Core 2 Practice Exam A
10. Which of the following features is used to both start and stop services? (Select the two best answers.) Computer Management Task Manager Performance Monitor MMC Msconfig
Computer Management Task Manager (You can start, stop, and restart services within Computer Management > Services and Applications > Services. From there, right-click the service in question and configure it as you wish. You can also open Services by going to the Run prompt and typing services.msc. The Task Manager can also be used to start and stop services, as well as to analyze the performance of the CPU, RAM, and the networking connections. You can also start and stop services with the net start / net stop and sc start / sc stop commands.)
16. Which of the following can be used to keep hard drives free of errors and ensure that Windows runs efficiently? (Select the two best answers.) Disk Management Disk Defragmenter Check Disk System Restore Task Scheduler
Disk Defragmenter Check Disk
7. Which specific tool enables you to create a partition in Windows? Disk Management Format command Computer Management Disk Cleanup
Disk Management
50. You successfully modified the Registry on a customer's PC. Now the customer's system gets onto the Internet normally. Which of the following steps should be performed next? Bill the customer. Move on to the next computer. Document your solution. Run Disk Defrag.
Document your solution.
56. A blue screen is most often caused by ____________. Driver failure Memory failure Hard drive failure CD-ROM failure
Driver failure (The most common reason for a BSOD (blue screen of death, otherwise known as a stop error) is driver failure. Incorrect Answers: Second on the list is memory/processor-related errors.)
69. Which tool is used to analyze and diagnose a video card, including its DirectX version? Device Manager DxDiag Services.msc USMT
DxDiag (The DxDiag utility is used to analyze a video card and its DirectX version and to check if drivers are digitally signed. You can access it by going to Run and typing dxdiag.)
67. You have been given the task of installing a new hard drive on a server for a customer. The customer will be supervising your work. Which of the following questions should you ask the customer first? "What is the administrator password?" "Are there any current backups?" "Do you want me to shut down the server?" "Which version of Windows Server is this?"
"Are there any current backups?"
66. Which of the following file extensions is used when saving PowerShell scripts? .js .vbs .ps1 .py
.ps1
78. Which of the following is the minimum processor requirement for Windows 10? 32 GB 1 GHz 2 GHz 2 GB
1 GHz (Windows 10 (and Windows 8 and Windows 7) requires a minimum processor frequency of 1 GHz.)
4. Which of the following is the minimum amount of RAM needed to install a 64-bit version of Windows 10? 512 MB 1 GB 2 GB 4 GB
2 GB (The 32-bit version requires 1 GB. The same goes for Windows 8.1. A minimum requirement for older versions of Windows was 512 MB. No doubt, 4 GB will be the minimum for some Windows versions at some point.)
19. Which of the following represents the RAM limitation of Windows 8.1 Pro 64-bit? 4 GB 128 GB 512 GB 2 TB
512 GB
11. Which of the following user account permissions are needed to install device drivers on Windows? Standard user Guest Administrator Power users
Administrator
45. Which of the following is an open-source operating system? Android iOS Windows 8.1 macOS
Android
30. Which type of software helps protect against viruses that are attached to e-mail? Firewall software Antivirus software Internet Explorer Hardware firewall
Antivirus software
46. Where can you obtain applications for mobile devices? (Select the three best answers.) Spotlight App Store Google Play iTunes
App Store Google Play iTunes
31. Which of the following is an example of social engineering? Asking for a username and password over the phone Using someone else's unsecured wireless network Hacking into a router A virus
Asking for a username and password over the phone
34. A fingerprint reader is known as which type of security technology? Biometrics Smart card Barcode reader SSID
Biometrics
68. You just upgraded the president's computer's video driver. Now, the Windows 10 system will not boot. Which of the following steps should be taken first? Access the Windows RE Command Prompt. Boot into Safe Mode and roll back the driver. Reinstall the operating system. Boot into Directory Services Restore mode.
Boot into Safe Mode and roll back the driver.
59. You and a coworker are running network cables above the drop ceiling. The coworker accidentally touches a live AC power line and is thrown off the ladder and onto the ground. He is dazed and can't stand. He is no longer near the AC power line. Which of the following statements best describes the first step you should take? Cut the power at the breaker. Move the coworker farther down the hall. Apply CPR. Call 911.
Call 911.
