← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Jailbreaking |
B | Grant superadmin |
C | VirusBarrier |
D | Open shell access |
E | Rooting |
Question 2 |
A | Read the manual on how HR is going to use the software. |
B | Look for program features and the minimum hardware requirements. |
C | Verify that the install is allowed under the company’s licensing agreements. |
D | Update the Windows drivers on the computer. |
Question 3 |
A | Complexity requirements |
B | Minimum password age |
C | Enforce password history |
D | Minimum password length |
Question 4 |
A | Low drive failure rates. |
B | Support for single large files over 4GB. |
C | Better driver encryption and support for cryptology. |
D | Compatibility across different OS providers such as Windows, Linux and Mac. |
E | Lower power consumption. |
Question 5 |
A | Enterprise license |
B | Open source license |
C | Commercial license |
D | Seat license |
Question 6 |
A | Remove and reinstall the application |
B | Close all running applications |
C | Hard reset the cell phone |
D | Reconnect the wireless network connection |
Question 7 |
A | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
B | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
C | Set a strong password that requires a renewal every 30 days. |
D | Display a message on lock screen advising users how importnat to lock their computer. |
E | Create a group policy to set minimum password standards. |
Question 8 |
A | Initialize the drive. |
B | Run Windows updates. |
C | Format and partition the drive. |
D | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
E | Unplug the power and re-plug it without powering down the workstation. |
Question 9 |
A | spam bot |
B | spyware |
C | trojan |
D | worm |
Question 10 |
A | SSO |
B | Propagation |
C | Secure Shell |
D | Inheritance |
E | MFA |
Question 11 |
A | Install to a network drive |
B | Install to a secondary internal HDD |
C | Install to a USB drive |
D | Install to a DVD-RW |
Question 12 |
A | Microsoft |
B | IBM |
C | Apple |
D | WWF |
E | CompTIA |
Question 13 |
A | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
B | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
C | Contact HR immediately and seek advice. |
D | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
E | Contact a lawyer as this breaches the professional conduct policies. |
Question 14 |
A | chkdsk C: /I |
B | chkdsk C: /F |
C | chkdsk /sec |
D | chkdsk C: /C |
E | chkdsk C: /R |
Question 15 |
A | Local Security Policy |
B | Performance Monitor |
C | Device Manager |
D | Component Services |
Question 16 |
A | taskmgr |
B | perfmon |
C | regd |
D | dxdiag |
E | msconfig |
Question 17 |
A | ls |
B | bash |
C | sbin |
D | cat |
Question 18 |
A | TRIM |
B | Power plans |
C | Device Manager |
D | Display properties |
E | Task Manager |
Question 19 |
A | Run a driver update check for the specified software. |
B | Document your solution. |
C | Move on to the server to a different node or VLAN on the network. |
D | Invoice the customer. |
Question 20 |
A | Multi-boot |
B | Dynamic |
C | PXE |
D | GPT |
Question 21 |
A | Partition the drive. |
B | Defragment the drive. |
C | Copy system files. |
D | Run chkdsk. |
Question 22 |
A | api |
B | .ipa |
C | .apk |
D | .sdk |
E | .exe |
Question 23 |
A | Install a firewall and enforce rules. |
B | Disable the SSID broadcast. |
C | Disconnect the Internet connection to the LAN. |
D | Install an antivirus on the main server. |
E | Install an intrusion detection system (IDS). |
Question 24 |
A | .vbs |
B | .ps |
C | .py1 |
D | .py |
E | .ps1 |
Question 25 |
A | Ls |
B | Chmod |
C | Passwd |
D | Chown |
E | dirc |
Question 26 |
A | Using msconfig Tools tab. |
B | Using msconfig Boot tab. |
C | Using msconfig General tab. |
D | Using msconfig Services tab. |
Question 27 |
A | deltask |
B | process -k |
C | taskkill |
D | process -del |
E | delprocess |
Question 28 |
A | Home Folder |
B | Security Groups |
C | Folder Redirection |
