CompTIA A+ Certification Exam 220-802 Practice Test 1-5

Windows Vista and Windows 7 offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is called:

A. User Account Control (UAC)
B. Trusted Platform Module (TPM)
C. Windows Firewall
D. Windows Defender real-time protection

A. User Account Control (UAC)
Which of the following are the system memory requirements for Microsoft Windows 7?

A. 64 MB of RAM (128 MB is recommended)
B. 512 MB RAM
C. 768 MB RAM
D. 1 GB RAM (32-bit) or 2 GB RAM (64-bit)

D. 1 GB RAM (32-bit) or 2 GB RAM (64-bit)
Windows Aero: (Select 3 answers)

A. Changes the way in which windows are displayed by adding translucent window borders
B. Is a set of user interface enhancements available in premium editions of Windows Vista and Windows 7
C. Was introduced in Windows XP
D. Is a set of user interface enhancements available in all editions of Windows Vista and Windows 7
E. Offers live preview of an entire open window after hovering over a taskbar icon (taskbar preview of open windows)

A. Changes the way in which windows are displayed by adding translucent window borders
B. Is a set of user interface enhancements available in premium editions of Windows Vista and Windows 7
E. Offers live preview of an entire open window after hovering over a taskbar icon (taskbar preview of open windows)
What is the name of a Microsoft Windows feature that allows for encrypting entire drives?

A. Encrypting File System (EFS)
B. BitLocker
C. LoJack
D. Compact Disc File System (CDFS)

B. BitLocker
Previous versions are copies of files and folders that Windows automatically saves as part of a restore point. Previous versions are sometimes referred to:

A. Primary copies
B. Shadow copies
C. Mirror copies
D. Spare copies

B. Shadow copies
What is the function of Windows Defender software?

A. Allowing and blocking applications through Windows Firewall
B. Protection against spyware and other potentially unwanted software
C. Reviewing computer’s status and resolving issues
D. Management of User Account Control settings

B. Protection against spyware and other potentially unwanted software
Which of the following CPU specifications complies with system requirements for Microsoft Windows 7?

A. Pentium 233 MHz processor or faster (300 MHz is recommended)
B. 2 GHz or faster microprocessor
C. 1 GHz or faster 32-bit (x86) or 64-bit (x64) processor
D. 800 MHz 32-bit (x86) or 64-bit (x64) processor

C. 1 GHz or faster 32-bit (x86) or 64-bit (x64) processor
Which Microsoft Windows technology offers the capability to take advantage of unused space on a USB flash drive or flash memory card to help improve PC performance?

A. Device Manager
B. Windows Easy Transfer
C. ReadyBoost
D. BitLocker To Go Reader

C. ReadyBoost
With the release of Windows ME, Microsoft added a new built-in utility to their desktop operating systems which allows to roll back system files and settings to an earlier point in time without affecting personal files. It provides a yet another way to undo system changes to the computer when an installation of a new program or device driver causes a problem and uninstalling doesn’t fix the problem. The utility’s interface contains a list allowing the user to bring back the system to the state it was in before the selected event. Items on that list are called:

A. Backup files
B. Restore points
C. System logs
D. Roll-back points

B. Restore points
Windows 7 includes a collection of mini utility programs used to display information about date, time, weather, or CPU usage in a form of standalone widgets that can be moved and arranged on the Windows desktop. Desktop Gadgets in Windows 7 (also known as Windows Sidebar in Vista) can be configured in:

A. Programs and Features menu in Control Panel
B. Appearance and Personalization menu in Control Panel
C. Ease of Access menu in Control Panel
D. Clock, Language, and Region menu in Control Panel

B. Appearance and Personalization menu in Control Panel
If an application written for an earlier version of Windows doesn’t run correctly the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed by:

A. Right-clicking the program icon and selecting “Run program using recommended compatibility settings” option from the pop-up menu
B. Right-clicking the program icon, clicking Properties, and then applying the required settings on the Compatibility tab
C. Right-clicking the program icon and selecting “Run as administrator” option from the pop-up menu
D. Right-clicking the program icon and choosing “Restore previous versions” option from the menu

B. Right-clicking the program icon, clicking Properties, and then applying the required settings on the Compatibility tab
Windows Vista and Windows 7 facilitate moving user accounts and settings, application configuration data, and personal files from one computer to another with the use of:

A. Windows Ease of Access
B. Windows Easy Transfer
C. Windows System Restore
D. User Account Control (UAC)

B. Windows Easy Transfer
In order to work effectively, one of the applications listed below requires specific types of files containing up-to-date definitions of potential software threats. Which of the following software included in Windows requires such files?

