← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Server and gateway |
B | Server and domain |
C | IP address and domain |
D | IP address and DNS |
Question 2 |
A | Plug and check if the equipment is working. |
B | Install grounding bars. |
C | Set up dehumidifiers. |
D | Implement a fire suppression system. |
E | Increase the closet's airflow. |
Question 3 |
A | setuperr.log |
B | diskmgmt.msc |
C | setupact.log |
D | unattend.xml |
Question 4 |
A | Promptly notify the administrator's immediate supervisor |
B | Ask the owner to move the files from the server to a local computer |
C | Move the folder to another location on the server, and notify the local authorities |
D | Rename the folder on the server, and notify the information security officer |
Question 5 |
A | 1 GB |
B | 4 GB |
C | 2 GB |
D | 6 GB |
E | 512 MB |
Question 6 |
A | Google Play |
B | Trusted Mobile Platform (TMP) |
C | Spotlight |
D | App Store |
E | iTunes |
Question 7 |
A | Format command |
B | Disk Management |
C | Computer Management |
D | Disk Cleanup utility |
Question 8 |
A | IBM |
B | Apple |
C | WWF |
D | Microsoft |
E | CompTIA |
Question 9 |
A | Msconfig |
B | Regedit |
C | Sigverif |
D | Ping |
E | Dxdiag |
Question 10 |
A | Event Viewer |
B | Task Manager |
C | Task Scheduler |
D | Services |
Question 11 |
A | Disk 0 - 465.27 MB NTFS |
B | None of the partitions can be dismounted without crashing the system. |
C | Disk 1 |
D | Disk 0 - 500 MB NTFS |
Question 12 |
A | Chrome OS |
B | Ubuntu OS |
C | Windows 10 |
D | Android OS |
E | macOS |
Question 13 |
A | Enterprise license |
B | Seat license |
C | Commercial license |
D | Open source license |
Question 14 |
A | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
B | It would be very difficualt and will require specialized laborotory to recover the data. |
C | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
D | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
Question 15 |
A | Add the user to the local administrators group |
B | Rebuild the users mail profile |
C | Check for and apply software updates |
D | Perform repair installation on the application |
Question 16 |
A | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
B | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
C | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
D | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
Question 17 |
A | ipconfig /renew |
B | netstat |
C | ipconfig /all |
D | ping |
E | ipconfig |
Question 18 |
A | Ask the customer to find an application that does not use Java. |
B | Reinstall Java on the affected workstation. |
C | Ask the customer to use a different web browser. |
D | Delete and clear Java Temporary Internet Files. |
Question 19 |
A | pad and chmod |
B | ls and chown |
C | cp and rm |
D | ps and kill |
E | sudo and vi |
Question 20 |
A | FAT32 |
B | NTFS |
C | ext4 |
D | exFAT |
Question 21 |
A | boot |
B | Windows |
C | Users |
D | Program Files |
E | System32 |
Question 22 |
A | Format and partition the drive. |
B | Unplug the power and re-plug it without powering down the workstation. |
C | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
D | Initialize the drive. |
E | Run Windows updates. |
Question 23 |
A | Replace |
B | Convert |
C | Recover |
D | Rebuild |
E | REM |
Question 24 |
A | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
B | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
C | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
D | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
Question 25 |
A | Task Manager |
B | Mac Management |
C | Force quit |
D | Taskkill |
E | Time Machine |
Question 26 |
A | CD-ROM |
B | Memory |
C | Hard drive/SSD |
D | Driver |
Question 27 |
A | .ps1 |
B | .py1 |
C | .vbs |
D | .ps |
E | .py |
Question 28 |
A | Request that you need to speak to a senior Supervisor. |
B | Refer your panicking Supervisor and co-workers to professional counseling services. |
C | Take everyone out to lunch get their mind off of the problem. |
