← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.The two cores of A+ exams are very smiliar and the knowlagebase is linked across both exams. I highly recommend that you go through the questions for both core 1 and core 2 compeltely at least once before talking either exam. Then you can you back and study the questions intricately for one of the two cores before taking that specific section exam.
Go to: 220-1001 – Core 1
CompTIA 220-1002 - Core 2
Congratulations - you have completed CompTIA 220-1002 - Core 2.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Enabling sharing |
B | Modifying spool settings |
C | Adding ports |
D | Pausing printing |
Question 2 |
A | dir |
B | MD |
C | SD |
D | CD |
E | RD |
Question 3 |
A | Performance Monitor |
B | Device Manager |
C | Component Services |
D | Local Security Policy |
Question 4 |
A | GPT |
B | PXE |
C | Dynamic |
D | Multi-boot |
Question 5 |
A | Both Android OS and iOS can run on almost all handheld modern electronic devices. |
B | A consumer can exchange the apps (applications) between Andorid OS and iOS. |
C | Android OS is open source but the iOS is closed source and owned by Apple Inc. |
D | Unlike Android OS, Apple OS allow you to customize the user interface using a system called Launcher. |
Question 6 |
A | 2 GB |
B | 6 GB |
C | 1 GB |
D | 512 MB |
E | 4 GB |
Question 7 |
A | NTFS |
B | exFAT |
C | ext4 |
D | FAT32 |
Question 8 |
A | eventvwr.msc |
B | wintask |
C | perfmon.exe |
D | systempropertiesadvanced.exe |
E | devmgmt.msc |
Question 9 |
A | Document the changes and perform the work. |
B | Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. |
C | Notify the change team of the changes needed and perform the changes. |
D | Submit the changes to the change board for approval. |
E | Escalate to stakeholders and obtain override approval for out-of-scope changes. |
Question 10 |
A | Local Users and Groups |
B | Security Policy |
C | System Configuration |
D | Component Services |
Question 11 |
A | Data execution prevention |
B | Page-file size |
C | Visual effects |
D | Processor scheduling |
Question 12 |
A | Lower power consumption. |
B | Compatibility across different OS providers such as Windows, Linux and Mac. |
C | Low drive failure rates. |
D | Support for single large files over 4GB. |
E | Better driver encryption and support for cryptology. |
Question 13 |
A | Windows Control Panel |
B | Windows Task Manager |
C | Windows Registry |
D | MS-DOS Control Panel |
E | Windows Task Scheduler |
Question 14 |
A | Computer Management |
B | Format command |
C | Disk Management |
D | Disk Cleanup utility |
Question 15 |
A | Defrag the hard drive. |
B | Change the location of the system32 |
C | Convert the file system to NTFS. |
D | Disable UAC. |
E | Enable TPM in the BIOS/UEFI. |
Question 16 |
A | Disable the SSID broadcast. |
B | Disconnect the Internet connection to the LAN. |
C | Install an intrusion detection system (IDS). |
D | Install an antivirus on the main server. |
E | Install a firewall and enforce rules. |
Question 17 |
A | Enterprise license |
B | Seat license |
C | Open source license |
D | Commercial license |
Question 18 |
A | exFAT |
B | FAT32 |
C | NTFS |
D | FAT16 |
Question 19 |
A | Social engineering |
B | Phishing attack |
C | Session hijacking attack |
D | DDoS attack |
E | Brute force attack |
Question 20 |
