← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | chkdsk C: /C |
B | chkdsk /sec |
C | chkdsk C: /I |
D | chkdsk C: /R |
E | chkdsk C: /F |
Question 2 |
A | It may lead to instability issues. |
B | It may interfere with other signed drivers installed on the device. |
C | It may result in damage to the device. |
D | It may result in random reboots. |
Question 3 |
A | Minimum password age |
B | Complexity requirements |
C | Enforce password history |
D | Minimum password length |
Question 4 |
A | Enterprise license |
B | Open source license |
C | Commercial license |
D | Seat license |
Question 5 |
A | Implement a fire suppression system. |
B | Plug and check if the equipment is working. |
C | Increase the closet's airflow. |
D | Set up dehumidifiers. |
E | Install grounding bars. |
Question 6 |
A | Program Files |
B | Program Files (x86) |
C | Systemroot |
D | System32 |
Question 7 |
A | MSDS |
B | official documentation |
C | Incident Response Life Cycle |
D | chain of custody |
E | incident response |
Question 8 |
A | Guest |
B | Domain Admin |
C | Administrator |
D | Power user |
Question 9 |
A | ifconfig |
B | Msconfig |
C | Task Manager |
D | Safe Mode |
Question 10 |
A | Unsigned drivers or untrusted software. |
B | Mobile Device Management (MDM) policies |
C | VPN configuration or inactive VPN. |
D | Anti-virous and anti-malware software intefrence. |
Question 11 |
A | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
B | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
C | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
D | Contact HR immediately and seek advice. |
E | Contact a lawyer as this breaches the professional conduct policies. |
Question 12 |
A | Move the folder to another location on the server, and notify the local authorities |
B | Ask the owner to move the files from the server to a local computer |
C | Rename the folder on the server, and notify the information security officer |
D | Promptly notify the administrator's immediate supervisor |
Question 13 |
A | /S |
B | /D |
C | /E |
D | /DCOPY:T |
E | /sub-1 |
F | /B |
Question 14 |
A | CompTIA |
B | Microsoft |
C | Apple |
D | WWF |
E | IBM |
Question 15 |
A | Recover |
B | Rebuild |
C | Replace |
D | REM |
E | Convert |
Question 16 |
A | Do nothing. |
B | Replace the hard drive. |
C | Educate the customer on how to avoid malware. |
D | Change the user account permissions to restrict access. |
E | Reinstall the antivirous and malware software. |
Question 17 |
A | System log |
B | Tasker log |
C | Security log |
D | Application log |
E | Setup log |
Question 18 |
A | Active Directory Policy |
B | Site Policy |
C | Local Security Policy |
D | OU Group Policy |
Question 19 |
A | GPT |
B | Multi-boot |
C | PXE |
D | Dynamic |
Question 20 |
A | Google Cloud Platform |
B | Microsoft OneDrive |
C | iCloud |
D | Local NAS |
Question 21 |
A | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
B | It would be very difficualt and will require specialized laborotory to recover the data. |
C | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
D | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
Question 22 |
A | \%systemroot%\System32 |
B | \%systemroot%\Windows\System32\Con
fig |
C | \%systemroot%\System32\Config |
D | \%systemroot%\Windows |
Question 23 |
A | netstat |
B | ping |
C | ipconfig |
D | ipconfig /renew |
E | ipconfig /all |
Question 24 |

A | Disk Management |
B | DiskPart |
C | Gparted |
D | Event Viewer |
E | System Management |
Question 25 |
A | Using msconfig General tab. |
B | Using msconfig Boot tab. |
C | Using msconfig Tools tab. |
D | Using msconfig Services tab. |
Question 26 |
A | FAT16 |
B | NTFS |
C | exFAT |
D | FAT32 |
Question 27 |
A | Run Msconfig. |
B | Check the System log. |
C | Remove the network card. |
D | Boot into the Safe Mode. |
E | Run Chkdsk. |
Question 28 |
A | Rooting |
B | Grant superadmin |
C | Open shell access |
D | VirusBarrier |
E | Jailbreaking |
Question 29 |
A | conditional statement , iteration |
B | loop , run |
C | loop , iteration |
D | conditional statement , run |
Question 30 |
A | Sigverif |
B | Ping |
C | Msconfig |
