CompTIA A+ 220-1002 Core 2 Practice Test
Which of the following is an integer? (Select the two best answers.) A. 16 B. cat C. string D. 00000001
A. 16 D. 00000001
A stop error could manifest itself as what? A. A BSOD B. An Event Viewer error C. An Action Center notification D. An Internet Explorer error
A. A BSOD
You have been contracted to perform some work at a small office. There is a problem with a Windows 10 computer and the user accounts folder has been corrupted. "Luckily" the company has a backup. Where should you restore the accounts to? (Select the two best answers.) A. C:\Users B. Ntdsutil C. Active Directory Users and Computers D. Local Users and Groups E. ISO-compliant array
A. C:\Users D. Local Users and Groups
You have been tasked with backing up new user profiles in an enterprise environment. You propose to back up these user accounts to a new tape backup device. Which of the following procedures should you follow? A. Change management B. End-user acceptance C. File History D. Incremental backup E. Backup testing
A. Change management E. Backup testing
You are the security administrator for your organization. You have just identified a malware incident. Of the following, what should be your first response? A. Containment B. Removal C. Recovery D. Monitoring
A. Containment
If a power supply fails, what should you do? A. Replace it B. Repair it C. Use a different computer D. Switch it to a different voltage setting.
A. Replace it
Which of the following are good ideas when dealing with customers? A. Speak clearly. B. Ignore them. C. Avoid distractions. D. Explain to them what they did wrong.
A. Speak clearly. C. Avoid distractions
A customer experiences a server crash. When you arrive, the manager is upset about this problem. What do you need to remember in this scenario? A. Stay calm and do the job as efficiently as possible. B. Imagine the customer in his underwear. C. Avoid the customer and get the job done quickly. D. Refer the customer to your supervisor.
A. Stay calm and do the job as efficiently as possible.
Which of the following is a built-in security component of Windows 10? A. UAC B. Firefox C. Active Directory D. MFA
A. UAC
Which of the following are ways to avoid ESD? (Select three,) A. Use an antistatic wrist strap B. Use a vacuum cleaner C. Use an antistatic mat D. Touch the chassis of the computer
A. Use an antistatic wrist strap C. Use an antistatic mat D. Touch the chassis of the computer
You are in charge of setting up the administrators' connections to remote Windows 10 computers located at satellite offices using RDP. What are some of the ways to make the connections more secure? (Select the three best answers.) A. Use strong passwords B. Use OpenSSH C. Use Network Level Authentication D. Use PuTTY E. Use L2TP and IKEv2
A. Use strong passwords C. Use Network Level Authentication E. Use L2TP and IKEv2
You are a field technician working at a customer's site. One of the workers asks you to load a copy of an organization's purchased software on a personal laptop. What should you do first? A. Verify that the installation is allowed under the company's licensing agreement. B. Act as though you are distracted and ignore the user. C. Leave the premises and inform the policy. D. Tell the worker that installing unlicensed software is illegal. E. Notify the worker's manager of a security breach.
A. Verify that the installation is allowed under the company's licensing agreement.
You work for an enterprise-level organization that is certified as ISO 27002:2013. You have been tasked with adding a group of Windows client computers with a new image configuration to the IT asset inventory database, and this task has a standard procedure. You must furnish a document to be signed off by two people. Who should you approach for signatures? (Select the two best answers.) A. Your manager B. Compliance officer C. IT directory D. Owner of the company E. CISO
A. Your manager C. IT directory
You find illegal materials on a customer's computer. Your boss commands you to preserve computer evidence until he gets to the scene. What is your boss asking you to begin? A. Documentation B. Chain of custody C. First response D. GDPR compliance
B. Chain of custody
A co-worker complains that after the cleaning crew has come through, the key-board irritates his hand and leaves some green residue. What should you do? A. Call the department. B. Contact the facilities department. C. Contact the manufacturer of the keyboard. D. Call OSHA and complain.
