Back to AI Flashcard MakerInformation Technology /CompTIA A+ 220-1001 & 220-1002 Exam Cram A - CompTIA A+ 1002

CompTIA A+ 220-1001 & 220-1002 Exam Cram A - CompTIA A+ 1002

Information Technology80 CardsCreated 3 months ago

Windows 7, Windows 8.1, and Windows 10 (version 1803) are all Microsoft operating systems commonly used on PCs. iOS, Android, and Linux are not Microsoft OSs—they are used in mobile and open-source environments.

Which of the following are Microsoft Operating Systems? (Choose ALL Correct Answers)

Windows 8.1

iOS

10 Version 1803

Android

Linux

Windows 7

Windows 8.1
10 Version 1803
Windows 7

Explanation:
Windows 8.1, Windows 10 (version 1803), and Windows 7 are all Microsoft operating systems that you should know for the exam.

Incorrect Answers:
iOS is the operating system Apple uses on its mobile devices.

Android is the competitor of iOS and is an open-source operating system used on many other manufacturers’ mobile devices. Android is developed from Linux.

The original Linux was made for PCs with the goal of being a freely accessible, open-source platform; today it is more commonly found in server form. Okay, that was an easy one…moving on!

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 155). Pearson Education. Kindle Edition.

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/80

Key Terms

Term
Definition

Which of the following are Microsoft Operating Systems? (Choose ALL Correct Answers)

Windows 8.1

iOS

10 Version 1803

Android

Linux

Windows 7

Windows 8.1
10 Version 1803
Windows 7

Explanation:
Windows 8.1, Windows 10 (ve...

Which of the following is the default file system used by Windows?

FAT32
CDFS
NTFS
exFAT

NTFS

Where is the Notification Area located in Windows?

In the System Properties dialog box
In the System32 folder
On the Taskbar
Within the Start Menu

On the Taskbar

Which of the following is the minimum amount of RAM needed to install a 64-bit version of Windows 10?

512 MB
1 GB
2 GB
4 GB

2 GB

In Windows, an MMC is blank by default. Which of the following should be added to the MMC to populate it with Programs?

Applets
Files
Directories
Snap-ins

Snap-ins

  • Which of the following files is the boot loader in Windows?

Winload.exe
BCD
Setup.exe
Ntoskrnl.exe

Winload.exe

Explanation:
Winload.exe is the Windows boot loader program for Windows ...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Which of the following are Microsoft Operating Systems? (Choose ALL Correct Answers)

Windows 8.1

iOS

10 Version 1803

Android

Linux

Windows 7

Windows 8.1
10 Version 1803
Windows 7

Explanation:
Windows 8.1, Windows 10 (version 1803), and Windows 7 are all Microsoft operating systems that you should know for the exam.

Incorrect Answers:
iOS is the operating system Apple uses on its mobile devices.

Android is the competitor of iOS and is an open-source operating system used on many other manufacturers’ mobile devices. Android is developed from Linux.

The original Linux was made for PCs with the goal of being a freely accessible, open-source platform; today it is more commonly found in server form. Okay, that was an easy one…moving on!

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 155). Pearson Education. Kindle Edition.

Which of the following is the default file system used by Windows?

FAT32
CDFS
NTFS
exFAT

NTFS

Where is the Notification Area located in Windows?

In the System Properties dialog box
In the System32 folder
On the Taskbar
Within the Start Menu

On the Taskbar

Which of the following is the minimum amount of RAM needed to install a 64-bit version of Windows 10?

512 MB
1 GB
2 GB
4 GB

2 GB

In Windows, an MMC is blank by default. Which of the following should be added to the MMC to populate it with Programs?

Applets
Files
Directories
Snap-ins

Snap-ins

  • Which of the following files is the boot loader in Windows?

Winload.exe
BCD
Setup.exe
Ntoskrnl.exe

Winload.exe

Explanation:
Winload.exe is the Windows boot loader program for Windows 10, 8, and 7. It is located in %systemroot%\System32 (which is usually C:\Windows\System32). It works in conjunction with the Bootmgr file (Windows Boot Manager). Bootmgr is the first file to load in Windows. It reads the BCD and displays an OS menu (if there is more than one OS).

