Exam Cram A - CompTIA A+ 1002 Flashcards

1
Q
  • Which of the following are Microsoft Operating Systems? (Choose ALL Correct Answers)
Windows 8.1
iOS
10 Version 1803
Android
Linux
Windows 7
A

Windows 8.1
10 Version 1803
Windows 7

Explanation:
Windows 8.1, Windows 10 (version 1803), and Windows 7 are all Microsoft operating systems that you should know for the exam.

Incorrect Answers:
iOS is the operating system Apple uses on its mobile devices.

Android is the competitor of iOS and is an open-source operating system used on many other manufacturers’ mobile devices. Android is developed from Linux.

The original Linux was made for PCs with the goal of being a freely accessible, open-source platform; today it is more commonly found in server form. Okay, that was an easy one…moving on!

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 155). Pearson Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the default file system used by Windows?

FAT32
CDFS
NTFS
exFAT

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where is the Notification Area located in Windows?

In the System Properties dialog box
In the System32 folder
On the Taskbar
Within the Start Menu

A

On the Taskbar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the minimum amount of RAM needed to install a 64-bit version of Windows 10?

512 MB
1 GB
2 GB
4 GB

A

2 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In Windows, an MMC is blank by default. Which of the following should be added to the MMC to populate it with Programs?

Applets
Files
Directories
Snap-ins

A

Snap-ins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Which of the following files is the boot loader in Windows?

Winload.exe
BCD
Setup.exe
Ntoskrnl.exe

A

Winload.exe

Explanation:
Winload.exe is the Windows boot loader program for Windows 10, 8, and 7. It is located in %systemroot%\System32 (which is usually C:\Windows\System32). It works in conjunction with the Bootmgr file (Windows Boot Manager). Bootmgr is the first file to load in Windows. It reads the BCD and displays an OS menu (if there is more than one OS).

Incorrect Answers:
The BCD is the Boot Configuration Data store; it is the successor to boot.ini.

Setup.exe is the default name of the file that starts installations of Windows and many other programs.

Ntoskrnl.exe is the main system file of Windows; without it, the system would crash and the file would have to be replaced or repaired.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 156). Pearson Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which specific tool enables you to create a partition in Windows?

Disk Management
Format Command
Computer Management
Disk Cleanup

A

Disk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of partition should an OS be installed to?

Primary
Extended
Dynamic
Logical Drive

A

Primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following tools enables you to find out how much memory a particular application is using?

Msconfig
Task Manager
chkdsk
System Information

A

Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following features is used to both start and stop services? (Select the Two Best Answers)

Computer Management
Task Manager
Performance Monitor
MMC
Msconfig
A

Computer Management
Task Manager

Explanation:
You can start, stop, and restart services within Computer Management > Services and Applications > Services. From there, right-click the service in question and configure it as you wish. You can also open Services by going to the Run prompt and typing services.msc.

The Task Manager can also be used to start and stop services, as well as to analyze the performance of the CPU, RAM, and the networking connections. You can also start and stop services with the net start / net stop and sc start / sc stop commands.

Incorrect Answers:
Performance Monitor analyzes the computer in much more depth than the Task Manager.

The MMC is the Microsoft Management Console, which is the index that can store other console windows such as Computer Management.

Among other things, Msconfig is used to enable/disable services, but not to start them.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 157). Pearson Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following user account permissions are needed to install device drivers on Windows?

Standard User
Guest
Administrator
Power Users

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following commands creates a New Directory in the Windows Command Prompt?

CD
MD
RD
SD

A

MD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Which of the following commands is entered at the Command Prompt to learn more about the dir command? (Select the Two Best Answers)

dir help
help dir
dir /?
dir man

A

help dir
dir /?

Explanation:
To learn more about any command in Windows, open the Command Prompt, type the command and then /?, or type help dir.

Incorrect Answers:
dir help would attempt to find the file named HELP within the current directory.

dir man would most likely result in a “file not found” error. MAN pages are help pages used in Linux and macOS.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 157). Pearson Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which interface is used to launch the ipconfig command?

Command Prompt
Control Panel
MMC
Task Manager

A

Command Prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A customer’s computer is using FAT32. Which file system can you upgrade it to when using the Convert Command?

