← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Disconnect the Internet connection to the LAN. |
B | Install a firewall and enforce rules. |
C | Install an intrusion detection system (IDS). |
D | Disable the SSID broadcast. |
E | Install an antivirus on the main server. |
Question 2 |
A | Local Users and Groups |
B | Security Policy |
C | Component Services |
D | System Configuration |
Question 3 |
A | netstat |
B | ipconfig /renew |
C | ping |
D | ipconfig /all |
E | ipconfig |
Question 4 |
A | Local-level firewall policies |
B | Network-level firewall policies |
C | Antivirus domain-level policies |
D | Local-level user policies |
E | Domain-level group policies |
Question 5 |
A | /B |
B | /sub-1 |
C | /S |
D | /DCOPY:T |
E | /D |
F | /E |
Question 6 |
A | System Restore |
B | Startup Repair |
C | Reset Your PC |
D | File History |
E | Windows Registry |
Question 7 |
A | Boot the workstation in safe mode and disable the graphics driver system tray menu |
B | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
C | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
D | Boot the workstation in safe mode and disable Windows driver signing requirements |
Question 8 |
A | Upgrade the video drivers. |
B | Reinstall the CAD program. |
C | Replace the hard drive. |
D | Check the RAM configuration. |
E | Reinstall the Windows OS. |
Question 9 |
A | Dir |
B | Ping |
C | MD |
D | Ver |
E | CD |
Question 10 |
A | Stay calm and do your job to best of your ability. |
B | Refer your panicking Supervisor and co-workers to professional counseling services. |
C | Take everyone out to lunch get their mind off of the problem. |
D | Quit your job because of this work environment is toxic. |
E | Request that you need to speak to a senior Supervisor. |
Question 11 |
A | spyware |
B | worm |
C | trojan |
D | spam bot |
Question 12 |
A | DiskPart |
B | Gparted |
C | System Management |
D | Disk Management |
E | Event Viewer |
Question 13 |
A | Ask the owner to move the files from the server to a local computer |
B | Rename the folder on the server, and notify the information security officer |
C | Move the folder to another location on the server, and notify the local authorities |
D | Promptly notify the administrator's immediate supervisor |
Question 14 |
A | SSO |
B | MFA |
C | Inheritance |
D | Secure Shell |
E | Propagation |
Question 15 |
A | winload.exe |
B | setup.exe |
C | shell.adb |
D | startup.exe |
E | system32.exe |
Question 16 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /fixboot |
B | bootrec /restore |
C | bootrec /rebuildbcd |
D | bootrec /fixmbr |
E | boot\bcd |
Question 17 |
A | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
B | Run Windows updates. |
C | Unplug the power and re-plug it without powering down the workstation. |
D | Format and partition the drive. |
E | Initialize the drive. |
Question 18 |
A | Msconfig |
B | ifconfig |
C | Safe Mode |
D | Task Manager |
Question 19 |
A | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
B | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
C | Each manufacturer has their own customized Launchers that modify the GUI. |
D | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
E | The Android Kernel version must be different bvetwen the manufactures. |
Question 20 |
A | PowerShell |
B | Windows Firewall |
C | Compatibility mode |
D | OneDrive |
Question 21 |
A | Execute the file notepad++ in as3final.py |
B | Change the file name from notepad to as3final.py |
C | Open file as3final.py file using the program notepad++ |
D | Execute the file as3final.py in notepad++ |
E | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
Question 22 |
A | Phishing |
B | DDoS |
C | Brute force |
D | Session hijacking |
E | Malicious attack |
Question 23 |
A | Files |
B | Directories |
C | Snap-ins |
D | Applets |
Question 24 |
A | Windows administrator user account |
B | BitLocker |
C | BIOS password |
D | Windows user account |
E | BitDefender |
Question 25 |