28. Which of the following tasks can be performed to secure your WAP/router? (Select all that apply.) Changing the default SSID name Turning off SSID broadcasting Enabling DHCP Disabling DHCP
Changing the default SSID name Turning off SSID broadcasting Disabling DHCP (Disabling DHCP and instead using static IP addresses removes one of the types of packets that are broadcast from the WAP, making it more difficult to hack, but of course less functional and useful!)
14. Which interface is used to launch the ipconfig command? Command Prompt Control Panel MMC Task Manager
Command Prompt
76. Which of the following should be performed during a hard drive replacement to best maintain data privacy? Completely erase the old drive prior to disposal. Format the new hard drive twice prior to installation. Use only FAT32 file systems when formatting the new drives. Install antivirus software on the computer before removing the old hard drive.
Completely erase the old drive prior to disposal.
20. A customer's Device Manager shows an arrow pointing down over one of the devices. What does this tell you? The device's driver has not been installed. The device is not recognized. The device is disabled. The device is in queue to be deleted.
The device is disabled.
71. Which of the following settings must be established when you want to make a secure wireless connection? (Select all that apply.) The brand of access point The wireless standard used The encryption standard used The SSID of the access point
The encryption standard used The SSID of the access point
44. A coworker downloads a game that ends up stealing information from the computer system. What is this known as? Worm Spam Trojan Spyware
Trojan (A Trojan is a disguised program that is used to gain access to a computer and either steal information or take control of the computer)
27. Which component of Windows enables users to perform common tasks as nonadministrators and, when necessary, as administrators without having to switch users, log off, or use Run As? USMT UAC USB VNC
UAC (User Account Control (UAC) enabled, users perform common tasks as nonadministrators and, when necessary, as administrators without having to switch users, log off, or use Run As. If the user is logged in as an administrator, a pop-up window will appear verifying that the user has administrative privileges before action is taken; the user need only click Yes. If the user is not logged on as an administrator, clicking Yes will cause Windows to prompt the user for an administrative username and password.)
79. You create an answer file to aid in installing Windows. Which type of installation are you performing? (Select the best answer.) Drive image installation USB installation Multiboot installation Unattended installation
Unattended installation (An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation using Windows Deployment Services (WDS) in Server 2008 or higher.)
61. You are working on a very old printer and it begins to smoke. Which of the following statements best describes the first step you should take? Turn off the printer. Call 911. Unplug the printer Call maintenance. Tell the printer it is bad to smoke.
Unplug the printer
60. A computer you are working on has a lot of dust inside it. Which of the following statements best describes how to clean this? Disassemble the power supply and remove the dust. Use a household vacuum to clean up the dust. Use a surface dust cleaning solution. Use compressed air to remove the dust.
Use compressed air to remove the dust.
38. Which of the following is the most secure for your wireless network? WEP WPA2 TKIP WPA
WPA2
73. In Windows, when will a computer dump the physical memory? When the wrong processor is installed When a device is missing drivers When the computer is shut down improperly When the computer detects a condition from which it cannot recover
When the computer detects a condition from which it cannot recover
17. What is Windows Recovery Environment known as? (Select the two best answers.) WinRE Recovery Console Advanced Boot Options System Recovery Options
WinRE System Recovery Options
Which of the following are Microsoft operating systems? (Select all correct answers.) Windows 8.1 iOS 10 version 1803 Android Linux Windows 7
Windows 8.1 10 version 1803 Windows 7
36. Which shortcut key combination immediately locks Windows? Ctrl+Alt+Del Windows+R Windows+M Windows+L
Windows+L
6. Which of the following files is the boot loader in Windows? Winload.exe BCD Setup.exe Ntoskrnl.exe
Winload.exe
26. Which type of virus propagates itself by tunneling through the Internet and networks? Macro Phishing Trojan Worm
Worm
29. When you connect to a website to make a purchase by credit card, you want to make sure the website is secure. Which of the following statements best describes how to determine whether a site is secure? (Select the two best answers.) You should look for the padlock (in the locked position) toward the top or bottom of the screen. You should look for the padlock (in the unlocked position) toward the top or bottom of the screen. You should look for the protocol HTTP in the address or URL bar. You should look for the protocol HTTPS in the address or URL bar
You should look for the padlock (in the locked position) toward the top or bottom of the screen. You should look for the protocol HTTPS in the address or URL bar
75. The message "The Windows Boot Configuration Data File Is Missing Required Information" appears on the screen. Which command can repair this issue? bootrec /fixboot bootrec /fixmbr bootrec /rebuildbcd boot\bcd
bootrec /rebuildbcd
13. Which of the following commands is entered at the Command Prompt to learn more about the dir command? (Select the two best answers.) dir help help dir dir /? dir man
help dir dir /?