A | It would be nearly impossible to recover the user data since the primary drive conating the OS is required to access the seconday drive. |
B | It would be fairly easy as long as the secondary hard drive is not encrpyted. |
C | You can go to BIOS and make the secondary drive as the primary boot drive to download the data. |
D | It would be very difficualt and will require specialized laborotory to recover the data. |
Question 21 |
A | Open shell access |
B | Rooting |
C | Jailbreaking |
D | Grant superadmin |
E | VirusBarrier |
Question 22 |
A | Android OS |
B | Ubuntu OS |
C | macOS |
D | Chrome OS |
E | Windows 10 |
Question 23 |
A | Using msconfig Tools tab. |
B | Using msconfig Boot tab. |
C | Using msconfig General tab. |
D | Using msconfig Services tab. |
Question 24 |
A | Dynamic partition |
B | Extended partition |
C | Secondary partition |
D | USB drive |
E | Primary partition |
Question 25 |
A | Home Folder |
B | Folder Redirection |
C | Security Groups |
D | Group Policy |
Question 26 |
A | Windows 10 Education |
B | Windows 10 Pro |
C | Windows 10 Enterprise |
D | Windows 10 Home |
Question 27 |
A | Healthy partition |
B | Disk 0 |
C | Disk 1 |
D | Primary partition |
E | FAT32 partition |
Question 28 |
A | Recover |
B | Replace |
C | REM |
D | Rebuild |
E | Convert |
Question 29 |
A | Timeset |
B | Net time set |
C | Net timer |
D | Net time |
E | Time |
Question 30 |
A | Windows administrator user account |
B | BitLocker |
C | BIOS password |
D | BitDefender |
E | Windows user account |
Question 31 |
A | It may result in damage to the device. |
B | It may result in random reboots. |
C | It may lead to instability issues. |
D | It may interfere with other signed drivers installed on the device. |
Question 32 |
A | Spoofing |
B | Spear phishing |
C | Whaling |
D | Impersonation |
Question 33 |
A | perfmon.msc |
B | DxDiag |
C | Ipconfig |
D | Regedit |
E | gettingstarted |
Question 34 |
A | Virus infection of the C drive. |
B | Windows Update is running. |
C | Drivers are being downloaded by the Device Manager. |
D | Hyper-Threading has been disabled. |
E | The printing system is running. |
Question 35 |
A | Disable and then reenable Bluetooth |
B | Disconnect and then reconnect the stylus |
C | Restart the tablet |
D | Calibrate the touchscreen sensor |
Question 36 |
A | Run chkdsk. |
B | Defragment the drive. |
C | Copy system files. |
D | Partition the drive. |
Question 37 |
A | Replace the IP camera system with a new one. |
B | Reconfigure the gaming consoles' network interfaces. |
C | Factory reset the gaming consoles. |
D | Replace the router with an upgraded unit. |
E | Configure router QoS engine with service priority for gaming applications. |
F | Power cycle the network appliances. |
Question 38 |
A | Guest |
B | Power user |
C | Domain Admin |
D | Administrator |
Question 39 |
A | /D |
B | /B |
C | /DCOPY:T |
D | /sub-1 |
E | /RCOPY |
F | /S |
Question 40 |
A | Apple |
B | CompTIA |
C | WWF |
D | IBM |
E | Microsoft |
Question 41 |
A | Computer Management |
B | Task Manager |
C | Control Panel |
D | Tasklist |
E | Force quit |
Question 42 |
A | In the System32 folder |
B | On the taskbar |
C | Within the Start menu |
D | In the System Properties dialog box |
Question 43 |
A | Commercial license |
B | Open source license |
C | Enterprise license |
D | Seat license |
Question 44 |
A | chkdsk |
B | diskpart |
C | defrag |
D | cleanmgr |