B. Contact the facilities department.
How will speaking with a lot of jargon make a technician sound? A. Competent B. Insecure C. Smart D. Powerful
B. Insecure .
A technician just finished scripting sequence of code and saved the file as a .sh. What system is the technician working in? A. PowerShell B. Linux C. JavaScript D. Python E. Batch file
B. Linux
You want to list a variable number 16 times but don't want to type 16 lines of code. Which of the following techniques should you use? A. If-Then B. Looping C. Environmental variables D. Comment syntax
B. Looping
What document can aid you if a chemical spill occurs? A. HEPA B. MSDS C. OSHA D. EPA
B. MSDS
Which program enables a user to invite a technician to help repair their computer remotely? A. Remote Desktop Connection B. Remote Assistance C. RDP D. Remote connectivity
B. Remote Assistance
You have been tasked with configuring a user account so that its folder and settings will follow the user to whatever computer the user logs on to within the domain. Which of the following should you configure? A. OU B. Roaming profile C. Logon script D. Home folder mapped to a network drive
B. Roaming profile
You want a cost-effective solution to the common surges that can affect your computer. Which device offers the best solution? A. UPS B. Surge suppressor C. Power strip D. Line conditioner
B. Surge suppressor
What should you type to comment out syntax in JavaScript? A. $ B. # C. // D. <!-- -->
C. //
What do inventory management systems and software use to keep track of assets? (Select the two best answers.) A. Regulatory policies B. AUPs C. Asset tags D. Barcodes
C. Asset tags D. Barcodes
You have been tasked with making a command-line-based, remote connection to an Ubuntu Linux computer located on your LAN, so that you can run two scripts on it as an administrator. What protocol should you use? (Select the best answer.) A. RDP B. mstsc C. SSH D. VPN
C. SSH
You have been asked by a customer at a hospital to perform routine maintenance on a laser printer. Before you begin, you notice PHI has printed out. What should you do first? A. Ensure the paper tray is full so that everything can print. B. Place the printed output in a secure recycle bin and begin maintenance. C. Kindly warn the customer that printing PHI at work is a HIPPA violation. D. Ask the customer to move the printed output to another area
D. Ask the customer to move the printed output to another area.
You walk into the server room and see a person lying on the floor with a live electrical wire draped over. What should you do first? A. Run out and call 911. B. Grab the wire and fling it off the person. C. Grab the person and drag him out from under the wire. D. Grab a piece of wood and use it to move the wire off the person.
D. Grab a piece of wood and use it to move the wire off the person.
Which of the following is not one of the steps of the incident response process? A. Eradication B. Recovery C. Containment D. Non-repudiation
D. Non-repudiation
Which type of regulated data is specifically protected under the HIPAA Privacy Rule? A. PII B. PCI C. GDPR D. PHI
D. PHI
You are concerned with the power outages that occur infrequently and for short periods of time. You don't want to suffer from potentially harmful restarts. What device should you install for the users' computers? A. Surge protector B. Line conditioner C. MSDS D. UPS
D. UPS
Which Windows account would you create for someone who needs to regularly install software, change settings, and take ownership? A. Power User B. Standard User C. Guest D. Root E. Administrator
E. Administrator
What must you do first to a basic disk to create spanned, stripped, mirrored, or RAID-5 Volumes in Disk Management? A. Extend it B. Shrink it C. Split it D. Initialize it E. Convert it to dynamic
E. Convert it to dynamic
In a change management board meeting you are discussing any vulnerabilities that can be mitigated as part of a recommended change and anything that could potentially occur due to that change. What best describes what you are discussing? A. Purpose of change B. Scope the change C. Backout plan D. Document changes E. Risk analysis
E. Risk analysis
Which of the following helps to secure a SOHO router? (Select the three best answers.) A. Change default passwords B. Enable SSID C. Enable MAC filtering D. Enable WPS E. Enable WPA2
A. Change default passwords C. Enable MAC filtering E. Enable WPA2
You are tasked with repairing an issue with a Windows client computer that is attempting to log on to a domain. The user informs you that it takes 5 minutes to log on to domain, but logging in to the local machine only takes 15 seconds. What steps should you take to fix the problem? (Select the two best answers.) A. Clean up temp files. B. Disable unnecessary services in msconfig. C. Update the BIOS boot order. D. Synchronize the Windows client's time to the domain. E. Run ipconfig/release and ipconfig /renew