Incorrect Answers:
The BCD is the Boot Configuration Data store; it is the successor to boot.ini.

Setup.exe is the default name of the file that starts installations of Windows and many other programs.

Ntoskrnl.exe is the main system file of Windows; without it, the system would crash and the file would have to be replaced or repaired.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 156). Pearson Education. Kindle Edition.

Which specific tool enables you to create a partition in Windows?

Disk Management
Format Command
Computer Management
Disk Cleanup

Disk Management

Which type of partition should an OS be installed to?

Primary
Extended
Dynamic
Logical Drive

Primary

Which of the following tools enables you to find out how much memory a particular application is using?

Msconfig
Task Manager
chkdsk
System Information

Task Manager

Which of the following features is used to both start and stop services? (Select the Two Best Answers)

Computer Management

Task Manager

Performance Monitor

MMC

Msconfig

Computer Management
Task Manager

Explanation:
You can start, stop, and restart services within Computer Management > Services and Applications > Services. From there, right-click the service in question and configure it as you wish. You can also open Services by going to the Run prompt and typing services.msc.

The Task Manager can also be used to start and stop services, as well as to analyze the performance of the CPU, RAM, and the networking connections. You can also start and stop services with the net start / net stop and sc start / sc stop commands.

Incorrect Answers:
Performance Monitor analyzes the computer in much more depth than the Task Manager.

The MMC is the Microsoft Management Console, which is the index that can store other console windows such as Computer Management.

Among other things, Msconfig is used to enable/disable services, but not to start them.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 157). Pearson Education. Kindle Edition.

Which of the following user account permissions are needed to install device drivers on Windows?

Standard User
Guest
Administrator
Power Users

Administrator

Which of the following commands creates a New Directory in the Windows Command Prompt?

CD
MD
RD
SD

MD

  • Which of the following commands is entered at the Command Prompt to learn more about the dir command? (Select the Two Best Answers)

dir help
help dir
dir /?
dir man

help dir
dir /?

Explanation:
To learn more about any command in Windows, open the Command Prompt, type the command and then /?, or type help dir.

Incorrect Answers:
dir help would attempt to find the file named HELP within the current directory.

dir man would most likely result in a “file not found” error. MAN pages are help pages used in Linux and macOS.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 157). Pearson Education. Kindle Edition.

Which interface is used to launch the ipconfig command?

Command Prompt
Control Panel
MMC
Task Manager

Command Prompt

A customer’s computer is using FAT32. Which file system can you upgrade it to when using the Convert Command?

NTFS
ext4
exFAT
NFS

NTFS

Which of the following can be used to keep hard drives free of errors and ensure that Windows runs efficiently? (Select the Two Best Answers)

Disk Management

Disk Defragmenter

Check Disk

System Restore

Task Scheduler

Disk Defragmenter

Check Disk

What is Windows Recovery Environment known as? (Select the Two Best Answers)

WinRE
Recovery Console
Advanced Boot Options
System Recovery Options

WinRE
System Recovery Options

Explanation:
The Windows Recovery Environment (Windows RE or WinRE) is also known as System Recovery Options. From here, you can restore the system, fix file errors, and work in an unprotected Command Prompt.

Incorrect Answers:
The Recovery Console is the predecessor of WinRE, in the deprecated Windows XP.

Advanced Boot Options is the menu that you can access by pressing F8. It is also referred to as ABOM, and in Windows 8/8.1/10 is known as Startup Settings.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 158). Pearson Education. Kindle Edition.

Which log file contains information about Windows setup errors?

setupact. log
setuperr. log
unattend. xml
diskmgmt. msc

setuperr.log

  • Which of the following represents the RAM limitation of Windows 8.1 Pro 64-bit?

