PEARSON's CompTIA A+ Core 2 (220-1102) Exam Cram chapters 30-36

Ace your homework & exams now with Quizwiz!

You want to create a spanned volume over two hard drives that are separate from the system volume of a Windows workstation. What tool can help you determine if the hard drives can support spanned volumes? Disk Management Task Manager Device Manager System Information

Disk Management --The Task Manager shows the performance of a computer's CPU and RAM and displays the programs/processes currently running. --The Device Manager is used to configure devices, update drivers, and view device settings. --the System Information tool is similar to the Device Manager, but you cannot make changes; this tool also shows information about the software environment and hardware resources.

A customer wants you to set up the system to scale images at 200%. Which Control Panel icon should you access to configure this? Programs and Features Mail Sound Ease of Access Center Devices and Printers

Ease of Access Center

You are attempting to install a Windows 64-bit OS within a VM, but you keep receiving errors. The specifications for the VM include Four 1 GHz CPUs 4 GB of RAM 15 GB storage drive space 720p screen resolution Which of the following should you do to resolve this issue? Increase the number of CPUs. Increase the amount of memory. Increase the amount of drive space. Increase the screen resolution.

Increase the amount of drive space. --Windows 10 or 11. 64-bit installations of Windows 10 require 32 GB of storage drive space. Windows 11 installations require 64 GB of storage drive space. This holds true for physical installations and virtual installations. The virtual machine (VM) installation will fail until the VM's drive space is increased. In fact, 15 GB is not enough for Windows 8 either, though chances are you won't be seeing much of that since its EOL is January 2023.

Where should you go to find out what applications are running in the background in Windows 10? Taskbar Start menu Quick Launch Notification area Cortana

Notification area

You have been tasked with repairing a magnetic-based hard drive that is running sluggishly. Which of the following tools should you use to fix the problem? (Select the best answer.) Disk Management Optimize Drives Storage Spaces Mount point

Optimize Drives

What should you modify if you need to change the number of pixels that are displayed horizontally and vertically on the screen? Color space Refresh rate Resolution Scaling

Resolution

Your boss is concerned that someone is accessing her Windows system while she is away from her desk. You believe configuring lock screen and screen timeout Settings will help secure the system. Where can you configure these settings? Settings>Update & Security>Windows Security Settings>Personalization>Lock screen Control Panel>System and Security>Security and Maintenance Control Panel>Ease of Access

Settings>Personalization>Lock screen

You see an exclamation point next to a device in the Device Manager. What does this indicate? The device driver is corrupt. The device driver is outdated. The device driver is missing. The device is disabled.

The device driver is missing. --If the device were disabled, it would have a down arrow. --That might also be the case if the driver file were corrupt, or the device would simply show up in the "Other devices" category in the Device Manager and not function at all. The "Other devices" category is also where the device would be listed if the driver was missing altogether. --An outdated driver doesn't necessarily initiate an error or marking of any kind; however, drivers should be checked and updated periodically (if it is not done automatically).

Which command is used to list the contents of a directory in the Command Prompt? cd dir ping ver

dir --cd is short for change directory and is used to navigate. --ping is used to verify whether another computer is available on the network. --ver shows the version number of the Windows operating system - in the Command Prompt, but not PowerShell. (winver gives more information in a graphical format.)

You need to assign drive letters and make a partition active from the Command Prompt. What of the following will allow you to perform these activities? Disk Management format defrag diskpart

diskpart

What is HKEY_LOCAL_MACHINE considered to be? A registry entry A subkey A string value A hive

A hive

A customer calls to report that when she walks away from her laptop for an extended period of time, she has to reconnect to wireless upon returning. Which of the following will most likely correct this issue? Replace the wireless card. Install a higher-capacity battery. Adjust the power settings. Disable the screensaver.

Adjust the power settings.

