CompTIA A+ Core 2 220-1002 Anand Ramrooch M.Q.A. (Computer Science)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Anand RAMROOCH
A
Anand RAMROOCH
Community Contributor
Quizzes Created: 1 | Total Attempts: 85
Questions: 25 | Attempts: 85

SettingsSettingsSettings
CompTIA A+ Core 2 220-1002 Anand Ramrooch M.Q.A. (Computer Science) - Quiz

Quentin Docter (A+, Network+, IT Fundamentals+, MCSE, CCNA, SCSA)
Jon Buhagiar (Network+, A+, CCNA, MCSA, MCSE, BS/ITM)


Questions and Answers
  • 1. 

    Which of the following can you type in the Start menu in Windows to open a command prompt? (Choose two.)

    • A.

      A. run

    • B.

      B. cmd

    • C.

      C. command

    • D.

      D. open

    Correct Answer(s)
    B. B. cmd
    C. C. command
    Explanation
    *##*B, C. You can open a command prompt by typing cmd or command in the Start menu. The command prompt utility will pop up in the search results. B, C. You can open a command prompt by typing cmd or command in the Start menu. The command prompt utility will pop up in the search results.*##*Run is not a command; it is a dialog box. Open is not
    a command; it is an operating system action.

    Rate this question:

  • 2. 

    How do you increase the size of the taskbar?

    • A.

      A. Right-click the mouse and drag the taskbar.

    • B.

      B. Left-click the mouse and double-click the taskbar.

    • C.

      C. Move the mouse pointer to the top of the taskbar, pausing until the pointer turns into a double-headed arrow, and then click and drag.

    • D.

      D. Highlight the taskbar and double-click in the center.

    Correct Answer
    C. C. Move the mouse pointer to the top of the taskbar, pausing until the pointer turns into a double-headed arrow, and then click and drag.
    Explanation
    *##*. C. You can increase the size of the taskbar size placing the cursor over the top of the taskbar and dragging it up.*##*A,B & D does not apply.

    Rate this question:

  • 3. 

    In Windows, a deleted file can be retrieved using which of the following?

    • A.

      A. My Computer icon

    • B.

      B. Recycle Bin

    • C.

      C. Control Panel

    • D.

      D. Settings app

    Correct Answer
    B. B. Recycle Bin
    Explanation
    B. The Recycle Bin is a temporary spot that files are deleted to but from where they can be retrieved if deleted mistakenly. The My Computer icon is another way to start the File Explorer. The Control Panel and Settings app are used to customize the operating system.

    Rate this question:

  • 4. 

    What is the minimum amount of free hard drive space required for the installation of Windows 764-bit?

    • A.

      A. 1.5 GB

    • B.

      B. 15 GB

    • C.

      C. 20 GB

    • D.

      D. 60 GB

    Correct Answer
    C. C. 20 GB
    Explanation
    C. The minimum amount of free hard drive space required for Windows 7 64-bit is 20 GB.

    Rate this question:

  • 5. 

     Which of the following utilities is used to update Group Policy settings and replaces some of the functionality that previously existed with secedit?

    • A.

      A. clobber

    • B.

      B. gpupdate

    • C.

      C. consolidate

    • D.

      D. extract

    Correct Answer
    B. B. gpupdate
    Explanation
    *##*. B. The gpupdate utility is used to update Group Policy from the command line. *##*. The clobber
    command is a Linux command. The extract command is used to extract files from .cab files.

    Rate this question:

  • 6. 

    In Windows, which of the following is the filesystem of choice for CD media?

    • A.

      A. NTFS

    • B.

      B. EFS

    • C.

      C. FAT32

    • D.

      D. CDFS

    Correct Answer
    D. D. CDFS
    Explanation
    *##*D. The CDFS filesystem is used for CD media.*##*. NTFS is the native filesystem for the Windows operating system. FAT32 is a filesystem that was popular with Windows 9x operating systems. EFS is a technology that encrypts files.

    Rate this question:

  • 7. 

    What is the minimum required memory for a 64-bit installation of Windows 10?

    • A.

      A. 512 MB

    • B.

      B. 1 GB

    • C.

      C. 2 GB

    • D.