D | Dxdiag |
E | Regedit |
Question 31 |
A | The Android Kernel version must be different bvetwen the manufactures. |
B | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
C | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
D | Each manufacturer has their own customized Launchers that modify the GUI. |
E | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
Question 32 |
A | trojan |
B | worm |
C | spam bot |
D | spyware |
Question 33 |
A | perfmon |
B | taskmgr |
C | regd |
D | msconfig |
E | dxdiag |
Question 34 |
A | ls |
B | ifconfig |
C | ipaddr /all |
D | chown |
E | ipconfig /all |
Question 35 |
A | Impersonation |
B | Spoofing |
C | Whaling |
D | Spear phishing |
Question 36 |
A | Primary partition |
B | USB drive |
C | Extended partition |
D | Dynamic partition |
E | Secondary partition |
Question 37 |
A | Run a driver update check for the specified software. |
B | Document your solution. |
C | Move on to the server to a different node or VLAN on the network. |
D | Invoice the customer. |
Question 38 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /fixmbr |
B | bootrec /restore |
C | boot\bcd |
D | bootrec /fixboot |
E | bootrec /rebuildbcd |
Question 39 |
A | Ping |
B | Dir |
C | MD |
D | Ver |
E | CD |
Question 40 |
A | DDoS |
B | Phishing |
C | Brute force |
D | Session hijacking |
E | Malicious attack |
Question 41 |
A | OneDrive |
B | Windows Firewall |
C | PowerShell |
D | Compatibility mode |
Question 42 |
A | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
B | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
C | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
D | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
Question 43 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | Malicious attack |
B | DDoS attack |
C | Session hijacking attack |
D | Brute force attack |
E | HTTP attack |
Question 44 |
A | Run the CHKDSK /R command |
B | Run Windows Update |
C | Disable System Restore |
D | Disable all non-administrator accounts. |
E | Disable network cards |
Question 45 |
A | Uninstall firewall applications and disable all firewall rules. |
B | Reboot the network cameras. |
C | Revert the computer back to the last stable Windows service pack. |
D | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
E | Reboot the router. |
Question 46 |
A | dir |
B | CD |
C | MD |
D | RD |
E | SD |
Question 47 |
A | NTFS supports larger volumes. |
B | NTFS supports file encryption. |
C | NTFS supports more file formats. |
D | NTFS supports larger file sizes. |
Question 48 |
A | Reinstall Java on the affected workstation. |
B | Ask the customer to use a different web browser. |
C | Ask the customer to find an application that does not use Java. |
D | Delete and clear Java Temporary Internet Files. |
Question 49 |
A | Mac Management |
B | Taskkill |
C | Task Manager |
D | Force quit |
E | Time Machine |
Question 50 |
A | MS-DOS Control Panel |
B | Windows Registry |
C | Windows Control Panel |
D | Windows Task Scheduler |
E | Windows Task Manager |
Question 51 |
A | secpol.msc |
B | devmgmt.msc |
C | mtg |
D | CMD |
E | MMC |
Question 52 |

A | Windows Task Scheduler |
B | Windows Task Manager |
C | Windows Control Panel |
D | Windows Registry |
E | Performance Monitor |
Question 53 |
A | .vbs |
B | .bat |
C | .sh |
D | .js |
Question 54 |
A | pad and chmod |
B | sudo and vi |
C | ps and kill |
D | ls and chown |
E | cp and rm |
Question 55 |
A | MD |
B | dir |
C | CD |
D | SD |
E | RD |
Question 56 |
A | VB Script |
B | Command Prompt |
C | PowerShell |
D | DOS |
Question 57 |
A | IBM |
B | Apple |
C | Microsoft |
D | WWF |
E | CompTIA |
Question 58 |
A | Spotlight |
B | iTunes |
C | Google Play |
D | Trusted Mobile Platform (TMP) |
E | App Store |
Question 59 |
A | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
B | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
C | Windows user account authentication is more secure than BitLocker. |
D | Windows user account authentication can only be used with a Windows Server Domain Controller. |
E | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
Question 60 |

A | Mac OS |