A. Clean up temp files. D. Synchronize the Windows client's time to the domain.
You suspect that a mobile device has been compromised and is now part of a botnet. What are some of the indicators that has happened? (Select the two best answers.) A. High resource usage B. Notification of camera/webcam usage C. Apps were forced stopped D. Power drain E. Log files are unavailable F. The user's account was locked out
A. High resource usage D. Power drain
Which of the following is the built-in web browser for macOS? A. Safari B. Chrome C. Firefox D. Internet Explorer
A. Safari
Which of the following is the best mode to use when scanning for viruses? A. Safe Mode B. Reset the PC C. Command Prompt only D. Boot into Windows normally
A. Safe Mode
You have been tasked with implementing a virus prevention plan on a group of Windows client computers. Which of the following should you carry out? (Select all that apply) A. Update AV software B. Configure File History C. Update Microsoft Office D. Install a rootkit scanner E. Verify that a firewall is installed
A. Update AV software B. Configure File History E. Verify that a firewall is installed
Scenario: It's the summer of 2023. Your company has many types of technologies running-many of which interact with each other. Of the following OSes and devices that are used in your company's infrastructure, which are security concerns? (Select the best answers.) A. Windows 7 B. Windows 10 C. MacBook Pro 2012 D. Android 6.0 E. Windows 8.1
A. Windows 7 B. Windows 10 C. MacBook Pro 2012 D. Android 6.0 E. Windows 8.1
Which command in Linux will show the directory contents? A. ls B. pwd C. cd D. mv
A. ls
You need to map a network drive to a share named data1 on a computer named Jupiter-Server. You want to use the J: drive letter. Which syntax should you use if you were to do this in the Command Prompt? A. net use J: \\Jupiter-Server\data 1 B. net use J \Jupiter-Server\data 1 C. net use Jupiter-Server\J\data 1 D. net use J: \Jupiter-Server\data 1
A. net use J: \\Jupiter-Server\data 1
Which tools can be used to restore a computer? (Select all that apply) A. File History B. System Restore C. System Image Recovery D. Msconfig
B. System Restore C. System Image Recovery
What is the name of the folder where windows 10 stores 64-bit system files? A. Systemroot B. System32 C. SysWOW64 D. Program Files (x86)
B. System32
Where can a user go to start and stop services in Windows? (Select all that apply). A. MSConfig B. Task Manager C. Computer Management' D. Command Prompt
B. Task Manager C. Computer Management' D. Command Prompt
Which tool can run particular programs at a time designated by the user? A. Services B. Task Scheduler C. Event Viewer D. Windows Memory Diagnostics
B. Task Scheduler
Which of the following requires a Windows-created password to gain access to it? A. Workgroup B. Client/server C. HomeGroup D. Domain
C. HomeGroup
You have been tasked with purging a hard drive so that it can be recycled to a sister company. Which of the following should you perform before sending the hard drive out? A. Clear the drive B. Degauss the drive C. Run Secure Erase D. Pulverize the drive
C. Run Secure Erase
A user's WINWORD.EXE application is completely frozen. How can you determine the application's processes ID and then terminate the frozen application process? (Select the two best answers.) A. Use the net user command to identify the current PID of the application. B. Use the net user /delete command to terminate the frozen process ID. C. Run tasklist and record the process ID (PID) D. Run taskkill /PID number
C. Run tasklist and record the process ID (PID) D. Run taskkill /PID number
Which command will determine if protected system files have been overwritten and replace those files with the original version? A. chkdsk B. msconfig C. SFC D. xcopy
C. SFC
Which option starts the operating system with a minimal set of drivers? A. Windows RE B. System Restore C. Safe Mode D. Debugging Mode
C. Safe Mode
Which of the following should be enabled when you want a user at another Mac to take control of your computer? A. Remote Desktop B. Remote Assistance C. Screen Sharing D. Screen Mirroring
C. Screen Sharing
An application won't close on an Android smartphone. You've tried to force stop it, to no avail. What should you do? A. Hard reset the device B. Stop the underlying service in Running Services C. Soft reset the device. D. Take the device to an authorized service center.
