Question 19 |
A | Trusted Mobile Platform (TMP) |
B | iTunes |
C | App Store |
D | Google Play |
E | Spotlight |
Question 20 |
A | dir /? |
B | dir /d |
C | dir /a |
D | dir -1 |
E | dir /o |
Question 21 |
A | HKEY_LOCAL_MACHINE |
B | HKEY_USERS |
C | HKEY_CLASSES_ROOT |
D | HKEY_CURRENT_CONFIG |
Question 22 |
A | Secure Shell |
B | SSO |
C | MFA |
D | Inheritance |
E | Propagation |
Question 23 |
A | Ask the owner to move the files from the server to a local computer |
B | Rename the folder on the server, and notify the information security officer |
C | Move the folder to another location on the server, and notify the local authorities |
D | Promptly notify the administrator's immediate supervisor |
Question 24 |
A | Contact HR immediately and seek advice. |
B | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
C | Contact a lawyer as this breaches the professional conduct policies. |
D | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
E | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
Question 25 |
A | Move on to the server to a different node or VLAN on the network. |
B | Run a driver update check for the specified software. |
C | Invoice the customer. |
D | Document your solution. |
Question 26 |
A | Call the building supervisor to make sure there is enough solder for others. |
B | Consult the MSDS for the solder spool. |
C | Do not attempt to repair a motherboard. It is better to buy a new one. |
D | Check the temperature at which the solder should be applied. |
Question 27 |
A | dir |
B | RD |
C | MD |
D | SD |
E | CD |
Question 28 |
A | Ping |
B | Dir |
C | MD |
D | CD |
E | Ver |
Question 29 |
A | Format command |
B | Disk Management |
C | Computer Management |
D | Disk Cleanup utility |
Question 30 |
A | .sdk |
B | .apk |
C | .ipa |
D | .exe |
E | api |
Question 31 |
A | Verify that the install is allowed under the company’s licensing agreements. |
B | Look for program features and the minimum hardware requirements. |
C | Update the Windows drivers on the computer. |
D | Read the manual on how HR is going to use the software. |
Question 32 |
A | BitDefender |
B | BitLocker |
C | Windows administrator user account |
D | Windows user account |
E | BIOS password |
Question 33 |
A | Ubuntu OS |
B | Windows 10 |
C | Android OS |
D | macOS |
E | Chrome OS |
Question 34 |
A | Unplug the power and re-plug it without powering down the workstation. |
B | Run Windows updates. |
C | Initialize the drive. |
D | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
E | Format and partition the drive. |
Question 35 |
A | Task Manager |
B | ifconfig |
C | Safe Mode |
D | Msconfig |
Question 36 |
A | Corporate license |
B | Volume license |
C | Enterprise license |
D | Personal license |
E | Open license |
Question 37 |
A | MMC |
B | Control Panel |
C | Command Prompt |
D | Task Manager |
Question 38 |
A | IPCONFIG |
B | CONVERT |
C | CHKNTFS |
D | NETDOM |
Question 39 |
A | VNC |
B | RDP |
C | Telnet |
D | SSH |
Question 40 |
A | Reconnect the wireless network connection |
B | Hard reset the cell phone |
C | Remove and reinstall the application |
D | Close all running applications |
Question 41 |
A | iOS |
B | Ubuntu |
C | Mac OS |
D | Android |
E | Windows 10 |
Question 42 |
A | Change the location of the system32 |
B | Convert the file system to NTFS. |
C | Disable UAC. |
D | Defrag the hard drive. |
E | Enable TPM in the BIOS/UEFI. |
Question 43 |
A | hives |
B | regedit |
C | reg |
D | winreg |
E | registry |
Question 44 |
A | Services |
B | Event Viewer |
C | Task Scheduler |
D | Task Manager |
Question 45 |
A | Seat license |
B | Enterprise license |
C | Commercial license |
D | Open source license |
Question 46 |
A | Anti-virous and anti-malware software intefrence. |
B | VPN configuration or inactive VPN. |
C | Mobile Device Management (MDM) policies |
D | Unsigned drivers or untrusted software. |
Question 47 |
A | Security Policy |
B | System Configuration |
C | Component Services |
D | Local Users and Groups |
Question 48 |
A | .sh |
B | .js |
C | .vbs |
D | .bat |
Question 49 |
A | Program Files |
B | Program Files (x86) |
C | Systemroot |
D | System32 |
Question 50 |
A | The 64-bit version is also known as x86. |
B | Windows 10 only comes in 64-bit version. |
C | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
D | The 64-bit architecture has an upper RAM limit of 128 GB. |