Which of the following Internet Options tabs should you access to enable TLS in Internet Explorer? Security Privacy Advanced Connections

Advanced---Use the Advanced tab to enable TLS 1.2/1.3 (and other security protocols) within Internet Explorer. --this is a bit of a trick question. At first glance, you would think that TLS is a security feature; and while it is, the Security tab deals with zone security, not specific protocol-based security options. --The Privacy tab deals with blocking cookies. --The Connections tab concerns setting up Internet connections, VPNs, and proxy server connections.

You receive an error message stating "remote desktop can't connect to remote computer" when trying to assist a remote customer. Which of the following can help you correct this problem? (Select the two best answers.) Have the customer reboot the computer. Run Windows Update to ensure that the system is updated. Change the firewall settings. Change settings to allow remote connections to this computer. Select 2 answers

Change the firewall settings. (By the way, RDC uses port 3389.) Change settings to allow remote connections to this computer.

What must you do first to a basic disk to create spanned, striped, mirrored, or RAID 5 volumes in Disk Management? Extend it Shrink it Split it Initialize it Convert it to dynamic

Convert it to dynamic

You are working on a gaming computer that is running an older version of Windows. There is a high-end gaming application that isn't performing very well. So far, you have updated all of the hardware on the system and flashed the BIOS. What should you analyze further in an attempt to fix the problem? Video driver DirectX Resolution setting Safe Mode OSD

DirectX --DirectX is a Windows technology that includes video, animation, and sound components. It helps a computer get more performance out of multimedia, games, and movies. You can find out what version of DirectX the Windows computer is running by going to Run and entering dxdiag. In the System tab, you will see the version; for example, DirectX 12. Check for the requirements of the gaming application (it probably requires the latest version of DirectX) and install that from Microsoft's website. Some gamers want to run older versions of Windows (for a variety of reasons), but older versions of Windows come with older versions of DirectX unless it is updated

You previously installed a new application for a customer and added three new services. Today, the customer informs you that the application will not start. You find out that one of the three new services has failed to start, and manual attempts to start it fail. Where should you look next for information? (Select the two best answers.) Registry Event Viewer %systemroot%\System32\Drivers Log files for the new application Task Manager Select 2 answers

Event Viewer Log files for the new application --The registry contains all of the parameters of the operating system, but it won't give you error information. --%systemroot%\System32\Drivers contains drivers for hardware. --The log file might lead you to believe that a driver needs to be replaced, but it isn't the first place you should look. --Task Manager shows the performance of the CPU and RAM and shows what services are running. You might have attempted to start the service from there (or the Services Console) as part of the scenario.

You are troubleshooting a Windows system and are currently unable to see certain folders and operating system files in File Explorer. How can you make hidden folders and protected system files visible? From the Folder Options View tab, select Show hidden files, folders, and drives From the Control Panel Internet Options Privacy tab, enable/configure viewing options Enter appwiz.cpl in the Run box and Turn Windows features on or off From the Folder Options View tab, uncheck the Hide protected operating system files (recommended) box Select 2 answers

From the Folder Options View tab, select Show hidden files, folders, and drives From the Folder Options View tab, uncheck the Hide protected operating system files (recommended) box

Which power management mode stores data on a storage drive? Sleep Hibernate Standby Pillow.exe

Hibernate

What tool can assist a user who needs to find results faster when searching for files on a storage drive? firewall.cpl Internet Options appwiz.cpl Indexing

Indexing

You attempt to install a legacy application on a computer running Windows. You receive an error that says the application cannot be installed because the OS is not supported. Which of the following describes the first step you should take to continue installing the application? Purchase the latest version of the application. Install the application in Safe Mode. Install the application in compatibility mode. Install the latest security updates.

Install the application in compatibility mode. --Attempt to install legacy (older) applications in compatibility mode. Select the older OS that the application was originally written for. --your first step should never include the word purchase; besides it is not necessary in a system such as Windows, where compatibility mode exits. --Normally you wouldn't install an application in Safe Mode; you might run the application or troubleshoot the system in that mode. --Security updates probably won't have an effect on this scenario either.