D | Group Policy |
Question 29 |
A | Plug and check if the equipment is working. |
B | Increase the closet's airflow. |
C | Set up dehumidifiers. |
D | Implement a fire suppression system. |
E | Install grounding bars. |
Question 30 |
A | Replace the router with an upgraded unit. |
B | Factory reset the gaming consoles. |
C | Power cycle the network appliances. |
D | Reconfigure the gaming consoles' network interfaces. |
E | Replace the IP camera system with a new one. |
F | Configure router QoS engine with service priority for gaming applications. |
Question 31 |
A | Delete the bit torrent application and contact the affected copyright holders. |
B | Document the incident and purge all policy-violating materials. |
C | Reprimand the user and apply a content filter
to the user’s profile. |
D | Immediately delete all unauthorized materials. |
E | Secure the workstation in a limited access
facility. |
Question 32 |
A | diskmgmt.msc |
B | unattend.xml |
C | setupact.log |
D | setuperr.log |
Question 33 |
A | Schedule scans and run updates. |
B | Enable System Restore. |
C | Identify malware symptoms. |
D | Disable System Restore. |
E | Remediate infected systems. |
F | Quarantine infected systems. |
Question 34 |
A | SSH |
B | Telnet |
C | RDP |
D | VNC |
Question 35 |
A | CONVERT |
B | IPCONFIG |
C | CHKNTFS |
D | NETDOM |
Question 36 |
A | perfmon.exe |
B | systempropertiesadvanced.exe |
C | devmgmt.msc |
D | eventvwr.msc |
E | wintask |
Question 37 |
A | Degauss |
B | Low-level format |
C | Drive wipe |
D | Standard format |
Question 38 |
A | Seat license |
B | Commercial license |
C | Enterprise license |
D | Open source license |
Question 39 |
A | Ask the customer to use a different web browser. |
B | Reinstall Java on the affected workstation. |
C | Ask the customer to find an application that does not use Java. |
D | Delete and clear Java Temporary Internet Files. |
Question 40 |
A | Trusted Mobile Platform (TMP) |
B | Google Play |
C | Spotlight |
D | App Store |
E | iTunes |
Question 41 |
A | Local NAS |
B | Google Cloud Platform |
C | Microsoft OneDrive |
D | iCloud |
Question 42 |
A | Session hijacking attack |
B | Social engineering |
C | Brute force attack |
D | DDoS attack |
E | Phishing attack |
Question 43 |
A | Device Manager |
B | Task Manager |
C | Services console |
D | File Explorer |
E | Windows Registry |
Question 44 |
A | Network-level firewall policies |
B | Local-level user policies |
C | Antivirus domain-level policies |
D | Domain-level group policies |
E | Local-level firewall policies |
Question 45 |
A | Driver |
B | Memory |
C | CD-ROM |
D | Hard drive/SSD |
Question 46 |
A | Page-file size |
B | Data execution prevention |
C | Processor scheduling |
D | Visual effects |
Question 47 |
A | It may interfere with other signed drivers installed on the device. |
B | It may result in damage to the device. |
C | It may result in random reboots. |
D | It may lead to instability issues. |
Question 48 |
A | WWF |
B | CompTIA |
C | Microsoft |
D | IBM |
E | Apple |
Question 49 |
A | Block all unused ports on the LAN smart switch |
B | Enforce password complexity |
C | Change the default access port |
D | Disable logon time restrictions |
E | Put the terminal server into the routers DMZ |
F | Use the local client certificate for server authentication |
Question 50 |
A | setupact.log |
B | unattend.xml |
C | setuperr.log |
D | diskmgmt.msc |
Question 51 |
A | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
B | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
C | This PC is running low on memory resources with a very high percentage is committed. |
D | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
E | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
Question 52 |
A | Net timer |
B | Net time |
C | Timeset |
D | Time |
E | Net time set |
Question 53 |
A | Msconfig |
B | Chkdsk |
C | Task Manager |
D | System Information |
Question 54 |
A | Healthy partition |
B | Primary partition |