A. Event Viewer
B. Windows Firewall
C. Windows Defender
D. Windows Experience Index

C. Windows Defender
Which of the following editions of Microsoft Windows OS do not include Windows Aero desktop experience? (Select 3 answers)

A. Windows 7 Home Basic
B. Windows 7 Starter
C. Windows Vista Home Basic
D. Windows 7 Professional
E. Windows Vista Business

A. Windows 7 Home Basic
B. Windows 7 Starter
C. Windows Vista Home Basic
If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files.

True/False

False

*System Restore can make changes to Windows system files, registry settings, and programs installed on your computer. It also can make changes to scripts, batch files, and other types of executable files on your computer. Personal files, such as documents, e‑mail, photos, and music files, are not changed.*

Which of the following are the hard disk space system requirements for Windows 7?

A. 20 GB hard disk that has 10 GB of free hard disk space
B. 40 GB hard disk that has 10 GB of free hard disk space
C. 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
D. 1.5 GB of available space on the hard disk

C. 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
Windows XP utility for transferring files and settings from an old computer to a new computer is called:

A. System Restore
B. Files and Settings Transfer Wizard
C. Windows Easy Transfer
D. Program Compatibility troubleshooter

B. Files and Settings Transfer Wizard
The 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system.

True/False

True
An OS installation that doesn’t preserve programs, files, or settings is sometimes referred to as:

A. Upgrade
B. Unattended installation
C. Image deployment
D. Clean install

D. Clean install
While upgrading from an earlier edition of Windows to Windows 7 it is important to make sure that programs and devices will work with the new OS version. To find potential compatibility problems with computer’s hardware, devices, or programs that might affect the installation of Windows 7, Microsoft offers a free utility designed to check for any issues and to provide recommendations on what to do before performing an upgrade to improve the PC’s compatibility with Windows 7. What is the name of this utility?

A. Files and Settings Transfer Wizard
B. Upgrade Assistant
C. Windows Easy Transfer
D. Windows 7 Upgrade Advisor

D. Windows 7 Upgrade Advisor
Which of the following terms refers to an environment that allows to boot a PC through a network interface?

A. ACPI
B. SSID broadcast
C. PXE
D. Fixboot

C. PXE
When a program installed in Windows stops responding or encounters an error, logs describing error can be examined with the use of:

A. Event Viewer
B. System menu in Control Panel
C. Task Manager
D. System Information utility (MSINFO32)

A. Event Viewer
Command Prompt (cmd.exe) is a feature of Microsoft Windows operating systems that allows for performing tasks on the PC without the use of Windows graphical interface. Command Prompt can be invoked through which sequence of steps? (Select all that apply / Fragments of text all in upper case are the actual commands to type in)

A. In Control Panel, change one of the settings in the Display menu to Console
B. Windows Logo key + L, type in CMD.EXE, Enter
C. Windows Logo key + R, type in CMD, Enter
D. Ctrl+Shift+Esc to invoke Task Manager, click New Task… button on the Applications tab in Task Manager, type in CMD, Enter

C. Windows Logo key + R, type in CMD, Enter
D. Ctrl+Shift+Esc to invoke Task Manager, click New Task… button on the Applications tab in Task Manager, type in CMD, Enter
BitLocker Drive Encryption is available in: (Select 2 answers)

A. Windows Vista Starter
B. Windows Vista Business
C. Windows 7 Home Premium
D. Windows 7 Enterprise
E. Windows 7 Ultimate

D. Windows 7 Enterprise
E. Windows 7 Ultimate
Which of the following commands in Windows is used to display help information related to a specific command-line utility?

A. [command] /?
B. $ [command] –help
C. $ man [command]
D. $ info [command]

A. [command] /?
If a computer’s hard disk has adequate free disk space, it is possible to install more than one operating system and then choose which OS to use during each startup. This type of configuration setup is often referred to as:

A. Single sign-on
B. Multi-mode
C. Multiboot
D. Clean install

C. Multiboot
Migrating from an earlier Microsoft operating system version to Windows 7 through an Upgrade install: (Select 2 answers)

A. Installs new version of Windows alongside the current operating system
B. Doesn’t preserve personal files, settings, and programs
C. Replaces the current version of Windows with Windows 7
D. Keeps personal files, settings, and programs in place on the computer

C. Replaces the current version of Windows with Windows 7
D. Keeps personal files, settings, and programs in place on the computer
Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers)

A. Windows-based computers on home networks must be part of a homegroup
B. Windows-based computers on a network must be part of a workgroup or a domain
C. Windows-based computers on workplace networks are usually part of a domain
D. Windows-based computers on workplace networks are usually part of a workgroup
E. Windows-based computers on home networks are usually part of a workgroup
F. Windows-based computers on home networks are usually part of a domain

B. Windows-based computers on a network must be part of a workgroup or a domain
C. Windows-based computers on workplace networks are usually part of a domain
E. Windows-based computers on home networks are usually part of a workgroup
Which of the power-saving states in Windows uses the least amount of power?