E | The 32-bit architecture has an upper RAM limit of 64 GB. |
Question 51 |
A | Disconnect the computer from the office network. |
B | Reboot the computer in order to make sure all other programs are terminated. |
C | Run a System Restore. |
D | Research the virus and how to remove it. |
E | Rollback OS and driver updates. |
Question 52 |
A | NTFS supports larger file sizes. |
B | NTFS supports more file formats. |
C | NTFS supports larger volumes. |
D | NTFS supports file encryption. |
Question 53 |
A | Task Manager |
B | Computer Management |
C | Control Panel |
D | Force quit |
E | Tasklist |
Question 54 |
A | Organization security and content policy supersede all other legal policies of the country which the company operates. |
B | Organization security and content policy must follow the legal policies of the country which the company operates. |
C | Organization security and content policy typically do not apply to executive staff. |
D | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
E | Organization security and content policies are not part of the majority of government organizations. |
Question 55 |
A | Corporate license |
B | Enterprise license |
C | Open license |
D | Volume license |
E | Personal license |
Question 56 |
A | /B |
B | /E |
C | /S |
D | /DCOPY:T |
E | /sub-1 |
F | /D |
Question 57 |
A | Date and time |
B | Logon times |
C | UEFI boot mode |
D | User access control |
Question 58 |
A | Commercial license |
B | Open source license |
C | Enterprise license |
D | Seat license |
Question 59 |
A | Partition the drive. |
B | Run chkdsk. |
C | Copy system files. |
D | Defragment the drive. |
Question 60 |
A | Replace the router with an upgraded unit. |
B | Reconfigure the gaming consoles' network interfaces. |
C | Power cycle the network appliances. |
D | Replace the IP camera system with a new one. |
E | Factory reset the gaming consoles. |
F | Configure router QoS engine with service priority for gaming applications. |
Question 61 |
A | 2 GB |
B | 512 MB |
C | 6 GB |
D | 1 GB |
E | 4 GB |
Question 62 |
A | PXE |
B | Multi-boot |
C | Dynamic |
D | GPT |
Question 63 |
A | Users |
B | Windows |
C | boot |
D | System32 |
E | Program Files |
Question 64 |
A | cleanmgr |
B | diskpart |
C | defrag |
D | chkdsk |
Question 65 |
A | Enforce password complexity |
B | Block all unused ports on the LAN smart switch |
C | Put the terminal server into the routers DMZ |
D | Disable logon time restrictions |
E | Use the local client certificate for server authentication |
F | Change the default access port |
Question 66 |
A | Task Manager |
B | Force quit |
C | Mac Management |
D | Taskkill |
E | Time Machine |
Question 67 |
A | Performance Monitor |
B | Device Manager |
C | Component Services |
D | Local Security Policy |
Question 68 |
A | Execute the file as3final.py in notepad++ |
B | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
C | Execute the file notepad++ in as3final.py |
D | Open file as3final.py file using the program notepad++ |
E | Change the file name from notepad to as3final.py |
Question 69 |
A | ITU-T |
B | EBCDIC |
C | PS1 |
D | ASCII |
E | Unicode |
Question 70 |
A | /D |
B | /DCOPY:T |
C | /S |
D | /RCOPY |
E | /B |
F | /sub-1 |
Question 71 |
A | cat |
B | sbin |
C | bash |
D | ls |
Question 72 |
A | deltask |
B | taskkill |
C | process -k |
D | delprocess |
E | process -del |
Question 73 |
A | Enabling sharing |
B | Pausing printing |
C | Adding ports |
D | Modifying spool settings |
Question 74 |
A | Revert the computer back to the last stable Windows service pack. |
B | Uninstall firewall applications and disable all firewall rules. |
C | Reboot the router. |
D | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
E | Reboot the network cameras. |
Question 75 |
A | loop , iteration |
B | conditional statement , run |
C | conditional statement , iteration |
D | loop , run |
Question 76 |
A | Memory |
B | Driver |
C | CD-ROM |
D | Hard drive/SSD |
Question 77 |
A | Domain Admin |
B | Administrator |
C | Power user |
D | Guest |
Question 78 |
A | Healthy partition |
B | FAT32 partition |
C | Primary partition |
D | Disk 1 |
E | Disk 0 |
Question 79 |
A | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
B | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