C | Disk 0 |
D | FAT32 partition |
E | Disk 1 |
Question 55 |
A | WWAN |
B | 5G LTE |
C | VPN |
D | VLAN |
E | WLAN |
Question 56 |
A | Windows 10 Enterprise |
B | Windows 10 Education |
C | Windows 10 Pro |
D | Windows 10 Home |
Question 57 |
A | Time Machine |
B | Taskkill |
C | Mac Management |
D | Task Manager |
E | Force quit |
Question 58 |
A | Security Policy |
B | Component Services |
C | System Configuration |
D | Local Users and Groups |
Question 59 |
A | Phishing |
B | DDoS |
C | Malicious attack |
D | Brute force |
E | Session hijacking |
Question 60 |
A | None of the answers are correct |
B | Center |
C | First right |
D | First left |
Question 61 |
A | /S |
B | /RCOPY |
C | /B |
D | /DCOPY:T |
E | /D |
F | /sub-1 |
Question 62 |
A | Boot the workstation in safe mode and disable Windows driver signing requirements |
B | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
C | Boot the workstation in safe mode and disable the graphics driver system tray menu |
D | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
Question 63 |
A | Image Clone |
B | Robocopy |
C | Image Copy |
D | Ghost |
E | Sysprep |
Question 64 |
A | Windows Control Panel |
B | MS-DOS Control Panel |
C | Windows Registry |
D | Windows Task Manager |
E | Windows Task Scheduler |
Question 65 |
A | Completely erase the old drive prior to disposal. |
B | Open the old hard drive case and use ESD to destory the circuitry. |
C | Format the old hard drive multiple times before deposal. |
D | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
Question 66 |
A | Windows Control Panel |
B | Windows Task Manager |
C | Windows Registry |
D | Performance Monitor |
E | Windows Task Scheduler |
Question 67 |
A | /E |
B | /B |
C | /DCOPY:T |
D | /sub-1 |
E | /D |
F | /S |
Question 68 |
A | setup.exe |
B | winload.exe |
C | system32.exe |
D | startup.exe |
E | shell.adb |
Question 69 |
A | Spoofing |
B | Impersonation |
C | Spear phishing |
D | Whaling |
Question 70 |
A | PowerShell |
B | Command Prompt |
C | VB Script |
D | DOS |
Question 71 |
A | Rename the folder on the server, and notify the information security officer |
B | Promptly notify the administrator's immediate supervisor |
C | Move the folder to another location on the server, and notify the local authorities |
D | Ask the owner to move the files from the server to a local computer |
Question 72 |
A | Windows+L |
B | Windows+R |
C | Windows+M |
D | Ctrl+Alt+Del |
E | Windows+pause break |
Question 73 |
A | Do not attempt to repair a motherboard. It is better to buy a new one. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Check the temperature at which the solder should be applied. |
D | Consult the MSDS for the solder spool. |
Question 74 |
A | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
B | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
C | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
D | Windows user account authentication can only be used with a Windows Server Domain Controller. |
E | Windows user account authentication is more secure than BitLocker. |
Question 75 |
A | On the taskbar |
B | In the System Properties dialog box |
C | In the System32 folder |
D | Within the Start menu |
Question 76 |
A | Standard |
B | Home |
C | Pro |
D | Enterprise |
Question 77 |
A | hives |
B | regedit |
C | reg |
D | winreg |
E | registry |
Question 78 |
A | MD |
B | CD |
C | Dir |
D | Ping |
E | Ver |
Question 79 |
A | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
B | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
C | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
D | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
Question 80 |
A | Change the user account permissions to restrict access. |
B | Replace the hard drive. |
C | Educate the customer on how to avoid malware. |
D | Reinstall the antivirous and malware software. |
E | Do nothing. |
Question 81 |
A | ipconfig /all |
B | ls |
C | ifconfig |
D | ipaddr /all |
E | chown |