18. Which log file contains information about Windows setup errors? setupact.log setuperr.log unattend.xml diskmgmt.msc
setuperr.log (Setupact.log contains the events that occurred during the installation. Unattend.xml is the answer file used by Windows during unattended installations. Diskmgmt.msc is a command that can be run from the Run prompt or Command Prompt, which opens the Disk Management utility.)
40. A customer's Windows computer needs a new larger, faster hard drive. Another technician in your company installs the new drive and then formats the old drive before delivering it to you for disposal. How secure is the customer's data? Confidential Very insecure Secure Completely secured
very insecure (The data is very insecure. Many tools can recover data from a drive after it is formatted. Some companies will "low-level" format the drive, or sanitize the drive (as opposed to a standard format in Windows, for example) and keep it in storage indefinitely. The organization might go further and use data wiping software; in fact, this might be a policy for the organization. Always check your organization's policies to be sure you are disposing or recycling hard drives properly.)
49. Which of the following is the second step of the A+ troubleshooting theory? Identify the problem. Establish a probable cause. Test the theory. Document.
Establish a probable cause.
51. Buzz gets an error that says "Error log full." Where should you go to clear his error log? Device Manager System Information Recovery Console Event Viewer
Event Viewer
55. Which utility enables you to troubleshoot an error with a file such as ntoskrnl.exe? Registry Event Viewer REGSVR32 Terminal
Event Viewer (The Event Viewer logs all errors that occur on a system. Particularly, the System log would contain the information useful in troubleshooting this error.)
35. Which of the following is the most secure password? marquisdesod Marqu1sDeS0d MarquisDeSod Marqu1s_De_S0d_ver_2
Marqu1s_De_S0d_ver_2 (increase its length and then add capital letters, numbers, and finally special characters.)
65. Which of the following tools is used when setting the computer to boot with the Selective Startup feature? Task Manager Windows RE Safe Mode Msconfig
Msconfig (Msconfig enables you to modify the startup selection. You can boot the computer in different modes with Msconfig. You can also enable and disable services.)
15. A customer's computer is using FAT32. Which file system can you upgrade it to when using the convert command? NTFS ext4 exFAT NFS
NTFS
2. Which of the following is the default file system used by Windows? FAT32 CDFS NTFS exFAT
NTFS
37. Which of the following is the most secure file system in Windows? ext4 exFAT NTFS FAT32
NTFS
21. Which of the following is not an advantage of NTFS over FAT32? NTFS supports file encryption. NTFS supports larger file sizes. NTFS supports larger volumes. NTFS supports more file formats.
NTFS supports more file formats.
32. Where are software-based firewalls most commonly implemented? On routers On servers On clients On switches
On clients
3. Where is the Notification Area located in Windows? In the System Properties dialog box In the System32 folder On the taskbar Within the Start menu
On the taskbar
23. How would you create a restore point in Windows? Run Disk Defragmenter from the MMC. Run Backup and Restore from the Control Panel. Run the System Restore program from System Properties. Run the Disk Cleanup program from System Properties.
Run the System Restore program from System Properties.
57. A technician is installing a program on a Windows computer and the installation fails. Which of the following statements describes the next best step? Run the installer as an administrator. Contact the program's manufacturer. Reinstall Windows on the computer. Upgrade to the latest version of Windows.
Run the installer as an administrator. (Programs cannot be installed by standard users or guests. You must have administrative rights to do so)
52. Which of the following tools checks protected system files? Chkdsk Dism Scandisk SFC
SFC (System File Checker (SFC) checks protected system files and replaces incorrect versions. Incorrect Answers: None of the other options check system files. Chkdsk can check for and repair errors, but just regular files. Dism is a tool used to work with Windows images. Scandisk is an older command-line scanning tool that today's versions of Windows don't use. It was replaced by Chkdsk.)
42. Which protocol encrypts transactions through a website? HTTP SSL PuTTY Kerberos
SSL (Secure Sockets Layer (SSL) and the newer Transport Layer Security (TLS) encrypt the transactions through the website.)