A | HomeGroup |
B | Sync Center |
C | Windows Defender |
D | Windows Aero |
E | Windows Domain |
Question 26 |
A | USB drive |
B | Secondary partition |
C | Extended partition |
D | Dynamic partition |
E | Primary partition |
Question 27 |
A | Jailbreaking |
B | VirusBarrier |
C | Open shell access |
D | Grant superadmin |
E | Rooting |
Question 28 |
A | Msconfig |
B | Chkdsk |
C | System Information |
D | Task Manager |
Question 29 |
A | Personal license |
B | Open license |
C | Enterprise license |
D | Volume license |
E | Corporate license |
Question 30 |
A | Update the SATA controller driver from the manufacturers website |
B | Reset the PC to its factory conditions. Perform the OS upgrade again |
C | Roll back the OS upgrade. Continue using the older version of Windows |
D | Perform a full backup and replace the hard drive |
Question 31 |
A | Force quit |
B | Task Manager |
C | Tasklist |
D | Computer Management |
E | Control Panel |
Question 32 |
A | .ps1 |
B | .vbs |
C | .ps |
D | .py1 |
E | .py |
Question 33 |
A | Disable System Restore. |
B | Remediate infected systems. |
C | Identify malware symptoms. |
D | Enable System Restore. |
E | Quarantine infected systems. |
F | Schedule scans and run updates. |
Question 34 |
A | Passwd |
B | dirc |
C | Chmod |
D | Ls |
E | Chown |
Question 35 |
A | Time Machine |
B | Force quit |
C | Taskkill |
D | Mac Management |
E | Task Manager |
Question 36 |
A | Task Manager |
B | Control Panel |
C | Command Prompt |
D | MMC |
Question 37 |
A | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
B | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
C | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
D | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
Question 38 |
A | Task Scheduler |
B | Event Viewer |
C | Task Manager |
D | Services |
Question 39 |
A | Dxdiag |
B | Ping |
C | Regedit |
D | Sigverif |
E | Msconfig |
Question 40 |
A | NETDOM |
B | IPCONFIG |
C | CHKNTFS |
D | CONVERT |
Question 41 |
A | Administrative Tools |
B | Task Manager |
C | Msconfig |
D | Disk Management |
Question 42 |
A | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
B | Open the old hard drive case and use ESD to destory the circuitry. |
C | Completely erase the old drive prior to disposal. |
D | Format the old hard drive multiple times before deposal. |
Question 43 |
A | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
B | It would be very difficualt and will require specialized laborotory to recover the data. |
C | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
D | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
Question 44 |
A | IP address and domain |
B | Server and gateway |
C | Server and domain |
D | IP address and DNS |
Question 45 |
A | Windows+pause break |
B | Windows+M |
C | Windows+R |
D | Ctrl+Alt+Del |
E | Windows+L |
Question 46 |
A | chkdsk /F |
B | diskpart |
C | robocopy |
D | tracert /w |
Question 47 |
A | User Accounts |
B | Sync Center |
C | Folder Options |
D | Display Settings |
Question 48 |
A | Organization security and content policies are not part of the majority of government organizations. |
B | Organization security and content policy typically do not apply to executive staff. |
C | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
D | Organization security and content policy must follow the legal policies of the country which the company operates. |
E | Organization security and content policy supersede all other legal policies of the country which the company operates. |
Question 49 |
A | Ask the customer to use a different web browser. |
B | Reinstall Java on the affected workstation. |
C | Ask the customer to find an application that does not use Java. |
D | Delete and clear Java Temporary Internet Files. |
Question 50 |
A | Hard drive/SSD |
B | Driver |
C | CD-ROM |
D | Memory |
Question 51 |
A | System32 |
B | Windows |
C | Users |
D | boot |
E | Program Files |
Question 52 |
A | Within the Start menu |
