Exam Cram A - CompTIA A+ 1002 Flashcards
- Which of the following are Microsoft Operating Systems? (Choose ALL Correct Answers)
Windows 8.1 iOS 10 Version 1803 Android Linux Windows 7
Windows 8.1
10 Version 1803
Windows 7
Explanation:
Windows 8.1, Windows 10 (version 1803), and Windows 7 are all Microsoft operating systems that you should know for the exam.
Incorrect Answers:
iOS is the operating system Apple uses on its mobile devices.
Android is the competitor of iOS and is an open-source operating system used on many other manufacturers’ mobile devices. Android is developed from Linux.
The original Linux was made for PCs with the goal of being a freely accessible, open-source platform; today it is more commonly found in server form. Okay, that was an easy one…moving on!
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 155). Pearson Education. Kindle Edition.
Which of the following is the default file system used by Windows?
FAT32
CDFS
NTFS
exFAT
NTFS
Where is the Notification Area located in Windows?
In the System Properties dialog box
In the System32 folder
On the Taskbar
Within the Start Menu
On the Taskbar
Which of the following is the minimum amount of RAM needed to install a 64-bit version of Windows 10?
512 MB
1 GB
2 GB
4 GB
2 GB
In Windows, an MMC is blank by default. Which of the following should be added to the MMC to populate it with Programs?
Applets
Files
Directories
Snap-ins
Snap-ins
- Which of the following files is the boot loader in Windows?
Winload.exe
BCD
Setup.exe
Ntoskrnl.exe
Winload.exe
Explanation:
Winload.exe is the Windows boot loader program for Windows 10, 8, and 7. It is located in %systemroot%\System32 (which is usually C:\Windows\System32). It works in conjunction with the Bootmgr file (Windows Boot Manager). Bootmgr is the first file to load in Windows. It reads the BCD and displays an OS menu (if there is more than one OS).
Incorrect Answers:
The BCD is the Boot Configuration Data store; it is the successor to boot.ini.
Setup.exe is the default name of the file that starts installations of Windows and many other programs.
Ntoskrnl.exe is the main system file of Windows; without it, the system would crash and the file would have to be replaced or repaired.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 156). Pearson Education. Kindle Edition.
Which specific tool enables you to create a partition in Windows?
Disk Management
Format Command
Computer Management
Disk Cleanup
Disk Management
Which type of partition should an OS be installed to?
Primary
Extended
Dynamic
Logical Drive
Primary
Which of the following tools enables you to find out how much memory a particular application is using?
Msconfig
Task Manager
chkdsk
System Information
Task Manager
Which of the following features is used to both start and stop services? (Select the Two Best Answers)
Computer Management Task Manager Performance Monitor MMC Msconfig
Computer Management
Task Manager
Explanation:
You can start, stop, and restart services within Computer Management > Services and Applications > Services. From there, right-click the service in question and configure it as you wish. You can also open Services by going to the Run prompt and typing services.msc.
The Task Manager can also be used to start and stop services, as well as to analyze the performance of the CPU, RAM, and the networking connections. You can also start and stop services with the net start / net stop and sc start / sc stop commands.
Incorrect Answers:
Performance Monitor analyzes the computer in much more depth than the Task Manager.
The MMC is the Microsoft Management Console, which is the index that can store other console windows such as Computer Management.
Among other things, Msconfig is used to enable/disable services, but not to start them.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 157). Pearson Education. Kindle Edition.
Which of the following user account permissions are needed to install device drivers on Windows?
Standard User
Guest
Administrator
Power Users
Administrator
Which of the following commands creates a New Directory in the Windows Command Prompt?
CD
MD
RD
SD
MD
- Which of the following commands is entered at the Command Prompt to learn more about the dir command? (Select the Two Best Answers)
dir help
help dir
dir /?
dir man
help dir
dir /?
Explanation:
To learn more about any command in Windows, open the Command Prompt, type the command and then /?, or type help dir.
Incorrect Answers:
dir help would attempt to find the file named HELP within the current directory.
dir man would most likely result in a “file not found” error. MAN pages are help pages used in Linux and macOS.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 157). Pearson Education. Kindle Edition.
Which interface is used to launch the ipconfig command?
Command Prompt
Control Panel
MMC
Task Manager
Command Prompt
A customer’s computer is using FAT32. Which file system can you upgrade it to when using the Convert Command?
NTFS
ext4
exFAT
NFS
NTFS
Which of the following can be used to keep hard drives free of errors and ensure that Windows runs efficiently? (Select the Two Best Answers)
Disk Management Disk Defragmenter Check Disk System Restore Task Scheduler
Disk Defragmenter
Check Disk
What is Windows Recovery Environment known as? (Select the Two Best Answers)
WinRE
Recovery Console
Advanced Boot Options
System Recovery Options
WinRE
System Recovery Options
Explanation:
The Windows Recovery Environment (Windows RE or WinRE) is also known as System Recovery Options. From here, you can restore the system, fix file errors, and work in an unprotected Command Prompt.