B | Ubuntu |
C | Windows 10 |
D | Android |
E | iOS |
Question 61 |
A | tokens |
B | root CA |
C | keys |
D | passwords |
Question 62 |
A | Enabling sharing |
B | Pausing printing |
C | Adding ports |
D | Modifying spool settings |
Question 63 |
A | chkdsk C: /R |
B | chkdsk C: /C |
C | chkdsk C: /I |
D | chkdsk C: /F |
E | chkdsk /sec |
Question 64 |
A | Image Copy |
B | Sysprep |
C | Robocopy |
D | Image Clone |
E | Ghost |
Question 65 |
A | .ps1 |
B | .py |
C | .ps |
D | .py1 |
E | .vbs |
Question 66 |
A | Quit your job because of this work environment is toxic. |
B | Stay calm and do your job to best of your ability. |
C | Refer your panicking Supervisor and co-workers to professional counseling services. |
D | Take everyone out to lunch get their mind off of the problem. |
E | Request that you need to speak to a senior Supervisor. |
Question 67 |
A | Control Panel |
B | MMC |
C | Task Manager |
D | Command Prompt |
Question 68 |
A | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
B | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
C | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
D | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
Question 69 |
A | diskpart |
B | cleanmgr |
C | chkdsk |
D | defrag |
Question 70 |
A | Task Manager |
B | Windows Registry |
C | File Explorer |
D | Services console |
E | Device Manager |
Question 71 |
A | Power users |
B | Administrator |
C | Guest |
D | Standard user |
Question 72 |
A | Device Manager |
B | TRIM |
C | Display properties |
D | Power plans |
E | Task Manager |
Question 73 |
A | /D |
B | /S |
C | /sub-1 |
D | /DCOPY:T |
E | /RCOPY |
F | /B |
Question 74 |
A | HKEY_LOCAL_MACHINE |
B | HKEY_USERS |
C | HKEY_CLASSES_ROOT |
D | HKEY_CURRENT_CONFIG |
Question 75 |
A | Local-level firewall policies |
B | Local-level user policies |
C | Network-level firewall policies |
D | Domain-level group policies |
E | Antivirus domain-level policies |
Question 76 |
A | Install a firewall and enforce rules. |
B | Disable the SSID broadcast. |
C | Install an antivirus on the main server. |
D | Disconnect the Internet connection to the LAN. |
E | Install an intrusion detection system (IDS). |
Question 77 |
A | Msconfig |
B | Task Manager |
C | Chkdsk |
D | System Information |
Question 78 |
A | Sync Center |
B | Folder Options |
C | User Accounts |
D | Display Settings |
Question 79 |
A | Document the incident and purge all policy-violating materials. |
B | Immediately delete all unauthorized materials. |
C | Delete the bit torrent application and contact the affected copyright holders. |
D | Reprimand the user and apply a content filter
to the user’s profile. |
E | Secure the workstation in a limited access
facility. |
Question 80 |
A | CMD |
B | MS Excel |
C | Notepad |
D | MS PowerPoint |
E | MS Word |
Question 81 |
A | Windows 10 Education |
B | Windows 10 Home |
C | Windows 10 Enterprise |
D | Windows 10 Pro |
Question 82 |
A | Telnet |
B | VNC |
C | RDP |
D | SSH |
Question 83 |
A | NETDOM |
B | CONVERT |
C | IPCONFIG |
D | CHKNTFS |
Question 84 |
A | Windows Aero |
B | Windows Domain |
C | HomeGroup |
D | Windows Defender |
E | Sync Center |
Question 85 |
A | Task Manager |
B | Task Scheduler |
C | Event Viewer |
D | Services |
Question 86 |
A | Completely erase the old drive prior to disposal. |
B | Open the old hard drive case and use ESD to destory the circuitry. |
C | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
D | Format the old hard drive multiple times before deposal. |
Question 87 |
A | Look for program features and the minimum hardware requirements. |
B | Verify that the install is allowed under the company’s licensing agreements. |
C | Update the Windows drivers on the computer. |
D | Read the manual on how HR is going to use the software. |
Question 88 |
A | Pro |
B | Enterprise |
C | Standard |
D | Home |
Question 89 |
A | cat |
B | bash |
C | ls |
D | sbin |
Question 90 |
A | Rebuild the users mail profile |
B | Check for and apply software updates |
C | Perform repair installation on the application |
D | Add the user to the local administrators group |
Question 91 |
A | VPN |
