← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Notepad |
B | MS PowerPoint |
C | MS Excel |
D | CMD |
E | MS Word |
Question 2 |
A | sudo and vi |
B | ps and kill |
C | cp and rm |
D | pad and chmod |
E | ls and chown |
Question 3 |
A | Chmod |
B | Chown |
C | dirc |
D | Ls |
E | Passwd |
Question 4 |
A | Revert the computer back to the last stable Windows service pack. |
B | Uninstall firewall applications and disable all firewall rules. |
C | Reboot the network cameras. |
D | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
E | Reboot the router. |
Question 5 |
A | Network-level firewall policies |
B | Domain-level group policies |
C | Antivirus domain-level policies |
D | Local-level user policies |
E | Local-level firewall policies |
Question 6 |
A | 512 MB |
B | 4 GB |
C | 6 GB |
D | 2 GB |
E | 1 GB |
Question 7 |
A | systempropertiesadvanced.exe |
B | eventvwr.msc |
C | devmgmt.msc |
D | wintask |
E | perfmon.exe |
Question 8 |
A | User access control |
B | Logon times |
C | UEFI boot mode |
D | Date and time |
Question 9 |
A | VLAN |
B | VPN |
C | WWAN |
D | 5G LTE |
E | WLAN |
Question 10 |
A | OneDrive |
B | PowerShell |
C | Compatibility mode |
D | Windows Firewall |
Question 11 |
A | Power cycle the network appliances. |
B | Configure router QoS engine with service priority for gaming applications. |
C | Replace the IP camera system with a new one. |
D | Factory reset the gaming consoles. |
E | Replace the router with an upgraded unit. |
F | Reconfigure the gaming consoles' network interfaces. |
Question 12 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /fixmbr |
B | bootrec /rebuildbcd |
C | bootrec /fixboot |
D | bootrec /restore |
E | boot\bcd |
Question 13 |
A | Event Viewer |
B | Services |
C | Task Scheduler |
D | Task Manager |
Question 14 |
A | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
B | The Android Kernel version must be different bvetwen the manufactures. |
C | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
D | Each manufacturer has their own customized Launchers that modify the GUI. |
E | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
Question 15 |
A | Snap-ins |
B | Directories |
C | Files |
D | Applets |
Question 16 |
A | VirusBarrier |
B | Rooting |
C | Jailbreaking |
D | Grant superadmin |
E | Open shell access |
Question 17 |
A | Enable System Restore. |
B | Identify malware symptoms. |
C | Schedule scans and run updates. |
D | Disable System Restore. |
E | Remediate infected systems. |
F | Quarantine infected systems. |
Question 18 |
A | Windows Update is running. |
B | Hyper-Threading has been disabled. |
C | Virus infection of the C drive. |
D | The printing system is running. |
E | Drivers are being downloaded by the Device Manager. |
Question 19 |

A | Disk 1 |
B | Healthy partition |
C | FAT32 partition |
D | Primary partition |
E | Disk 0 |
Question 20 |
A | Device Manager |
B | Component Services |
C | Performance Monitor |
D | Local Security Policy |
Question 21 |
A | Ping |
B | Sigverif |
C | Regedit |
D | Dxdiag |
E | Msconfig |
Question 22 |
A | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
B | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
C | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
D | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
Question 23 |
A | Ask Sara why she has this type of folder on her work computer. |
B | Open the folder and enjoy the images. |
C | Contact the Manager of the company immediately. |
D | Install the software and ignore the folder. |
E | Open the folder to investigate the content, but do not open the images. |
Question 24 |
A | Home Folder |
B | Group Policy |
C | Security Groups |
D | Folder Redirection |
Question 25 |
A | Windows |
B | Users |
C | Program Files |
D | System32 |
E | boot |
Question 26 |
A | Consult the MSDS for the solder spool. |
B | Check the temperature at which the solder should be applied. |
C | Do not attempt to repair a motherboard. It is better to buy a new one. |
D | Call the building supervisor to make sure there is enough solder for others. |
Question 27 |
A | System Restore |
B | Startup Repair |