NTFS
ext4
exFAT
NFS

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following can be used to keep hard drives free of errors and ensure that Windows runs efficiently? (Select the Two Best Answers)

Disk Management
Disk Defragmenter
Check Disk
System Restore
Task Scheduler
A

Disk Defragmenter

Check Disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Windows Recovery Environment known as? (Select the Two Best Answers)

WinRE
Recovery Console
Advanced Boot Options
System Recovery Options

A

WinRE
System Recovery Options

Explanation:
The Windows Recovery Environment (Windows RE or WinRE) is also known as System Recovery Options. From here, you can restore the system, fix file errors, and work in an unprotected Command Prompt.

Incorrect Answers:
The Recovery Console is the predecessor of WinRE, in the deprecated Windows XP.

Advanced Boot Options is the menu that you can access by pressing F8. It is also referred to as ABOM, and in Windows 8/8.1/10 is known as Startup Settings.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 158). Pearson Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which log file contains information about Windows setup errors?

setupact. log
setuperr. log
unattend. xml
diskmgmt. msc

A

setuperr.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • Which of the following represents the RAM limitation of Windows 8.1 Pro 64-bit?

4 GB
128 GB
512 GB
2 TB

A

512 GB

Explanation:
The physical memory limit of Windows 8.1 Pro is 512 GB on a 64-bit system. That is also the RAM limit for Windows 8.1 Enterprise; however, Windows 8.1 standard can access only 128 GB of RAM. Even though 64-bit CPUs can address a realistic maximum of 256 terabytes (TB), software is usually far more limited (as of the writing of this book in 2019).

Incorrect Answers:
Windows 10 Home can access 128 GB. Windows 10 Pro and Education can access 2 TB of RAM.

Windows 10 Enterprise can access 6 TB. The maximum that Windows 7 64-bit Professional, Ultimate, and Enterprise can access is 192 GB of RAM.

Keep in mind that 32-bit versions of Windows 8.1 (and other versions of Windows) can access only a maximum of 4 GB of RAM, due to the limitations of 32-bit CPUs.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (pp. 158-159). Pearson Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A customer’s Device Manager shows an arrow pointing down over one of the devices. What does this tell you?

The Device Driver has not been installed.
The Device is not recognized.
The Device is Disabled
The Device is in Queue to be Deleted

A

The Device is Disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is NOT an advantage of NTFS over FAT32?

NTFS supports file encryption.
NTFS supports larger file sizes.
NTFS supports larger volumes.
NTFS supports more file formats.

A

NTFS supports more file formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A coworker just installed a second drive in his Windows computer. However, he does not see the drive in Explorer. What did he forget to do? (Select the Three Best Answers)

Format the Drive
Partition the Drive
Run FDISK
Initialize the Drive
Setup the Drive in UEFI/BIOS
A

Format the Drive
Partition the Drive
Initialize the Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How would you create a Restore Point in Windows?

Run Disk Defragmenter from the MMC
Run Backup and Restore from the Control Panel
Run the System Restore program from System Properties
Run the Disk Cleanup program from the System Properties

A

Run the System Restore program from System Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following tasks CANNOT be performed from the Printer Properties Screen?

Modifying Spool Settings
Adding Ports
Pausing Printing
Enabling Sharing

A

Pausing Printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You are setting up auditing on a Windows Computer. If it’s set up properly, which of the following logs should contain entries?

Application Log
System Log
Security Log
Maintenance Log

A

Security Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which type of virus propagates itself by tunneling through the Internet and networks?

Macro
Phishing
Trojan
Worm

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which component of Windows enables users to perform common tasks as nonadministrators and, when necessary, as administrators without having to switch users, log off, or use Run As?

USMT
UAC
USB
VNC

A

UAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following tasks can be performed to secure your WAP/Router? (Select ALL That Apply)

Changing the Default SSID Name
Turning off SSID Broadcasting
Enabling DHCP
Disabling DHCP

A

Changing the Default SSID Name
Turning off SSID Broadcasting
Disabling DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When you connect to a website to make a purchase by credit card, you want to make sure the website is secure. Which of the following statements best describes how to determine whether a site is secure? (Select the Two Best Answers)

You should look for the padlock (in the locked position) toward the top or bottom of the screen.
You should look for the padlock (in the unlocked position) toward the top or bottom of the screen.
You should look for the Protocol HTTP in the address or URL bar.
You should look for the Protocol HTTPS in the address or URL bar.

A

You should look for the padlock (in the locked position) toward the top or bottom of the screen.
You should look for the Protocol HTTPS in the address or URL bar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which type of software helps protect against viruses that are attached to email?

Firewall Software
Antivirus Software
Internet Explorer
Hardware Firewall

A

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is an example of Social Engineering?