4 GB
128 GB
512 GB
2 TB

512 GB

Explanation:
The physical memory limit of Windows 8.1 Pro is 512 GB on a 64-bit system. That is also the RAM limit for Windows 8.1 Enterprise; however, Windows 8.1 standard can access only 128 GB of RAM. Even though 64-bit CPUs can address a realistic maximum of 256 terabytes (TB), software is usually far more limited (as of the writing of this book in 2019).

Incorrect Answers:
Windows 10 Home can access 128 GB. Windows 10 Pro and Education can access 2 TB of RAM.

Windows 10 Enterprise can access 6 TB. The maximum that Windows 7 64-bit Professional, Ultimate, and Enterprise can access is 192 GB of RAM.

Keep in mind that 32-bit versions of Windows 8.1 (and other versions of Windows) can access only a maximum of 4 GB of RAM, due to the limitations of 32-bit CPUs.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (pp. 158-159). Pearson Education. Kindle Edition.

A customer’s Device Manager shows an arrow pointing down over one of the devices. What does this tell you?

The Device Driver has not been installed.
The Device is not recognized.
The Device is Disabled
The Device is in Queue to be Deleted

The Device is Disabled

Which of the following is NOT an advantage of NTFS over FAT32?

NTFS supports file encryption.
NTFS supports larger file sizes.
NTFS supports larger volumes.
NTFS supports more file formats.

NTFS supports more file formats.

A coworker just installed a second drive in his Windows computer. However, he does not see the drive in Explorer. What did he forget to do? (Select the Three Best Answers)

Format the Drive

Partition the Drive

Run FDISK

Initialize the Drive

Setup the Drive in UEFI/BIOS

Format the Drive
Partition the Drive
Initialize the Drive

How would you create a Restore Point in Windows?

Run Disk Defragmenter from the MMC
Run Backup and Restore from the Control Panel
Run the System Restore program from System Properties
Run the Disk Cleanup program from the System Properties

Run the System Restore program from System Properties

Which of the following tasks CANNOT be performed from the Printer Properties Screen?

Modifying Spool Settings
Adding Ports
Pausing Printing
Enabling Sharing

Pausing Printing

You are setting up auditing on a Windows Computer. If it's set up properly, which of the following logs should contain entries?

Application Log
System Log
Security Log
Maintenance Log

Security Log

Which type of virus propagates itself by tunneling through the Internet and networks?

Macro
Phishing
Trojan
Worm

Worm


Which component of Windows enables users to perform common tasks as nonadministrators and, when necessary, as administrators without having to switch users, log off, or use Run As?

USMT
UAC
USB
VNC

UAC

Which of the following tasks can be performed to secure your WAP/Router? (Select ALL That Apply)

Changing the Default SSID Name
Turning off SSID Broadcasting
Enabling DHCP
Disabling DHCP

Changing the Default SSID Name
Turning off SSID Broadcasting
Disabling DHCP

When you connect to a website to make a purchase by credit card, you want to make sure the website is secure. Which of the following statements best describes how to determine whether a site is secure? (Select the Two Best Answers)

You should look for the padlock (in the locked position) toward the top or bottom of the screen.
You should look for the padlock (in the unlocked position) toward the top or bottom of the screen.
You should look for the Protocol HTTP in the address or URL bar.
You should look for the Protocol HTTPS in the address or URL bar.

You should look for the padlock (in the locked position) toward the top or bottom of the screen.
You should look for the Protocol HTTPS in the address or URL bar.

Which type of software helps protect against viruses that are attached to email?

Firewall Software
Antivirus Software
Internet Explorer
Hardware Firewall

Antivirus Software

Which of the following is an example of Social Engineering?

Asking for a Username and Password over the phone.
Using someone else's unsecured Wireless Network
Hacking into a Router
A Virus

Asking for a Username and Password over the phone.

Where are software-based Firewalls most commonly implemented?

On Routers
On Servers
On Clients
On Switches

On Clients

Making data appear as if it is coming from somewhere other than its original source is known as which of the following terms?

Impersonation
Phishing
Zero-Day
Spoofing

Spoofing

A Fingerprint Reader is known as which type of security technology?