D | Quit your job because of this work environment is toxic. |
E | Stay calm and do your job to best of your ability. |
Question 29 |
A | Snap-ins |
B | Files |
C | Directories |
D | Applets |
Question 30 |
A | Impersonation |
B | Spear phishing |
C | Whaling |
D | Spoofing |
Question 31 |
A | OneDrive |
B | Windows Firewall |
C | Compatibility mode |
D | PowerShell |
Question 32 |
A | Educate the customer on how to avoid malware. |
B | Reinstall the antivirous and malware software. |
C | Change the user account permissions to restrict access. |
D | Do nothing. |
E | Replace the hard drive. |
Question 33 |
A | SSO |
B | Secure Shell |
C | Inheritance |
D | Propagation |
E | MFA |
Question 34 |
A | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
B | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
C | Create a group policy to set minimum password standards. |
D | Set a strong password that requires a renewal every 30 days. |
E | Display a message on lock screen advising users how importnat to lock their computer. |
Question 35 |
A | passwords |
B | tokens |
C | keys |
D | root CA |
Question 36 |
A | Location, RFID |
B | Asset ID, MAC address |
C | Domain name, location, IP address |
D | Domain name, location, asset ID |
Question 37 |
A | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
B | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
C | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
D | This PC is running low on memory resources with a very high percentage is committed. |
E | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
Question 38 |
A | Mobile Device Management (MDM) policies |
B | VPN configuration or inactive VPN. |
C | Anti-virous and anti-malware software intefrence. |
D | Unsigned drivers or untrusted software. |
Question 39 |
A | Ipconfig |
B | gettingstarted |
C | perfmon.msc |
D | Regedit |
E | DxDiag |
Question 40 |
A | Check the RAM configuration. |
B | Replace the hard drive. |
C | Reinstall the CAD program. |
D | Upgrade the video drivers. |
E | Reinstall the Windows OS. |
Question 41 |
A | VB Script |
B | DOS |
C | Command Prompt |
D | PowerShell |
Question 42 |
A | Minimum password length |
B | Complexity requirements |
C | Minimum password age |
D | Enforce password history |
Question 43 |
A | Reboot the router. |
B | Reboot the network cameras. |
C | Uninstall firewall applications and disable all firewall rules. |
D | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
E | Revert the computer back to the last stable Windows service pack. |
Question 44 |
A | Open the old hard drive case and use ESD to destory the circuitry. |
B | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
C | Format the old hard drive multiple times before deposal. |
D | Completely erase the old drive prior to disposal. |
Question 45 |
A | CHKNTFS |
B | CONVERT |
C | NETDOM |
D | IPCONFIG |
Question 46 |
A | Social engineering |
B | Phishing attack |
C | Brute force attack |
D | DDoS attack |
E | Session hijacking attack |
Question 47 |
A | Drivers are being downloaded by the Device Manager. |
B | The printing system is running. |
C | Hyper-Threading has been disabled. |
D | Windows Update is running. |
E | Virus infection of the C drive. |
Question 48 |
A | Commercial license |
B | Seat license |
C | Open source license |
D | Enterprise license |
Question 49 |
A | Date and time |
B | Logon times |
C | User access control |
D | UEFI boot mode |
Question 50 |
A | system32.exe |
B | winload.exe |
C | startup.exe |
D | shell.adb |
E | setup.exe |
Question 51 |
A | Check the System log. |
B | Boot into the Safe Mode. |
C | Remove the network card. |
D | Run Chkdsk. |
E | Run Msconfig. |
Question 52 |
A | Ask Sara why she has this type of folder on her work computer. |
B | Contact the Manager of the company immediately. |
C | Open the folder and enjoy the images. |
D | Install the software and ignore the folder. |
E | Open the folder to investigate the content, but do not open the images. |