B | WWAN |
C | VLAN |
D | 5G LTE |
E | WLAN |
Question 92 |
A | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
B | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
C | Display a message on lock screen advising users how importnat to lock their computer. |
D | Set a strong password that requires a renewal every 30 days. |
E | Create a group policy to set minimum password standards. |
Question 93 |
A | The 64-bit architecture has an upper RAM limit of 128 GB. |
B | The 32-bit architecture has an upper RAM limit of 64 GB. |
C | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
D | Windows 10 only comes in 64-bit version. |
E | The 64-bit version is also known as x86. |
Question 94 |
A | Snap-ins |
B | Applets |
C | Directories |
D | Files |
Question 95 |
A | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
B | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
C | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
D | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
Question 96 |
A | Security Policy |
B | Local Users and Groups |
C | Component Services |
D | System Configuration |
Question 97 |
A | Lower power consumption. |
B | Support for single large files over 4GB. |
C | Low drive failure rates. |
D | Compatibility across different OS providers such as Windows, Linux and Mac. |
E | Better driver encryption and support for cryptology. |
Question 98 |
A | CD-ROM |
B | Memory |
C | Hard drive/SSD |
D | Driver |
Question 99 |
A | Android OS |
B | Windows 10 |
C | Ubuntu OS |
D | Chrome OS |
E | macOS |
Question 100 |
A | robocopy |
B | diskpart |
C | tracert /w |
D | chkdsk /F |
Question 101 |
A | Convert the file system to NTFS. |
B | Defrag the hard drive. |
C | Disable UAC. |
D | Change the location of the system32 |
E | Enable TPM in the BIOS/UEFI. |
Question 102 |
A | BIOS password |
B | BitDefender |
C | BitLocker |
D | Windows user account |
E | Windows administrator user account |
Question 103 |
A | delprocess |
B | deltask |
C | process -del |
D | process -k |
E | taskkill |
Question 104 |
A | MFA |
B | Propagation |
C | SSO |
D | Secure Shell |
E | Inheritance |
Question 105 |
A | C:\Users\System32\Documents |
B | C:\Documents and Settings\%username%\Documents |
C | C:\Users\%username%\Documents |
D | C:\Users\%root%\Documents |
Question 106 |
A | ipconfig man |
B | man ipconfig |
C | ipconfig help |
D | ipconfig /? |
Question 107 |
A | eventvwr.msc |
B | devmgmt.msc |
C | perfmon.exe |
D | wintask |
E | systempropertiesadvanced.exe |
Question 108 |
A | Task Manager |
B | Msconfig |
C | Disk Management |
D | Administrative Tools |
Question 109 |
A | Upgrade the video drivers. |
B | Reinstall the Windows OS. |
C | Check the RAM configuration. |
D | Replace the hard drive. |
E | Reinstall the CAD program. |
Question 110 |
A | System Restore |
B | Windows Registry |
C | Startup Repair |
D | File History |
E | Reset Your PC |
Question 111 |
A | Server and domain |
B | IP address and domain |
C | IP address and DNS |
D | Server and gateway |
Question 112 |
A | dir /d |
B | dir /? |
C | dir -1 |
D | dir /a |
E | dir /o |
Question 113 |
A | Grant superadmin |
B | Open shell access |
C | Jailbreaking |
D | VirusBarrier |
E | Rooting |
Question 114 |
A | Reconfigure the gaming consoles' network interfaces. |
B | Factory reset the gaming consoles. |
C | Configure router QoS engine with service priority for gaming applications. |
D | Replace the router with an upgraded unit. |
E | Power cycle the network appliances. |
F | Replace the IP camera system with a new one. |
Question 115 |
A | Standard format |
B | Low-level format |
C | Drive wipe |
D | Degauss |
Question 116 |
A | Run chkdsk. |
B | Defragment the drive. |
C | Copy system files. |
D | Partition the drive. |
Question 117 |

A | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
B | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
C | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
D | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
E | This PC is running low on memory resources with a very high percentage is committed. |
Question 118 |
A | Domain name, location, asset ID |