B | In the System32 folder |
C | In the System Properties dialog box |
D | On the taskbar |
Question 53 |
A | \%systemroot%\System32 |
B | \%systemroot%\Windows\System32\Con
fig |
C | \%systemroot%\System32\Config |
D | \%systemroot%\Windows |
Question 54 |
A | 2 GB |
B | 4 GB |
C | 512 MB |
D | 1 GB |
E | 6 GB |
Question 55 |
A | Disk 0 - 465.27 MB NTFS |
B | Disk 0 - 500 MB NTFS |
C | Disk 1 |
D | None of the partitions can be dismounted without crashing the system. |
Question 56 |
A | HKEY_LOCAL_MACHINE |
B | HKEY_CURRENT_CONFIG |
C | HKEY_CLASSES_ROOT |
D | HKEY_USERS |
Question 57 |
A | System32 |
B | Program Files (x86) |
C | Program Files |
D | Systemroot |
Question 58 |
A | Incident Response Life Cycle |
B | chain of custody |
C | MSDS |
D | incident response |
E | official documentation |
Question 59 |
A | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
B | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
C | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
D | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
Question 60 |
A | Document the changes and perform the work. |
B | Notify the change team of the changes needed and perform the changes. |
C | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
D | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
E | Submit the changes to the change board for approval. |
Question 61 |
A | ipaddr /all |
B | ifconfig |
C | chown |
D | ls |
E | ipconfig /all |
Question 62 |
A | VLAN |
B | VPN |
C | WWAN |
D | 5G LTE |
E | WLAN |
Question 63 |
A | Sysprep |
B | Image Clone |
C | Robocopy |
D | Ghost |
E | Image Copy |
Question 64 |
A | loop , run |
B | conditional statement , run |
C | loop , iteration |
D | conditional statement , iteration |
Question 65 |
A | Uninstall firewall applications and disable all firewall rules. |
B | Reboot the network cameras. |
C | Revert the computer back to the last stable Windows service pack. |
D | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
E | Reboot the router. |
Question 66 |
A | The printing system is running. |
B | Hyper-Threading has been disabled. |
C | Virus infection of the C drive. |
D | Windows Update is running. |
E | Drivers are being downloaded by the Device Manager. |
Question 67 |
A | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
B | Windows user account authentication is more secure than BitLocker. |
C | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
D | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
E | Windows user account authentication can only be used with a Windows Server Domain Controller. |
Question 68 |
A | CompTIA |
B | Apple |
C | IBM |
D | WWF |
E | Microsoft |
Question 69 |
A | NTFS supports larger file sizes. |
B | NTFS supports more file formats. |
C | NTFS supports file encryption. |
D | NTFS supports larger volumes. |
Question 70 |
A | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
B | This PC is running low on memory resources with a very high percentage is committed. |
C | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
D | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
E | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
Question 71 |
A | Location, RFID |
B | Asset ID, MAC address |
C | Domain name, location, IP address |
D | Domain name, location, asset ID |
Question 72 |
A | wintask |
B | devmgmt.msc |
C | systempropertiesadvanced.exe |
D | eventvwr.msc |
E | perfmon.exe |
Question 73 |
A | Replace the hard drive. |
B | Change the user account permissions to restrict access. |
C | Educate the customer on how to avoid malware. |
D | Reinstall the antivirous and malware software. |
E | Do nothing. |
Question 74 |
A | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
B | The 32-bit architecture has an upper RAM limit of 64 GB. |
C | The 64-bit version is also known as x86. |
D | The 64-bit architecture has an upper RAM limit of 128 GB. |
E | Windows 10 only comes in 64-bit version. |
Question 75 |
A | FAT16 |
B | NTFS |
C | FAT32 |