C. Soft reset the device.
You have been tasked with preventing unwanted removal of a webcam. Which of the following tools should you implement?? A. Smart card B. USB fingerprint scanner C. USB lock D. Privacy filter
C. USB lock
Which of the following uses an answer file to provide responses with no user intervention required? A. Factory recovery partition B. Clean installation C. Unattended installation D. Reset your PC
C. Unattended installation
Which command repairs the bootmgr file in Windows? (Select the best answer.) A. msconfig B. bootrec /fixboot C. bootrec /rebuildbcd D. boot\bcd
C. bootrec /rebuildbcd
You have been tasked with bringing the policies of a Windows 10 computer up to date. You won't be able to log off and back on, and you must use the Command Prompt. Which of the following tools should you use? A. Shutdown' B. DISM C. gpupdate D. Local Security Policy E. nslookup
C. gpupdate
Which of the following is used on iPads? A. Chrome OS B. Windows 10 C. iOS D. Android
C. iOS
Which command will show the configuration details of a wireless connection in Linux? A. ifconfig B. ipconfig C. iwconfig D. grep
C. iwconfig
Which command will show the path of routers between your computer and a web server? A. ping B. ipconfig C. tracert D. nbstat
C. tracert
A customer reports that a spinning wheel appears on her screen whenever she tries to run a specific application. What does this represent? (Select the best answer.) A. A failing CPU B. An Apple macOS proprietary crash screen C. A Microsoft Windows proprietary crash screen D. A Linux proprietary crash screen
B. An Apple macOS proprietary crash screen
Which of the following is the science of recognizing humans based on physical characteristics? A. Mantraps B. Biometrics C. Tailgating D. CAC
B. Biometrics
There are Android-based smartphones in your organization that are part of the BYOD infrastructure. They need to be able to connect to the LAN remotely using a VPN, Which of the following should you incorporate into the MDM profile for the smartphones to connect to the VPN securely? (Select the best answer.) A. AV software B. Certificate C. Remote wipe D. Authentication app E. Microsoft Intune
B. Certificate
You have been tasked with fixing a problem on a Windows Server. You need to find out which switch it connects to and how it connects. Which of the following types of documentation should you consult? A. Microsoft Knowledge Base B. Network topology diagram C. Incident documentation D. Compliance policy E. Inventory management
B. Network topology diagram
You have been tasked with repairing a magnetic-based hard drive that is running sluggishly. Which of the following tools should you use to fix the problem? (Select the best answer.) A. Disk management B. Optimize Drives C. Storage Spaces D. Mount point
B. Optimize Drives
Which window would you navigate to in order to modify the virtual memory settings in Windows? (Select the best answer) A. Device Manager B. Performance Options C. System D. Folder Options E. System Properties
B. Performance Options
You have been tasked with setting up a client Windows computer. It needs to gain access to the Internet, but all web traffic is cached and filtered by a go-between server on the LAN. What should you configure to enable Internet access for the Windows client? A. Alternate IP address B. Proxy server C. Duplex D. WSD
B. Proxy server
You are running Windows 8.1 and want to save personal files and remove all programs installed to the desktop while resetting PC settings. Which of the following should you select? A. Reset your PC B. Refresh your PC C. System Recovery Options D. Command Prompt
B. Refresh your PC
Your organization is concerned about a potential scenario where a mobile device with confidential data is stolen. Which of the following should be recommended first? (Select the best answer) A. Remote backup application B. Remote wipe program C. Password locks D. Locator application
B. Remote wipe program
Which command can copy multiple files and entire directory trees? A. copy B. cut C. paste D. robocopy
D. robocopy
You have been tasked with repairing a computer that is exhibiting the following symptoms: -Excessive pop-up windows appear: -A particular website comes up every time the user searches. What is this most likely cause? A. Spam B. Virus C. Social engineering D. Trojan E. Spyware
E. Spyware
In Windows 10, which network location profile settings should you choose if you are not sure what computers will be on the network or if you can trust them? A. Private B. Home C. Work D. Public
D. Public
One of your customers updated the software for a wireless adapter on a PC. After rebooting the user logged in and the computer displayed a blue screen. What should you do? A. Install the device on a known good computer. B. Reboot the computer and access debugging mode. C. Purchase a new wireless adapter. D. Roll back the device drivers in Safe Mode
D. Roll back the device drivers in Safe Mode
Which log file in the Event Viewer contains information concerning auditing? A. System B. Application C. Local Users and Groups D. Security