C | It would be very difficualt and will require specialized laborotory to recover the data. |
D | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
Question 80 |
A | Session hijacking |
B | Brute force |
C | Phishing |
D | Malicious attack |
E | DDoS |
Question 81 |
A | Local Security Policy |
B | Active Directory Policy |
C | OU Group Policy |
D | Site Policy |
Question 82 |
A | Open shell access |
B | Jailbreaking |
C | Rooting |
D | Grant superadmin |
E | VirusBarrier |
Question 83 |
A | Setup log |
B | Security log |
C | System log |
D | Application log |
E | Tasker log |
Question 84 |
A | WWF |
B | IBM |
C | CompTIA |
D | Apple |
E | Microsoft |
Question 85 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /fixmbr |
B | boot\bcd |
C | bootrec /fixboot |
D | bootrec /rebuildbcd |
E | bootrec /restore |
Question 86 |
A | System Restore |
B | Reset Your PC |
C | File History |
D | Windows Registry |
E | Startup Repair |
Question 87 |
A | Domain-level group policies |
B | Local-level firewall policies |
C | Antivirus domain-level policies |
D | Local-level user policies |
E | Network-level firewall policies |
Question 88 |
A | ipconfig |
B | ipconfig /all |
C | ping |
D | ipconfig /renew |
E | netstat |
Question 89 |
A | perfmon |
B | msconfig |
C | dxdiag |
D | regd |
E | taskmgr |
Question 90 |
A | Windows 98 |
B | iOS |
C | Android |
D | Windows 10 |
E | macOS |
Question 91 |
A | chkdsk C: /I |
B | chkdsk /sec |
C | chkdsk C: /R |
D | chkdsk C: /C |
E | chkdsk C: /F |
Question 92 |
A | Install to a DVD-RW |
B | Install to a network drive |
C | Install to a secondary internal HDD |
D | Install to a USB drive |
Question 93 |
A | Within the Start menu |
B | In the System32 folder |
C | In the System Properties dialog box |
D | On the taskbar |
Question 94 |
A | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
B | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
C | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
D | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
Question 95 |
A | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
B | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
C | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
D | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
Question 96 |
A | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
B | Display a message on lock screen advising users how importnat to lock their computer. |
C | Create a group policy to set minimum password standards. |
D | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
E | Set a strong password that requires a renewal every 30 days. |
Question 97 |
A | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
B | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
C | Notify the change team of the changes needed and perform the changes. |
D | Document the changes and perform the work. |
E | Submit the changes to the change board for approval. |
Question 98 |
A | Reprimand the user and apply a content filter
to the user’s profile. |
B | Immediately delete all unauthorized materials. |
C | Secure the workstation in a limited access
facility. |
D | Delete the bit torrent application and contact the affected copyright holders. |
E | Document the incident and purge all policy-violating materials. |
Question 99 |
A | Replace the hard drive. |
B | Change the user account permissions to restrict access. |
C | Do nothing. |
D | Reinstall the antivirous and malware software. |
E | Educate the customer on how to avoid malware. |
Question 100 |
A | Degauss |
B | Low-level format |
C | Standard format |
D | Drive wipe |
Question 101 |
A | WWF |
B | Microsoft |
C | CompTIA |
D | Apple |
E | IBM |
Question 102 |
A | dirc |
B | Chmod |
C | Ls |
D | Passwd |
E | Chown |
Question 103 |
A | spam bot |
B | worm |
C | spyware |
D | trojan |
Question 104 |
A | It may lead to instability issues. |
B | It may result in random reboots. |
C | It may interfere with other signed drivers installed on the device. |
D | It may result in damage to the device. |
Question 105 |
A | Windows+pause break |
B | Windows+M |
C | Windows+L |
D | Windows+R |
E | Ctrl+Alt+Del |
Question 106 |
A | Increase the closet's airflow. |
B | Set up dehumidifiers. |
C | Plug and check if the equipment is working. |
D | Install grounding bars. |
E | Implement a fire suppression system. |
Question 107 |
A | Administrative Tools |
