CompTIA A+ 220-1002 Exam 2

1. Which of the following can be used as a bootable device while installing Windows on a new machine?
2. Which of the following filesystems is used for the CD-ROM and is supported by multiple operating systems?
3. IOS is an open-source phone and tablet OS developed by Apple
4. Match the command with its usage
nslookup
Displays the current network configuration of a system

Unselect

Query the DNS server for the domain

Unselect

Determine the hops that are in between your system and the remote machine

Unselect

Reveals the status of open and listening ports and the routing table.

Unselect

tracert
Displays the current network configuration of a system

Unselect

Query the DNS server for the domain

Unselect

Determine the hops that are in between your system and the remote machine

Unselect

Reveals the status of open and listening ports and the routing table.

Unselect

ipconfig
Displays the current network configuration of a system

Unselect

Query the DNS server for the domain

Unselect

Determine the hops that are in between your system and the remote machine

Unselect

Reveals the status of open and listening ports and the routing table.

Unselect

netstat
Displays the current network configuration of a system

Unselect

Query the DNS server for the domain

Unselect

Determine the hops that are in between your system and the remote machine

Unselect

Reveals the status of open and listening ports and the routing table.

Unselect

5. Which of the following is used when the physical memory is running low or not available for applications?
6. Match the command with its usage
dd
Used to copy files on a disk

Unselect

Command-line utility for Unix-like OS. It is used to convert and copy files

Unselect

Used for renaming or moving files

Unselect

Used to create archive and extract the archive files

Unselect

tar
Used to copy files on a disk

Unselect

Command-line utility for Unix-like OS. It is used to convert and copy files

Unselect

Used for renaming or moving files

Unselect

Used to create archive and extract the archive files

Unselect

cp
Used to copy files on a disk

Unselect

Command-line utility for Unix-like OS. It is used to convert and copy files

Unselect

Used for renaming or moving files

Unselect

Used to create archive and extract the archive files

Unselect

mv
Used to copy files on a disk

Unselect

Command-line utility for Unix-like OS. It is used to convert and copy files

Unselect

Used for renaming or moving files

Unselect

Used to create archive and extract the archive files

Unselect

7. Using the Task Manager application, which tab displays the resource usage for the current user account with the applications that have been used?
8. Windows 10 32-bit operating system cannot support more than 4 GB of RAM
9. Which of the following commands provide the below output?

10. Which of the following file system is supported by both Windows and Linux?
11. Which of the following tool analyze the disk and then consolidate files and folders so that they occupy a contiguous space, thereby, increasing performance during file retrieval?
12. Which of the following command provides the below output?

13. Which type of operating system you can install with a 64-bit processor?
14. You have installed Windows 10 on a laptop. When you partition the hard drive, which type of partition can be divided into one or more logical drives?
15. Under a Windows operating system, which of the following volume types you can create using Disk Management?
16. Which of the following can be used to install Windows on a Mac computer and then choose between operating systems as you boot?
17. Which of the following can be used to close the application, when it hangs inside the Mac OS?
18. Which of the following attack exploits the vulnerabilities in software, which are unnoticed by the vendor or the developer?
19. Which of the following can be used to scan the outbound e-mails and track any sensitive information, such as accounts data?
20. Authentication and encryption can be used as a defence mechanism against IP spoofing
21. You decide to dispose of your hard drive. Which of the following method can be used to ensure that the information on the hard drive cannot be retrieved?
22. Which of the following is the strongest wireless encryption standard?
23. Which type of malware can create a back door or replace a valid program during installation?
24. Which of the following would change the MAC address of a laptop to gain access to a network?
25. Which type of virus replicates itself using different media, such as a network or an e-mail?
26. EAP-TLS is a wireless protocol that is susceptible to password attacks, such as brute-force or dictionary attacks
27. In which type of attack, an attacker disguises as someone else to gain access to confidential and private information using emails or websites?
28. You want to encrypt few files on the NTFS volume on Windows 7 machine. You don't have administrative access to the computer. Which of the following encryption method can be used to encrypt the files?
29. Whish of the following method is used to open a port on a firewall and send incoming traffic to a specific computer?
30. Which of the following component is used to manage various aspects of Active Directory and the local operating system?
31. Which of the following policy defines the minimum specifications for an employee’s personal device used for work-related access?
32. Which of the following software enables you to enforce profile security requirements on mobile devices?
33. If you copy a file or a folder to a different NTFS volume, it will keep its original permissions
34. Which of the following biometric authentication methods are used with smart mobile devices?
35. Which of the following security method can be used to limit access to one or a few individuals, to stop tailgating?
36. Which of the following feature automatically find and run the content on removable media such as CD-ROM?
37. Which of the following feature prompts for credentials, when a standard user tries to make a system change?
38. What is the Windows exception error called, that causes a system crash?
39. You noticed that while booting Windows, an error is displayed about some missing system files. Which utility can be used to fix this issue?
40. In Mac OS, you get system updates via 'apt-get update' and 'apt-get upgrade' commands
41. You installed an old application on your Windows 10 laptop. However, the application continues to crash after you start it. How should you possibly resolve this issue?
42. Which Microsoft protocol lets you establish a connection to a remote client, showing the remote system's desktop?
43. Which memory type refers to the hard disk storage that serves as a swap file to augment physical memory?
44. Which of the following refers to the set of rules applied by the network administrator, that describes the ways in which the network or system may be used?
45. What type of script has the filename extension .vbs?
46. Which scripting construct can provide a technique to execute a command repeatedly?
47. Which of the following practice can help an administrator to know the details of a particular asset and also helps in inventory management?
48. Which document type states that the change is agreed upon by the end-users?
49. Which of the following will specify the script path, filename, and file location and is available for reference at runtime?
50. Which software type is often free, and you can modify the code free of charge as well?

 

Leave a comment