Asking for a Username and Password over the phone.
Using someone else’s unsecured Wireless Network
Hacking into a Router
A Virus

A

Asking for a Username and Password over the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Where are software-based Firewalls most commonly implemented?

On Routers
On Servers
On Clients
On Switches

A

On Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Making data appear as if it is coming from somewhere other than its original source is known as which of the following terms?

Impersonation
Phishing
Zero-Day
Spoofing

A

Spoofing

34
Q

A Fingerprint Reader is known as which type of security technology?

Biometrics
Smart Card
Barcode Reader
SSID

A

Biometrics

35
Q

Which of the following is the most secure password?

marquisdesod
Marqu1sDeS0d
MarquisDeSod
Marqu1s_De_S0d_ver_2

A

Marqu1s_De_S0d_ver_2

36
Q

Which shortcut key combination immediately locks Windows?

CTRL + ALT + DEL
Windows + R
Windows + M
Windows + L

A

Windows + L

37
Q

Which of the following is the most secure file system in Windows?

ext4
exFAT
NTFS
FAT32

A

NTFS

38
Q

Which of the following is the most secure for your Wireless Networks?

WEP
WPA2
TKIP
WPA

A

WPA2

39
Q

Which of the following terms refers to when people are manipulated into giving access to Network Resources?

Shoulder Surfing
Social Engineering
Phishing
Spear Phishing

A

Social Engineering

40
Q
  • A customer’s Windows computer needs a new larger, faster hard drive. Another tech in your company installs the new drive and then formats the old drive before delivering it to you for disposal. How secure is the customer’s data?

Confidential
Very Secure
Secure
Completely Secured

A

Very Secure

Explanation:
The data is very insecure. Many tools can recover data from a drive after it is formatted. Some companies will “low-level” format the drive, or sanitize the drive (as opposed to a standard format in Windows, for example) and keep it in storage indefinitely. The organization might go further and use data wiping software; in fact, this might be a policy for the organization. Always check your organization’s policies to be sure you are disposing of or recycling hard drives properly.

Incorrect Answers:
Confidential is a term used to classify data. For example, personally identifiable information should be kept confidential (where only the appropriate personnel can access it).

Secure is a relative term. Remember: nothing is ever Completely Secured.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 163). Pearson Education. Kindle Edition.

41
Q

Which of the following offers hardware-based authentication?

NTFS
Smart Card
Strong Passwords
Encrypted Passwords

A

Smart Card

42
Q

Which protocol encrypts transactions through a Website?

HTTP
SSL
PuTTY
Kerberos

A

SSL

43
Q
  • Which of the following is a Common Local Security Policy?

Use of RAID
Password Length
Router Passwords
Use of a Password to Log In

A

Password Length

Explanation:
Common local security policies include password length, duration, and complexity. Just the use of a password doesn’t constitute a password policy. An example of a password policy would be when an organization mandates that passwords be 15 characters in length with at least 1 capital letter, 1 number, and 1 special character. In Windows you would access Local Security Policy > Security Settings > Account Policies > Password Policy to make changes to these things.

Incorrect Answers:
Simply having a RAID array is not a security policy, though security policies often define how the RAID array will be used.

Again, just having passwords (such as router passwords or other passwords used to log in) does not establish policy. Modifying how passwords are selected and enforced is a security policy.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 164). Pearson Education. Kindle Edition.

44
Q

A coworker downloads a game that ends up stealing information from the computer system. What is this known as?

Worm
Spam
Trojan
Spyware

A

Trojan

45
Q

Which of the following is an open-source operating system?

Android
iOS
Windows 8.1
macOS

A

Android

46
Q

Where can you obtain applications for Mobile Devices? (Select the Three Best Answers)

Spotlight
App Store
Google Play
iTunes

A

App Store
Google Play
iTunes

47
Q

You need to locate a mobile device that was stolen. Which technology can aid in this?

GPS
Screen Orientation
Passcode Locks
Gmail

A

GPS

48
Q

Which kinds of data are typically synchronized on a smartphone? (Select the Two Best Answers)

Contacts
PHP Pages
Email
SQL Databases

A

Contacts

Email

49
Q

Which of the following is the second step of the A+ Troubleshooting Theory?

Identify the Problem
Establish a Probable Cause
Test the Theory
Document

A

Establish a Probable Cause

50
Q

You successfully modified the Registry on a computer’s PC. Now the customer’s system gets onto the Internet normally. Which of the following steps should be performed next?