A. Sleep
B. Standby
C. High performance
D. Hibernation

D. Hibernation
What is the name of a Windows Command Prompt command that can be used to shut down, restart, log off, or hibernate the computer?

A. TASKKILL
B. SHUTDOWN
C. EXIT
D. MODE

B. SHUTDOWN

*Allows you to shut down or restart a local or remote computer.*

*Syntax*
*shutdown [{-l|-s|-r|-a}] [-f] [-m [\ComputerName]] [-t xx] [-c “message”] [-d[u][p]:xx:yy]*

*-l : Logs off the current user, this is also the defualt. -m ComputerName takes precedence.

-s : Shuts down the local computer.

-r : Reboots after shutdown.

-a : Aborts shutdown. Ignores other parameters, except -l and ComputerName. You can only use -a during the time-out period.

-f : Forces running applications to close.

-m [ \ ComputerName ] : Specifies the computer that you want to shut down.

-t xx : Sets the timer for system shutdown in xx seconds. The default is 20 seconds.

-c ” message ” : Specifies a message to be displayed in the Message area of the System Shutdown window. You can use a maximum of 127 characters. You must enclose the message in quotation marks.

-d [ u ][ p ] : xx : yy : Lists the reason code for the shutdown. The following table lists the different values.

Which of the following terms describes a hard disk partition that can contain only one logical drive?

A. Logical
B. Extended
C. Primary
D. Locked

C. Primary
By creating volumes that span multiple disks (spanned and striped volumes), dynamic disks in Windows provide the capability for software implementations of RAID.

True/False

True
Which of the following statements describing methods of hard drive formatting are true? (Select all that apply)

A. Normal format is a formatting option that fully erases any existing data on the hard disk
B. Normal format is a formatting option that creates a new file table on a hard disk but does not fully overwrite or erase the disk
C. Quick format is a formatting option that creates a new file table on a hard disk but does not fully overwrite or erase the disk
D. Quick format is much faster than a normal format
E. Quick format is a formatting option that fully erases any existing data on the hard disk

A. Normal format is a formatting option that fully erases any existing data on the hard disk
C. Quick format is a formatting option that creates a new file table on a hard disk but does not fully overwrite or erase the disk
D. Quick format is much faster than a normal format
What is the name of a Windows network diagnostic tool for displaying the path and measuring transit delays of packets across an Internet Protocol (IP) network?

A. TRACEROUTE
B. NETSTAT
C. IPCONFIG
D. TRACERT

D. TRACERT
Which of the following terms refers to a backup technique that allows for creating an exact copy of an entire drive and replicating the drive to a new computer or to another drive on the same computer in case of a hard drive failure?

A. Repair installation
B. Drive imaging
C. Incremental backup
D. Differential backup

B. Drive imaging
Which of the following terms refers to a Windows command-line network administration utility used to test the communication with another computer on an Internet Protocol (IP) network?

A. PING
B. IPCONFIG
C. MSINFO32
D. IFCONFIG
E. DXDIAG

A. PING
Microsoft’s New Technology File System (NTFS) provides several improvements over earlier File Allocation Table (FAT) file systems. These improvements include: (Select all that apply)

A. Encrypting File System (EFS) which allows for encryption of any file or folder on an NTFS volume
B. Providing the capability to set permissions on a file and folder level
C. Extending the limit for maximum volume size to 2TB (terabytes)
D. Extending the maximum file size limit for a single file to 4GB (gigabytes)
E. File compression
F. Disk quotas which allow the administrator to set a threshold of disk space that users may use and also to keep track of how much disk space each user is using

A. Encrypting File System (EFS) which allows for encryption of any file or folder on an NTFS volume
B. Providing the capability to set permissions on a file and folder level
E. File compression
F. Disk quotas which allow the administrator to set a threshold of disk space that users may use and also to keep track of how much disk space each user is using
A recovery disc is a general term for removable media commonly shipped with most new computers to allow the user to reformat the hard drive and restore the operating system to the original factory condition as configured by an Original Equipment Manufacturer (OEM). Most OEM recovery systems for Microsoft Windows involve booting from a separate CD-ROM or DVD, however in recent years bundled recovery CD-ROMs and DVDs have become less common as in case of newer systems more frequently the recovery data becomes available on a separate partition of a new computer’s hard drive.