You have been tasked with limiting computer access to certain Windows users. Which of the following should be configured? System Configuration Local Security Policy BCD Advanced Security

Local Security Policy --System Configuration is MSConfig, which is used to modify how the system boots and enable/disable applications and services. --BCD stands for boot configuration data. The BCD store contains information about the operating system(s) that can be booted to. --Advanced Security is a place you can go for the Windows Defender Firewall that allows you to create advanced port exceptions for applications.

you have been tasked with running updates on a Windows computer. Some of the updates go through fine, but one of them fails. While troubleshooting, you restart the computer and attempt to install the failed update, but it continues to fail. Which of the following should you do first? Analyze the Event Viewer for more information about the failures. Download the failed updates to install it manually. Visit the Microsoft Update website to see if there is an issue with a specific update. Look up the error number associated with the failed update.

Look up the error number associated with the failed update.

Which utility would you use to configure Windows for safe boot? Windows Recovery Environment Startup Settings Task Manager Regedit MSConfig

MSConfig --The Windows Recovery Environment (WinRE) is used to repair problems with Windows. --The same goes for Startup Settings (part of WinRE); you will see Safe Mode in that menu, but that is slightly different than configuring safe boot in MSConfig. --The Task Manager doesn't allow you to change the boot options, but it does show processes, performance, and other analytics of the OS. --Regedit is used to make less common (and usually more difficult) configuration changes to the system.

You just installed a new updated driver for a network interface card (NIC). Now you want to test its data transfer rate. What tool should you use to run your test? Device Manager Local Security Policy Performance Monitor System Information

Performance Monitor --Use Performance Monitor (Run > perfmon.exe) to analyze a device. In this example, you can find out how many bits per second the NIC can transfer (that is, the data transfer rate). You can also use this tool to monitor all of the other devices (objects) on the system and save and report on those findings in a variety of ways. Another useful tool is Resource Monitor. --Device Manager is where you would go to install or uninstall a device or roll back the driver for that device. --Local Security Policy (Run > secpol.msc) is where you would go to enable or disable rules (policies) on a Windows client computer. --System Information (msinfo32) gives you the Windows system summary for hardware resources, components, and the software environment, but it cannot perform tests.

Which window would you navigate to in order to modify the virtual memory settings in Windows? (Select the best answer.) Network & Internet Performance Options Devices Device Manager Display

Performance Option

Which Control Panel utility is best used to remove a Windows application? Disk Cleanup Administrative Tools Folder Options Programs and Features

Programs and Features --is the place to go in the Control Panel (CP) to remove an application in Windows. You can also open this by entering appwiz.cpl in the Command Prompt. Or you could access Settings > Apps > Apps & features. --Disk Cleanup is used to remove temporary files; it's not used to remove applications. --Administrative Tools is a group of tools, such as Event Viewer, Task Scheduler, and Computer Management. --Folder Options (or File Explorer Options) is where you can go to change how folders are displayed.

You are about to start troubleshooting a Windows system. You need to be able to view the bootmgr file in the C: root of the storage drive. Which of the following should you configure to make this file visible? (Select the two best answers.) Hidden files and folders Extensions for known file types Encrypted or compressed NTFS files in color Protected operating system files Select 2 answers

Protected operating system files Hidden files and folders

You are troubleshooting a Windows system that is suffering from poor performance. The Event Viewer states that the file system is corrupt. What should you do next? Reload the OS using FAT32 instead of NTFS. Run chkdsk with the /R option and reboot the system. Open the defrag utility and run the drive analysis. Change the drive from basic to dynamic.