D. Security
Which of the following types of malware self-replicates? A. Virus B. Worm C. Trojan D. Rootkit
B. Worm
Which of the following are administrative share names? (Select the two best answers.) A. C$ B. C:\\Windows C. ADMIN$ D. System32 E. $print
A. C$ C. ADMIN$
Which of the following are important considerations when planning the installation of a new application? (Select the three best answers.) A. CPU speed B. Windows location C. Program Files location D. User permissions E. Warranty
A. CPU speed C. Program Files location D. User permissions
Which of the following are symptoms of viruses? (Select the three best answers.) A. A computer runs slowly. B. A computer locks up. C. Excessive pop-up windows appear. D. A strange website is displayed whenever a search is done.. E. Unusual error messages are displayed
A. A computer runs slowly. B. A computer locks up. E. Unusual error messages are displayed
You are concerned about the possibility of jailbreaks on your organization's iPhones and viruses on the Android-based devices. Which of the following should you implement? (Select the two best answers.) A. AV software B. Firewall C. Mobile device management D. Device reset
A. AV software C. Mobile device management
Which of the following describes an attempt to guess a password by using a combination of letters and numbers? A. Brute-force B. Social engineering C. Dictionary D. Zero-day
A. Brute-force
You want to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network. How can you accomplish this? (Select the two best answers.) A. Enable MAC filtering B. Create a DMZ C. Configure a complex SSID D. Disable physical ports
A. Enable MAC filtering D. Disable physical ports
You are about to start troubleshooting a Windows system. You need to be able to view the bootmgr file in the C: root of the hard drive. Which of the following should you configure to make this file visible? (Select the two best answers.) A. Hidden files and folders B. Extensions for known file types C. Encrypted or compressed NTFS files in color D. Protected operating system files
A. Hidden files and folders D. Protected operating system files
Which of the following system utilities should be used to create a text file with no formatting? A. Notepad B. Explorer C. msinfo32 D. Registry
A. Notepad
Which of the following are valid Wi-Fi troubleshooting methods? (Select the two best answers.) A. Power cycle the device. B. Restart Bluetooth C. Use a static IP. D. Make sure the device is within range. E. Rename the SSID
A. Power cycle the device. D. Make sure the device is within range.
To avoid SID conflicts when driving imaging, which program should you use in Windows? A. Sysprep B. Diskpart C. SIM D. Windows Deployment Services
A. Sysprep
A co-worker technician is using certmgr.msc to analyze a problem with a computer. Which of the following issues is the technician most likely troubleshooting? A. Trusted root CA B. Hijacked e-mail C. Spam D. Browser redirection
A. Trusted root CA
Which editions of Windows 10 offer Hyper-V? (Select the three best answers.) A. Windows 10 Home B. Windows 10 Pro C. Windows 10 Education D. Windows 10 Enterprise
B. Windows 10 Pro C. Windows Education' D. Windows 10 Enterprise
Which of the following installation types would require PXE compliance? A. Local B. Network' C. Internal D. USB flash drive
B. Network
Which tool should be used if you want to do Startup Repair in Windows? A. File History B. Windows RE C. System Restore D. Safe Mode
B. Windows RE
A customer's computer has many logins to websites saved within Windows. Some of these are security risks. Where can you go to remove those login usernames and passwords? (Select the two best answers) A. Programs and Features B. Credential Manager C. Devices and Printers D. MSDT E. Store User Names and Passwords F. Sync Center
B. Credential Manager E. Store User Names and Passwords
Which program should you use to access Utilities in macOS? (Select the two best answers.) A. Mission Control B. Finder C. Spotlight D. Safari
B. Finder C. Spotlight
Which power management mode stores f=data on the hard drive? A. Sleep B. Hibernate C. Standby D. Pillow.exe
B. Hibernate
Which of the following can be described as removing limitations on iOS? A. Rooting' B. Jailbreaking C. Gegtracking D. AV software
B. Jailbreaking
You are tasked with installing Windows with the standard configuration. The file system needs to be able to access an 8-TB partition. Which of the following should you configure the system to use? A. GPT B. NTFS C. FAT32 D. MBR E. ext4
B. NTFS
You are the administrator for your network and you set up an administrative share called Data$. Which of the following is necessary in order for another user to access this share? (Select the two best answers.) A. The user must be part of a HomeGroup. B. The user must have permissions to access the share. C. The user must know the decryption key. D. The user must know the exact network path to the share. E. The user must enable File Sharing in the Network and Sharing Center