True/False

True
The following command-line utility in Windows can be used to display information about computer’s network configuration settings (including its IP address, subnet mask, DNS server address, and default gateway).

A. TRACERT
B. PING
C. IFCONFIG
D. NETSTAT
E. IPCONFIG

E. IPCONFIG
Which of the following commands in Windows Command Prompt can be used to display help information related to a specific command-line utility? (Select 2 answers)

A. info [command]
B. [command] /help
C. $ man [command]
D. help [command]
E. [command] /?

D. help [command]
E. [command] /?
System Configuration is a Windows tool that can help in finding and isolating problems that might prevent Windows from starting correctly by providing the capability to choose which common services and programs should be run during startup. Which of the following commands is used to launch System Configuration from the Command Prompt?

A. TASKMGR
B. MSINFO32
C. APPWIZ.CPL
D. WSCUI.CPL
E. MSCONFIG

E. MSCONFIG
To create a system image of a Windows drive, the drive must be formatted to use:

A. FAT32 file system
B. CDFS file system
C. FAT file system
D. NTFS file system

D. NTFS file system
The shortcut icon to run Windows Memory Diagnostic tool can be found in:

A. System menu
B. Hardware and Sound menu in Control Panel
C. Administrative Tools menu in Control Panel
D. Performance Information and Tools menu

C. Administrative Tools menu in Control Panel
Which of the following commands can be used to open Windows Explorer from the Command Prompt?

A. EXPLORER
B. IEXPLORE.EXE
C. SERVICES.MSC
D. REGEDIT

A. EXPLORER
Both upgrade and full editions of Windows 7 include the same features and both can be used to migrate an older Microsoft OS to Windows 7, however upgrading an earlier operating system than Windows XP (for example, Windows 95 or Windows 2000) requires full edition of Windows 7 and a custom (clean) installation.

True/False

True
Which of the following Windows Command Prompt commands are used to create a directory or subdirectory? (Select 2 answers)

A. CHDIR
B. CD
C. MKDIR
D. DIR
E. RD
F. MD

C. MKDIR
F. MD
In Windows 7, the Remote Desktop Connection can be launched from the Start menu search box, from the Run menu dialog box, or from a command line. Which of the following commands is used to start Remote Desktop Connection from the Command Prompt?

A. MMC
B. EXPLORER
C. MSTSC
D. NSLOOKUP
E. SFC

C. MSTSC

*Creates connections to terminal servers or other remote computers, edits an existing Remote Desktop Connection (.rdp) configuration file, and migrates Windows XP connections (connections created with Client Connection Manager) to new .rdp files.*

In order to make sure that a hard disk has no errors, Windows operating systems offer a utility tool that can be used to scan and verify the integrity of all protected system files and to replace incorrect versions with correct Microsoft versions. Which of the following Command Prompt commands is used to launch this tool and make it repair corrupted files?

A. SFC /SCAN+VERIFY
B. SFC /VERIFYONLY
C. DISKPART /CLEAN
D. SFC /SCANNOW
E. NBTSTAT

D. SFC /SCANNOW

*The sfc command is a Command Prompt command that can be used to verify and replace important Windows system files.

System File Checker is a very useful tool to use when you suspect issues with protected Windows files like many DLL files.

/verifyonly = This sfc command option is the same as /scannow but without repairing.*

A collection of computers on a Windows network where servers are used to control the security and permissions for all computers is called:

A. Workgroup
B. Homegroup
C. Demilitarized zone (DMZ)
D. Domain

D. Domain
Which of the following Windows command-line utilities allow for copying entire directory structures with subdirectories and files? (Select all that apply)

A. COPY
B. MKDIR
C. XCOPY
D. ROBOCOPY

C. XCOPY
D. ROBOCOPY

*Xcopy*
Copies files and directories, including subdirectories. Applies To: Windows 7, Windows 8, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista

*Robocopy*
Copies file data. Applies to Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012

Which of the menus in Windows 7 Control Panel provides the quickest access to screen resolution settings?