Question 82 |
A | Run Chkdsk. |
B | Run Msconfig. |
C | Check the System log. |
D | Remove the network card. |
E | Boot into the Safe Mode. |
Question 83 |
A | HomeGroup |
B | Windows Aero |
C | Sync Center |
D | Windows Defender |
E | Windows Domain |
Question 84 |
A | MD |
B | RD |
C | SD |
D | dir |
E | CD |
Question 85 |
A | Research the virus and how to remove it. |
B | Disconnect the computer from the office network. |
C | Run a System Restore. |
D | Reboot the computer in order to make sure all other programs are terminated. |
E | Rollback OS and driver updates. |
Question 86 |
A | Event Viewer |
B | Task Manager |
C | Task Scheduler |
D | Services |
Question 87 |
A | Corporate license |
B | Enterprise license |
C | Personal license |
D | Open license |
E | Volume license |
Question 88 |
A | Disk Management |
B | Msconfig |
C | Administrative Tools |
D | Task Manager |
Question 89 |
A | ipconfig |
B | netstat |
C | ipconfig /all |
D | ping |
E | ipconfig /renew |
Question 90 |
A | User Accounts |
B | Display Settings |
C | Sync Center |
D | Folder Options |
Question 91 |
A | dir /d |
B | dir /o |
C | dir /? |
D | dir /a |
E | dir -1 |
Question 92 |
A | Check the RAM configuration. |
B | Reinstall the Windows OS. |
C | Upgrade the video drivers. |
D | Replace the hard drive. |
E | Reinstall the CAD program. |
Question 93 |
A | root CA |
B | tokens |
C | passwords |
D | keys |
Question 94 |
A | Check for and apply software updates |
B | Perform repair installation on the application |
C | Add the user to the local administrators group |
D | Rebuild the users mail profile |
Question 95 |
A | incident response |
B | Incident Response Life Cycle |
C | MSDS |
D | official documentation |
E | chain of custody |
Question 96 |
A | chkdsk C: /I |
B | chkdsk C: /R |
C | chkdsk C: /F |
D | chkdsk /sec |
E | chkdsk C: /C |
Question 97 |
A | ipconfig /? |
B | ipconfig man |
C | ipconfig help |
D | man ipconfig |
Question 98 |
A | It would be very difficualt and will require specialized laborotory to recover the data. |
B | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
C | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
D | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
Question 99 |
A | Event Viewer |
B | Disk Management |
C | Gparted |
D | System Management |
E | DiskPart |
Question 100 |
A | Safe Mode |
B | Msconfig |
C | ifconfig |
D | Task Manager |
Question 101 |
A | NTFS supports larger file sizes. |
B | NTFS supports file encryption. |
C | NTFS supports larger volumes. |
D | NTFS supports more file formats. |
Question 102 |
A | Chrome OS |
B | Ubuntu OS |
C | macOS |
D | Windows 10 |
E | Android OS |
Question 103 |
A | BIOS password |
B | BitDefender |
C | Windows user account |
D | Windows administrator user account |
E | BitLocker |
Question 104 |
A | Dynamic drive |
B | FAT32 |
C | MBR |
D | GPT |
Question 105 |
A | Task Manager |
B | Tasklist |
C | Computer Management |
D | Force quit |
E | Control Panel |
Question 106 |
A | loop , iteration |
B | conditional statement , iteration |
C | conditional statement , run |
D | loop , run |
Question 107 |
A | Replace |
B | Convert |
C | Rebuild |
D | Recover |
E | REM |
Question 108 |
A | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
B | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
C | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
D | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
Question 109 |
A | PS1 |
B | Unicode |
C | EBCDIC |
D | ITU-T |
E | ASCII |
Question 110 |
A | HKEY_USERS |
B | HKEY_LOCAL_MACHINE |
C | HKEY_CLASSES_ROOT |
D | HKEY_CURRENT_CONFIG |
Question 111 |
A | Systemroot |
B | Program Files |
C | Program Files (x86) |
D | System32 |
Question 112 |
A | \%systemroot%\System32\Config |
B | \%systemroot%\System32 |
C | \%systemroot%\Windows |
D | \%systemroot%\Windows\System32\Con
fig |
Question 113 |
A | Pausing printing |
B | Enabling sharing |
C | Adding ports |
D | Modifying spool settings |
Question 114 |