Incorrect Answers:
The Recovery Console is the predecessor of WinRE, in the deprecated Windows XP.
Advanced Boot Options is the menu that you can access by pressing F8. It is also referred to as ABOM, and in Windows 8/8.1/10 is known as Startup Settings.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 158). Pearson Education. Kindle Edition.
Which log file contains information about Windows setup errors?
setupact. log
setuperr. log
unattend. xml
diskmgmt. msc
setuperr.log
- Which of the following represents the RAM limitation of Windows 8.1 Pro 64-bit?
4 GB
128 GB
512 GB
2 TB
512 GB
Explanation:
The physical memory limit of Windows 8.1 Pro is 512 GB on a 64-bit system. That is also the RAM limit for Windows 8.1 Enterprise; however, Windows 8.1 standard can access only 128 GB of RAM. Even though 64-bit CPUs can address a realistic maximum of 256 terabytes (TB), software is usually far more limited (as of the writing of this book in 2019).
Incorrect Answers:
Windows 10 Home can access 128 GB. Windows 10 Pro and Education can access 2 TB of RAM.
Windows 10 Enterprise can access 6 TB. The maximum that Windows 7 64-bit Professional, Ultimate, and Enterprise can access is 192 GB of RAM.
Keep in mind that 32-bit versions of Windows 8.1 (and other versions of Windows) can access only a maximum of 4 GB of RAM, due to the limitations of 32-bit CPUs.
L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (pp. 158-159). Pearson Education. Kindle Edition.
A customer’s Device Manager shows an arrow pointing down over one of the devices. What does this tell you?
The Device Driver has not been installed.
The Device is not recognized.
The Device is Disabled
The Device is in Queue to be Deleted
The Device is Disabled
Which of the following is NOT an advantage of NTFS over FAT32?
NTFS supports file encryption.
NTFS supports larger file sizes.
NTFS supports larger volumes.
NTFS supports more file formats.
NTFS supports more file formats.
A coworker just installed a second drive in his Windows computer. However, he does not see the drive in Explorer. What did he forget to do? (Select the Three Best Answers)
Format the Drive Partition the Drive Run FDISK Initialize the Drive Setup the Drive in UEFI/BIOS
Format the Drive
Partition the Drive
Initialize the Drive
How would you create a Restore Point in Windows?
Run Disk Defragmenter from the MMC
Run Backup and Restore from the Control Panel
Run the System Restore program from System Properties
Run the Disk Cleanup program from the System Properties
Run the System Restore program from System Properties
Which of the following tasks CANNOT be performed from the Printer Properties Screen?
Modifying Spool Settings
Adding Ports
Pausing Printing
Enabling Sharing
Pausing Printing
You are setting up auditing on a Windows Computer. If it’s set up properly, which of the following logs should contain entries?
Application Log
System Log
Security Log
Maintenance Log
Security Log
Which type of virus propagates itself by tunneling through the Internet and networks?
Macro
Phishing
Trojan
Worm
Worm
Which component of Windows enables users to perform common tasks as nonadministrators and, when necessary, as administrators without having to switch users, log off, or use Run As?
USMT
UAC
USB
VNC
UAC
Which of the following tasks can be performed to secure your WAP/Router? (Select ALL That Apply)
Changing the Default SSID Name
Turning off SSID Broadcasting
Enabling DHCP
Disabling DHCP
Changing the Default SSID Name
Turning off SSID Broadcasting
Disabling DHCP
When you connect to a website to make a purchase by credit card, you want to make sure the website is secure. Which of the following statements best describes how to determine whether a site is secure? (Select the Two Best Answers)
You should look for the padlock (in the locked position) toward the top or bottom of the screen.
You should look for the padlock (in the unlocked position) toward the top or bottom of the screen.
You should look for the Protocol HTTP in the address or URL bar.
You should look for the Protocol HTTPS in the address or URL bar.
You should look for the padlock (in the locked position) toward the top or bottom of the screen.
You should look for the Protocol HTTPS in the address or URL bar.
Which type of software helps protect against viruses that are attached to email?
Firewall Software
Antivirus Software
Internet Explorer
Hardware Firewall
Antivirus Software
Which of the following is an example of Social Engineering?
Asking for a Username and Password over the phone.
Using someone else’s unsecured Wireless Network
Hacking into a Router
A Virus
Asking for a Username and Password over the phone.
Where are software-based Firewalls most commonly implemented?
On Routers
On Servers
On Clients
On Switches
On Clients