A+ Core 2 Practice Exam Content Flashcards

Study up for the CompTIA A+ Core 2 exam! (220-1102)

1
Q

Which parameter of the ipconfig command exhibits contents of the DNS client resolver cache?

Windows command prompt & terminal knowledge

A

/displaydns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which command is used on a computer running Windows to display the DNS server that the computer is using?

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which switch in the chkdsk program in Windows forces the volume to dismount first, if necessary, and includes the functionality of the /F switch?

A

/X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to A+ exam guide, what are the steps in order for removing malware from an end user’s computer?

Step by Step Answer

*One through Seven *

A
  1. Identify and research malware symptoms.
  2. Quarantine the infected systems.
  3. Disable System Restore (on Windows machines)
  4. Remediate the infected systems.
    * Update the anti-malware software
    * Scan & use removal techniques (including the use of safe-mode/pre-installation environment)
  5. Schedule scans and run updates.
  6. Enable System Restore and create a fresh restore point (Windows)
  7. Educate the end user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the acronym MBSA denote?

A

Microsoft Baseline Security Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why should you configure your Windows computer with an IP address in the alternate configuration of TCP/IP properties?

A

The alternate configuration ensures that you will have an IP address if your computer does not receive an IP address from a DHCP server. (In a nut shell – allowing APIPA to do it’s thing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the User State Migration Tool (USMT)?

A

It is a system tool used to migrate user settings from one operating system to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an AUP?

A

It is an Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which operating system uses the ext3 and ext4 filesystems?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following backup types has the fastest backup
time?
a. Differential Backup
b. Full Backups
c. Pitstop Backup
d. Incremental Backups

A

D. Incremental Backups are the “fastest” of the three types of backups.
* In ranked order: Incremental is the fastest to execute, then differential, and lastly a full backup.
* Restoration speed is different though: data restoration from an incremental is more nuanced, therefore more time consuming than a differential backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the application protocol underpinning file and printer sharing on Windows networks?
a. FTP
b. SMB
c. RDP
d. Kerberos

A

B. Server Message Block protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not configured via DHCP?
a. IP Address
b. Default Gateway
c. MAC Address
d. Subnet Mask

A

C. A MAC address is not configured by any connection to a DHCP server or configured using the protocol. A MAC address is given to a device by the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Assigning permissions to files and folders for many users is simplified by what mechanism?
a. Security Groups
b. Organizational Units
c. User Account Control
d. Group Policy Objects

A

A. Security Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are configuration customizations accomplished during an unattended installation?
a. By applying customizations after installation is complete
b. By using a customized version of Windows installation files
c. No customizations are possible
d. By using an answer file

A

D. An answer file is how! Which essentially a script that guides the setup through various prompts and decisions, allowing you to specify settings without manual intervention. It’s the key to automating a custom install on Windows machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following describes Event Viewer?
a. Monitors the state of all registered background processes.
b. A management console snap-in for viewing and managing logs on a Windows host.
c. Produces a comprehensive report about the system’s hardware and software components.
d. Used to provide real-time charts of system resources.

A

B. It is a snap in management console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Administrative Tool is used to configure Safe Mode boot?
a. Device Manager
b. System Configuration
c. Task Manager
d. Computer Management

A

B. System Configuration - commonly accessed via the BIOS/UEFI of a Windows machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which type of hypervisor is installed directly onto the computer and manages access to the host hardware without going through a host OS?
a. Containerization
b. Client-side
c. Bare Metal
d. Host-based

A

C. A Bare Metal hypervisor does not operate via the operating system of the host computer.

18
Q

Where IS configuration information for hardware, OS and apps stored?
a. Control Panel
b. Registry
c. BIOS
d. System Information

A

B. The registry is where!

19
Q

Which of the following Windows tools can be used to obtain a custom view of detailed system utilization information?
a. Utilization Monitor
b. Resource Monitor
c. Task Monitor
d. Performance Monitor

A

D. Performance Monitor (The Snap-in from the MMC)

20
Q

Explain what the following two switches to the chkdsk command do:
1. /scan
2. /perf

both of these are only usable on a machine using NTFS

A
  • /scan is used to run an online scan of the specified volume (drive).
  • using /perf as a chkdsk switch that must be used with /scan allocates more system resources to complete the function as quickly as possible.
21
Q

Which feature of the Windows operating system helps reduce repetitive traffc over a WAN?
a. Domain access
b. BitLocker
c. BranchCache
d. EFS

A

C. BranchCache

22
Q

What is the keyboard combination to immediately launch task manager?