Run chkdsk with the /R option and reboot the system. --The only option that would help the situation would be to run the chkdsk command with the /R option. /R locates bad sectors and recovers readable information, which is the only option listed that might fix the file system corruption (keyword might). /R implies /F as well, which fixes basic errors on the drive

To meet the security requirements for your organization, one of the technicians on your team recently performed an in-place upgrade on a user's laptop to the latest version of Windows. After the upgrade was completed, an older in-house application no longer functions. The technician realizes that the application is not compatible with the latest version of Windows. Being the resident Windows expert, the technician comes to you for help. What should you recommend? Roll back the in-place upgrade Update the system Have the user work on another computer Run the application in compatibility mode

Run the application in compatibility mode

Which command is the best option for verifying that the protected system files in Windows are correct? diskpart SFC chkdsk bootrec /fixboot

SFC --System File Checker (SFC) is the best option in this scenario. It checks and, if necessary, fixes system files in Windows. --diskpart is the command-line partitioning tool, the counterpart of the GUI version, Disk Management. --chkdsk can help to identify issues with a hard drive and can fix some basic problems automatically, but it is not the best answer for dealing with protected system files. --bootrec /fixboot is a recovery environment tool used in Windows to rewrite the boot sector of a storage drive. --

Which log file in the Event Viewer contains information concerning auditing? System Application Local Users and Groups Security

Security

A customer wants a laptop to enter a power saving mode that will reduce the power consumption to nearly zero but retain memory of what the user was working on. It should be able to retain this information for weeks if need be, and even if the laptop's battery discharges completely. What is the best method? Set the computer to sleep. Set the computer to hibernate. Set the computer to standby. Set the computer to shut down.

Set the computer to hibernate.

Which of the following sections of Windows Settings allows a user to copy important information about a PC and possibly send it to a technician for troubleshooting purposes? System > About Network & Internet > Ethernet Ease of Access > Narrator Privacy > Diagnostics & Feedback

System > About

You are preparing to troubleshoot a system that is having some driver issues. Which of the following tools should you use to configure the system to boot safely? Event Viewer Resource Monitor msinfo32 System Configuration

System Configuration

A customer has a computer running Windows. The Windows Defender Firewall appears to be causing communications to fail within a certain gaming application even though you set up an exception for the program. You stop the Windows Defender Firewall, but when the computer reboots, the service starts up again. Which of the following tools should be used to disable the Windows Defender Firewall service? Task Scheduler System Properties System Configuration Local Security Policy

System Configuration --The Task Scheduler is used to set a time when particular applications and processes will run, but not to disable them (though you can disable tasks here if necessary). --System Properties is the dialog box where you can change the name of the computer, configure System Restore, and set up Remote Desktop. L --Local Security Policy is where password and auditing policies can be configured.

You reboot a customer's computer and see a pop-up message that says, "One or More Services Failed to Start." Which of the following can give you more information? System event logs Task Manager Application event logs Security log

System event logs

A technician is working on a laptop running Windows that has become slower over time. The tech analyzes the CPU utilization and notices that it is hovering between 90 and 100 percent usage. When the technician closes some running applications, the CPU drops down to normal and the laptop runs faster until it is restarted, at which point the problem happens again. Which utility can the technician use to fix the problem? Task Manager Performance Monitor MSConfig RDP

Task Manager --The Performance Monitor is used to analyze the resources of the computer. It can be used to monitor CPU utilization, as mentioned in the question, but it can't be used to disable programs. --MSConfig is used to modify how the system boot and services can be disabled from there, but not applications. -- Remote Desktop Protocol (RDP) is used to remotely control other systems on the network or the Internet.

Where can a user go to start and stop services in Windows? (Select all that apply.) gpedit.msc Task Manager services.msc Command Prompt Select 3 answers

Task Manager services.msc Command Prompt

Which Windows utility can be used to see which user is currently logged on? MSConfig Disk Management Task Manager Administrative Tools

Task Manager--Task Manager Users tab shows any currently logged-on users and their status. The Task Manager shows the percentage of resources that are being used by each user. --MSConfig (System Configuration) is used to change boot settings and disable services. --Disk Management is used to monitor the status of drives and to work with partitioning/formatting. --Administrative Tools is a collection of tools used to configure the OS, but it does not offer a quick way to see which users are logged in to the system.

Which tool can run particular programs at times designated by the user? Services Task Scheduler Event Viewer Task Manager

Task Scheduler

You are configuring a new Windows-based mobile device for a user who has had trouble reading text on the previous device. Which of the following is the best way to help the user see content on the screen better? Use haptic feedback. Utilize text-to-speech. Increase the resolution. Use the magnifier.