C | File History |
D | Reset Your PC |
E | Windows Registry |
Question 28 |
A | Unsigned drivers or untrusted software. |
B | VPN configuration or inactive VPN. |
C | Mobile Device Management (MDM) policies |
D | Anti-virous and anti-malware software intefrence. |
Question 29 |
A | \%systemroot%\System32 |
B | \%systemroot%\Windows\System32\Con
fig |
C | \%systemroot%\Windows |
D | \%systemroot%\System32\Config |
Question 30 |
A | diskmgmt.msc |
B | unattend.xml |
C | setuperr.log |
D | setupact.log |
Question 31 |
A | .apk |
B | api |
C | .exe |
D | .ipa |
E | .sdk |
Question 32 |
A | reg |
B | regedit |
C | hives |
D | winreg |
E | registry |
Question 33 |
A | Rename the folder on the server, and notify the information security officer |
B | Promptly notify the administrator's immediate supervisor |
C | Move the folder to another location on the server, and notify the local authorities |
D | Ask the owner to move the files from the server to a local computer |
Question 34 |
A | defrag |
B | diskpart |
C | cleanmgr |
D | chkdsk |
Question 35 |
A | Reset the PC to its factory conditions. Perform the OS upgrade again |
B | Perform a full backup and replace the hard drive |
C | Roll back the OS upgrade. Continue using the older version of Windows |
D | Update the SATA controller driver from the manufacturers website |
Question 36 |
A | Standard user |
B | Administrator |
C | Guest |
D | Power users |
Question 37 |
A | FAT32 |
B | ext4 |
C | NTFS |
D | exFAT |
Question 38 |
A | Pro |
B | Enterprise |
C | Standard |
D | Home |
Question 39 |
A | Windows Domain |
B | Windows Defender |
C | Sync Center |
D | HomeGroup |
E | Windows Aero |
Question 40 |
A | Administrator |
B | Guest |
C | Domain Admin |
D | Power user |
Question 41 |
A | NTFS supports more file formats. |
B | NTFS supports larger file sizes. |
C | NTFS supports larger volumes. |
D | NTFS supports file encryption. |
Question 42 |
A | System log |
B | Application log |
C | Tasker log |
D | Setup log |
E | Security log |
Question 43 |
A | Organization security and content policy must follow the legal policies of the country which the company operates. |
B | Organization security and content policies are not part of the majority of government organizations. |
C | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
D | Organization security and content policy typically do not apply to executive staff. |
E | Organization security and content policy supersede all other legal policies of the country which the company operates. |
Question 44 |
A | Defragment the drive. |
B | Partition the drive. |
C | Run chkdsk. |
D | Copy system files. |
Question 45 |
A | Use the local client certificate for server authentication |
B | Change the default access port |
C | Put the terminal server into the routers DMZ |
D | Enforce password complexity |
E | Block all unused ports on the LAN smart switch |
F | Disable logon time restrictions |
Question 46 |
A | .js |
B | .vbs |
C | .sh |
D | .bat |
Question 47 |
A | Task Manager |
B | Msconfig |
C | ifconfig |
D | Safe Mode |
Question 48 |
A | Chkdsk |
B | System Information |
C | Task Manager |
D | Msconfig |
Question 49 |
A | CD |
B | MD |
C | SD |
D | dir |
E | RD |
Question 50 |
A | MD |
B | SD |
C | CD |
D | dir |
E | RD |
Question 51 |
A | Primary partition |
B | Extended partition |
C | Dynamic partition |
D | USB drive |
E | Secondary partition |
Question 52 |
A | Complexity requirements |
B | Enforce password history |
C | Minimum password length |
D | Minimum password age |
Question 53 |
A | Change the location of the system32 |
B | Enable TPM in the BIOS/UEFI. |
C | Disable UAC. |
D | Convert the file system to NTFS. |
E | Defrag the hard drive. |
Question 54 |
A | Computer Management |
B | Tasklist |
C | Force quit |
D | Control Panel |
E | Task Manager |
Question 55 |
A | Security Policy |
B | Component Services |
C | Local Users and Groups |
D | System Configuration |
Question 56 |
A | shell.adb |
B | winload.exe |
C | startup.exe |
D | system32.exe |
E | setup.exe |
Question 57 |
A | Session hijacking |
B | Malicious attack |
C | DDoS |
D | Phishing |