Question 45 |
A | Date and time |
B | Logon times |
C | User access control |
D | UEFI boot mode |
Question 46 |
A | Ask the owner to move the files from the server to a local computer |
B | Rename the folder on the server, and notify the information security officer |
C | Promptly notify the administrator's immediate supervisor |
D | Move the folder to another location on the server, and notify the local authorities |
Question 47 |
A | Files |
B | Directories |
C | Applets |
D | Snap-ins |
Question 48 |
A | System32 |
B | Systemroot |
C | Program Files |
D | Program Files (x86) |
Question 49 |
A | Install to a network drive |
B | Install to a secondary internal HDD |
C | Install to a DVD-RW |
D | Install to a USB drive |
Question 50 |
A | Local Security Policy |
B | Site Policy |
C | OU Group Policy |
D | Active Directory Policy |
Question 51 |
A | Request for proposal |
B | Plan for change |
C | End-user acceptance |
D | Backout plan |
E | Risk analysis |
F | Business processes |
Question 52 |
A | Windows 98 |
B | Android |
C | iOS |
D | macOS |
E | Windows 10 |
Question 53 |
A | chkdsk C: /I |
B | chkdsk /sec |
C | chkdsk C: /F |
D | chkdsk C: /C |
E | chkdsk C: /R |
Question 54 |
A | NETDOM |
B | CONVERT |
C | CHKNTFS |
D | IPCONFIG |
Question 55 |
A | Windows Defender |
B | HomeGroup |
C | Sync Center |
D | Windows Domain |
E | Windows Aero |
Question 56 |
A | Device Manager |
B | Windows Registry |
C | Task Manager |
D | File Explorer |
E | Services console |
Question 57 |
A | chkdsk C: /R |
B | chkdsk C: /F |
C | chkdsk C: /C |
D | chkdsk /sec |
E | chkdsk C: /I |
Question 58 |
A | Administrative Tools |
B | Disk Management |
C | Msconfig |
D | Task Manager |
Question 59 |
A | The 64-bit architecture has an upper RAM limit of 128 GB. |
B | The 64-bit version is also known as x86. |
C | The 32-bit architecture has an upper RAM limit of 64 GB. |
D | Windows 10 only comes in 64-bit version. |
E | The 32-bit CPUs can only address a maximum of 4 GB of RAM, but 64-bit CPUs can address many TBs of RAM. |
Question 60 |
A | Boot the workstation in safe mode with networking and install the latest stable graphics driver |
B | Boot the workstation in safe mode and disable Windows driver signing requirements |
C | Boot the workstation in safe mode and disable the graphics driver system tray menu |
D | Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings |
Question 61 |
A | Personal license |
B | Corporate license |
C | Open license |
D | Volume license |
E | Enterprise license |
Question 62 |
A | 1 GB |
B | 6 GB |
C | 512 MB |
D | 4 GB |
E | 2 GB |
Question 63 |
A | This PC is running low on memory resources with a very high percentage is committed. |
B | This PC Is connected to the LAN via both wired and wireless LAN interfaces. |
C | This PC has two LAN interface cards; wired and wireless. But only the wired LAN is connected to a network. |
D | This PC must be running Windows 7 because only Windows 7 utilities can generate this snapshot. |
E | This PC is connected to a domain called SANUJA and NetBIOS device name is ASUS. |
Question 64 |
A | cat |
B | bash |
C | ls |
D | sbin |
Question 65 |
-Often the website is responding slowly.
-Often the website is unresponsive.
-Some users have problems accessing the website.
-When the webserver is ping from a computer within the same LAN, the ping timeout or the ping time is usually high.