A. Ease of Access Center
B. Display
C. Personalization
D. System

B. Display
Which of the following is an example of a biometric authentication? (Select all that apply)

A. Fingerprint scan
B. User name
C. Retinal scan
D. Password
E. Smart card

A. Fingerprint scan
C. Retinal scan
The way in which files and folders function and how items are displayed in Windows 7 can be changed by:

A. Using Administrative Tools menu in Control Panel
B. Right-clicking on any folder or file icon and setting the required options in the Properties menu
C. Setting the required options in the Personalization menu
D. Using Folder Options menu in Control Panel

D. Using Folder Options menu in Control Panel
The built-in antispyware software included with Windows is called:

A. AVG
B. Windows Firewall
C. Windows Defender
D. Microsoft Windows Malicious Software Removal Tool

C. Windows Defender
Gaining unauthorized access to a restricted area by following someone through the door they just unlocked is referred to as:

A. Shoulder surfing
B. Phishing
C. Mantrap
D. Tailgating

D. Tailgating
Virus definition database files contain all the known viruses and countermeasures against them that can be applied by a particular antivirus application. In order to be effective, an AV program needs up-to-date versions of these files which can be obtained:

A. Through AV software updates
B. Through Windows updates
C. From technical support
D. As an additional, paid option

A. Through AV software updates
Which of the following terms refers to a technology that allows multiple operating systems to work simultaneously on the same hardware?

A. Hyperthreading
B. Multi core
C. Virtualization
D. Combo drive

C. Virtualization
If a network adapter’s “Speed & Duplex” property is set to Half Duplex, it means that communication on the network will be taking place:

A. Only in one direction at a time
B. In one direction at half the speed
C. In two directions simultaneously
D. In two directions at half the speed

A. Only in one direction at a time
Which of the following Windows tools allow for migrating user data and user information to a new computer? (Select 3 answers)

A. Microsoft Management Console (MMC)
B. CHKDSK
C. USMT
D. Windows Easy Transfer
E. MBSA
F. Files and Settings Transfer Wizard

C. USMT
D. Windows Easy Transfer
F. Files and Settings Transfer Wizard

The *User State Migration Tool (USMT)* is a Microsoft *command line utility program* intended to allow advanced users, comfortable with Scripting language, to transfer files and settings between PCs. *USMT supports the high-volume, automated deployment of files and settings from Microsoft Windows versions 2000, XP, Vista and Windows 7 and is useful in migrating user settings and files during OS upgrades. 32-bit to 64-bit migrations are supported, but 64-bit to 32-bit are not.*

Allowing a program through a firewall is also known as creating:

A. Static route
B. Tunnel
C. Exception
D. Event

C. Exception
Which of the following Windows Command Prompt commands are used for creating a new directory or subdirectory? (Select 2 answers)

A. RD
B. MD
C. COPY
D. MKDIR
E. CD

B. MD
D. MKDIR
Many of the utilities available in the Administrative Tools menu in Windows Control Panel are implemented as the so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this menu (which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer) is called:

A. Task Manager
B. Performance Monitor
C. Computer Management
D. System Configuration

C. Computer Management
System Configuration is a Windows utility used for identifying problems that might prevent Windows from starting correctly. It can be launched from the Administrative Tools menu in Windows Control Panel, but also from the Windows Command Prompt. Which of the following commands is used to start System Configuration from Windows command line?

A. MSCONFIG
B. COMPMGMT.MSC
C. TASKMGR.EXE
D. CONTROL.EXE
E. MSINFO32

A. MSCONFIG
Which of the following Windows Command Prompt commands is used to display all active TCP / IP connections and listening ports?

A. NSLOOKUP
B. NET VIEW
C. TRACERT
D. NETSTAT -R
E. NETSTAT -A

E. NETSTAT -A

*-a* : Displays all active TCP connections and the TCP and UDP ports on which the computer is listening.

*-e* : Displays Ethernet statistics, such as the number of bytes and packets sent and received. This parameter can be combined with -s.

*-n* : Displays active TCP connections, however, addresses and port numbers are expressed numerically and no attempt is made to determine names.

*-o* : Displays active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID on the Processes tab in Windows Task Manager. This parameter can be combined with -a, -n, and -p.

*-p Protocol* : Shows connections for the protocol specified by Protocol. In this case, the Protocol can be tcp, udp, tcpv6, or udpv6. If this parameter is used with -s to display statistics by protocol, Protocol can be tcp, udp, icmp, ip, tcpv6, udpv6, icmpv6, or ipv6.

*-s* : Displays statistics by protocol. By default, statistics are shown for the TCP, UDP, ICMP, and IP protocols. If the IPv6 protocol for Windows XP is installed, statistics are shown for the TCP over IPv6, UDP over IPv6, ICMPv6, and IPv6 protocols. The -p parameter can be used to specify a set of protocols.

*-r* : Displays the contents of the IP routing table. This is equivalent to the route print command.

A type of identification badge that can be held within a certain distance of the reader to authenticate the holder is called:

A. Biometric device
B. RFID badge
C. Private key
D. Ethernet card

B. RFID badge
Which of the following Control Panel menus in Windows 7 offers an option to create a system repair disc?

A. Programs and Features
B. Administrative Tools
C. Backup and Restore
D. System Restore

C. Backup and Restore
The Advanced Boot Options screen allows for starting Windows in advanced troubleshooting modes. The Advanced Boot Options menu can be accessed by turning on the PC and pressing a function key before Windows starts. Which of the following keys provides access to this menu?