      D. 4 GB

    Correct Answer
    C. C. 2 GB
    Explanation
    . C. The minimum amount of memory required for the 64-bit installation of the Windows 10 is 2
    GB

    Rate this question:

  • 8. 

    Virtual memory is configured through which system tool?

    • A.

      A. Taskbar

    • B.

      B. System Properties

    • C.

      C. Memory Manager

    • D.

      D. Virtual Configuration

    Correct Answer
    B. B. System Properties
    Explanation
    *##*B. Virtual memory is configured in the System Properties applet. *##*The taskbar is an element of the
    desktop; the memory manager is a process in the operating system for memory management; and
    virtual configuration is an invalid answer.

    Rate this question:

  • 9. 

    What can you do if a program is not responding to any commands and appears to be locked up?

    • A.

      A. Open the System Control Panel applet and choose Performance to see what process is causing the problem.

    • B.

      B. Add more memory.

    • C.

      C. Press Ctrl+Alt+Del to reboot the computer

    • D.

      D. Open Task Manager, select the appropriate task, and then click End Task.

    Correct Answer
    D. D. Open Task Manager, select the appropriate task, and then click End Task.
    Explanation
    *##*. D. When a program is not responding to any commands, the process must be terminated via the
    Task Manager. You can end the process by opening the Task Manager, right-clicking the
    application, and selecting End Task.
    *##*. Viewing the performance will not make the process respond.
    Adding more memory is not possible without shutting down the computer. Pressing Ctrl+Alt+Del
    without any further action will not reboot the computer.

    Rate this question:

  • 10. 

    You believe that your system files are corrupted in Windows. You run the System File Checker. Which command should you run in order to make the System File Checker automatically repair your system files?

    • A.

      A. sfc /recover

    • B.

      B. sfc /repair

    • C.

      C. sfc /verifyfile

    • D.

      D. sfc /scannow

    Correct Answer
    D. D. sfc /scannow
    Explanation
    *##*. D. The System File Checker (sfc) will scan for and fix missing or corrupted operating systems
    files.
    *##*. The command used to initiate an immediate scan is sfc /scannow. SFC /recover and SFC
    /repair are not valid options. SFC /verifyfile will check a single file, but the path must be
    specified.

    Rate this question:

  • 11. 

    Which of the following Registry hives contains information about the computer’s hardware?

    • A.

      A. HKEY_CURRENT_MACHINE

    • B.

      B. HKEY_LOCAL_MACHINE

    • C.

      C. HKEY_MACHINE

    • D.

      D. HKEY_RESOURCES

    Correct Answer
    B. B. HKEY_LOCAL_MACHINE
    Explanation
    *##*B. The HKEY_LOCAL_MACHINE Registry hive contains information about the computer’s hardware. It
    is also known as HKLM
    *##*HKEY_CURRENT_MACHINE and HKEY_MACHINE are not valid Registry hives.
    HKEY_RESOURCES was used with Windows 9x operating systems but is no longer used.

    Rate this question:

  • 12. 

    You have a computer with four physical CPUs and 4 TB of RAM. Which edition of Windows 10 should you install?

    • A.

      A. Education

    • B.

      B. Enterprise

    • C.

      C. Pro

    • D.

      D. Pro for Workstations

    Correct Answer
    D. D. Pro for Workstations
    Explanation
    *##*D. Only Windows 10 Pro for Workstations supports four physical CPUs*##*Windows 10 Education
    supports two physical CPUs and 2 TB of RAM. Windows 10 Enterprise supports two physical
    CPUs and 2 TB of RAM. Windows 10 Pro supports two physical CPUs and 2 TB of RAM.

    Rate this question:

  • 13. 

    You used the winver.exe utility and it reported Windows 10 Version 1703 (OS Build 15063.145). What is the current date of the last update?

    • A.

      A. 63rd day of 2015

    • B.

      B. 145th day of 2015

    • C.

      C. March of 2017

    • D.

      D. The version needs to be looked up at Microsoft.com.

    Correct Answer
    C. C. March of 2017
    Explanation
    *##*. C. The date code of the edition is yymm, so 1703 is March of 2017. *##*The 63rd day of 2015 and the
    145th day of 2015 are incorrect answers, because the build number is the number of builds of
    Windows 10. The build number does translate to a version of Windows, but that information is in
    the date code and does not need to be looked up.