E | Brute force |
Question 58 |
A | Microsoft OneDrive |
B | iCloud |
C | Local NAS |
D | Google Cloud Platform |
Question 59 |
A | .vbs |
B | .py1 |
C | .ps1 |
D | .ps |
E | .py |
Question 60 |
A | Install an antivirus on the main server. |
B | Disable the SSID broadcast. |
C | Disconnect the Internet connection to the LAN. |
D | Install a firewall and enforce rules. |
E | Install an intrusion detection system (IDS). |
Question 61 |
A | Perform repair installation on the application |
B | Add the user to the local administrators group |
C | Rebuild the users mail profile |
D | Check for and apply software updates |
Question 62 |
A | tokens |
B | passwords |
C | keys |
D | root CA |
Question 63 |
A | Within the Start menu |
B | In the System Properties dialog box |
C | On the taskbar |
D | In the System32 folder |
Question 64 |
A | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
B | Format the old hard drive multiple times before deposal. |
C | Completely erase the old drive prior to disposal. |
D | Open the old hard drive case and use ESD to destory the circuitry. |
Question 65 |
A | taskmgr |
B | dxdiag |
C | perfmon |
D | msconfig |
E | regd |
Question 66 |
A | ipconfig |
B | ipconfig /all |
C | ping |
D | ipconfig /renew |
E | netstat |
Question 67 |
A | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
B | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
C | Boot the workstation in safe mode and disable Windows driver signing requirements |
D | Boot the workstation in safe mode and disable the graphics driver system tray menu |
Question 68 |
A | Trusted Mobile Platform (TMP) |
B | iTunes |
C | Spotlight |
D | App Store |
E | Google Play |
Question 69 |
A | MS-DOS Control Panel |
B | Windows Registry |
C | Windows Task Manager |
D | Windows Task Scheduler |
E | Windows Control Panel |
Question 70 |
A | robocopy |
B | diskpart |
C | tracert /w |
D | chkdsk /F |
Question 71 |
A | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
B | Display a message on lock screen advising users how importnat to lock their computer. |
C | Set a strong password that requires a renewal every 30 days. |
D | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
E | Create a group policy to set minimum password standards. |
Question 72 |
A | chkdsk C: /C |
B | chkdsk C: /F |
C | chkdsk C: /I |
D | chkdsk C: /R |
E | chkdsk /sec |
Question 73 |
A | Delete the bit torrent application and contact the affected copyright holders. |
B | Reprimand the user and apply a content filter
to the user’s profile. |
C | Secure the workstation in a limited access
facility. |
D | Document the incident and purge all policy-violating materials. |
E | Immediately delete all unauthorized materials. |
Question 74 |
A | Invoice the customer. |
B | Move on to the server to a different node or VLAN on the network. |
C | Document your solution. |
D | Run a driver update check for the specified software. |
Question 75 |
A | devmgmt.msc |
B | MMC |
C | secpol.msc |
D | mtg |
E | CMD |
Question 76 |
A | Ping |
B | Ver |
C | MD |
D | Dir |
E | CD |
Question 77 |
A | Ask the customer to find an application that does not use Java. |
B | Delete and clear Java Temporary Internet Files. |
C | Ask the customer to use a different web browser. |
D | Reinstall Java on the affected workstation. |
Question 78 |
A | /DCOPY:T |
B | /S |
C | /sub-1 |
D | /D |
E | /B |
F | /E |
Question 79 |
A | 512 MB |
B | 4 GB |
C | 1 GB |
D | 2 GB |
E | 6 GB |
Question 80 |
A | Task Manager |
B | TRIM |
C | Device Manager |
D | Power plans |
E | Display properties |
Question 81 |
A | NETDOM |
B | CHKNTFS |
C | CONVERT |
D | IPCONFIG |
Question 82 |
A | Windows 10 Pro |
B | Windows 10 Enterprise |
C | Windows 10 Education |
D | Windows 10 Home |
Question 83 |
A | IP address and DNS |
B | Server and domain |
C | IP address and domain |
D | Server and gateway |
Question 84 |
A | dir -1 |
B | dir /d |
C | dir /? |
D | dir /o |
E | dir /a |
Question 85 |
A | Contact a lawyer as this breaches the professional conduct policies. |
B | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
C | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
