Exam Cram A - CompTIA A+ 1002 Flashcards
- Which of the following are Microsoft Operating Systems? (Choose ALL Correct Answers)
Windows 8.1 iOS 10 Version 1803 Android Linux Windows 7
Windows 8.1
10 Version 1803
Windows 7
Explanation:
Windows 8.1, Windows 10 (version 1803), and Windows 7 are all Microsoft operating systems that you should know for the exam.
Incorrect Answers:
iOS is the operating system Apple uses on its mobile devices.
Android is the competitor of iOS and is an open-source operating system used on many other manufacturers’ mobile devices. Android is developed from Linux.
The original Linux was made for PCs with the goal of being a freely accessible, open-source platform; today it is more commonly found in server form. Okay, that was an easy one…moving on!
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 155). Pearson Education. Kindle Edition.
Which of the following is the default file system used by Windows?
FAT32
CDFS
NTFS
exFAT
NTFS
Where is the Notification Area located in Windows?
In the System Properties dialog box
In the System32 folder
On the Taskbar
Within the Start Menu
On the Taskbar
Which of the following is the minimum amount of RAM needed to install a 64-bit version of Windows 10?
512 MB
1 GB
2 GB
4 GB
2 GB
In Windows, an MMC is blank by default. Which of the following should be added to the MMC to populate it with Programs?
Applets
Files
Directories
Snap-ins
Snap-ins
- Which of the following files is the boot loader in Windows?
Winload.exe
BCD
Setup.exe
Ntoskrnl.exe
Winload.exe
Explanation:
Winload.exe is the Windows boot loader program for Windows 10, 8, and 7. It is located in %systemroot%\System32 (which is usually C:\Windows\System32). It works in conjunction with the Bootmgr file (Windows Boot Manager). Bootmgr is the first file to load in Windows. It reads the BCD and displays an OS menu (if there is more than one OS).
Incorrect Answers:
The BCD is the Boot Configuration Data store; it is the successor to boot.ini.
Setup.exe is the default name of the file that starts installations of Windows and many other programs.
Ntoskrnl.exe is the main system file of Windows; without it, the system would crash and the file would have to be replaced or repaired.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 156). Pearson Education. Kindle Edition.
Which specific tool enables you to create a partition in Windows?
Disk Management
Format Command
Computer Management
Disk Cleanup
Disk Management
Which type of partition should an OS be installed to?
Primary
Extended
Dynamic
Logical Drive
Primary
Which of the following tools enables you to find out how much memory a particular application is using?
Msconfig
Task Manager
chkdsk
System Information
Task Manager
Which of the following features is used to both start and stop services? (Select the Two Best Answers)
Computer Management Task Manager Performance Monitor MMC Msconfig
Computer Management
Task Manager
Explanation:
You can start, stop, and restart services within Computer Management > Services and Applications > Services. From there, right-click the service in question and configure it as you wish. You can also open Services by going to the Run prompt and typing services.msc.
The Task Manager can also be used to start and stop services, as well as to analyze the performance of the CPU, RAM, and the networking connections. You can also start and stop services with the net start / net stop and sc start / sc stop commands.
Incorrect Answers:
Performance Monitor analyzes the computer in much more depth than the Task Manager.
The MMC is the Microsoft Management Console, which is the index that can store other console windows such as Computer Management.
Among other things, Msconfig is used to enable/disable services, but not to start them.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 157). Pearson Education. Kindle Edition.
Which of the following user account permissions are needed to install device drivers on Windows?
Standard User
Guest
Administrator
Power Users
Administrator
Which of the following commands creates a New Directory in the Windows Command Prompt?
CD
MD
RD
SD
MD
- Which of the following commands is entered at the Command Prompt to learn more about the dir command? (Select the Two Best Answers)
dir help
help dir
dir /?
dir man
help dir
dir /?
Explanation:
To learn more about any command in Windows, open the Command Prompt, type the command and then /?, or type help dir.
Incorrect Answers:
dir help would attempt to find the file named HELP within the current directory.
dir man would most likely result in a “file not found” error. MAN pages are help pages used in Linux and macOS.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 157). Pearson Education. Kindle Edition.
Which interface is used to launch the ipconfig command?
Command Prompt
Control Panel
MMC
Task Manager
Command Prompt
A customer’s computer is using FAT32. Which file system can you upgrade it to when using the Convert Command?