B. The user must have permissions to access the share. D. The user must know the exact network path to the share.
You want to save the state of the Mac running macOS. Which tool should be used? A. System Restore B. Time Machine C. Force Quite D. Disk Utility
B. Time Machine
Which of the following operating systems is a free download with no evaluation period limitations? A. Windows 10 Home B. Ubuntu 18.04 C. macOS D. iOS
B. Ubuntu 18.04
You have been tasked with connecting wireless clients to a server that supports SSO and 802.1X. Which of the following technologies should you implement? A. WPA2-PSK B. WPA2-ENT C. WEP D. TKIP' E. RADIUS
B. WPA2-ENT E. RADIUS
A drive is to be repurposed within your company. You have been tasked with zeroing out the drive three times from within Windows. Which of the following methods will accomplish this? A. Degaussing B. format C: /fs:fat32/p:3 C. diskpart > select disk 1 > clean all D. dd if=/dev/zero of=/dev/sda1
B. format C: /fs:fat32/p:3
A customer is having a problem connecting to mapped network drives but can connect to the Internet just fine. You are tasked with fixing that system. Which tool should you use to take charge of the system and analyze it? A. dxdiag B. mstsc C. msinfo32 D. dfrgui E. diskpart F. System Restore
B. mstsc
An application is frozen and cannot be closed. However, the rest of the operating system works fine. Which tool can be used to close the application? A. tasklist B. taskkill C. shutdown D. convert
B. taskkill
Which of the following types of malware is designed to gain administrative-level control of a system? A. Ransomware B. Keylogger C. Rootkit D. Spyware
C. Rootkit
What is the minimum hard drive requirement for Windows 10 64-bit? A. 2 GB of RAM B. 2 GHz C. 32 GB of hard drive space D. 200 GB of hard drive
C. 32 GB of hard drive space
Which of the following is the strongest form of wireless encryption? A. WPA B. WEP C. AES D. TKIP
C. AES
Which program handles a printer's driver automatically in macOS? (Select the best answer) A. Bonjour B. Magic Mouse C. AirPrint D. iCloud
C. AirPrint
Which of the following might cause a blue screen? A. A faulty DVD-ROM B. A CPU without a fan C. Bad drivers D. A program compatibility issue
C. Bad drivers
You want to prevent a user from accessing your phone while you step away from your desk. What should you do? A. Implement remote backup B. Set up a remote wipe program C. Configure a screen lock D. Install a locator application
C. Configure a screen lock
You are troubleshooting a mobile device's e-mail connection. Your company requires the latest in security when it comes to e-mail sessions. The e-mail client is a separate app that is not browse based. How should the mobile device's e-mail client program be configured? (Select the two best answers.) A. SSL on port 25 B. TLS on port 443 C. POP3 with TLS using port 995 D. SMTP using port 995 E. IMAP using SSL on port 110 F. SMTP using TLS on port 587
C. POP3 with TLS using port 995 F. SMTP using TLS on port 587
A user clicked a link in an e-mail that appeared to be from his bank. The like led him to a page that requested he charge his password to access his bank account. it turns out that the webpage was fraudulent. What is this an example of? A. Impersonation B. Dumpster diving C. Phishing D. Shoulder surfing
C. Phishing
One of the users on your network is trying to access files shared on a remote computer. The file's share permissions allow the user Full Control but the NTFS permissions allow the user Read access. Which of the following will be the resulting access for the user? A. Full Control B. Modify C. Read D. Write
C. Read
What should you modify if you need to change the number of pixels that are displayed horizontally and vertically on the screen? A. Color depth B. Refresh rate C. Resolution' D. Scaling
C. Resolution
Which of the following statements is true? A. Android is an example of closed-source software. B. 32-bit CPUs can only address a maximum of 256 GB of RAM. C. Chrome OS is designed by Apple to use mostly desktop applications. D. 64-bit versions of Windows can run 32-bit apps as well as 64-bit apps.