A | HTTP attack |
B | Brute force attack |
C | DDoS attack |
D | Session hijacking attack |
E | Malicious attack |
Question 66 |
A | Enable System Restore. |
B | Remediate infected systems. |
C | Disable System Restore. |
D | Quarantine infected systems. |
E | Identify malware symptoms. |
F | Schedule scans and run updates. |
Question 67 |
A | Google Android version may be the same but the core APKs are different from manufacture to manufacture. |
B | One of the users most likely is not on Android 10 even though he/she thinks they are on Android 10. |
C | Each manufacturer has their own customized Launchers that modify the GUI. |
D | The Android Kernel version must be different bvetwen the manufactures. |
E | Each manufacturer has their own custom apps which change the behaviour of the GUI. |
Question 68 |
A | Install the software and ignore the folder. |
B | Open the folder to investigate the content, but do not open the images. |
C | Open the folder and enjoy the images. |
D | Contact the Manager of the company immediately. |
E | Ask Sara why she has this type of folder on her work computer. |
Question 69 |
A | Request that you need to speak to a senior Supervisor. |
B | Quit your job because of this work environment is toxic. |
C | Refer your panicking Supervisor and co-workers to professional counseling services. |
D | Take everyone out to lunch get their mind off of the problem. |
E | Stay calm and do your job to best of your ability. |
Question 70 |
A | Regedit |
B | Sigverif |
C | Ping |
D | Dxdiag |
E | Msconfig |
Question 71 |
A | /sub-1 |
B | /S |
C | /E |
D | /D |
E | /DCOPY:T |
F | /B |
Question 72 |
A | Enforce password history |
B | Complexity requirements |
C | Minimum password length |
D | Minimum password age |
Question 73 |
A | Reboot the network cameras. |
B | Reboot the router. |
C | Revert the computer back to the last stable Windows service pack. |
D | Uninstall firewall applications and disable all firewall rules. |
E | Add the necessary port numbers to the exceptions list of Windows Defender firewall. |
Question 74 |
A | Memory |
B | CD-ROM |
C | Driver |
D | Hard drive/SSD |
Question 75 |
A | MMC |
B | Control Panel |
C | Task Manager |
D | Command Prompt |
Question 76 |
A | Local NAS |
B | Microsoft OneDrive |
C | iCloud |
D | Google Cloud Platform |
Question 77 |
A | Execute the file notepad++ in as3final.py |
B | Execute the file as3final.py in notepad++ |
C | Append the file name as3final.py to as3final.py by combing notepad and as3final terms. |
D | Open file as3final.py file using the program notepad++ |
E | Change the file name from notepad to as3final.py |
Question 78 |
A | Drive wipe |
B | Standard format |
C | Degauss |
D | Low-level format |
Question 79 |
A | Secure Shell |
B | Propagation |
C | MFA |
D | SSO |
E | Inheritance |
Question 80 |
A | tracert /w |
B | robocopy |
C | diskpart |
D | chkdsk /F |
Question 81 |
A | Center |
B | None of the answers are correct |
C | First left |
D | First right |
Question 82 |
A | RDP |
B | VNC |
C | SSH |
D | Telnet |
Question 83 |
A | ifconfig |
B | Task Manager |
C | Msconfig |
D | Safe Mode |
Question 84 |
A | setuperr.log |
B | setupact.log |
C | unattend.xml |
D | diskmgmt.msc |
Question 85 |
A | Application log |
B | Setup log |
C | Security log |
D | Tasker log |
E | System log |
Question 86 |
A | dirc |
B | Ls |
C | Chown |
D | Passwd |
E | Chmod |
Question 87 |
A | dir /? |
B | dir /d |
C | dir /o |
D | dir /a |
E | dir -1 |
Question 88 |
A | MD |
B | CD |
C | SD |
D | RD |
E | dir |
Question 89 |
A | .vbs |
B | .js |
C | .sh |
D | .bat |
Question 90 |
A | PS1 |
B | EBCDIC |
C | ITU-T |
D | ASCII |
E | Unicode |
Question 91 |
A | Destroy the old hard drive by physically mutilation and cutting the platters into small pieces. |
B | Open the old hard drive case and use ESD to destory the circuitry. |
C | Format the old hard drive multiple times before deposal. |
D | Completely erase the old drive prior to disposal. |
Question 92 |