A | 512 MB |
B | 4 GB |
C | 2 GB |
D | 1 GB |
E | 6 GB |
Question 115 |
A | Install the software and ignore the folder. |
B | Open the folder and enjoy the images. |
C | Open the folder to investigate the content, but do not open the images. |
D | Contact the Manager of the company immediately. |
E | Ask Sara why she has this type of folder on her work computer. |
Question 116 |
A | OneDrive |
B | Windows Firewall |
C | PowerShell |
D | Compatibility mode |
Question 117 |
A | Directories |
B | Files |
C | Applets |
D | Snap-ins |
Question 118 |
A | IP address and DNS |
B | Server and domain |
C | Server and gateway |
D | IP address and domain |
Question 119 |
A | Revert the computer back to the last stable Windows service pack. |
B | Reboot the network cameras. |
C | Uninstall firewall applications and disable all firewall rules. |
D | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
E | Reboot the router. |
Question 120 |
A | .sh |
B | .bat |
C | .js |
D | .vbs |
Question 121 |
A | Restart the tablet |
B | Disable and then reenable Bluetooth |
C | Disconnect and then reconnect the stylus |
D | Calibrate the touchscreen sensor |
Question 122 |
A | Tasker log |
B | Security log |
C | Application log |
D | Setup log |
E | System log |
Question 123 |
A | cleanmgr |
B | defrag |
C | diskpart |
D | chkdsk |
Question 124 |
A | Windows Registry |
B | System Restore |
C | File History |
D | Startup Repair |
E | Reset Your PC |
Question 125 |
A | System32 |
B | boot |
C | Program Files |
D | Users |
E | Windows |
Question 126 |
A | Secure Shell |
B | SSO |
C | Propagation |
D | Inheritance |
E | MFA |
Question 127 |
A | Unsigned drivers or untrusted software. |
B | Anti-virous and anti-malware software intefrence. |
C | VPN configuration or inactive VPN. |
D | Mobile Device Management (MDM) policies |
Question 128 |
A | FAT16 |
B | exFAT |
C | FAT32 |
D | NTFS |
Question 129 |
A | Dynamic partition |
B | USB drive |
C | Extended partition |
D | Secondary partition |
E | Primary partition |
Question 130 |
A | Computer Management |
B | Format command |
C | Disk Management |
D | Disk Cleanup utility |
Question 131 |
A | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
B | The 64-bit architecture has an upper RAM limit of 128 GB. |
C | The 32-bit architecture has an upper RAM limit of 64 GB. |
D | Windows 10 only comes in 64-bit version. |
E | The 64-bit version is also known as x86. |
Question 132 |
A | Open shell access |
B | Grant superadmin |
C | Jailbreaking |
D | VirusBarrier |
E | Rooting |
Question 133 |
A | Disable all non-administrator accounts. |
B | Disable System Restore |
C | Disable network cards |
D | Run Windows Update |
E | Run the CHKDSK /R command |
Question 134 |
A | Control Panel |
B | MMC |
C | Command Prompt |
D | Task Manager |
Question 135 |
A | Roll back the OS upgrade. Continue using the older version of Windows |
B | Perform a full backup and replace the hard drive |
C | Reset the PC to its factory conditions. Perform the OS upgrade again |
D | Update the SATA controller driver from the manufacturers website |
Question 136 |
A | MS Word |
B | MS Excel |
C | MS PowerPoint |
D | Notepad |
E | CMD |
Question 137 |
A | chkdsk /F |
B | tracert /w |
C | robocopy |
D | diskpart |
Question 138 |
A | Organization security and content policy supersede all other legal policies of the country which the company operates. |
B | Organization security and content policy typically do not apply to executive staff. |
C | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
D | Organization security and content policies are not part of the majority of government organizations. |
E | Organization security and content policy must follow the legal policies of the country which the company operates. |
Question 139 |
A | Submit the changes to the change board for approval. |
B | Notify the change team of the changes needed and perform the changes. |
C | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