D | Contact HR immediately and seek advice. |
E | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
Question 86 |
A | Secure Shell |
B | Inheritance |
C | SSO |
D | Propagation |
E | MFA |
Question 87 |
A | Run Windows Update |
B | Disable network cards |
C | Run the CHKDSK /R command |
D | Disable System Restore |
E | Disable all non-administrator accounts. |
Question 88 |
A | Using msconfig Tools tab. |
B | Using msconfig Boot tab. |
C | Using msconfig General tab. |
D | Using msconfig Services tab. |
Question 89 |
A | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
B | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
C | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
D | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
Question 90 |
A | spam bot |
B | spyware |
C | worm |
D | trojan |
Question 91 |
A | Ghost |
B | Robocopy |
C | Image Clone |
D | Sysprep |
E | Image Copy |
Question 92 |
A | Systemroot |
B | Program Files (x86) |
C | Program Files |
D | System32 |
Question 93 |
A | Windows user account authentication is more secure than BitLocker. |
B | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
C | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
D | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
E | Windows user account authentication can only be used with a Windows Server Domain Controller. |
Question 94 |

A | iOS |
B | Android |
C | Windows 10 |
D | Ubuntu |
E | Mac OS |
Question 95 |
A | Microsoft |
B | IBM |
C | Apple |
D | CompTIA |
E | WWF |
Question 96 |
A | Android |
B | iOS |
C | macOS |
D | Windows 10 |
E | Windows 98 |
Question 97 |
A | ITU-T |
B | PS1 |
C | ASCII |
D | Unicode |
E | EBCDIC |
Question 98 |
A | It may lead to instability issues. |
B | It may result in random reboots. |
C | It may result in damage to the device. |
D | It may interfere with other signed drivers installed on the device. |
Question 99 |
A | ipconfig /? |
B | ipconfig help |
C | man ipconfig |
D | ipconfig man |
Question 100 |
A | Memory |
B | Driver |
C | Hard drive/SSD |
D | CD-ROM |
Question 101 |
A | Corporate license |
B | Personal license |
C | Volume license |
D | Enterprise license |
E | Open license |
Question 102 |
A | Read the manual on how HR is going to use the software. |
B | Verify that the install is allowed under the company’s licensing agreements. |
C | Update the Windows drivers on the computer. |
D | Look for program features and the minimum hardware requirements. |
Question 103 |
A | GPT |
B | FAT32 |
C | MBR |
D | Dynamic drive |
Question 104 |
A | Reinstall the Windows OS. |
B | Reinstall the CAD program. |
C | Upgrade the video drivers. |
D | Check the RAM configuration. |
E | Replace the hard drive. |
Question 105 |
A | HKEY_CLASSES_ROOT |
B | HKEY_LOCAL_MACHINE |
C | HKEY_USERS |
D | HKEY_CURRENT_CONFIG |
Question 106 |
A | Increase the closet's airflow. |
B | Set up dehumidifiers. |
C | Install grounding bars. |
D | Plug and check if the equipment is working. |
E | Implement a fire suppression system. |
Question 107 |
A | Folder Options |
B | User Accounts |
C | Sync Center |
D | Display Settings |
Question 108 |
A | /D |
B | /DCOPY:T |
C | /RCOPY |
D | /S |
E | /sub-1 |
F | /B |
Question 109 |
A | Low drive failure rates. |
B | Lower power consumption. |
C | Support for single large files over 4GB. |
D | Compatibility across different OS providers such as Windows, Linux and Mac. |
E | Better driver encryption and support for cryptology. |
Question 110 |
A | DxDiag |
B | perfmon.msc |
C | Regedit |
D | gettingstarted |
E | Ipconfig |
Question 111 |
A | C:\Users\%username%\Documents |
B | C:\Users\%root%\Documents |
C | C:\Users\System32\Documents |
D | C:\Documents and Settings\%username%\Documents |
Question 112 |
A | Run Chkdsk. |
B | Check the System log. |
C | Remove the network card. |
D | Run Msconfig. |
E | Boot into the Safe Mode. |
Question 113 |

A | This PC is running low on memory resources with a very high percentage is committed. |
B | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
C | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
D | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
E | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
Question 114 |
A | Whaling |
B | Spear phishing |
C | Impersonation |
D | Spoofing |
Question 115 |
A | Task Manager |
B | Mac Management |
C | Taskkill |
D | Time Machine |
E | Force quit |
Question 116 |
A | Take everyone out to lunch get their mind off of the problem. |
B | Request that you need to speak to a senior Supervisor. |
C | Stay calm and do your job to best of your ability. |
D | Refer your panicking Supervisor and co-workers to professional counseling services. |
E | Quit your job because of this work environment is toxic. |
Question 117 |
A | CompTIA |
B | Apple |
C | Microsoft |
D | IBM |
E | WWF |
Question 118 |
A | FAT16 |
B | exFAT |
C | NTFS |
D | FAT32 |
Question 119 |

A | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
B | Open file as3final.py file using the program notepad++ |
C | Execute the file as3final.py in notepad++ |
D | Change the file name from notepad to as3final.py |
E | Execute the file notepad++ in as3final.py |
Question 120 |
A | BitDefender |
B | BIOS password |
C | Windows administrator user account |
D | Windows user account |
E | BitLocker |
Question 121 |
A | Telnet |
B | VNC |
C | SSH |
D | RDP |
Question 122 |
A | First left |
B | Center |
C | First right |
D | None of the answers are correct |
Question 123 |
A | macOS |
B | Ubuntu OS |
C | Chrome OS |
D | Android OS |
E | Windows 10 |
Question 124 |
A | Drive wipe |
B | Low-level format |
C | Degauss |
D | Standard format |
Question 125 |
A | Command Prompt |
B | VB Script |
C | PowerShell |
D | DOS |
Question 126 |
A | ipconfig /all |
B | ipaddr /all |
C | chown |
D | ls |
E | ifconfig |
Question 127 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | DDoS attack |
B | Session hijacking attack |
C | HTTP attack |
D | Malicious attack |
E | Brute force attack |
Question 128 |
A | Educate the customer on how to avoid malware. |
B | Reinstall the antivirous and malware software. |
C | Change the user account permissions to restrict access. |
D | Replace the hard drive. |
E | Do nothing. |
Question 129 |

A | Windows Task Manager |
B | Windows Task Scheduler |
C | Windows Registry |
D | Performance Monitor |
E | Windows Control Panel |
Question 130 |
A | setupact.log |
B | unattend.xml |
C | setuperr.log |
D | diskmgmt.msc |
Question 131 |
A | Domain name, location, asset ID |
B | Asset ID, MAC address |
C | Domain name, location, IP address |
D | Location, RFID |
Question 132 |
A | Calibrate the touchscreen sensor |
B | Disconnect and then reconnect the stylus |
C | Disable and then reenable Bluetooth |
D | Restart the tablet |
Question 133 |
A | cat |
B | bash |
C | sbin |
D | ls |
Question 134 |
A | Document the changes and perform the work. |
B | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
C | Notify the change team of the changes needed and perform the changes. |
D | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
E | Submit the changes to the change board for approval. |
Question 135 |
A | Incident Response Life Cycle |
B | official documentation |
C | incident response |
D | chain of custody |
E | MSDS |
Question 136 |
A | Active Directory Policy |
B | Site Policy |
C | Local Security Policy |
D | OU Group Policy |
Question 137 |
A | Open source license |
B | Commercial license |
C | Enterprise license |
D | Seat license |
Question 138 |

A | Disk 0 - 500 MB NTFS |
B | None of the partitions can be dismounted without crashing the system. |
C | Disk 0 - 465.27 MB NTFS |
D | Disk 1 |
Question 139 |
A | Time |
B | Net time set |
C | Timeset |
D | Net time |
E | Net timer |
Question 140 |
A | Remove and reinstall the application |
B | Reconnect the wireless network connection |
C | Close all running applications |
D | Hard reset the cell phone |
Question 141 |
A | REM |
B | Recover |
C | Replace |
D | Convert |
E | Rebuild |
Question 142 |
A | Open source license |
B | Commercial license |
C | Seat license |
D | Enterprise license |
Question 143 |
A | loop , iteration |
B | loop , run |
C | conditional statement , run |
D | conditional statement , iteration |