A | Move on to the server to a different node or VLAN on the network. |
B | Invoice the customer. |
C | Run a driver update check for the specified software. |
D | Document your solution. |
Question 93 |
A | Hard reset the cell phone |
B | Close all running applications |
C | Remove and reinstall the application |
D | Reconnect the wireless network connection |
Question 94 |
A | conditional statement , run |
B | conditional statement , iteration |
C | loop , iteration |
D | loop , run |
Question 95 |
A | Network-level firewall policies |
B | Local-level firewall policies |
C | Domain-level group policies |
D | Local-level user policies |
E | Antivirus domain-level policies |
Question 96 |
A | Phishing |
B | DDoS |
C | Brute force |
D | Malicious attack |
E | Session hijacking |
Question 97 |
A | Task Manager |
B | Mac Management |
C | Force quit |
D | Taskkill |
E | Time Machine |
Question 98 |
A | PowerShell |
B | Windows Firewall |
C | OneDrive |
D | Compatibility mode |
Question 99 |
A | NTFS supports more file formats. |
B | NTFS supports file encryption. |
C | NTFS supports larger file sizes. |
D | NTFS supports larger volumes. |
Question 100 |
A | Change the user account permissions to restrict access. |
B | Do nothing. |
C | Reinstall the antivirous and malware software. |
D | Educate the customer on how to avoid malware. |
E | Replace the hard drive. |
Question 101 |
A | C:\Users\%username%\Documents |
B | C:\Users\System32\Documents |
C | C:\Documents and Settings\%username%\Documents |
D | C:\Users\%root%\Documents |
Question 102 |
A | Enterprise license |
B | Personal license |
C | Open license |
D | Corporate license |
E | Volume license |
Question 103 |
A | Guest |
B | Standard user |
C | Power users |
D | Administrator |
Question 104 |
A | \%systemroot%\Windows |
B | \%systemroot%\System32 |
C | \%systemroot%\Windows\System32\Con
fig |
D | \%systemroot%\System32\Config |
Question 105 |
A | Secure the workstation in a limited access
facility. |
B | Immediately delete all unauthorized materials. |
C | Document the incident and purge all policy-violating materials. |
D | Delete the bit torrent application and contact the affected copyright holders. |
E | Reprimand the user and apply a content filter
to the user’s profile. |
Question 106 |
A | ipconfig /all |
B | ipconfig |
C | netstat |
D | ping |
E | ipconfig /renew |
Question 107 |
A | Anti-virous and anti-malware software intefrence. |
B | Unsigned drivers or untrusted software. |
C | Mobile Device Management (MDM) policies |
D | VPN configuration or inactive VPN. |
Question 108 |
A | .sdk |
B | .ipa |
C | .apk |
D | .exe |
E | api |
Question 109 |
The Windows Boot Configuration Data File Is Missing Required Information.
A | bootrec /restore |
B | bootrec /fixmbr |
C | bootrec /rebuildbcd |
D | boot\bcd |
E | bootrec /fixboot |
Question 110 |
A | Reset Your PC |
B | Startup Repair |
C | System Restore |
D | Windows Registry |
E | File History |
Question 111 |
A | Windows Task Manager |
B | Windows Registry |
C | Performance Monitor |
D | Windows Control Panel |
E | Windows Task Scheduler |
Question 112 |
A | official documentation |
B | incident response |
C | Incident Response Life Cycle |
D | chain of custody |
E | MSDS |
Question 113 |
A | Secure Shell |
B | Propagation |
C | SSO |
D | Inheritance |
E | MFA |
Question 114 |
A | passwords |
B | tokens |
C | root CA |
D | keys |
Question 115 |
A | Reset the PC to its factory conditions. Perform the OS upgrade again |
B | Perform a full backup and replace the hard drive |
C | Roll back the OS upgrade. Continue using the older version of Windows |
D | Update the SATA controller driver from the manufacturers website |
Question 116 |
A | Event Viewer |
B | Disk Management |
C | System Management |
D | DiskPart |
E | Gparted |
Question 117 |
A | Organization security and content policy must include explicit punishment guidelines for employees who do not follow the guidelines. |
B | Organization security and content policy typically do not apply to executive staff. |