Use the magnifier.

Which of the following operating systems are you using if you are working in Computer Management? Windows macOS Linux Android

Windows

A customer requires a current operating system that can utilize 512 GB of RAM that is installed to a PC. Which of the following should you suggest? (Select two.) Windows 10 Home Windows 10 Pro Windows 7 Pro Windows 10 Enterprise Select 2 answers

Windows 10 Pro Windows 10 Enterprise

Which editions of Windows 10 offer Hyper-V? (Select the three best answers.) Windows 10 Home Windows 10 Pro Windows 10 Pro for Workstations Windows 10 Enterprise Select 3 answers

Windows 10 Pro Windows 10 Pro for Workstations Windows 10 Enterprise

you are tasked with troubleshooting a RAID 1 array that is running slowly. You reboot the system and see S.M.A.R.T. errors when the computer boots. Which tool should be used to troubleshoot these errors? chkdsk diskpart Disk Cleanup format

chkdsk --diskpart is the Command Prompt utility used to manage hard drives; it is the text-based counterpart of the Disk Management program. --Disk Cleanup is used to remove temporary files from a Windows system. --The format command is used to write a file system (such as NTFS) to a volume; it deletes all data when used.

You plug a 32 GB flash drive into a Windows laptop. The flash drive has multiple smaller partitions that are not writable. Which of the following diskpart commands can be used to remove the partitions so that you can later format the drive to full capacity? repair clean merge extend

clean --As per the docs.microsoft.com diskpart page: "clean removes any and all partition or volume formatting from the disk with focus." See Chapter 31, "Microsoft Command-Line Tools, Part I," for more information.

Which of the following do you type in the Run prompt to open the Device Manager? mmc secpol.msc cmd devmgmt.msc

devmgmt.msc --devmgmt.msc is the Microsoft console window known as Device Manager. --mmc opens up a new blank Microsoft Management Console. secpol.msc opens the Local Security Policy window. --cmd opens the Command Prompt.

Which command or tool would display the contents of C:\Windows\System32\? net cd System Information tool dir

dir --The net command has many uses; for example, use net stop spooler to stop the print spooler, net use to map network drives, and so on. --cd stands for change directory. Within the command line it enables you to move from one directory to any other directory in the tree. --The System Information tool displays details about hardware resources, components, and the software environment.

You have been tasked with printing a Group Policy configuration report to an HTML file for offline review. Which of the following commands will enable you to do this? gpresult gpupdate gpedit.msc secpol.msc

gpresult --Use the gpresult command, which allows you to view the results of the Microsoft Group Policy configuration and print it to various file formats if you wish. --gpupdate takes care of updating settings on a computer regarding the computer policy configuration. --gpedit.msc opens the Local Group Policy Editor window. --secpol.msc opens the Local Security Policy window.

You are tasked with reapplying a policy to a Windows computer. Which command should you use? diskpart gpresult gpupdate net use

gpupdate

You have been tasked with bringing the policies of a Windows 10 computer up to date. You won't be able to log off and back on, and you must use the Command Prompt. Which of the following tools should you use? shutdown rd gpupdate Local Security Policy winver

gpupdate

Where can a technician create rules for inbound and outbound network traffic? (Select the two best answers.) Windows Defender Firewall with Advanced Security Windows Defender Firewall Apps & Features wf.msc Select 2 answers

indows Defender Firewall with Advanced Security wf.msc

Which of the following commands will display the MAC address of a computer? ping netstat ipconfig /all ipconfig /renew

ipconfig /all --ping is used to test whether other computers are available on the network. --netstat displays all the network sessions to remote computers. --ipconfig /renew is used with /release to reissue DHCP-obtained IP addresses.