Question 53 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | boot\bcd |
B | bootrec /restore |
C | bootrec /fixboot |
D | bootrec /rebuildbcd |
E | bootrec /fixmbr |
Question 54 |
A | Group Policy |
B | Security Groups |
C | Home Folder |
D | Folder Redirection |
Question 55 |
A | Google Cloud Platform |
B | Microsoft OneDrive |
C | iCloud |
D | Local NAS |
Question 56 |
A | Windows Registry |
B | MS-DOS Control Panel |
C | Windows Task Scheduler |
D | Windows Control Panel |
E | Windows Task Manager |
Question 57 |
A | Image Copy |
B | Ghost |
C | Image Clone |
D | Sysprep |
E | Robocopy |
Question 58 |
A | Secure Shell |
B | MFA |
C | Propagation |
D | Inheritance |
E | SSO |
Question 59 |
A | MBR |
B | FAT32 |
C | Dynamic drive |
D | GPT |
Question 60 |
A | dir -1 |
B | dir /o |
C | dir /? |
D | dir /d |
E | dir /a |
Question 61 |
A | Using msconfig Boot tab. |
B | Using msconfig Services tab. |
C | Using msconfig Tools tab. |
D | Using msconfig General tab. |
Question 62 |
A | Msconfig |
B | Task Manager |
C | ifconfig |
D | Safe Mode |
Question 63 |
A | Display properties |
B | TRIM |
C | Task Manager |
D | Device Manager |
E | Power plans |
Question 64 |
A | Change the default access port |
B | Enforce password complexity |
C | Use the local client certificate for server authentication |
D | Disable logon time restrictions |
E | Block all unused ports on the LAN smart switch |
F | Put the terminal server into the routers DMZ |
Question 65 |
A | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
B | Notify the change team of the changes needed and perform the changes. |
C | Document the changes and perform the work. |
D | Submit the changes to the change board for approval. |
E | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
Question 66 |
A | Install an intrusion detection system (IDS). |
B | Disconnect the Internet connection to the LAN. |
C | Install an antivirus on the main server. |
D | Install a firewall and enforce rules. |
E | Disable the SSID broadcast. |
Question 67 |
A | chown |
B | ipconfig /all |
C | ifconfig |
D | ipaddr /all |
E | ls |
Question 68 |
A | Contact HR immediately and seek advice. |
B | Contact a lawyer as this breaches the professional conduct policies. |
C | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
D | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
E | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
Question 69 |
A | Remove and reinstall the application |
B | Reconnect the wireless network connection |
C | Hard reset the cell phone |
D | Close all running applications |
Question 70 |
A | Standard user |
B | Administrator |
C | Guest |
D | Power users |
Question 71 |
A | Command Prompt |
B | Task Manager |
C | MMC |
D | Control Panel |
Question 72 |
A | Windows+pause break |
B | Windows+M |
C | Windows+R |
D | Ctrl+Alt+Del |
E | Windows+L |
Question 73 |
A | Windows 10 Pro |
B | Windows 10 Education |
C | Windows 10 Enterprise |
D | Windows 10 Home |
Question 74 |
A | Degauss |
B | Standard format |
C | Low-level format |
D | Drive wipe |
Question 75 |
A | System Configuration |
B | Security Policy |
C | Local Users and Groups |
D | Component Services |
Question 76 |
A | perfmon.exe |
B | systempropertiesadvanced.exe |
C | eventvwr.msc |
D | devmgmt.msc |
E | wintask |
Question 77 |
A | Home |
B | Enterprise |
C | Pro |
D | Standard |
Question 78 |
A | defrag |
B | diskpart |
C | chkdsk |
D | cleanmgr |
Question 79 |
A | Backout plan |
B | Plan for change |
C | Risk analysis |
D | Request for proposal |
E | End-user acceptance |
F | Business processes |
Question 80 |
A | Boot the workstation in safe mode and disable the graphics driver system tray menu |
B | Boot the workstation in safe mode and disable Windows driver signing requirements |
C | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
D | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
Question 81 |
A | CMD |
B | MS PowerPoint |
C | Notepad |