D | Document the changes and perform the work. |
E | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
Question 140 |
A | C:\Users\System32\Documents |
B | C:\Documents and Settings\%username%\Documents |
C | C:\Users\%username%\Documents |
D | C:\Users\%root%\Documents |
Question 141 |
A | Convert the file system to NTFS. |
B | Enable TPM in the BIOS/UEFI. |
C | Defrag the hard drive. |
D | Change the location of the system32 |
E | Disable UAC. |
Question 142 |
A | CMD |
B | devmgmt.msc |
C | secpol.msc |
D | mtg |
E | MMC |
Question 143 |
A | ext4 |
B | FAT32 |
C | exFAT |
D | NTFS |
Question 144 |
A | Hyper-Threading has been disabled. |
B | Windows Update is running. |
C | Virus infection of the C drive. |
D | Drivers are being downloaded by the Device Manager. |
E | The printing system is running. |
Question 145 |
A | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
B | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
C | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
D | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
Question 146 |
A | Request for proposal |
B | Risk analysis |
C | Business processes |
D | Plan for change |
E | End-user acceptance |
F | Backout plan |
Question 147 |
A | Domain Admin |
B | Guest |
C | Administrator |
D | Power user |
Question 148 |
A | 512 MB |
B | 4 GB |
C | 1 GB |
D | 6 GB |
E | 2 GB |
Question 149 |
A | Ping |
B | Sigverif |
C | Msconfig |
D | Dxdiag |
E | Regedit |
Question 150 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | Malicious attack |
B | HTTP attack |
C | Brute force attack |
D | Session hijacking attack |
E | DDoS attack |
Question 151 |
A | Ipconfig |
B | DxDiag |
C | gettingstarted |
D | Regedit |
E | perfmon.msc |
Question 152 |
A | iOS |
B | Android |
C | macOS |
D | Windows 98 |
E | Windows 10 |
Question 153 |
A | Guest |
B | Standard user |
C | Administrator |
D | Power users |
Question 154 |
A | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
B | Change the file name from notepad to as3final.py |
C | Execute the file as3final.py in notepad++ |
D | Open file as3final.py file using the program notepad++ |
E | Execute the file notepad++ in as3final.py |
Question 155 |
A | Disk 0 - 465.27 MB NTFS |
B | None of the partitions can be dismounted without crashing the system. |
C | Disk 1 |
D | Disk 0 - 500 MB NTFS |
Question 156 |
A | Android |
B | iOS |
C | Windows 10 |
D | Mac OS |
E | Ubuntu |
Question 157 |
A | Local Security Policy |
B | OU Group Policy |
C | Site Policy |
D | Active Directory Policy |
Question 158 |
A | Quit your job because of this work environment is toxic. |
B | Take everyone out to lunch get their mind off of the problem. |
C | Stay calm and do your job to best of your ability. |
D | Refer your panicking Supervisor and co-workers to professional counseling services. |
E | Request that you need to speak to a senior Supervisor. |
Question 159 |
A | Corporate license |
B | Volume license |
C | Enterprise license |
D | Personal license |
E | Open license |
Question 160 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /fixboot |
B | bootrec /rebuildbcd |
C | bootrec /restore |
D | boot\bcd |
E | bootrec /fixmbr |
Question 161 |
A | cp and rm |
B | ps and kill |
C | pad and chmod |
D | ls and chown |
E | sudo and vi |
Question 162 |
A | dir |
B | RD |
C | MD |
D | SD |
E | CD |
Question 163 |
A | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
B | Each manufacturer has their own customized Launchers that modify the GUI. |
C | The Android Kernel version must be different bvetwen the manufactures. |
D | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
E | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
Question 164 |
A | Asset ID, MAC address |
B | Domain name, location, asset ID |
C | Location, RFID |
D | Domain name, location, IP address |
Question 165 |
A | User access control |
B | Date and time |
C | UEFI boot mode |
D | Logon times |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.