B | Location, RFID |
C | Domain name, location, IP address |
D | Asset ID, MAC address |
Question 119 |
A | Windows |
B | Program Files |
C | boot |
D | System32 |
E | Users |
Question 120 |
A | First left |
B | None of the answers are correct |
C | First right |
D | Center |
Question 121 |
A | Net timer |
B | Time |
C | Timeset |
D | Net time |
E | Net time set |
Question 122 |
A | Disk Management |
B | Format command |
C | Computer Management |
D | Disk Cleanup utility |
Question 123 |

A | Open file as3final.py file using the program notepad++ |
B | Change the file name from notepad to as3final.py |
C | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
D | Execute the file notepad++ in as3final.py |
E | Execute the file as3final.py in notepad++ |
Question 124 |
A | Install to a network drive |
B | Install to a USB drive |
C | Install to a secondary internal HDD |
D | Install to a DVD-RW |
Question 125 |
A | Home Folder |
B | Folder Redirection |
C | Security Groups |
D | Group Policy |
Question 126 |
A | Backout plan |
B | End-user acceptance |
C | Business processes |
D | Plan for change |
E | Request for proposal |
F | Risk analysis |
Question 127 |
A | hives |
B | reg |
C | regedit |
D | winreg |
E | registry |
Question 128 |
A | Social engineering |
B | Brute force attack |
C | Session hijacking attack |
D | DDoS attack |
E | Phishing attack |
Question 129 |
A | Calibrate the touchscreen sensor |
B | Disable and then reenable Bluetooth |
C | Restart the tablet |
D | Disconnect and then reconnect the stylus |
Question 130 |
A | On the taskbar |
B | Within the Start menu |
C | In the System32 folder |
D | In the System Properties dialog box |
Question 131 |
A | .sdk |
B | .ipa |
C | .exe |
D | api |
E | .apk |
Question 132 |
A | PS1 |
B | ASCII |
C | EBCDIC |
D | ITU-T |
E | Unicode |
Question 133 |
A | Roll back the OS upgrade. Continue using the older version of Windows |
B | Reset the PC to its factory conditions. Perform the OS upgrade again |
C | Update the SATA controller driver from the manufacturers website |
D | Perform a full backup and replace the hard drive |
Question 134 |
A | Passwd |
B | Chown |
C | Chmod |
D | dirc |
E | Ls |
Question 135 |
A | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
B | Notify the change team of the changes needed and perform the changes. |
C | Document the changes and perform the work. |
D | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
E | Submit the changes to the change board for approval. |
Question 136 |
A | 6 GB |
B | 1 GB |
C | 2 GB |
D | 512 MB |
E | 4 GB |
Question 137 |
A | Call the building supervisor to make sure there is enough solder for others. |
B | Check the temperature at which the solder should be applied. |
C | Do not attempt to repair a motherboard. It is better to buy a new one. |
D | Consult the MSDS for the solder spool. |
Question 138 |

A | Disk 0 - 465.27 MB NTFS |
B | None of the partitions can be dismounted without crashing the system. |
C | Disk 0 - 500 MB NTFS |
D | Disk 1 |
Question 139 |
A | 2 GB |
B | 1 GB |
C | 6 GB |
D | 512 MB |
E | 4 GB |
Question 140 |
A | MBR |
B | GPT |
C | Dynamic drive |
D | FAT32 |
Question 141 |
A | unattend.xml |
B | diskmgmt.msc |
C | setupact.log |
D | setuperr.log |
Question 142 |
A | Commercial license |
B | Open source license |
C | Seat license |
D | Enterprise license |
Question 143 |
A | Volume license |
B | Corporate license |
C | Enterprise license |
D | Open license |
E | Personal license |
Question 144 |

A | Primary partition |
B | Healthy partition |
C | FAT32 partition |
D | Disk 0 |
E | Disk 1 |
Question 145 |
A | Change the default access port |
B | Enforce password complexity |
C | Block all unused ports on the LAN smart switch |
D | Disable logon time restrictions |
E | Put the terminal server into the routers DMZ |
F | Use the local client certificate for server authentication |
Question 146 |
A | Organization security and content policy supersede all other legal policies of the country which the company operates. |
B | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