A. F1
B. Del
C. F8
D. Esc

C. F8
The Recovery Console available in earlier versions of Windows has been removed in Windows Vista / 7 and replaced by several tools located in the System Recovery Options menu. The System Recovery Options menu can be accessed through:

A. Advanced Boot Options screen during startup
B. System Configuration console in the Administrative Tools menu
C. Computer Management console in the Administrative Tools menu
D. Backup and Restore menu in Windows Control Panel

A. Advanced Boot Options screen during startup
Which of the following options of BOOTREC.EXE can be used to write a new Windows 7 or Windows Vista-compatible master boot record to the system partition?

A. /ScanOs
B. /FixMbr
C. /FixBoot
D. /RebuildBcd

B. /FixMbr

*Syntax*
Bootrec.ece /fixmbr

Which of the following Windows Command Prompt commands are used to delete a directory? (Select all that apply)

A. XCOPY
B. CHDIR
C. RMDIR
D. ROBOCOPY
E. CD
F. RD

C. RMDIR
F. RD
If a device in Windows fails after driver update, the driver can be restored to the previously installed version in:

A. Device Manager
B. Windows Update menu
C. Programs and Features menu
D. Task Manager

A. Device Manager
Which of the following locations can provide access to the System Recovery Options menu? (Select all that apply)

A. Hard disk (if a computer has preinstalled recovery options)
B. Windows Control Panel
C. Windows installation disc
D. Custom system repair disc
E. Computer Management console

A. Hard disk (if a computer has preinstalled recovery options)
C. Windows installation disc
D. Custom system repair disc
Windows Task Scheduler is a component of Microsoft Windows that provides the ability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut which can be used to launch the Task Scheduler MMC snap-in?

A. Personalization menu in Windows Control Panel
B. Ease of Access Center
C. Programs and Features menu in Windows Control Panel
D. Windows Command Prompt
E. Administrative Tools menu in Windows Control Panel

E. Administrative Tools menu in Windows Control Panel
Advanced details (including real-time reports) on how a computer running Windows OS is using system resources such as random access memory (RAM) and the central processing unit (CPU) can be viewed: (Select all that apply)

A. In Windows Task Scheduler
B. In Windows Resource Monitor system tool
C. On the General tab in System Configuration menu
D. On the Performance tab in Task Manager
E. On the Performance tab in Device Manager

B. In Windows Resource Monitor system tool
D. On the Performance tab in Task Manager
In computer security, a situation in which an unauthorized person is able to view another user’s display or keyboard to learn their password or other confidential information is known as:

A. Shoulder surfing
B. Tailgating
C. Authentication
D. Principle of least privilege

A. Shoulder surfing
Which of the following Command Prompt commands launches the Remote Desktop Connection utility in Windows?

A. MSTSC
B. MMC
C. SERVICES.MSC
D. EXPLORER

A. MSTSC
In Microsoft Windows OSs, system configuration information is stored centrally in a hierarchical database called:

A. Microsoft Management Console (MMC)
B. COMPMGMT.MSC
C. MSCONFIG
D. Registry

D. Registry
Which item in Windows Control Panel contains an option that allows to display hidden files, folders, and drives?

A. Folder Options
B. Administrative Tools
C. System
D. Computer Management

A. Folder Options
In computer security, the practice of obtaining confidential information by manipulating and / or deceiving people is called:

A. Social engineering
B. Authentication
C. Spyware
D. Hacking

A. Social engineering
Which of the following terms refers to a collection of Microsoft Windows technologies used by many of the multimedia applications for handling display, sound, and input related tasks?

A. Lynx
B. DirectX
C. DXDIAG
D. OpenGL
E. i.LINK

B. DirectX
After moving a dynamic disk to the local computer from another computer its status in Windows Disk Management utility is set to:

A. Foreign
B. Missing
C. Basic
D. Online

A. Foreign
In Windows XP / Vista / 7, cookie management settings can be accessed through:

A. Command Prompt interface
B. Programs and Features applet in Control Panel
C. Internet Options applet in Control Panel
D. Administrative Tools folder

C. Internet Options applet in Control Panel
Which of the following Windows Command Prompt commands launches the Registry Editor?