NTFS
ext4
exFAT
NFS
NTFS
Which of the following can be used to keep hard drives free of errors and ensure that Windows runs efficiently? (Select the Two Best Answers)
Disk Management Disk Defragmenter Check Disk System Restore Task Scheduler
Disk Defragmenter
Check Disk
What is Windows Recovery Environment known as? (Select the Two Best Answers)
WinRE
Recovery Console
Advanced Boot Options
System Recovery Options
WinRE
System Recovery Options
Explanation:
The Windows Recovery Environment (Windows RE or WinRE) is also known as System Recovery Options. From here, you can restore the system, fix file errors, and work in an unprotected Command Prompt.
Incorrect Answers:
The Recovery Console is the predecessor of WinRE, in the deprecated Windows XP.
Advanced Boot Options is the menu that you can access by pressing F8. It is also referred to as ABOM, and in Windows 8/8.1/10 is known as Startup Settings.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 158). Pearson Education. Kindle Edition.
Which log file contains information about Windows setup errors?
setupact. log
setuperr. log
unattend. xml
diskmgmt. msc
setuperr.log
- Which of the following represents the RAM limitation of Windows 8.1 Pro 64-bit?
4 GB
128 GB
512 GB
2 TB
512 GB
Explanation:
The physical memory limit of Windows 8.1 Pro is 512 GB on a 64-bit system. That is also the RAM limit for Windows 8.1 Enterprise; however, Windows 8.1 standard can access only 128 GB of RAM. Even though 64-bit CPUs can address a realistic maximum of 256 terabytes (TB), software is usually far more limited (as of the writing of this book in 2019).
Incorrect Answers:
Windows 10 Home can access 128 GB. Windows 10 Pro and Education can access 2 TB of RAM.
Windows 10 Enterprise can access 6 TB. The maximum that Windows 7 64-bit Professional, Ultimate, and Enterprise can access is 192 GB of RAM.
Keep in mind that 32-bit versions of Windows 8.1 (and other versions of Windows) can access only a maximum of 4 GB of RAM, due to the limitations of 32-bit CPUs.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (pp. 158-159). Pearson Education. Kindle Edition.
A customer’s Device Manager shows an arrow pointing down over one of the devices. What does this tell you?
The Device Driver has not been installed.
The Device is not recognized.
The Device is Disabled
The Device is in Queue to be Deleted
The Device is Disabled
Which of the following is NOT an advantage of NTFS over FAT32?
NTFS supports file encryption.
NTFS supports larger file sizes.
NTFS supports larger volumes.
NTFS supports more file formats.
NTFS supports more file formats.
A coworker just installed a second drive in his Windows computer. However, he does not see the drive in Explorer. What did he forget to do? (Select the Three Best Answers)
Format the Drive Partition the Drive Run FDISK Initialize the Drive Setup the Drive in UEFI/BIOS
Format the Drive
Partition the Drive
Initialize the Drive
How would you create a Restore Point in Windows?
Run Disk Defragmenter from the MMC
Run Backup and Restore from the Control Panel
Run the System Restore program from System Properties
Run the Disk Cleanup program from the System Properties
Run the System Restore program from System Properties
Which of the following tasks CANNOT be performed from the Printer Properties Screen?
Modifying Spool Settings
Adding Ports
Pausing Printing
Enabling Sharing
Pausing Printing
You are setting up auditing on a Windows Computer. If it’s set up properly, which of the following logs should contain entries?
Application Log
System Log
Security Log
Maintenance Log
Security Log
Which type of virus propagates itself by tunneling through the Internet and networks?
Macro
Phishing
Trojan
Worm
Worm
Which component of Windows enables users to perform common tasks as nonadministrators and, when necessary, as administrators without having to switch users, log off, or use Run As?
USMT
UAC
USB
VNC
UAC
Which of the following tasks can be performed to secure your WAP/Router? (Select ALL That Apply)
Changing the Default SSID Name
Turning off SSID Broadcasting
Enabling DHCP
Disabling DHCP
Changing the Default SSID Name
Turning off SSID Broadcasting
Disabling DHCP
When you connect to a website to make a purchase by credit card, you want to make sure the website is secure. Which of the following statements best describes how to determine whether a site is secure? (Select the Two Best Answers)
You should look for the padlock (in the locked position) toward the top or bottom of the screen.