Bill the Customer
Move on to the next computer
Document your Solution
Run Disk Defrag

A

Document your Solution

51
Q

Buss gets an error that says “Error Log Full.” Where should you go to clear this error log?

Device Manager
System Info
Recovery Console
Event Viewer

A

Event Viewer

52
Q

Which of the following tools checks protected system files?

chkdsk
dism
scandisk
SFC

A

SFC

53
Q

After installing a new hard drive on a Windows computer, Len tries to format the drive. Windows does not show the format option in Disk Management. What did Len forget to do first?

Run chkdsk
Partition the drive
Defragment the drive
Copy system files

A

Partition the drive

54
Q

Which Windows System Recovery option attempts to automatically fix problems?

System Restore
Startup Repair
File History
Reset Your PC

A

Startup Repair

55
Q

Which utility enables you to troubleshoot an error with a file such as ntoskrnl.exe?

Registry
Event Viewer
REGSVR32
Terminal

A

Event Viewer

56
Q

A blue screen is most often caused by _____?

Driver Failure
Memory Failure
Hard Drive Failure
CD-ROM Failure

A

Driver Failure

57
Q

A Tech is installing a program on a Windows computer and the installation fails. Which of the following statements describes the next best step?

Run the installer as an Administrator
Contact the programs manufacturer
Reinstall Windows on the Computer
Upgrade to the Latest Version of Windows

A

Run the installer as an Administrator

58
Q

Which of the following statements best describes how to apply spray cleaner to a monitor?

Spray the cleaner directly on the monitor screen
Spray the cleaner on the top of the monitor and wipe down
Spray evenly on the monitor
Spray the cleaner on a clean, lint-free cloth first

A

Spray the cleaner on a clean, lint-free cloth first

59
Q

You and a coworker are running network cables above the drop ceiling. The coworker accidently touches a live AC power line and is thrown off the ladder and onto the ground. He is dazed and can’t stand. He is no longer near the AC power line. Which of the following statements best describes the first step you should take?

Cut the power to the breaker
Move the coworker farther down the hall
Apply CPR
Call 911

A

Call 911

60
Q

A computer you are working on has alot of dust inside it. Which of the following statements best describes how to clean this?

Disassemble the power supply and remove the dust
Use a household vacuum to clean up the dust
Use a surface dust cleaning solution
Use compressed air to remove the dust

A

Use compressed air to remove the dust

61
Q

You are working on a very old printer and it begins to smoke. Which of the following statements best describest the first step you should take?

Turn off the Printer
Call 911
Unplug the Printer
Call Maintenance
Tell the Printer it is bad to smoke
A

Unplug the Printer

62
Q

Which of the following statements best describes the recommended method for handling an empty toner cartridge?

Throw it away
Incinerate it
Refill it
Recycle it

A

Recycle it

63
Q

One of your technicians is on a service call and is dealing with a furious customer who has been shouting loudly. The technician tries but cannot calm down the customer. Which of the following statements best describes the next step the technician should take?

He should let the customer continue to shout; sooner or later the customer will get tired and calm down
He should call the supervisor and complain
He should leave the customer site and document the incident
He should shout back ad the customer in an attempt to regain control

A

He should leave the customer site and document the incident

64
Q

While you are working at a customer site, a friend calls you on your cell phone. Which of the following statements best describes the recommended course of action?

Ignore the call for now
Go outside and take the call
Answer the phone as quietly as possible
Text your friend

A

Ignore the call for now

65
Q
  • Which of the following tools is used when setting the computer to boot with the Selected Startup feature?

Task Manager
Windows RE
Safe Mode
Msconfig

A

Msconfig

Explanation:
Msconfig enables you to modify the startup selection. You can boot the computer in different modes with Msconfig. You can also enable and disable services.

Incorrect Answers:
The Task Manager gives you a snapshot of your system’s performance and allows you to shut down applications (tasks) or processes, even if the application is hanging or frozen.

Windows RE is the Windows Recovery Environment, a special repair environment that is used to fix issues in the operating system. From here, you can fix system file issues and repair the boot sector, along with GPT and MBR-related issues.

Safe Mode is one of the options in the Startup Settings/Advanced Boot Options menu. It starts the computer with a basic set of drivers so that you can troubleshoot why devices have failed. It is also instrumental when dealing with viruses.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (pp. 168-169). Pearson Education. Kindle Edition.

66
Q

Which of the following file extensions is used when saving PowerShell scripts?