D | MS Word |
E | MS Excel |
Question 82 |
A | CompTIA |
B | WWF |
C | Apple |
D | IBM |
E | Microsoft |
Question 83 |
A | SD |
B | CD |
C | MD |
D | dir |
E | RD |
Question 84 |
A | Jailbreaking |
B | VirusBarrier |
C | Grant superadmin |
D | Rooting |
E | Open shell access |
Question 85 |
A | Jailbreaking |
B | VirusBarrier |
C | Rooting |
D | Grant superadmin |
E | Open shell access |
Question 86 |
A | RD |
B | MD |
C | dir |
D | SD |
E | CD |
Question 87 |
A | Phishing |
B | Brute force |
C | DDoS |
D | Session hijacking |
E | Malicious attack |
Question 88 |
A | Organization security and content policy supersede all other legal policies of the country which the company operates. |
B | Organization security and content policy typically do not apply to executive staff. |
C | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
D | Organization security and content policies are not part of the majority of government organizations. |
E | Organization security and content policy must follow the legal policies of the country which the company operates. |
Question 89 |
A | Ping |
B | Ver |
C | MD |
D | CD |
E | Dir |
Question 90 |
A | Dynamic partition |
B | Primary partition |
C | Extended partition |
D | Secondary partition |
E | USB drive |
Question 91 |
A | Chkdsk |
B | Msconfig |
C | Task Manager |
D | System Information |
Question 92 |
A | process -del |
B | delprocess |
C | process -k |
D | taskkill |
E | deltask |
Question 93 |
A | NTFS supports file encryption. |
B | NTFS supports larger volumes. |
C | NTFS supports larger file sizes. |
D | NTFS supports more file formats. |
Question 94 |
A | Startup Repair |
B | Windows Registry |
C | Reset Your PC |
D | System Restore |
E | File History |
Question 95 |
A | Domain Admin |
B | Guest |
C | Administrator |
D | Power user |
Question 96 |
A | Factory reset the gaming consoles. |
B | Power cycle the network appliances. |
C | Reconfigure the gaming consoles' network interfaces. |
D | Replace the IP camera system with a new one. |
E | Configure router QoS engine with service priority for gaming applications. |
F | Replace the router with an upgraded unit. |
Question 97 |
A | chkdsk C: /C |
B | chkdsk C: /F |
C | chkdsk /sec |
D | chkdsk C: /I |
E | chkdsk C: /R |
Question 98 |
A | \%systemroot%\Windows\System32\Con
fig |
B | \%systemroot%\System32 |
C | \%systemroot%\System32\Config |
D | \%systemroot%\Windows |
Question 99 |
A | /E |
B | /B |
C | /DCOPY:T |
D | /S |
E | /sub-1 |
F | /D |
Question 100 |
A | conditional statement , iteration |
B | loop , iteration |
C | conditional statement , run |
D | loop , run |
Question 101 |
A | man ipconfig |
B | ipconfig /? |
C | ipconfig help |
D | ipconfig man |
Question 102 |
A | Site Policy |
B | OU Group Policy |
C | Active Directory Policy |
D | Local Security Policy |
Question 103 |
A | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
B | Open file as3final.py file using the program notepad++ |
C | Change the file name from notepad to as3final.py |
D | Execute the file notepad++ in as3final.py |
E | Execute the file as3final.py in notepad++ |
Question 104 |
A | User Accounts |
B | Display Settings |
C | Folder Options |
D | Sync Center |
Question 105 |
A | File Explorer |
B | Task Manager |
C | Services console |
D | Windows Registry |
E | Device Manager |
Question 106 |
A | Computer Management |
B | Task Manager |
C | Tasklist |
D | Control Panel |
E | Force quit |
Question 107 |
A | spam bot |
B | trojan |
C | worm |
D | spyware |
Question 108 |
A | RDP |
B | Telnet |
C | VNC |
D | SSH |
Question 109 |
A | VPN |
B | 5G LTE |
C | WLAN |
D | VLAN |
E | WWAN |
Question 110 |
A | Incident Response Life Cycle |
B | chain of custody |
C | MSDS |
D | official documentation |
E | incident response |
Question 111 |
A | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
B | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
C | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
D | Each manufacturer has their own customized Launchers that modify the GUI. |