B | Task Manager |
C | Msconfig |
D | Disk Management |
Question 108 |
A | Roll back the OS upgrade. Continue using the older version of Windows |
B | Update the SATA controller driver from the manufacturers website |
C | Perform a full backup and replace the hard drive |
D | Reset the PC to its factory conditions. Perform the OS upgrade again |
Question 109 |
A | Server and gateway |
B | IP address and DNS |
C | IP address and domain |
D | Server and domain |
Question 110 |
A | ipaddr /all |
B | chown |
C | ls |
D | ipconfig /all |
E | ifconfig |
Question 111 |
A | Folder Options |
B | Display Settings |
C | User Accounts |
D | Sync Center |
Question 112 |
A | Windows Firewall |
B | OneDrive |
C | PowerShell |
D | Compatibility mode |
Question 113 |
A | Boot the workstation in safe mode and disable the graphics driver system tray menu |
B | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
C | Boot the workstation in safe mode and disable Windows driver signing requirements |
D | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
Question 114 |
A | setupact.log |
B | setuperr.log |
C | unattend.xml |
D | diskmgmt.msc |
Question 115 |
A | MS PowerPoint |
B | MS Excel |
C | CMD |
D | Notepad |
E | MS Word |
Question 116 |
A | chkdsk /F |
B | tracert /w |
C | robocopy |
D | diskpart |
Question 117 |
A | Open the folder and enjoy the images. |
B | Open the folder to investigate the content, but do not open the images. |
C | Install the software and ignore the folder. |
D | Ask Sara why she has this type of folder on her work computer. |
E | Contact the Manager of the company immediately. |
Question 118 |
A | FAT32 |
B | FAT16 |
C | NTFS |
D | exFAT |
Question 119 |
A | Rebuild the users mail profile |
B | Perform repair installation on the application |
C | Add the user to the local administrators group |
D | Check for and apply software updates |
Question 120 |
A | This PC is running low on memory resources with a very high percentage is committed. |
B | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
C | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
D | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
E | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
Question 121 |
A | tokens |
B | root CA |
C | keys |
D | passwords |
Question 122 |
A | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
B | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
C | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
D | The Android Kernel version must be different bvetwen the manufactures. |
E | Each manufacturer has their own customized Launchers that modify the GUI. |
Question 123 |
A | Take everyone out to lunch get their mind off of the problem. |
B | Request that you need to speak to a senior Supervisor. |
C | Quit your job because of this work environment is toxic. |
D | Stay calm and do your job to best of your ability. |
E | Refer your panicking Supervisor and co-workers to professional counseling services. |
Question 124 |
A | MSDS |
B | chain of custody |
C | official documentation |
D | Incident Response Life Cycle |
E | incident response |
Question 125 |
A | Google Cloud Platform |
B | iCloud |
C | Local NAS |
D | Microsoft OneDrive |
Question 126 |
A | winload.exe |
B | setup.exe |
C | shell.adb |
D | startup.exe |
E | system32.exe |
Question 127 |
A | Compatibility across different OS providers such as Windows, Linux and Mac. |
B | Low drive failure rates. |
C | Support for single large files over 4GB. |
D | Lower power consumption. |
E | Better driver encryption and support for cryptology. |
Question 128 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | Malicious attack |
B | Brute force attack |
C | HTTP attack |
D | Session hijacking attack |
E | DDoS attack |
Question 129 |
A | Disable and then reenable Bluetooth |
B | Restart the tablet |
C | Calibrate the touchscreen sensor |
D | Disconnect and then reconnect the stylus |
Question 130 |
A | Virus infection of the C drive. |
B | Hyper-Threading has been disabled. |
C | The printing system is running. |
D | Drivers are being downloaded by the Device Manager. |
E | Windows Update is running. |
Question 131 |
A | Visual effects |
B | Page-file size |
C | Data execution prevention |
D | Processor scheduling |
Question 132 |
A | C:\Users\%username%\Documents |