D. 64-bit versions of Windows can run 32-bit apps as well as 64-bit apps.
What is HKEY__LOCAL__MACHINE considered to be? A. A registry entry B. A subkey C. A string value D. A hive
D. A hive
Which utility allows a MAC user to dual-boot macOS and Windows? A. Ubuntu B. apt-get C. bootrec D. Boot Camp
D. Boot Camp
You have been tasked with verifying the certificates that are in use on a computer that is configured to use Microsoft Edge. Which tab of the Internet Properties dialog box should you access? A. General B. Security C. Privacy D. Content E. Connections F. Programs G. Advanced
D. Content
Several hundred infected computers simultaneously attacked your organization's server, rendering it useless to legitimate users. What kind of attack is this an example of? A. Botnet B. MITM C. Tailgating D. DDoS E. Rainbow table
D. DDoS
A hard drive needs to be disposed of in such a way that no one can access the data. Which method should be used? A. Degaussing B. Clearing C. diskpart D. Destruction
D. Destruction
You have been tasked with setting up encryption for a Windows computer. You are required to encrypt several shared folders within partition, so that they can't be need by other users. What tool should you use? A. BitLocker B. TPM C. Administrative share D. EFS
D. EFS
Several computers were infected with malware because the end users clicked unknown links embedded in e-mails. You have successfully applied the first six steps of the best practice procedures for malware removable. What should you do next? A. Schedule scans and run updates. B. Enable System Restore and create a restore point. C. Document findings, actions, and outcomes. D. Educate the corporate users.
D. Educate the corporate users.
When is a Windows 10 computer completely secured? A. When you have updated to the latest version B. When you have locked down the Local Security Policy C. When Microsoft releases the latest update D. Never
D. Never
Where should you go to find out what applications are running in the background of Windows 10? A. Taskbar B. Start menu C. Quick launch D. Notification Area E. Cortana
D. Notification Area
You want to prevent certain users from accessing particular websites. What should you configure on the SOHO router? A. MAC filtering B. Disable unused ports C. Port forwarding D. Parental controls E. Power levels
D. Parental controls
You are preparing to troubleshoot a system that is having some driver issues. Which of the following tools should you use to configure the system to boot safely? A. Event Viewer B. Performance Monitor C. Local Users and Groups D. System Configuration' E. MMC
D. System Configuration'
Which of the following would you use to track what percentage of resources are being used? A. devmgmt.msc B. eventvwr.msc C. systemproperiesadvanced.exe D. perfmon.exe
D. perfmon.exe
Which command should be used to change the permissions of a file? A. ps B. chown C. NTFS D. chmod
D. chmod
Which of the following should be typed in the Run prompt to open the Device Manager? A. MMC B. secpol.msc C.CMD D. devmgmt.msc
D. devmgmt.msc
You need to block users from installing programs in Windows 10. Of the following, what tool should you select? A. wf.msc B. IKEv2 C. WIP D. gpedit.msc E. certmgr.msc
D. gpedit.msc
You want to connect to a share on \\server1\data-share. Which of the following should be used to accomplish this? A. HomeGroup B. Right-click the folder and select Share with C. ipconfig D. net use
D. net use