C | Organization security and content policy must follow the legal policies of the country which the company operates. |
D | Organization security and content policies are not part of the majority of government organizations. |
E | Organization security and content policy supersede all other legal policies of the country which the company operates. |
Question 118 |
A | iOS |
B | Ubuntu |
C | Mac OS |
D | Windows 10 |
E | Android |
Question 119 |
A | Run Msconfig. |
B | Boot into the Safe Mode. |
C | Remove the network card. |
D | Check the System log. |
E | Run Chkdsk. |
Question 120 |
A | Implement a fire suppression system. |
B | Plug and check if the equipment is working. |
C | Set up dehumidifiers. |
D | Install grounding bars. |
E | Increase the closet's airflow. |
Question 121 |
A | pad and chmod |
B | ps and kill |
C | sudo and vi |
D | cp and rm |
E | ls and chown |
Question 122 |
A | Check the temperature at which the solder should be applied. |
B | Call the building supervisor to make sure there is enough solder for others. |
C | Consult the MSDS for the solder spool. |
D | Do not attempt to repair a motherboard. It is better to buy a new one. |
Question 123 |
A | .ps |
B | .py1 |
C | .ps1 |
D | .py |
E | .vbs |
Question 124 |
A | Unplug the power and re-plug it without powering down the workstation. |
B | Run Windows updates. |
C | Format and partition the drive. |
D | Initialize the drive. |
E | Visit the website of the SSD manufacturer for firmware updates or contact the manufacturer. |
Question 125 |
A | Disk 0 - 500 MB NTFS |
B | Disk 0 - 465.27 MB NTFS |
C | None of the partitions can be dismounted without crashing the system. |
D | Disk 1 |
Question 126 |
A | Update the Windows drivers on the computer. |
B | Read the manual on how HR is going to use the software. |
C | Look for program features and the minimum hardware requirements. |
D | Verify that the install is allowed under the company’s licensing agreements. |
Question 127 |
A | ipaddr /all |
B | ifconfig |
C | ipconfig /all |
D | chown |
E | ls |
Question 128 |
A | Image Copy |
B | Image Clone |
C | Ghost |
D | Robocopy |
E | Sysprep |
Question 129 |
A | If the IT Manager has the proper authority and documentation, perform the deletion task to the best of your ability. |
B | Contact HR immediately and seek advice. |
C | Contact a lawyer as this breaches the professional conduct policies. |
D | Before you take any actions, contact the CEO secretly and advise him/her that their IT account is being deleted. |
E | Before you take any actions, contact the CEO in writing or by email and advise him/her that their IT account is being deleted. |
Question 130 |
A | Msconfig |
B | Chkdsk |
C | Task Manager |
D | System Information |
Question 131 |
A | devmgmt.msc |
B | MMC |
C | CMD |
D | mtg |
E | secpol.msc |
Question 132 |
A | BitLocker can encrypt hard drives and protect user content from unauthorized access. |
B | Windows user account authentication is more secure than BitLocker. |
C | Windows user account authentication uses the TPM chipset on the motherboard to encrypt user data. |
D | Unlike Windows user accounts, BitLocker is available on multiple platforms such as Ubuntu, iOS and Android. |
E | Windows user account authentication can only be used with a Windows Server Domain Controller. |
Question 133 |
A | Folder Options |
B | Display Settings |
C | Sync Center |
D | User Accounts |
Question 134 |
A | Event Viewer |
B | Services |
C | Task Manager |
D | Task Scheduler |
Question 135 |
A | Ver |
B | CD |
C | Dir |
D | Ping |
E | MD |
Question 136 |
A | Rollback OS and driver updates. |
B | Reboot the computer in order to make sure all other programs are terminated. |
C | Research the virus and how to remove it. |
D | Disconnect the computer from the office network. |
E | Run a System Restore. |
Question 137 |
A | Apple |
B | IBM |
C | Microsoft |
D | WWF |
E | CompTIA |
Question 138 |
A | trojan |
B | spyware |
C | spam bot |
D | worm |
Question 139 |