You should look for the padlock (in the unlocked position) toward the top or bottom of the screen.
You should look for the Protocol HTTP in the address or URL bar.
You should look for the Protocol HTTPS in the address or URL bar.
You should look for the padlock (in the locked position) toward the top or bottom of the screen.
You should look for the Protocol HTTPS in the address or URL bar.
Which type of software helps protect against viruses that are attached to email?
Firewall Software
Antivirus Software
Internet Explorer
Hardware Firewall
Antivirus Software
Which of the following is an example of Social Engineering?
Asking for a Username and Password over the phone.
Using someone else’s unsecured Wireless Network
Hacking into a Router
A Virus
Asking for a Username and Password over the phone.
Where are software-based Firewalls most commonly implemented?
On Routers
On Servers
On Clients
On Switches
On Clients
Making data appear as if it is coming from somewhere other than its original source is known as which of the following terms?
Impersonation
Phishing
Zero-Day
Spoofing
Spoofing
A Fingerprint Reader is known as which type of security technology?
Biometrics
Smart Card
Barcode Reader
SSID
Biometrics
Which of the following is the most secure password?
marquisdesod
Marqu1sDeS0d
MarquisDeSod
Marqu1s_De_S0d_ver_2
Marqu1s_De_S0d_ver_2
Which shortcut key combination immediately locks Windows?
CTRL + ALT + DEL
Windows + R
Windows + M
Windows + L
Windows + L
Which of the following is the most secure file system in Windows?
ext4
exFAT
NTFS
FAT32
NTFS
Which of the following is the most secure for your Wireless Networks?
WEP
WPA2
TKIP
WPA
WPA2
Which of the following terms refers to when people are manipulated into giving access to Network Resources?
Shoulder Surfing
Social Engineering
Phishing
Spear Phishing
Social Engineering
- A customer’s Windows computer needs a new larger, faster hard drive. Another tech in your company installs the new drive and then formats the old drive before delivering it to you for disposal. How secure is the customer’s data?
Confidential
Very Secure
Secure
Completely Secured
Very Secure
Explanation:
The data is very insecure. Many tools can recover data from a drive after it is formatted. Some companies will “low-level” format the drive, or sanitize the drive (as opposed to a standard format in Windows, for example) and keep it in storage indefinitely. The organization might go further and use data wiping software; in fact, this might be a policy for the organization. Always check your organization’s policies to be sure you are disposing of or recycling hard drives properly.
Incorrect Answers:
Confidential is a term used to classify data. For example, personally identifiable information should be kept confidential (where only the appropriate personnel can access it).
Secure is a relative term. Remember: nothing is ever Completely Secured.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 163). Pearson Education. Kindle Edition.
Which of the following offers hardware-based authentication?
NTFS
Smart Card
Strong Passwords
Encrypted Passwords
Smart Card
Which protocol encrypts transactions through a Website?
HTTP
SSL
PuTTY
Kerberos
SSL
- Which of the following is a Common Local Security Policy?
Use of RAID
Password Length
Router Passwords
Use of a Password to Log In
Password Length
Explanation:
Common local security policies include password length, duration, and complexity. Just the use of a password doesn’t constitute a password policy. An example of a password policy would be when an organization mandates that passwords be 15 characters in length with at least 1 capital letter, 1 number, and 1 special character. In Windows you would access Local Security Policy > Security Settings > Account Policies > Password Policy to make changes to these things.
Incorrect Answers:
Simply having a RAID array is not a security policy, though security policies often define how the RAID array will be used.
Again, just having passwords (such as router passwords or other passwords used to log in) does not establish policy. Modifying how passwords are selected and enforced is a security policy.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 164). Pearson Education. Kindle Edition.
A coworker downloads a game that ends up stealing information from the computer system. What is this known as?
Worm
Spam
Trojan
Spyware
Trojan
Which of the following is an open-source operating system?
Android
iOS
Windows 8.1
macOS
Android
Where can you obtain applications for Mobile Devices? (Select the Three Best Answers)
Spotlight
App Store
Google Play
iTunes
App Store
Google Play
iTunes
You need to locate a mobile device that was stolen. Which technology can aid in this?
GPS
Screen Orientation
Passcode Locks
Gmail
GPS
Which kinds of data are typically synchronized on a smartphone? (Select the Two Best Answers)
Contacts
PHP Pages
Email
SQL Databases
Contacts
Which of the following is the second step of the A+ Troubleshooting Theory?