Windows Related

A

Ctrl + Shift + Escape

23
Q

Which Windows command-line tool is the DirectX Diagnostic tool that allows you to confirm DirectX settings, including the version of DirectX that is installed and the device driver versions?
a. intupd
b. diagog
c. dxdiag
d. chkdsk

Windows Related

A

C dxdiag

24
Q

How does communication occur in simplex mode?

A

Two separate channels are used for transmitting and receiving the signal.

25
Q

How does communication occur in full-duplex mode?

A

Signals can be transmitted and received through the same channel at the same time.

26
Q

Which switch in the CHKDSK program in Windows directs CHKDSK to skip the checks that compare directory entries to their corresponding file record segments?

A

/I (Aye not Ell) Performs a less vigorous check of index entries.

27
Q

Which file system should you use to format a volume to enable disk quota on that volume?

A

NTFS

28
Q

What are the minimum hardware requirements for the 32-bit versions of Windows 10?

A
  • 1 Gigahertz (GHz) processor
  • 1 GBRAM
  • 16 GB available hard drive space
  • DirectX 9 graphics card with WDDM 1.0 or higher driver
29
Q

What is the common name used for a volume containing the startup files?

A

System Volume

30
Q

What is the purpose of the convert command-line utility?

A

To convert a FAT partition to an NTFS partition.

31
Q

What should you use to restore files on a Mac computer?

A

Time Machine (the built in system restore program)

32
Q

Which drive on a partition cannot be marked as active?

A

The logical drive

33
Q

Which Windows command shows the Resultant Set of Policy (RsoP) information for a user and computer?

A

gpresult = This command line tool displays the Resultant Set of Policy (RSoP) information for a target user and computer.

34
Q

True or False

The main difference between the Linux ifconfig and iwconfig commands is that ifconfig is for wireless interfaces and the iwconfig command is used for wired interfaces.

Linux all the way

A

FAAALSE
Swap those explanations and you’ve got the right answer.
* ifconfig = Is NOT specific to either wired or wireless management/configuration, but does NOT include wireless specific tools. It is a more general network configuration tool.
* iwconfig is a similar tool to ifconfig in Unix systems, but is ONLY utilized to work with the wireless network of the system.

35
Q

What does the Linux cmkdir command do?
a. Allows the user to communicate with Doctor Ken directly via the command line.
b. Copies the master boot file into a custom directory.
c. Creates a Cryptographic File System directory. (CFS)

Linux all the way

A

C!
Creates a Cryptographic File System directory (CFS) where specified.

36
Q

Which One

Which Windows utility is used to create answer files for unattended installations?
{ setupmgr.exe ~OR~ msconfig }

A

SETUPMGR.EXE

37
Q

What are the 3 recycling or repurposing methods listed on the A+ exam guide?

A
  1. Low-Level Formatting
  2. Overwrite
  3. Drive Wipe
38
Q

What should a technician do when facing an error “SSL certificates are no longer valid” ?

A

Clear the SSL slate in the browser.

39
Q

Which command-line utility in Windows can you use to display or alter the compression of files on NTFS partitions?

A

compact

40
Q

What is a .vbs file?

A

A Visual Basic Script file

41
Q

What does the Linux { cmkdir } command do?

A

It creates a Cryptographic File System (CFS) directory

42
Q

According to the A+ exam guide, what are the four types of regulated data?

A
  • PII = Personally Identifiable Information
  • PCI = Payment Card Industry
  • GDPR = General Data Protection Regulation (EU policy)
  • PHI = Protected Health Information