D | exFAT |
Question 76 |
A | Install to a USB drive |
B | Install to a secondary internal HDD |
C | Install to a DVD-RW |
D | Install to a network drive |
Question 77 |
A | Standard format |
B | Drive wipe |
C | Low-level format |
D | Degauss |
Question 78 |
A | Using msconfig Services tab. |
B | Using msconfig General tab. |
C | Using msconfig Boot tab. |
D | Using msconfig Tools tab. |
Question 79 |
A | Set a strong password that requires a renewal every 30 days. |
B | Display a message on lock screen advising users how importnat to lock their computer. |
C | Create a group policy to set minimum password standards. |
D | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
E | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
Question 80 |
A | Update the Windows drivers on the computer. |
B | Read the manual on how HR is going to use the software. |
C | Look for program features and the minimum hardware requirements. |
D | Verify that the install is allowed under the company’s licensing agreements. |
Question 81 |
A | VNC |
B | SSH |
C | Telnet |
D | RDP |
Question 82 |
A | chkdsk C: /R |
B | chkdsk C: /F |
C | chkdsk /sec |
D | chkdsk C: /I |
E | chkdsk C: /C |
Question 83 |
A | pad and chmod |
B | sudo and vi |
C | cp and rm |
D | ls and chown |
E | ps and kill |
Question 84 |
A | Android |
B | Mac OS |
C | Ubuntu |
D | iOS |
E | Windows 10 |
Question 85 |
A | Rebuild |
B | Replace |
C | Recover |
D | Convert |
E | REM |
Question 86 |
A | Check the System log. |
B | Run Msconfig. |
C | Boot into the Safe Mode. |
D | Remove the network card. |
E | Run Chkdsk. |
Question 87 |
A | App Store |
B | Spotlight |
C | Google Play |
D | Trusted Mobile Platform (TMP) |
E | iTunes |
Question 88 |
A | Android |
B | Windows 10 |
C | iOS |
D | macOS |
E | Windows 98 |
Question 89 |
A | bash |
B | ls |
C | cat |
D | sbin |
Question 90 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | Malicious attack |
B | Brute force attack |
C | HTTP attack |
D | DDoS attack |
E | Session hijacking attack |
Question 91 |
A | None of the answers are correct |
B | First left |
C | Center |
D | First right |
Question 92 |
A | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
B | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
C | Contact HR immediately and seek advice. |
D | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
E | Contact a lawyer as this breaches the professional conduct policies. |
Question 93 |
A | .apk |
B | .sdk |
C | .exe |
D | api |
E | .ipa |
Question 94 |
A | Visual effects |
B | Page-file size |
C | Processor scheduling |
D | Data execution prevention |
Question 95 |
A | Plug and check if the equipment is working. |
B | Increase the closet's airflow. |
C | Set up dehumidifiers. |
D | Implement a fire suppression system. |
E | Install grounding bars. |
Question 96 |
A | taskkill |
B | deltask |
C | process -del |
D | process -k |
E | delprocess |
Question 97 |
A | setupact.log |
B | diskmgmt.msc |
C | unattend.xml |
D | setuperr.log |
Question 98 |
A | Notepad |
B | MS PowerPoint |
C | MS Word |
D | CMD |
E | MS Excel |
Question 99 |
A | VPN configuration or inactive VPN. |
B | Mobile Device Management (MDM) policies |
C | Unsigned drivers or untrusted software. |
D | Anti-virous and anti-malware software intefrence. |
Question 100 |
A | RD |
B | MD |
C | SD |
D | CD |
E | dir |
Question 101 |
A | Impersonation |
B | Whaling |
C | Spear phishing |
D | Spoofing |
Question 102 |
A | SSO |
B | Secure Shell |
C | Propagation |
D | MFA |
E | Inheritance |
Question 103 |
A | Performance Monitor |
B | Device Manager |
C | Local Security Policy |
D | Component Services |
Question 104 |
A | Disable logon time restrictions |
B | Use the local client certificate for server authentication |
C | Enforce password complexity |
D | Block all unused ports on the LAN smart switch |
E | Put the terminal server into the routers DMZ |
F | Change the default access port |
Question 105 |
A | Enterprise license |
B | Seat license |