Biometrics
Smart Card
Barcode Reader
SSID

Biometrics

Which of the following is the most secure password?

marquisdesod
Marqu1sDeS0d
MarquisDeSod
Marqu1sDeS0dver2

Marqu1sDeS0dver2

Which shortcut key combination immediately locks Windows?

CTRL + ALT + DEL
Windows + R
Windows + M
Windows + L

Windows + L

Which of the following is the most secure file system in Windows?

ext4
exFAT
NTFS
FAT32

NTFS


Which of the following is the most secure for your Wireless Networks?

WEP
WPA2
TKIP
WPA

WPA2

Which of the following terms refers to when people are manipulated into giving access to Network Resources?

Shoulder Surfing
Social Engineering
Phishing
Spear Phishing

Social Engineering


  • A customer's Windows computer needs a new larger, faster hard drive. Another tech in your company installs the new drive and then formats the old drive before delivering it to you for disposal. How secure is the customer's data?

Confidential
Very Secure
Secure
Completely Secured

Very Secure

Explanation:
The data is very insecure. Many tools can recover data from a drive after it is formatted. Some companies will “low-level” format the drive, or sanitize the drive (as opposed to a standard format in Windows, for example) and keep it in storage indefinitely. The organization might go further and use data wiping software; in fact, this might be a policy for the organization. Always check your organization’s policies to be sure you are disposing of or recycling hard drives properly.

Incorrect Answers:
Confidential is a term used to classify data. For example, personally identifiable information should be kept confidential (where only the appropriate personnel can access it).

Secure is a relative term. Remember: nothing is ever Completely Secured.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 163). Pearson Education. Kindle Edition.

Which of the following offers hardware-based authentication?

NTFS
Smart Card
Strong Passwords
Encrypted Passwords

Smart Card

Which protocol encrypts transactions through a Website?

HTTP
SSL
PuTTY
Kerberos

SSL

  • Which of the following is a Common Local Security Policy?

Use of RAID
Password Length
Router Passwords
Use of a Password to Log In

Password Length

Explanation:
Common local security policies include password length, duration, and complexity. Just the use of a password doesn’t constitute a password policy. An example of a password policy would be when an organization mandates that passwords be 15 characters in length with at least 1 capital letter, 1 number, and 1 special character. In Windows you would access Local Security Policy > Security Settings > Account Policies > Password Policy to make changes to these things.

Incorrect Answers:
Simply having a RAID array is not a security policy, though security policies often define how the RAID array will be used.

Again, just having passwords (such as router passwords or other passwords used to log in) does not establish policy. Modifying how passwords are selected and enforced is a security policy.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 164). Pearson Education. Kindle Edition.

A coworker downloads a game that ends up stealing information from the computer system. What is this known as?

Worm
Spam
Trojan
Spyware

Trojan

Which of the following is an open-source operating system?

Android
iOS
Windows 8.1
macOS

Android

Where can you obtain applications for Mobile Devices? (Select the Three Best Answers)

Spotlight
App Store
Google Play
iTunes

App Store
Google Play
iTunes

You need to locate a mobile device that was stolen. Which technology can aid in this?

GPS
Screen Orientation
Passcode Locks
Gmail

GPS

Which kinds of data are typically synchronized on a smartphone? (Select the Two Best Answers)

Contacts
PHP Pages
Email
SQL Databases

Contacts | Email

Which of the following is the second step of the A+ Troubleshooting Theory?

Identify the Problem
Establish a Probable Cause
Test the Theory
Document

Establish a Probable Cause

You successfully modified the Registry on a computer's PC. Now the customer's system gets onto the Internet normally. Which of the following steps should be performed next?

Bill the Customer
Move on to the next computer
Document your Solution
Run Disk Defrag

Document your Solution

Buss gets an error that says "Error Log Full." Where should you go to clear this error log?

Device Manager
System Info
Recovery Console
Event Viewer

Event Viewer

Which of the following tools checks protected system files?

chkdsk
dism
scandisk
SFC

SFC

After installing a new hard drive on a Windows computer, Len tries to format the drive. Windows does not show the format option in Disk Management. What did Len forget to do first?