25. You are setting up auditing on a Windows computer. If it's set up properly, which of the following logs should contain entries? Application log System log Security log Maintenance log
Security log (After Auditing is turned on and specific resources are configured for auditing, you need to check the Event Viewer's Security log for the entries. These could be successful logons or misfired attempts at deleting files; there are literally hundreds of options.)
74. When a person takes control of a session between a server and a client, it is known as which type of attack? DDoS Brute force Session hijacking Malicious software
Session hijacking
41. Which of the following offers hardware-based authentication? NTFS Smart card Strong passwords Encrypted passwords
Smart card
5. In Windows, an MMC is blank by default. Which of the following should be added to the MMC to populate it with programs? Applets Files Directories Snap-ins
Snap-ins
39. Which of the following terms refers to when people are manipulated into giving access to network resources? Shoulder surfing Social engineering Phishing Spear phishing
Social engineering
33. Making data appear as if it is coming from somewhere other than its original source is known as which of the following terms? Impersonation Phishing Zero-day Spoofing
Spoofing
58. Which of the following statements best describes how to apply spray cleaner to a monitor? Spray the cleaner directly on the monitor screen. Spray the cleaner on the top of the monitor and wipe down. Spray evenly on the monitor. Spray the cleaner on a clean, lint-free cloth first.
Spray the cleaner on a clean, lint-free cloth first.
54. Which Windows System Recovery Option attempts to automatically fix problems? System Restore Startup Repair File History Reset Your PC
Startup Repair
72. Which Windows utility is used to prepare a drive image for duplication across the network? Robocopy Sysprep Ghost Image Clone
Sysprep
70. Which of the following statements best describes a common risk when installing Windows drivers that are unsigned? System stability may be compromised. Files might be cross-linked. The drive might become fragmented. Physical damage to devices might occur.
System stability may be compromised.
9. Which of the following tools enables you to find out how much memory a particular application is using? Msconfig Task Manager Chkdsk System Information
Task Manager (The Task Manager enables you, via a click of the Processes tab, to view all current running processes and see how much memory each is using)
77. Which tool is used to back up data on the C: drive in Windows 10? Backup and Restore BitLocker Time Machine File History
File History (The Windows 10 and 8 File History utility (accessible in the Control Panel) enables a user to back up files or the entire PC)
22. A coworker just installed a second hard drive in his Windows computer. However, he does not see the drive in Explorer. What did he forget to do? (Select the three best answers.) Format the drive Partition the drive Run FDISK Initialize the drive Set up the drive in the UEFI/BIOS
Format the drive Partition the drive Initialize the drive (For secondary drives, you must go to Disk Management and initialize, partition, and format them.)
47. You need to locate a mobile device that was stolen. Which technology can aid in this? GPS Screen orientation Passcode locks Gmail
GPS
63. One of your technicians is on a service call and is dealing with a furious customer who has been shouting loudly. The technician tries but cannot calm down the customer. Which of the following statements best describes the next step the technician should take? He should let the customer continue to shout; sooner or later the customer will get tired and calm down. He should call the supervisor and complain. He should leave the customer site and document the incident. He should shout back at the customer in an attempt to regain control of the situation.
He should leave the customer site and document the incident.
64. While you are working at a customer site, a friend calls you on your cell phone. Which of the following statements best describes the recommended course of action? Ignore the call for now. Go outside and take the call. Answer the phone as quietly as possible. Text your friend.
Ignore the call for now.
53. After installing a new hard drive on a Windows computer, Len tries to format the drive. Windows does not show the format option in Disk Management. What did Len forget to do first? Run chkdsk. Partition the drive. Defragment the drive. Copy system files.
Partition the drive. (You must partition the drive before formatting)
43. Which of the following is a common local security policy? Use of RAID Password length Router passwords Use of a password to log in
Password length
24. Which of the following tasks cannot be performed from the Printer Properties screen? Modifying spool settings Adding ports Pausing printing Enabling sharing
Pausing printing
8. Which type of partition should an operating system be installed to? Primary Extended Dynamic Logical drive
Primary
62. Which of the following statements best describes the recommended method for handling an empty toner cartridge? Throw it away. Incinerate it. Refill it. Recycle it.
Recycle it.
80. Which of the following utilities can be used to view the startup programs? Ipconfig Ping Regedit DxDiag
Regedit (Regedit can be used to view startup programs. This is the executable that opens the Registry Editor. A common place to find some of the startup programs is the path HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru. Several other subkeys, mostly within the CurrentVersion, also house startup program information.)