.js
vbs
.ps1
.py

A

.ps1

67
Q

You have been given the task of installing a new hard drive on a server for a customer. The customer will be supervising your work. Which of the following questions should you ask the customer first?

What is the Administrator Password?
Are there any current backups?
Do you want me to shut down the Server?
Which version of Windows Server is this?

A

Are there any current backups?

68
Q

You just upgraded the president’s computer’s video driver. Now, the Windows 10 system will not boot. Which of the following steps should be taken first?

Access the Windows RE command prompt
Boot into Safe Mode and roll back the driver
Reinstall the OS
Boot into Directory Services Restore Mode

A

Boot into Safe Mode and roll back the driver

69
Q

Which tool is used to analyze and diagnose a video card, including its DirectX version?

Device Manager
DxDiag
Services.msc
USMT

A

DxDiag

70
Q

Which of the following statements best describes a common risk when installing Windows Drivers that are unsigned?

System stability may be compromised
Files might be cross-linked
The drive might become fragmented
Physical damage to the device might occur

A

System stability may be compromised

71
Q

Which of the following settings must be established when you want to make a secure wireless connection? (Select ALL That Apply)

The brand of access point
The wireless standard used
The encryption standard used
The SSID of the Access Point

A

The encryption standard used

The SSID of the access point

72
Q
  • Which Windows utility is used to prepare a drive image for duplication across the network?

Robocopy
Sysprep
Ghost
Image Clone

A

Sysprep

Explanation:
Sysprep is one of the utilities built into Windows for image deployment over the network. Sysprep preps the system to be moved as an image file.

Incorrect Answers:
Ghost and Image Clone are third-party offerings.

Robocopy copies entire directories (in the same physical order, too).

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 170). Pearson Education. Kindle Edition.

73
Q

In Windows, when will a computer dump the physical memory?

When the wrong processor is installed
When a device is missing drivers
When the computer is shut down improperly
When the computer detects a condition from which it cannot recover

A

When the computer detects a condition from which it cannot recovery

74
Q

When a person takes control of a session between a server and a client, it is known as which type of attack?

DDoS
Brute Force
Session Hacking
Malicious Software

A

Session Hacking

75
Q
  • The message “The Windows Boot Configuration Data File is Missing Required Information” appears on the screen. Which command can repair this issue?

bootrec /fixboot
bootrec /fixmbr
bootrec /rebuildbcd
boot\bcd

A

bootrec /rebuildbcd

Explanation:
Bootrec /rebuildbcd attempts to rebuild the boot configuration store.

Incorrect Answers:
Bootrec /fixboot is one of the methods you can try to repair bootmgr.exe in Windows.

Bootrec /fixmbr rewrites the master boot record in a Windows system that has an MBR-based hard drive (doesn’t affect the more common GPT-based drive).

boot\bcd is where the boot configuration store is located.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.

76
Q

Which of the following should be performed during a hard drive replacement to best maintain data privacy?

Completely erase the old drive prior to disposal
Format the new drive twice prior to installation
Use only FAT32 file system when formatting the new drives
Install antivirus software on the computer before removing the old hard drive

A

Completely erase the old drive prior to disposal

77
Q
  • Which tool is used to backup data on the C: drive in Windows 10?

Backup and Restore
BitLocker
Time Machine
File History

A

File History

Explanation:
The Windows 10 and 8 File History utility (accessible in the Control Panel) enables a user to back up files or the entire PC.

Incorrect Answers:
The File History utility is the successor to Windows 7’s Backup and Restore.

BitLocker is Microsoft’s full drive encryption software.

Time Machine is the backup program that is built into macOS.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.

78
Q
  • Which of the following is the minimum processor requirement for Windows 10?

32 GB
1 GHz
2 GHz
2 GB

A

1 GHz

Explanation: 
Windows 10 (and Windows 8 and Windows 7) requires a minimum processor frequency of 1 GHz. 

Incorrect Answers:
Windows 10 64-bit requires 32 GB of hard drive space.

As of the writing of this book, 2 GHz is not a valid answer for Windows.

The minimum RAM requirement for 64-bit versions of Windows is 2 GB.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.

79
Q

You create an answer file to aid in installing Windows. Which type of installation are you performing? (Select the Best Answer)

Drive image installation
USB installation
Multiboot installation
Unattended installation

A

Unattended installation

80
Q

Which of the following utilities can be used to view the startup programs?

ipconfig
ping
regedit
dxdiag

A

regedit