A. MSTSC
B. REGEDIT
C. MMC
D. MSCONFIG

B. REGEDIT
A mobile broadband technology providing wireless high-speed Internet access through portable devices is also known as:

A. WWAN
B. Dialup
C. VPN
D. SOHO

A. WWAN
In computer networks, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as a:

A. DHCP
B. Web server
C. VPN
D. Proxy

D. Proxy
A system that uses public network (such as Internet) as a means for creating private encrypted connections between remote locations is called:

A. Dialup
B. WAN
C. VPN
D. SOHO

C. VPN
Which of the following locations in Windows Control Panel provides access to proxy settings?

A. System Configuration (MSCONFIG) in Administrative Tools
B. Connections tab in Internet Options (LAN Settings)
C. Security tab in Internet Options (Custom level…)
D. Privacy tab in Internet Options (Advanced)

B. Connections tab in Internet Options (LAN Settings)
Since the release of Service Pack 2 for Windows XP, Microsoft operating systems (including Windows Vista and Windows 7) offer a Control Panel item providing users with the ability to review the status of security and (starting from Windows 7) system maintenance settings. The applet interface lists important messages about settings that require user attention and informs the user about recommended actions via a pop-up notification balloon in the taskbar area. In Windows 7, this Control Panel item is called:

A. Action Center
B. Ease of Access Center
C. Programs and Features
D. Security Center

A. Action Center
A technology that allows someone to turn on a network computer remotely by sending a special data packet (known as Magic Packet) is called:

A. VPN
B. QoS
C. Wake-on-LAN
D. PING

C. Wake-on-LAN
Which of the following Windows diagnostic tools allows for detecting problems with display, sound, and input settings?

A. MSCONFIG
B. DirectX
C. DXDIAG
D. System Information (MSINFO32)

C. DXDIAG
Task Scheduler is a Windows MMC snap-in for setting up automated tasks that perform actions at a specific time or when a certain event occurs. Which of the following commands can be used to launch this utility in Windows Command Prompt?

A. TASKMGR.EXE
B. TASKSCHD.MSC
C. WSCUI.CPL
D. COMPMGMT.MSC

B. TASKSCHD.MSC
What is the name of a new improved functionality introduced in Windows 7 that allows for managing different types of files in a structure similar to Windows folder?

A. Cluster
B. Partition
C. Library
D. Media Center

C. Library
Alongside the WorkGroup system used by previous versions, Windows 7 adds a new ad hoc home networking system known as:

A. User State Migration Tool (USMT)
B. Single Sign-On
C. Files and Settings Transfer Wizard
D. Directory service
E. HomeGroup

E. HomeGroup
ATTRIB is a command used to set and remove file attributes. Available options include read-only (R), archive (A), system (S), and hidden (H). With ATTRIB, the + symbol sets an attribute for a file, – sign removes the attribute. Which of the following answers contains the correct syntax for setting the read-only attribute to a file?

A. ATTRIB +R [drive:] [path] [filename]
B. ATTRIB /R [drive:] [path] [filename]
C. ATTRIB [drive:] [path] [filename] +R
D. ATTRIB [drive:] [path] [filename] /read-only

A. ATTRIB +R [drive:] [path] [filename]
Which of the following Windows Command Prompt commands launches a utility for managing system partitions?

A. DISKMGMT.MSC
B. CONTROL.EXE
C. WUAPP.EXE
D. COMPMGMT.MSC

A. DISKMGMT.MSC
Which of the following statements describing features of Windows HomeGroup are true? (Select all that apply)

A. Communication between HomeGroup computers is encrypted with a pre-shared password
B. Communication between HomeGroup computers is unencrypted
C. User passwords for accessing HomeGroup are stored centrally on a Domain Controller
D. Computers running Microsoft operating system earlier than Windows 7 cannot participate in HomeGroup
E. Computers running Windows XP and Windows Vista can participate in HomeGroup

A. Communication between HomeGroup computers is encrypted with a pre-shared password
D. Computers running Microsoft operating system earlier than Windows 7 cannot participate in HomeGroup
What is the function of archive bit in Windows?

A. Search indexing
B. Setting file attribute to read-only
C. Creating an extra copy of a file
D. Indicating whether a file has been modified since the last backup

D. Indicating whether a file has been modified since the last backup

*The archive bit is a file attribute used by Microsoft operating systems*, by OS/2 and by AmigaOS. *Typically its state indicates whether or not the file has been backed up*. On Windows and OS/2, *when a file is created or modified, the archive bit is set, and when the file has been backed up, the archive bit is cleared*.

Converting a dynamic disk back to a basic disk in Windows: (Select all that apply)

A. Destroys all data on the disk
B. Can be performed by members of the Backup Operators group
C. Doesn’t have any effect on the stored data
D. Can be performed by members of the Administrator group

A. Destroys all data on the disk
B. Can be performed by members of the Backup Operators group
D. Can be performed by members of the Administrator group
Which of the following Windows Control Panel items contains an option to create a password reset disk?