C | Organization security and content policies are not part of the majority of government organizations. |
D | Organization security and content policy typically do not apply to executive staff. |
E | Organization security and content policy must follow the legal policies of the country which the company operates. |
Question 147 |
A | Tasklist |
B | Force quit |
C | Computer Management |
D | Control Panel |
E | Task Manager |
Question 148 |
A | exFAT |
B | ext4 |
C | FAT32 |
D | NTFS |
Question 149 |
A | Format and partition the drive. |
B | Run Windows updates. |
C | Initialize the drive. |
D | Unplug the power and re-plug it without powering down the workstation. |
E | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
Question 150 |
A | UEFI boot mode |
B | Date and time |
C | Logon times |
D | User access control |
Question 151 |
A | Component Services |
B | Device Manager |
C | Performance Monitor |
D | Local Security Policy |
Question 152 |
A | Ask Sara why she has this type of folder on her work computer. |
B | Install the software and ignore the folder. |
C | Contact the Manager of the company immediately. |
D | Open the folder and enjoy the images. |
E | Open the folder to investigate the content, but do not open the images. |
Question 153 |
A | Remove and reinstall the application |
B | Hard reset the cell phone |
C | Close all running applications |
D | Reconnect the wireless network connection |
Question 154 |
A | winload.exe |
B | shell.adb |
C | startup.exe |
D | system32.exe |
E | setup.exe |
Question 155 |
A | Windows+L |
B | Windows+pause break |
C | Windows+M |
D | Windows+R |
E | Ctrl+Alt+Del |
Question 156 |
A | Personal license |
B | Volume license |
C | Corporate license |
D | Open license |
E | Enterprise license |
Question 157 |
A | Disconnect the computer from the office network. |
B | Rollback OS and driver updates. |
C | Reboot the computer in order to make sure all other programs are terminated. |
D | Run a System Restore. |
E | Research the virus and how to remove it. |
Question 158 |
A | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
B | Boot the workstation in safe mode and disable the graphics driver system tray menu |
C | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
D | Boot the workstation in safe mode and disable Windows driver signing requirements |
Question 159 |
A | Page-file size |
B | Data execution prevention |
C | Processor scheduling |
D | Visual effects |
Question 160 |
A | MFA |
B | Secure Shell |
C | Inheritance |
D | SSO |
E | Propagation |
Question 161 |
A | DxDiag |
B | perfmon.msc |
C | gettingstarted |
D | Ipconfig |
E | Regedit |
Question 162 |
A | setupact.log |
B | unattend.xml |
C | diskmgmt.msc |
D | setuperr.log |
Question 163 |
A | Quarantine infected systems. |
B | Schedule scans and run updates. |
C | Disable System Restore. |
D | Identify malware symptoms. |
E | Remediate infected systems. |
F | Enable System Restore. |
Question 164 |
A | Windows 10 |
B | iOS |
C | Android |
D | Windows 98 |
E | macOS |
Question 165 |
A | Virus infection of the C drive. |
B | Hyper-Threading has been disabled. |
C | The printing system is running. |
D | Windows Update is running. |
E | Drivers are being downloaded by the Device Manager. |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 |
| 31 | 32 | 33 | 34 | 35 |
| 36 | 37 | 38 | 39 | 40 |
| 41 | 42 | 43 | 44 | 45 |
| 46 | 47 | 48 | 49 | 50 |
| 51 | 52 | 53 | 54 | 55 |
| 56 | 57 | 58 | 59 | 60 |
| 61 | 62 | 63 | 64 | 65 |
| 66 | 67 | 68 | 69 | 70 |
| 71 | 72 | 73 | 74 | 75 |
| 76 | 77 | 78 | 79 | 80 |
| 81 | 82 | 83 | 84 | 85 |
| 86 | 87 | 88 | 89 | 90 |
| 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 |
| 101 | 102 | 103 | 104 | 105 |
| 106 | 107 | 108 | 109 | 110 |
| 111 | 112 | 113 | 114 | 115 |
| 116 | 117 | 118 | 119 | 120 |
| 121 | 122 | 123 | 124 | 125 |
| 126 | 127 | 128 | 129 | 130 |
| 131 | 132 | 133 | 134 | 135 |
| 136 | 137 | 138 | 139 | 140 |
| 141 | 142 | 143 | 144 | 145 |
| 146 | 147 | 148 | 149 | 150 |
| 151 | 152 | 153 | 154 | 155 |
| 156 | 157 | 158 | 159 | 160 |
| 161 | 162 | 163 | 164 | 165 |
| End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.