A | Enterprise |
B | Home |
C | Pro |
D | Standard |
Question 140 |
A | Windows+R |
B | Ctrl+Alt+Del |
C | Windows+L |
D | Windows+M |
E | Windows+pause break |
Question 141 |
A | WLAN |
B | VLAN |
C | 5G LTE |
D | WWAN |
E | VPN |
Question 142 |
A | Block all unused ports on the LAN smart switch |
B | Disable logon time restrictions |
C | Use the local client certificate for server authentication |
D | Put the terminal server into the routers DMZ |
E | Enforce password complexity |
F | Change the default access port |
Question 143 |
A | HKEY_CLASSES_ROOT |
B | HKEY_LOCAL_MACHINE |
C | HKEY_CURRENT_CONFIG |
D | HKEY_USERS |
Question 144 |
A | MBR drive format does not support drives over 4TB while GPT would be able to partition larger drives over 4TB. |
B | GPT is an older method of partitioning a disk that no longer in used and replaced by MBR. |
C | MBR can create multiple partitions without any issues but GPT has a limit of four partitions per drive. |
D | MBR is only used by Microsoft products while GPT is only used by Linux and MacOS. |
Question 145 |
A | diskmgmt.msc |
B | setupact.log |
C | unattend.xml |
D | setuperr.log |
Question 146 |
A | Ask the customer to find an application that does not use Java. |
B | Ask the customer to use a different web browser. |
C | Reinstall Java on the affected workstation. |
D | Delete and clear Java Temporary Internet Files. |
Question 147 |
A | Open shell access |
B | Rooting |
C | VirusBarrier |
D | Jailbreaking |
E | Grant superadmin |
Question 148 |
A | iTunes |
B | App Store |
C | Spotlight |
D | Google Play |
E | Trusted Mobile Platform (TMP) |
Question 149 |
A | CMD |
B | MS Word |
C | MS PowerPoint |
D | MS Excel |
E | Notepad |
Question 150 |
A | Upgrade the video drivers. |
B | Reinstall the CAD program. |
C | Check the RAM configuration. |
D | Replace the hard drive. |
E | Reinstall the Windows OS. |
Question 151 |
A | regedit |
B | hives |
C | reg |
D | registry |
E | winreg |
Question 152 |
A | taskmgr |
B | regd |
C | msconfig |
D | dxdiag |
E | perfmon |
Question 153 |
A | Run a screensaver after one minute of nonuse and a fingerprint lock for after hours. |
B | Display a message on lock screen advising users how importnat to lock their computer. |
C | Apply a screen lock after x minutes of non-use and set login time restrictions for after hours. |
D | Create a group policy to set minimum password standards. |
E | Set a strong password that requires a renewal every 30 days. |
Question 154 |
A | Check for and apply software updates |
B | Add the user to the local administrators group |
C | Perform repair installation on the application |
D | Rebuild the users mail profile |
Question 155 |
A | deltask |
B | process -k |
C | taskkill |
D | process -del |
E | delprocess |
Question 156 |
A | Server and gateway |
B | Server and domain |
C | IP address and domain |
D | IP address and DNS |
Question 157 |
A | Disable System Restore |
B | Disable all non-administrator accounts. |
C | Disable network cards |
D | Run Windows Update |
E | Run the CHKDSK /R command |
Question 158 |
A | Location, RFID |
B | Domain name, location, asset ID |
C | Domain name, location, IP address |
D | Asset ID, MAC address |
Question 159 |
A | winload.exe |
B | system32.exe |
C | shell.adb |
D | startup.exe |
E | setup.exe |
Question 160 |
A | MBR |
B | Dynamic drive |
C | FAT32 |
D | GPT |
Question 161 |
A | VB Script |
B | PowerShell |
C | Command Prompt |
D | DOS |
Question 162 |
A | Display properties |
B | Power plans |
C | TRIM |
D | Device Manager |
E | Task Manager |
Question 163 |
A | Users |
B | System32 |
C | Windows |
D | boot |
E | Program Files |
Question 164 |
A | ipconfig man |
B | ipconfig help |
C | ipconfig /? |
D | man ipconfig |
Question 165 |
A | This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. |
B | This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. |
C | This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions. |
D | This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.