Identify the Problem
Establish a Probable Cause
Test the Theory
Document
Establish a Probable Cause
You successfully modified the Registry on a computer’s PC. Now the customer’s system gets onto the Internet normally. Which of the following steps should be performed next?
Bill the Customer
Move on to the next computer
Document your Solution
Run Disk Defrag
Document your Solution
Buss gets an error that says “Error Log Full.” Where should you go to clear this error log?
Device Manager
System Info
Recovery Console
Event Viewer
Event Viewer
Which of the following tools checks protected system files?
chkdsk
dism
scandisk
SFC
SFC
After installing a new hard drive on a Windows computer, Len tries to format the drive. Windows does not show the format option in Disk Management. What did Len forget to do first?
Run chkdsk
Partition the drive
Defragment the drive
Copy system files
Partition the drive
Which Windows System Recovery option attempts to automatically fix problems?
System Restore
Startup Repair
File History
Reset Your PC
Startup Repair
Which utility enables you to troubleshoot an error with a file such as ntoskrnl.exe?
Registry
Event Viewer
REGSVR32
Terminal
Event Viewer
A blue screen is most often caused by _____?
Driver Failure
Memory Failure
Hard Drive Failure
CD-ROM Failure
Driver Failure
A Tech is installing a program on a Windows computer and the installation fails. Which of the following statements describes the next best step?
Run the installer as an Administrator
Contact the programs manufacturer
Reinstall Windows on the Computer
Upgrade to the Latest Version of Windows
Run the installer as an Administrator
Which of the following statements best describes how to apply spray cleaner to a monitor?
Spray the cleaner directly on the monitor screen
Spray the cleaner on the top of the monitor and wipe down
Spray evenly on the monitor
Spray the cleaner on a clean, lint-free cloth first
Spray the cleaner on a clean, lint-free cloth first
You and a coworker are running network cables above the drop ceiling. The coworker accidently touches a live AC power line and is thrown off the ladder and onto the ground. He is dazed and can’t stand. He is no longer near the AC power line. Which of the following statements best describes the first step you should take?
Cut the power to the breaker
Move the coworker farther down the hall
Apply CPR
Call 911
Call 911
A computer you are working on has alot of dust inside it. Which of the following statements best describes how to clean this?
Disassemble the power supply and remove the dust
Use a household vacuum to clean up the dust
Use a surface dust cleaning solution
Use compressed air to remove the dust
Use compressed air to remove the dust
You are working on a very old printer and it begins to smoke. Which of the following statements best describest the first step you should take?
Turn off the Printer Call 911 Unplug the Printer Call Maintenance Tell the Printer it is bad to smoke
Unplug the Printer
Which of the following statements best describes the recommended method for handling an empty toner cartridge?
Throw it away
Incinerate it
Refill it
Recycle it
Recycle it
One of your technicians is on a service call and is dealing with a furious customer who has been shouting loudly. The technician tries but cannot calm down the customer. Which of the following statements best describes the next step the technician should take?
He should let the customer continue to shout; sooner or later the customer will get tired and calm down
He should call the supervisor and complain
He should leave the customer site and document the incident
He should shout back ad the customer in an attempt to regain control
He should leave the customer site and document the incident
While you are working at a customer site, a friend calls you on your cell phone. Which of the following statements best describes the recommended course of action?
Ignore the call for now
Go outside and take the call
Answer the phone as quietly as possible
Text your friend
Ignore the call for now
- Which of the following tools is used when setting the computer to boot with the Selected Startup feature?
Task Manager
Windows RE
Safe Mode
Msconfig
Msconfig
Explanation:
Msconfig enables you to modify the startup selection. You can boot the computer in different modes with Msconfig. You can also enable and disable services.
Incorrect Answers:
The Task Manager gives you a snapshot of your system’s performance and allows you to shut down applications (tasks) or processes, even if the application is hanging or frozen.
Windows RE is the Windows Recovery Environment, a special repair environment that is used to fix issues in the operating system. From here, you can fix system file issues and repair the boot sector, along with GPT and MBR-related issues.
Safe Mode is one of the options in the Startup Settings/Advanced Boot Options menu. It starts the computer with a basic set of drivers so that you can troubleshoot why devices have failed. It is also instrumental when dealing with viruses.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (pp. 168-169). Pearson Education. Kindle Edition.