Run chkdsk
Partition the drive
Defragment the drive
Copy system files

Partition the drive

Which Windows System Recovery option attempts to automatically fix problems?

System Restore
Startup Repair
File History
Reset Your PC

Startup Repair

Which utility enables you to troubleshoot an error with a file such as ntoskrnl.exe?

Registry
Event Viewer
REGSVR32
Terminal

Event Viewer

A blue screen is most often caused by _?

Driver Failure
Memory Failure
Hard Drive Failure
CD-ROM Failure

Driver Failure

A Tech is installing a program on a Windows computer and the installation fails. Which of the following statements describes the next best step?

Run the installer as an Administrator
Contact the programs manufacturer
Reinstall Windows on the Computer
Upgrade to the Latest Version of Windows

Run the installer as an Administrator


Which of the following statements best describes how to apply spray cleaner to a monitor?

Spray the cleaner directly on the monitor screen
Spray the cleaner on the top of the monitor and wipe down
Spray evenly on the monitor
Spray the cleaner on a clean, lint-free cloth first

Spray the cleaner on a clean, lint-free cloth first


You and a coworker are running network cables above the drop ceiling. The coworker accidently touches a live AC power line and is thrown off the ladder and onto the ground. He is dazed and can't stand. He is no longer near the AC power line. Which of the following statements best describes the first step you should take?

Cut the power to the breaker
Move the coworker farther down the hall
Apply CPR
Call 911

Call 911


A computer you are working on has alot of dust inside it. Which of the following statements best describes how to clean this?

Disassemble the power supply and remove the dust
Use a household vacuum to clean up the dust
Use a surface dust cleaning solution
Use compressed air to remove the dust

Use compressed air to remove the dust


You are working on a very old printer and it begins to smoke. Which of the following statements best describest the first step you should take?

Turn off the Printer

Call 911

Unplug the Printer

Call Maintenance

Tell the Printer it is bad to smoke

Unplug the Printer

Which of the following statements best describes the recommended method for handling an empty toner cartridge?

Throw it away
Incinerate it
Refill it
Recycle it

Recycle it

One of your technicians is on a service call and is dealing with a furious customer who has been shouting loudly. The technician tries but cannot calm down the customer. Which of the following statements best describes the next step the technician should take?

He should let the customer continue to shout; sooner or later the customer will get tired and calm down
He should call the supervisor and complain
He should leave the customer site and document the incident
He should shout back ad the customer in an attempt to regain control

He should leave the customer site and document the incident

While you are working at a customer site, a friend calls you on your cell phone. Which of the following statements best describes the recommended course of action?

Ignore the call for now
Go outside and take the call
Answer the phone as quietly as possible
Text your friend

Ignore the call for now

  • Which of the following tools is used when setting the computer to boot with the Selected Startup feature?

Task Manager
Windows RE
Safe Mode
Msconfig

Msconfig

Explanation:
Msconfig enables you to modify the startup selection. You can boot the computer in different modes with Msconfig. You can also enable and disable services.

Incorrect Answers:
The Task Manager gives you a snapshot of your system’s performance and allows you to shut down applications (tasks) or processes, even if the application is hanging or frozen.

Windows RE is the Windows Recovery Environment, a special repair environment that is used to fix issues in the operating system. From here, you can fix system file issues and repair the boot sector, along with GPT and MBR-related issues.

Safe Mode is one of the options in the Startup Settings/Advanced Boot Options menu. It starts the computer with a basic set of drivers so that you can troubleshoot why devices have failed. It is also instrumental when dealing with viruses.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (pp. 168-169). Pearson Education. Kindle Edition.

Which of the following file extensions is used when saving PowerShell scripts?

.js
vbs
.ps1
.py

.ps1

You have been given the task of installing a new hard drive on a server for a customer. The customer will be supervising your work. Which of the following questions should you ask the customer first?