A. System Restore
B. Ease of Access Center
C. Parental Controls
D. User Accounts

A. System Restore
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?

A. DHCP
B. SMTP
C. SNMP
D. DNS

A. DHCP
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?

A. Quick format
B. Recycle bin
C. Degaussing
D. Low-level format

C. Degaussing
A standalone malicious computer program that replicates itself over a computer network is commonly referred to as:

A. Firmware
B. Worm
C. Spyware
D. Spam

B. Worm
Which of the following wireless encryption standards provides the lowest level of security?

A. WEP
B. WPA
C. WPA2
D. WAP

A. WEP
Unwanted programs designed specifically to damage or disrupt the operation of a computer system are commonly referred to as:

A. QoS
B. Spam
C. RFID
D. Malware

D. Malware
Which of the following default local groups has the least amount of access privileges in Windows?

A. Backup Operators
B. Administrators
C. Power Users
D. Guests

D. Guests
Which of the following prevention methods fall into the category of digital security? (Select all that apply)

A. Retinal scanner
B. Antivirus
C. Privacy filter
D. Firewall
E. RFID badge
F. Antispyware

B. Antivirus
C. Privacy filter
D. Firewall
F. Antispyware
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is called:

A. Principle of least privilege
B. Single Sign-On (SSO)
C. Social engineering
D. Phishing

A. Principle of least privilege
A network security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network is commonly referred to as:

A. MAC filtering
B. SSID broadcast
C. Encryption
D. Static IP addressing

A. MAC filtering
Which of the following is an example of an APIPA address?

A. 127.0.0.1
B. 192.168.0.3
C. 169.254.10.20
D. 65.55.57.27

C. 169.254.10.20
Which of the following prevention methods fall into the category of physical security? (Select all that apply)

A. Firewall
B. Key fob
C. Door locks
D. Antivrus
E. Directory permissions
F. RFID badge

B. Key fob
C. Door locks
F. RFID badge
A set of physical characteristics of the human body that can be used for identification and access control purposes is known as:

A. Biometrics
B. Physical security
C. Physical token
D. RFID badge

A. Biometrics
Which of the following provides the best defense against social engineering attacks?

A. User education
B. Hard drive sanitation
C. Spam filters
D. Strong passwords

A. User education
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)

A. Phishing
B. Share permissions
C. User authentication
D. Social engineering
E. Principle of least privilege

A. Phishing
D. Social engineering
Third-party antivirus software can be kept up to date through:

A. Virus signature updates
B. Windows updates
C. Auditing
D. Virtualization

A. Virus signature updates
An error screen displayed by operating systems after a crash is commonly referred to as:

A. BSOD
B. BIOS
C. JBOD
D. CAPTCHA

A. BSOD
Software that performs unwanted and harmful actions in disguise of a legitimate and useful program is also referred to as:

A. Firmware
B. Trojan horse
C. Console application
D. VPN

B. Trojan horse
Which of the following technologies allows one core on the microprocessor to appear as multiple cores to the operating system?

A. QPI
B. HTT
C. HyperTransport
D. CrossFireX

B. HTT
An account that allows users to have temporary access to a computer without the capability to install software or hardware, change settings, or create a password is called:

A. Guest account
B. Administrator account
C. Standard account
D. Single Sign-On (SSO)

A. Guest account
In computer security, a malicious software designed to hide the existence of certain processes or programs from normal methods of detection and enable continued unathorized access to a computer is known as:

A. Worm
B. Hypervisor
C. Patch
D. Rootkit

D. Rootkit
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?

A. DNS
B. DHCP
C. SMTP
D. HTTP

B. DHCP
Which of the following examples falls into the category of biometric authentication?

A. Retinal scan
B. Smart card
C. User name
D. Password

A. Retinal scan
Computer programs collecting information about users without their knowledge or consent are commonly referred to as:

A. Proxy servers
B. Pop-ups
C. Spyware
D. File recovery software

C. Spyware
Which of the following terms refer to a method for securing mobile devices that allows for removing data stored on a lost or stolen device? (Select 2 answers)

A. SSID broadcast
B. Remote wipe
C. Encryption
D. Remote sanitation
E. Degaussing
F. MAC filtering

B. Remote wipe
D. Remote sanitation
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is called:

A. Phishing
B. Shoulder surfing
C. Principle of least privilege
D. Tailgating

A. Phishing
Which of the following security measures can be applied to a wired SOHO network? (Select all that apply)

A. Disabling unused ports
B. Disabling SSID broadcast
C. Changing SSID
D. MAC filtering

A. Disabling unused ports
D. MAC filtering