Which of the following file extensions is used when saving PowerShell scripts?
.js
vbs
.ps1
.py
.ps1
You have been given the task of installing a new hard drive on a server for a customer. The customer will be supervising your work. Which of the following questions should you ask the customer first?
What is the Administrator Password?
Are there any current backups?
Do you want me to shut down the Server?
Which version of Windows Server is this?
Are there any current backups?
You just upgraded the president’s computer’s video driver. Now, the Windows 10 system will not boot. Which of the following steps should be taken first?
Access the Windows RE command prompt
Boot into Safe Mode and roll back the driver
Reinstall the OS
Boot into Directory Services Restore Mode
Boot into Safe Mode and roll back the driver
Which tool is used to analyze and diagnose a video card, including its DirectX version?
Device Manager
DxDiag
Services.msc
USMT
DxDiag
Which of the following statements best describes a common risk when installing Windows Drivers that are unsigned?
System stability may be compromised
Files might be cross-linked
The drive might become fragmented
Physical damage to the device might occur
System stability may be compromised
Which of the following settings must be established when you want to make a secure wireless connection? (Select ALL That Apply)
The brand of access point
The wireless standard used
The encryption standard used
The SSID of the Access Point
The encryption standard used
The SSID of the access point
- Which Windows utility is used to prepare a drive image for duplication across the network?
Robocopy
Sysprep
Ghost
Image Clone
Sysprep
Explanation:
Sysprep is one of the utilities built into Windows for image deployment over the network. Sysprep preps the system to be moved as an image file.
Incorrect Answers:
Ghost and Image Clone are third-party offerings.
Robocopy copies entire directories (in the same physical order, too).
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 170). Pearson Education. Kindle Edition.
In Windows, when will a computer dump the physical memory?
When the wrong processor is installed
When a device is missing drivers
When the computer is shut down improperly
When the computer detects a condition from which it cannot recover
When the computer detects a condition from which it cannot recovery
When a person takes control of a session between a server and a client, it is known as which type of attack?
DDoS
Brute Force
Session Hacking
Malicious Software
Session Hacking
- The message “The Windows Boot Configuration Data File is Missing Required Information” appears on the screen. Which command can repair this issue?
bootrec /fixboot
bootrec /fixmbr
bootrec /rebuildbcd
boot\bcd
bootrec /rebuildbcd
Explanation:
Bootrec /rebuildbcd attempts to rebuild the boot configuration store.
Incorrect Answers:
Bootrec /fixboot is one of the methods you can try to repair bootmgr.exe in Windows.
Bootrec /fixmbr rewrites the master boot record in a Windows system that has an MBR-based hard drive (doesn’t affect the more common GPT-based drive).
boot\bcd is where the boot configuration store is located.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.
Which of the following should be performed during a hard drive replacement to best maintain data privacy?
Completely erase the old drive prior to disposal
Format the new drive twice prior to installation
Use only FAT32 file system when formatting the new drives
Install antivirus software on the computer before removing the old hard drive
Completely erase the old drive prior to disposal
- Which tool is used to backup data on the C: drive in Windows 10?
Backup and Restore
BitLocker
Time Machine
File History
File History
Explanation:
The Windows 10 and 8 File History utility (accessible in the Control Panel) enables a user to back up files or the entire PC.
Incorrect Answers:
The File History utility is the successor to Windows 7’s Backup and Restore.
BitLocker is Microsoft’s full drive encryption software.
Time Machine is the backup program that is built into macOS.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.
- Which of the following is the minimum processor requirement for Windows 10?
32 GB
1 GHz
2 GHz
2 GB
1 GHz
Explanation: Windows 10 (and Windows 8 and Windows 7) requires a minimum processor frequency of 1 GHz.
Incorrect Answers:
Windows 10 64-bit requires 32 GB of hard drive space.
As of the writing of this book, 2 GHz is not a valid answer for Windows.
The minimum RAM requirement for 64-bit versions of Windows is 2 GB.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.
You create an answer file to aid in installing Windows. Which type of installation are you performing? (Select the Best Answer)
Drive image installation
USB installation
Multiboot installation
Unattended installation
Unattended installation
Which of the following utilities can be used to view the startup programs?
ipconfig
ping
regedit
dxdiag
regedit