What is the Administrator Password?
Are there any current backups?
Do you want me to shut down the Server?
Which version of Windows Server is this?

Are there any current backups?

You just upgraded the president's computer's video driver. Now, the Windows 10 system will not boot. Which of the following steps should be taken first?

Access the Windows RE command prompt
Boot into Safe Mode and roll back the driver
Reinstall the OS
Boot into Directory Services Restore Mode

Boot into Safe Mode and roll back the driver

Which tool is used to analyze and diagnose a video card, including its DirectX version?

Device Manager
DxDiag
Services.msc
USMT

DxDiag

Which of the following statements best describes a common risk when installing Windows Drivers that are unsigned?

System stability may be compromised
Files might be cross-linked
The drive might become fragmented
Physical damage to the device might occur

System stability may be compromised

Which of the following settings must be established when you want to make a secure wireless connection? (Select ALL That Apply)

The brand of access point
The wireless standard used
The encryption standard used
The SSID of the Access Point

The encryption standard used | The SSID of the access point

  • Which Windows utility is used to prepare a drive image for duplication across the network?

Robocopy
Sysprep
Ghost
Image Clone

Sysprep

Explanation:
Sysprep is one of the utilities built into Windows for image deployment over the network. Sysprep preps the system to be moved as an image file.

Incorrect Answers:
Ghost and Image Clone are third-party offerings.

Robocopy copies entire directories (in the same physical order, too).

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 170). Pearson Education. Kindle Edition.

In Windows, when will a computer dump the physical memory?

When the wrong processor is installed
When a device is missing drivers
When the computer is shut down improperly
When the computer detects a condition from which it cannot recover

When the computer detects a condition from which it cannot recovery

When a person takes control of a session between a server and a client, it is known as which type of attack?

DDoS
Brute Force
Session Hacking
Malicious Software

Session Hacking

  • The message "The Windows Boot Configuration Data File is Missing Required Information" appears on the screen. Which command can repair this issue?

bootrec /fixboot
bootrec /fixmbr
bootrec /rebuildbcd
boot\bcd

bootrec /rebuildbcd

Explanation:
Bootrec /rebuildbcd attempts to rebuild the boot configuration store.

Incorrect Answers:
Bootrec /fixboot is one of the methods you can try to repair bootmgr.exe in Windows.

Bootrec /fixmbr rewrites the master boot record in a Windows system that has an MBR-based hard drive (doesn’t affect the more common GPT-based drive).

boot\bcd is where the boot configuration store is located.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.

Which of the following should be performed during a hard drive replacement to best maintain data privacy?

Completely erase the old drive prior to disposal
Format the new drive twice prior to installation
Use only FAT32 file system when formatting the new drives
Install antivirus software on the computer before removing the old hard drive

Completely erase the old drive prior to disposal


  • Which tool is used to backup data on the C: drive in Windows 10?

Backup and Restore
BitLocker
Time Machine
File History

File History

Explanation:
The Windows 10 and 8 File History utility (accessible in the Control Panel) enables a user to back up files or the entire PC.

Incorrect Answers:
The File History utility is the successor to Windows 7’s Backup and Restore.

BitLocker is Microsoft’s full drive encryption software.

Time Machine is the backup program that is built into macOS.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.

  • Which of the following is the minimum processor requirement for Windows 10?

32 GB
1 GHz
2 GHz
2 GB

1 GHz

Explanation:

Windows 10 (and Windows 8 and Windows 7) requires a minimum processor frequency of 1 GHz.

Incorrect Answers:

Windows 10 64-bit requires 32 GB of hard drive space.

As of the writing of this book, 2 GHz is not a valid answer for Windows.

The minimum RAM requirement for 64-bit versions of Windows is 2 GB.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 171). Pearson Education. Kindle Edition.

You create an answer file to aid in installing Windows. Which type of installation are you performing? (Select the Best Answer)

Drive image installation
USB installation
Multiboot installation
Unattended installation

Unattended installation


Which of the following utilities can be used to view the startup programs?

ipconfig
ping
regedit
dxdiag

regedit