C | Open source license |
D | Commercial license |
Question 106 |
A | OU Group Policy |
B | Local Security Policy |
C | Site Policy |
D | Active Directory Policy |
Question 107 |
A | WWF |
B | IBM |
C | CompTIA |
D | Apple |
E | Microsoft |
Question 108 |
A | It may interfere with other signed drivers installed on the device. |
B | It may lead to instability issues. |
C | It may result in random reboots. |
D | It may result in damage to the device. |
Question 109 |
A | Net timer |
B | Net time |
C | Timeset |
D | Time |
E | Net time set |
Question 110 |
A | GPT |
B | PXE |
C | Dynamic |
D | Multi-boot |
Question 111 |
A | Remove and reinstall the application |
B | Close all running applications |
C | Reconnect the wireless network connection |
D | Hard reset the cell phone |
Question 112 |
A | devmgmt.msc |
B | secpol.msc |
C | mtg |
D | CMD |
E | MMC |
Question 113 |
A | DxDiag |
B | Ipconfig |
C | perfmon.msc |
D | gettingstarted |
E | Regedit |
Question 114 |
A | Administrator |
B | Power users |
C | Guest |
D | Standard user |
Question 115 |
A | Disk 1 |
B | Healthy partition |
C | Disk 0 |
D | Primary partition |
E | FAT32 partition |
Question 116 |
A | FAT32 |
B | exFAT |
C | ext4 |
D | NTFS |
Question 117 |
A | .vbs |
B | .sh |
C | .js |
D | .bat |
Question 118 |
A | Rooting |
B | Grant superadmin |
C | Jailbreaking |
D | Open shell access |
E | VirusBarrier |
Question 119 |
A | setupact.log |
B | setuperr.log |
C | unattend.xml |
D | diskmgmt.msc |
Question 120 |
A | chkdsk |
B | defrag |
C | diskpart |
D | cleanmgr |
Question 121 |
A | 6 GB |
B | 4 GB |
C | 512 MB |
D | 2 GB |
E | 1 GB |
Question 122 |
A | Disconnect and then reconnect the stylus |
B | Disable and then reenable Bluetooth |
C | Restart the tablet |
D | Calibrate the touchscreen sensor |
Question 123 |
A | Research the virus and how to remove it. |
B | Reboot the computer in order to make sure all other programs are terminated. |
C | Run a System Restore. |
D | Disconnect the computer from the office network. |
E | Rollback OS and driver updates. |
Question 124 |
A | ASCII |
B | Unicode |
C | EBCDIC |
D | PS1 |
E | ITU-T |
Question 125 |
A | /S |
B | /DCOPY:T |
C | /D |
D | /B |
E | /sub-1 |
F | /RCOPY |
Question 126 |
A | UEFI boot mode |
B | User access control |
C | Logon times |
D | Date and time |
Question 127 |
A | Move on to the server to a different node or VLAN on the network. |
B | Run a driver update check for the specified software. |
C | Document your solution. |
D | Invoice the customer. |
Question 128 |
A | Disk Cleanup utility |
B | Format command |
C | Computer Management |
D | Disk Management |
Question 129 |
A | C:\Users\%root%\Documents |
B | C:\Users\%username%\Documents |
C | C:\Documents and Settings\%username%\Documents |
D | C:\Users\System32\Documents |
Question 130 |
A | Partition the drive. |
B | Defragment the drive. |
C | Copy system files. |
D | Run chkdsk. |
Question 131 |
A | FAT32 |
B | GPT |
C | Dynamic drive |
D | MBR |
Question 132 |
A | Low drive failure rates. |
B | Lower power consumption. |
C | Compatibility across different OS providers such as Windows, Linux and Mac. |
D | Support for single large files over 4GB. |
E | Better driver encryption and support for cryptology. |
Question 133 |
A | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
B | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
C | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
D | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
Question 134 |
A | Contact the Manager of the company immediately. |
B | Ask Sara why she has this type of folder on her work computer. |
C | Open the folder and enjoy the images. |
D | Install the software and ignore the folder. |
E | Open the folder to investigate the content, but do not open the images. |
Question 135 |
A | Windows 10 Home |
B | Windows 10 Pro |
C | Windows 10 Education |
D | Windows 10 Enterprise |
Question 136 |
A | keys |
B | tokens |
C | root CA |
D | passwords |