Question 144 |
A | Rooting |
B | Jailbreaking |
C | Open shell access |
D | Grant superadmin |
E | VirusBarrier |
Question 145 |
A | Install to a USB drive |
B | Install to a network drive |
C | Install to a secondary internal HDD |
D | Install to a DVD-RW |
Question 146 |
A | Services console |
B | File Explorer |
C | Windows Registry |
D | Task Manager |
E | Device Manager |
Question 147 |

A | Gparted |
B | DiskPart |
C | Event Viewer |
D | Disk Management |
E | System Management |
Question 148 |
A | Ctrl+Alt+Del |
B | Windows+R |
C | Windows+pause break |
D | Windows+L |
E | Windows+M |
Question 149 |
A | chkdsk /sec |
B | chkdsk C: /C |
C | chkdsk C: /F |
D | chkdsk C: /I |
E | chkdsk C: /R |
Question 150 |
A | Backout plan |
B | Plan for change |
C | Business processes |
D | End-user acceptance |
E | Risk analysis |
F | Request for proposal |
Question 151 |
A | Enterprise license |
B | Personal license |
C | Volume license |
D | Corporate license |
E | Open license |
Question 152 |
A | Disk Management |
B | Msconfig |
C | Task Manager |
D | Administrative Tools |
Question 153 |
A | The 32-bit architecture has an upper RAM limit of 64 GB. |
B | Windows 10 only comes in 64-bit version. |
C | The 64-bit architecture has an upper RAM limit of 128 GB. |
D | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
E | The 64-bit version is also known as x86. |
Question 154 |
A | Page-file size |
B | Data execution prevention |
C | Visual effects |
D | Processor scheduling |
Question 155 |
A | deltask |
B | delprocess |
C | taskkill |
D | process -k |
E | process -del |
Question 156 |
A | DDoS attack |
B | Phishing attack |
C | Session hijacking attack |
D | Brute force attack |
E | Social engineering |
Question 157 |
A | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
B | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
C | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
D | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
Question 158 |
A | Unplug the power and re-plug it without powering down the workstation. |
B | Format and partition the drive. |
C | Run Windows updates. |
D | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
E | Initialize the drive. |
Question 159 |
A | Format command |
B | Disk Cleanup utility |
C | Computer Management |
D | Disk Management |
Question 160 |
A | Rollback OS and driver updates. |
B | Disconnect the computer from the office network. |
C | Research the virus and how to remove it. |
D | Reboot the computer in order to make sure all other programs are terminated. |
E | Run a System Restore. |
Question 161 |
A | GPT |
B | PXE |
C | Multi-boot |
D | Dynamic |
Question 162 |
A | Secure Shell |
B | Propagation |
C | SSO |
D | Inheritance |
E | MFA |
Question 163 |
A | Adding ports |
B | Pausing printing |
C | Enabling sharing |
D | Modifying spool settings |
Question 164 |
A | It would be very difficualt and will require specialized laborotory to recover the data. |
B | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
C | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
D | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
Question 165 |
A | Task Manager |
B | Command Prompt |
C | Control Panel |
D | MMC |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 |
| 31 | 32 | 33 | 34 | 35 |
| 36 | 37 | 38 | 39 | 40 |
| 41 | 42 | 43 | 44 | 45 |
| 46 | 47 | 48 | 49 | 50 |
| 51 | 52 | 53 | 54 | 55 |
| 56 | 57 | 58 | 59 | 60 |
| 61 | 62 | 63 | 64 | 65 |
| 66 | 67 | 68 | 69 | 70 |
| 71 | 72 | 73 | 74 | 75 |
| 76 | 77 | 78 | 79 | 80 |
| 81 | 82 | 83 | 84 | 85 |
| 86 | 87 | 88 | 89 | 90 |
| 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 |
| 101 | 102 | 103 | 104 | 105 |
| 106 | 107 | 108 | 109 | 110 |
| 111 | 112 | 113 | 114 | 115 |
| 116 | 117 | 118 | 119 | 120 |
| 121 | 122 | 123 | 124 | 125 |
| 126 | 127 | 128 | 129 | 130 |
| 131 | 132 | 133 | 134 | 135 |
| 136 | 137 | 138 | 139 | 140 |
| 141 | 142 | 143 | 144 | 145 |
| 146 | 147 | 148 | 149 | 150 |
| 151 | 152 | 153 | 154 | 155 |
| 156 | 157 | 158 | 159 | 160 |
| 161 | 162 | 163 | 164 | 165 |
| End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.