Which of the following tools allows you to change the number of CPU cores that Windows uses? perfmon dxdiag msconfig taskmgr

msconfig--the System Configuration utility (msconfig) can be used to change the total number of CPU cores used by Windows. This can be found by going to the Boot tab and clicking the Advanced options button. From there, check the Number of processors checkbox and select the number of CPU cores (or the actual number of CPUs if you have more than one). This is usually done to troubleshoot the CPU or Windows; in most cases, Windows will use all CPU cores available to it by default. --The Performance Monitor (perfmon.exe) is used to analyze system performance and can view each core in real time, as can the Task Manager (taskmgr.exe). --The DirectX Diagnostics tool (dxdiag.exe) is used to analyze audio and video DirectX components in the system.

A customer is unable to access a network share. However, the customer can access email. You analyze the system and confirm that the customer has the correct permissions to access the share. Which command should you use first to troubleshoot the problem? nslookup net use ipconfig ping

net use

You need to map a network drive to a share named data1 on a computer named Jupiter-Server. You want to use the J: drive letter. Which syntax should you use to do this in the Command Prompt? net use J: \\Jupiter-Server\data1 net use J \Jupiter-Server\data1 net use Jupiter-Server\J\data1 net use J: \Jupiter-Server\data1

net use J: \\Jupiter-Server\data1

Which of the following would you use to track the percentage of resources being used? devmgmt.msc eventvwr.msc compmgmt.msc perfmon.msc

perfmon.msc --the Performance Monitor utility, which is used to graphically track the resources that are being used on a computer, such as CPU, RAM, and so on. You could also use Task Manager > Performance to track resource usage (but without the ability to save the data), as well as the Resource Monitor. --devmgmt.msc opens the Device Manager. --eventvwr.msc opens the Event Viewer. --compmgmt.msc opens the Computer Management console window.

A user's computer is powered on and appears to work properly. However, the user cannot access any wired network resources, printers, or shared drives. In addition, the user cannot access the Internet. Which of the following commands should you use to troubleshoot the problem? netstat net use ping nslookup

ping --the ping command will help you to decipher what the problem is. However, consider using ipconfig /all before running ping. --The netstat command shows a list of current connections (among other things). Chances are that there are none currently in the scenario. --The net use command displays and makes connections to remote shares. --The nslookup command does name resolution between domain names and IP addresses.

Which command will ping continuously? ping /? ping -t ping -l ping -n

ping -t --ping -t is a continuous ping. It can be stopped by pressing Ctrl+C. -- ping /? will display the help file. --ping -l allows you to specify the number of bytes per ping. -----ping -n specifies the exact number of pings to send.

Which command can copy multiple files and entire directory trees? copy cut paste robocopy

robocopy

Which command determines whether protected system files have been overwritten and replaces those files with the original version? chkdsk md sfc xcopy

sfc --chkdsk can check for errors and fix some errors, but it cannot work with system files. --md is the command used to make a directory. --xcopy is used to copy large amounts of data to a new location.

As you are investigating a customer's Windows laptop, you find the following: Windows Update was disabled. Malware replaced a few Windows operating system files. You complete a malware scan to remediate the problem. Which of the following commands should you run next before enabling Windows Update? sfc chkdsk gpupdate robocopy grep

sfc---run the system file checker (SFC) utility. This will check and possibly replace damaged or missing Windows operating system files. --chkdsk checks the drive for errors and may try to fix those errors, depending on the options you supply with the command. --gpupdate makes changes to group policy take effect immediately (instead of waiting for user logoff and logon). --robocopy is used to copy groups of files or folders. --grep is a filtering tool in Linux.

Which command shows the path of routers between your computer and a web server? ping ipconfig tracert nbtstat

tracert

our boss asks you to find a list of routers along a given path through multiple networks. What command can help you? ping ipconfig tracert nslookup

tracert

Which of the following commands should you use to find out what edition of Windows is running? pathping winver ls hostname

winver


Related study sets

Econ: Business Cycle, Monetary Policy, and Fiscal Policy

View Set

MyLab M. 16.4 Deep Venous Thrombosis

View Set

Chapter 26- Soft Tissue Injuries

View Set

Mid Terms Study Guide- Questions from the Book

View Set

BASIC LIFE SUPPORT PRACTICE QUIZ

View Set