B | C:\Documents and Settings\%username%\Documents |
C | C:\Users\System32\Documents |
D | C:\Users\%root%\Documents |
Question 133 |
A | Identify malware symptoms. |
B | Schedule scans and run updates. |
C | Disable System Restore. |
D | Enable System Restore. |
E | Quarantine infected systems. |
F | Remediate infected systems. |
Question 134 |
A | Ghost |
B | Image Clone |
C | Sysprep |
D | Image Copy |
E | Robocopy |
Question 135 |
A | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
B | Windows user account authentication is more secure than BitLocker. |
C | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
D | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
E | Windows user account authentication can only be used with a Windows Server Domain Controller. |
Question 136 |
A | Sync Center |
B | HomeGroup |
C | Windows Domain |
D | Windows Aero |
E | Windows Defender |
Question 137 |
A | .py1 |
B | .vbs |
C | .ps |
D | .py |
E | .ps1 |
Question 138 |
A | WWAN |
B | 5G LTE |
C | VLAN |
D | VPN |
E | WLAN |
Question 139 |
A | TRIM |
B | Device Manager |
C | Display properties |
D | Power plans |
E | Task Manager |
Question 140 |
A | Ipconfig |
B | gettingstarted |
C | Regedit |
D | perfmon.msc |
E | DxDiag |
Question 141 |
A | First right |
B | Center |
C | First left |
D | None of the answers are correct |
Question 142 |
A | perfmon.exe |
B | wintask |
C | eventvwr.msc |
D | systempropertiesadvanced.exe |
E | devmgmt.msc |
Question 143 |
A | ipconfig help |
B | ipconfig /? |
C | ipconfig man |
D | man ipconfig |
Question 144 |
A | Command Prompt |
B | PowerShell |
C | VB Script |
D | DOS |
Question 145 |
A | Net timer |
B | Net time set |
C | Net time |
D | Time |
E | Timeset |
Question 146 |
A | FAT32 |
B | exFAT |
C | ext4 |
D | NTFS |
Question 147 |
A | Run the CHKDSK /R command |
B | Disable all non-administrator accounts. |
C | Run Windows Update |
D | Disable network cards |
E | Disable System Restore |
Question 148 |
A | ls and chown |
B | ps and kill |
C | pad and chmod |
D | sudo and vi |
E | cp and rm |
Question 149 |
A | Guest |
B | Standard user |
C | Power users |
D | Administrator |
Question 150 |
A | diskmgmt.msc |
B | unattend.xml |
C | setupact.log |
D | setuperr.log |
Question 151 |
A | Dynamic partition |
B | Primary partition |
C | Secondary partition |
D | Extended partition |
E | USB drive |
Question 152 |
A | Disk 0 - 500 MB NTFS |
B | None of the partitions can be dismounted without crashing the system. |
C | Disk 1 |
D | Disk 0 - 465.27 MB NTFS |
Question 153 |
A | Regedit |
B | Dxdiag |
C | Sigverif |
D | Msconfig |
E | Ping |
Question 154 |
A | Domain name, location, IP address |
B | Domain name, location, asset ID |
C | Location, RFID |
D | Asset ID, MAC address |
Question 155 |
A | Group Policy |
B | Folder Redirection |
C | Security Groups |
D | Home Folder |
Question 156 |
A | Inheritance |
B | MFA |
C | SSO |
D | Propagation |
E | Secure Shell |
Question 157 |
A | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
B | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
C | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
D | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
Question 158 |
A | Grant superadmin |
B | Jailbreaking |
C | VirusBarrier |
D | Rooting |
E | Open shell access |
Question 159 |
A | Check the System log. |
B | Boot into the Safe Mode. |
C | Remove the network card. |
D | Run Msconfig. |
E | Run Chkdsk. |
Question 160 |
A | Risk analysis |
B | End-user acceptance |
C | Request for proposal |
D | Backout plan |
E | Plan for change |
F | Business processes |
Question 161 |
A | 6 GB |
B | 512 MB |
C | 2 GB |
D | 1 GB |
E | 4 GB |
Question 162 |
A | Services console |
B | Windows Registry |
C | File Explorer |
D | Device Manager |
E | Task Manager |
Question 163 |
A | Windows Task Scheduler |
B | Windows Control Panel |
C | Windows Registry |
D | Windows Task Manager |
E | MS-DOS Control Panel |
Question 164 |
A | Ask the customer to find an application that does not use Java. |
B | Delete and clear Java Temporary Internet Files. |
C | Reinstall Java on the affected workstation. |
D | Ask the customer to use a different web browser. |
Question 165 |
A | Brute force attack |
B | Social engineering |
C | Phishing attack |
D | Session hijacking attack |
E | DDoS attack |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.