E | The Android Kernel version must be different bvetwen the manufactures. |
Question 112 |
A | Remediate infected systems. |
B | Identify malware symptoms. |
C | Enable System Restore. |
D | Disable System Restore. |
E | Schedule scans and run updates. |
F | Quarantine infected systems. |
Question 113 |
A | chkdsk C: /R |
B | chkdsk C: /C |
C | chkdsk C: /I |
D | chkdsk C: /F |
E | chkdsk /sec |
Question 114 |
A | Windows Aero |
B | Windows Defender |
C | HomeGroup |
D | Windows Domain |
E | Sync Center |
Question 115 |
A | Mac OS |
B | Android |
C | Ubuntu |
D | Windows 10 |
E | iOS |
Question 116 |
A | Event Viewer |
B | System Management |
C | Disk Management |
D | Gparted |
E | DiskPart |
Question 117 |
A | Disable network cards |
B | Disable all non-administrator accounts. |
C | Disable System Restore |
D | Run Windows Update |
E | Run the CHKDSK /R command |
Question 118 |
A | Windows Registry |
B | Windows Task Manager |
C | Windows Task Scheduler |
D | Windows Control Panel |
E | Performance Monitor |
Question 119 |
A | registry |
B | regedit |
C | hives |
D | reg |
E | winreg |
Question 120 |
A | Modifying spool settings |
B | Pausing printing |
C | Adding ports |
D | Enabling sharing |
Question 121 |
A | Performance Monitor |
B | Local Security Policy |
C | Device Manager |
D | Component Services |
Question 122 |
A | C:\Users\%root%\Documents |
B | C:\Documents and Settings\%username%\Documents |
C | C:\Users\%username%\Documents |
D | C:\Users\System32\Documents |
Question 123 |
A | Install to a secondary internal HDD |
B | Install to a DVD-RW |
C | Install to a USB drive |
D | Install to a network drive |
Question 124 |
A | Passwd |
B | Ls |
C | Chmod |
D | dirc |
E | Chown |
Question 125 |
A | regd |
B | taskmgr |
C | msconfig |
D | dxdiag |
E | perfmon |
Question 126 |
A | Local-level user policies |
B | Network-level firewall policies |
C | Antivirus domain-level policies |
D | Domain-level group policies |
E | Local-level firewall policies |
Question 127 |
A | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
B | The 64-bit architecture has an upper RAM limit of 128 GB. |
C | Windows 10 only comes in 64-bit version. |
D | The 64-bit version is also known as x86. |
E | The 32-bit architecture has an upper RAM limit of 64 GB. |
Question 128 |
A | Rollback OS and driver updates. |
B | Research the virus and how to remove it. |
C | Reboot the computer in order to make sure all other programs are terminated. |
D | Disconnect the computer from the office network. |
E | Run a System Restore. |
Question 129 |
A | Tasker log |
B | Security log |
C | System log |
D | Application log |
E | Setup log |
Question 130 |
A | Data execution prevention |
B | Page-file size |
C | Processor scheduling |
D | Visual effects |
Question 131 |
A | Reset the PC to its factory conditions. Perform the OS upgrade again |
B | Perform a full backup and replace the hard drive |
C | Roll back the OS upgrade. Continue using the older version of Windows |
D | Update the SATA controller driver from the manufacturers website |
Question 132 |
A | NTFS |
B | FAT32 |
C | exFAT |
D | FAT16 |
Question 133 |
A | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
B | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
C | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
D | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
Question 134 |
A | setuperr.log |
B | setupact.log |
C | unattend.xml |
D | diskmgmt.msc |
Question 135 |
A | Reprimand the user and apply a content filter
to the user’s profile. |
B | Immediately delete all unauthorized materials. |
C | Document the incident and purge all policy-violating materials. |
D | Delete the bit torrent application and contact the affected copyright holders. |
E | Secure the workstation in a limited access
facility. |
Question 136 |
A | 4 GB |
B | 2 GB |
C | 6 GB |
D | 512 MB |
E | 1 GB |
Question 137 |
A | Disable and then reenable Bluetooth |