    Rate this question:

  • 14. 

    You want to upgrade from 32-bit Windows 7 Professional to a 64-bit version of Windows 10. What are your options?

    • A.

      A. Upgrade directly to Windows 10 Pro 64-bit.

    • B.

      B. Upgrade first to Windows 10 Pro 32-bit, and then update to 64-bit.

    • C.

      C. Upgrade to Windows 8.1 64-bit, and then upgrade to Windows 10 64-bit.

    • D.

      D. You must perform a clean installation of Windows 10 Pro 64-bit.

    Correct Answer
    D. D. You must perform a clean installation of Windows 10 Pro 64-bit.
    Explanation
    When upgrading from a 32-bit version of Windows 7 to a 64-bit version of Windows 10, a clean installation is required. This means that you cannot directly upgrade from Windows 7 to Windows 10, nor can you upgrade from a 32-bit version of Windows 10. Instead, you must perform a clean installation of the 64-bit version of Windows 10 Pro. This involves backing up your files, formatting the hard drive, and installing the new operating system from scratch.

    Rate this question:

  • 15. 

    Which editions of Windows 8 support EFS? (Choose all that apply.)

    • A.

      A. Enterprise

    • B.

      B. Pro

    • C.

      C. RT

    • D.

      D. Core

    Correct Answer(s)
    A. A. Enterprise
    B. B. Pro
    Explanation
    A, B. Both the Enterprise and Pro editions of Windows 8 support EFS. The RT edition is
    preinstalled on tablets and does not support EFS. The Core edition does not support EFS.

    Rate this question:

  • 16. 

    Which of the following is the online/cloud storage account (to which you can save or move files) that comes with your Microsoft account?

    • A.

      A. eDirectory

    • B.

      B. Cloud+

    • C.

      C. OneDrive

    • D.

      D. PostBox

    Correct Answer
    C. C. OneDrive
    Explanation
    OneDrive is the online/cloud storage account that comes with your Microsoft account. It allows you to save or move files to the cloud, making them accessible from any device with an internet connection.

    Rate this question:

  • 17. 

    Which editions of Windows 7 cannot create a HomeGroup?

    • A.

      A. Windows 7 Starter

    • B.

      B. Windows 7 Home Premium

    • C.

      C. Windows 7 Professional

    • D.

      D. Windows 7 Enterprise

    Correct Answer
    A. A. Windows 7 Starter
    Explanation
    *##*A. Windows 7 Starter edition can join a HomeGroup, but it cannot create a HomeGroup*##*Only Windows 7 Home Premium, Professional, Enterprise, and Ultimate can both create and join a
    HomeGroup.

    Rate this question:

  • 18. 

    Where in Windows 7 can you manually create a restore point?

    • A.

      A. The System Restore option, beneath System Tools

    • B.

      B. The System Protection tab of System Properties

    • C.

      C. In Backup, beneath Administrative Tools

    • D.

      D. Windows 7 does not allow for the manual creation of restore points.

    Correct Answer
    B. B. The System Protection tab of System Properties
    Explanation
    *##*B. System Restore allows for both the automated and manual creation of restore points. You can manually create restore points via the System Protection tab of System Properties*##*. Windows 7 does not include a System Tools applet. The option to create manual restore points does not exist

    Rate this question:

  • 19. 

    Which utility allows you to choose the default operating system to boot to in a multiboot installation?

    • A.

      A. BOOTMGR

    • B.

      B. winload.exe

    • C.

      C. msconfig.exe

    • D.

      D. winlogon.exe

    Correct Answer
    C. C. msconfig.exe
    Explanation
    MSConfig.exe is a utility that allows users to configure several aspects of the Windows operating system, including the boot options. In a multiboot installation, where multiple operating systems are installed on the same computer, MSConfig.exe can be used to choose the default operating system that will be booted into. This utility provides a user-friendly interface to select the default operating system from a list of available options, making it convenient for users to manage their multiboot setup.

    Rate this question:

  • 20. 