Question 137 |
A | dir |
B | MD |
C | RD |
D | CD |
E | SD |
Question 138 |
A | chkdsk C: /F |
B | chkdsk /sec |
C | chkdsk C: /R |
D | chkdsk C: /I |
E | chkdsk C: /C |
Question 139 |
A | winreg |
B | reg |
C | hives |
D | registry |
E | regedit |
Question 140 |
A | Enforce password history |
B | Minimum password length |
C | Complexity requirements |
D | Minimum password age |
Question 141 |
A | Folder Redirection |
B | Home Folder |
C | Security Groups |
D | Group Policy |
Question 142 |
A | Do not attempt to repair a motherboard. It is better to buy a new one. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Consult the MSDS for the solder spool. |
D | Check the temperature at which the solder should be applied. |
Question 143 |
A | Commercial license |
B | Seat license |
C | Enterprise license |
D | Open source license |
Question 144 |
A | ipconfig /? |
B | ipconfig man |
C | ipconfig help |
D | man ipconfig |
Question 145 |
A | Pausing printing |
B | Modifying spool settings |
C | Adding ports |
D | Enabling sharing |
Question 146 |
A | Microsoft OneDrive |
B | iCloud |
C | Local NAS |
D | Google Cloud Platform |
Question 147 |
A | Domain Admin |
B | Power user |
C | Guest |
D | Administrator |
Question 148 |
A | Tasker log |
B | Setup log |
C | System log |
D | Application log |
E | Security log |
Question 149 |
A | Home |
B | Pro |
C | Enterprise |
D | Standard |
Question 150 |
A | Ubuntu OS |
B | Android OS |
C | macOS |
D | Chrome OS |
E | Windows 10 |
Question 151 |
A | Volume license |
B | Corporate license |
C | Enterprise license |
D | Open license |
E | Personal license |
Question 152 |
A | Reconfigure the gaming consoles' network interfaces. |
B | Replace the IP camera system with a new one. |
C | Configure router QoS engine with service priority for gaming applications. |
D | Factory reset the gaming consoles. |
E | Power cycle the network appliances. |
F | Replace the router with an upgraded unit. |
Question 153 |
A | Command Prompt |
B | VB Script |
C | PowerShell |
D | DOS |
Question 154 |
A | Request for proposal |
B | Business processes |
C | Plan for change |
D | Risk analysis |
E | Backout plan |
F | End-user acceptance |
Question 155 |
A | Services console |
B | Device Manager |
C | Task Manager |
D | File Explorer |
E | Windows Registry |
Question 156 |
A | Run Windows Update |
B | Run the CHKDSK /R command |
C | Disable System Restore |
D | Disable network cards |
E | Disable all non-administrator accounts. |
Question 157 |
A | Windows Registry |
B | Windows Control Panel |
C | Performance Monitor |
D | Windows Task Scheduler |
E | Windows Task Manager |
Question 158 |
A | Display properties |
B | Power plans |
C | Task Manager |
D | TRIM |
E | Device Manager |
Question 159 |
A | taskmgr |
B | regd |
C | perfmon |
D | dxdiag |
E | msconfig |
Question 160 |
A | Check for and apply software updates |
B | Rebuild the users mail profile |
C | Perform repair installation on the application |
D | Add the user to the local administrators group |
Question 161 |
A | Social engineering |
B | Phishing attack |
C | DDoS attack |
D | Session hijacking attack |
E | Brute force attack |
Question 162 |
A | MS-DOS Control Panel |
B | Windows Control Panel |
C | Windows Registry |
D | Windows Task Manager |
E | Windows Task Scheduler |
Question 163 |
A | Defrag the hard drive. |
B | Disable UAC. |
C | Enable TPM in the BIOS/UEFI. |
D | Change the location of the system32 |
E | Convert the file system to NTFS. |
Question 164 |
A | Document the incident and purge all policy-violating materials. |
B | Delete the bit torrent application and contact the affected copyright holders. |
C | Reprimand the user and apply a content filter
to the user’s profile. |
D | Immediately delete all unauthorized materials. |
E | Secure the workstation in a limited access
facility. |
Question 165 |
A | dir /d |
B | dir -1 |
C | dir /o |
D | dir /a |
E | dir /? |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.