B | Calibrate the touchscreen sensor |
C | Restart the tablet |
D | Disconnect and then reconnect the stylus |
Question 138 |
A | Windows user account authentication is more secure than BitLocker. |
B | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
C | Windows user account authentication can only be used with a Windows Server Domain Controller. |
D | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
E | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
Question 139 |
A | /D |
B | /S |
C | /B |
D | /RCOPY |
E | /DCOPY:T |
F | /sub-1 |
Question 140 |
A | Healthy partition |
B | FAT32 partition |
C | Disk 0 |
D | Disk 1 |
E | Primary partition |
Question 141 |
A | .sdk |
B | .apk |
C | .ipa |
D | api |
E | .exe |
Question 142 |
A | Volume license |
B | Corporate license |
C | Personal license |
D | Enterprise license |
E | Open license |
Question 143 |
A | MMC |
B | secpol.msc |
C | mtg |
D | devmgmt.msc |
E | CMD |
Question 144 |
A | Task Manager |
B | Disk Management |
C | Administrative Tools |
D | Msconfig |
Question 145 |
A | Defragment the drive. |
B | Copy system files. |
C | Partition the drive. |
D | Run chkdsk. |
Question 146 |
A | ls |
B | bash |
C | cat |
D | sbin |
Question 147 |
A | It may interfere with other signed drivers installed on the device. |
B | It may result in random reboots. |
C | It may lead to instability issues. |
D | It may result in damage to the device. |
Question 148 |
A | In the System Properties dialog box |
B | In the System32 folder |
C | On the taskbar |
D | Within the Start menu |
Question 149 |
A | Program Files (x86) |
B | Program Files |
C | System32 |
D | Systemroot |
Question 150 |
A | Look for program features and the minimum hardware requirements. |
B | Read the manual on how HR is going to use the software. |
C | Verify that the install is allowed under the company’s licensing agreements. |
D | Update the Windows drivers on the computer. |
Question 151 |
A | chkdsk /F |
B | diskpart |
C | tracert /w |
D | robocopy |
Question 152 |
A | Lower power consumption. |
B | Low drive failure rates. |
C | Support for single large files over 4GB. |
D | Better driver encryption and support for cryptology. |
E | Compatibility across different OS providers such as Windows, Linux and Mac. |
Question 153 |
A | Move on to the server to a different node or VLAN on the network. |
B | Document your solution. |
C | Invoice the customer. |
D | Run a driver update check for the specified software. |
Question 154 |
A | Timeset |
B | Net time |
C | Time |
D | Net timer |
E | Net time set |
Question 155 |
A | Check the temperature at which the solder should be applied. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Do not attempt to repair a motherboard. It is better to buy a new one. |
D | Consult the MSDS for the solder spool. |
Question 156 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | HTTP attack |
B | Session hijacking attack |
C | DDoS attack |
D | Malicious attack |
E | Brute force attack |
Question 157 |
A | PXE |
B | Multi-boot |
C | GPT |
D | Dynamic |
Question 158 |
A | Unicode |
B | EBCDIC |
C | ITU-T |
D | PS1 |
E | ASCII |
Question 159 |
A | Open license |
B | Enterprise license |
C | Personal license |
D | Volume license |
E | Corporate license |
Question 160 |
A | iOS |
B | Windows 98 |
C | Android |
D | macOS |
E | Windows 10 |
Question 161 |
A | First right |
B | Center |
C | First left |
D | None of the answers are correct |
Question 162 |
A | Enable TPM in the BIOS/UEFI. |
B | Disable UAC. |
C | Change the location of the system32 |
D | Defrag the hard drive. |
E | Convert the file system to NTFS. |
Question 163 |
A | Windows administrator user account |
B | Windows user account |
C | BIOS password |
D | BitLocker |
E | BitDefender |
Question 164 |
A | HKEY_USERS |
B | HKEY_LOCAL_MACHINE |
C | HKEY_CURRENT_CONFIG |
D | HKEY_CLASSES_ROOT |
Question 165 |
A | .bat |
B | .vbs |
C | .js |
D | .sh |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.