    Which of the following is a macOS feature for password management?

    • A.

      A. Spotlight

    • B.

      B. Keychain

    • C.

      C. Dock

    • D.

      D. Gestures

    Correct Answer
    B. B. Keychain
    Explanation
    Keychain is a macOS feature for password management. It securely stores passwords, encryption keys, and certificates for applications, websites, and servers. Keychain allows users to easily access and manage their passwords, automatically fill in login information, and generate strong passwords. It provides a convenient and secure way to store and retrieve passwords, ensuring that they are protected and easily accessible when needed.

    Rate this question:

  • 21. 

    Which statement about scripting languages is true?

    • A.

      A. Scripting languages require a compiler.

    • B.

      B. Scripting languages are strongly typed.

    • C.

      C. Scripting languages are interpreted.

    • D.

      D. Scripting languages have good memory management.

    Correct Answer
    C. C. Scripting languages are interpreted.
    Explanation
    Scripting languages are interpreted, meaning that they are executed line by line without the need for a separate compilation step. This allows for more flexibility and faster development, as changes can be made and tested in real-time. Interpreted languages also tend to have simpler syntax and are easier to learn and use compared to languages that require compilation. Additionally, interpreted languages often have built-in error handling and debugging features, making them ideal for tasks such as automation, web development, and rapid prototyping.

    Rate this question:

  • 22. 

    On which network protocol and port does SSH operate?

    • A.

      A. TCP port 3389

    • B.

      B. TCP port 22

    • C.

      C. TCP port 23

    • D.

      D. TCP port 443

    Correct Answer
    B. B. TCP port 22
    Explanation
    SSH (Secure Shell) operates on TCP port 22. SSH is a network protocol that provides secure remote access to systems and secure file transfers. It is commonly used in the administration of network devices and servers. TCP port 22 is the default port for SSH, and it is used for establishing a secure connection between the client and the server.

    Rate this question:

  • 23. 

    Which type of attack denies authorized users access to network resources?

    • A.

      A. DoS

    • B.

      D. Social engineering

    Correct Answer
    A. A. DoS
    Explanation
    A Denial of Service (DoS) attack is a type of cyber attack that aims to deny authorized users access to network resources. It does this by overwhelming the target system with a flood of illegitimate requests or by exploiting vulnerabilities in the system to crash it. This effectively renders the network or service unavailable to legitimate users. Social engineering, on the other hand, involves manipulating individuals to gain unauthorized access to systems or sensitive information, but it does not directly deny access to network resources.

    Rate this question:

  • 24. 

    Internal users suspect repeated attempts to infect their systems, as reported to them by pop-up messages from their antivirus software. According to the pop-up messages, the virus seems to be the same in every case. What is the most likely culprit?

    • A.

      A. A server is acting as a carrier for a virus.

    • B.

      B. A password attack is being carried out.

    • C.

      C. Your antivirus software has malfunctioned

    • D.

      D. A DoS attack is underway.

    Correct Answer
    A. A. A server is acting as a carrier for a virus.
    Explanation
    The most likely culprit in this scenario is that a server is acting as a carrier for a virus. The internal users are receiving pop-up messages from their antivirus software indicating repeated attempts to infect their systems with the same virus. This suggests that the virus is being transmitted from a common source, which is likely a server within the network. This explanation aligns with the symptoms described and the information provided.

    Rate this question:

  • 25. 

    Which of the following has the goal of allowing a username/password combination to be entered once, and then allowing claims to be used for consecutive logins? (Choose the best answer.)

    • A.

      A. Tokens

    • B.

      B. Kerberos

    • C.

      C. Single sign-on

    • D.

      D. Multifactor authentication

    Correct Answer
    C. C. Single sign-on
    Explanation
    Single sign-on (SSO) is a mechanism that allows users to authenticate themselves once and then use those credentials to access multiple applications or systems without having to enter their username and password again. This eliminates the need for users to remember multiple sets of login credentials and improves user experience. SSO typically uses claims-based authentication, where a security token is issued upon initial authentication, and this token is then used to assert the user's identity and access rights to other applications or systems.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 06, 2020
    Quiz Created by
    Anand RAMROOCH
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.