CompTIA A+ 220-1001 & 220-1002 Exam Cram B - CompTIA A+ 1002
To restart the Print Spooler service, use the command line with net stop spooler followed by net start spooler, or access it via Computer Management > Services to manually restart it. The Event Viewer does not control services.
Which of the following statements best describes how to restart the Print Spooler Services? (Select the Two Best Answers)
Which of the following statements best describes how to restart the Print Spooler Services? (Select the Two Best Answers)
Enter net stop spooler and then net start spooler on the command line
Enter net stop print spooler and then net start print spooler on the command line
Goto Computer Management > Services and Restart the Print Spooler Service
Goto Computer Management > System Tools > Event Viewer and Restart Print Spooler Service
Enter net stop spooler and then net start spooler on the command line
Goto Computer Management > System Tools > Event Viewer and Restart Print Spooler Service
Key Terms
Which of the following statements best describes how to restart the Print Spooler Services? (Select the Two Best Answers)
Enter net stop spooler and then net start spooler on the command line
Enter net stop print spooler and then net start print spooler on the command line
Goto Computer Management > Services and Restart the Print Spooler Service
Goto Computer Management > System Tools > Event Viewer and Restart Print Spooler Service
Enter net stop spooler and then net start spooler on the command line
Goto Computer Management > System Tools >...
Where is Registry hive data stored?
\%systemroot%\Windows
\%systemroot%\Windows\System32\Config
\%systemroot%\System32
\%systemroot%\System32\Config
\%systemroot%\System32\Config
Clinton needs a more secure partition on his hard drive. Currently, the only partition on the drive (C:) is formatted as FAT32. He cannot lose the data on the drive but must have a higher level of security, so he is asking you to change the drive to NTFS. Which of the following is the proper syntax for this procedure?
change C: /FS:NTFS
change C: NTFS /FS
convert C: /FS:NTFS
convert C: NTFS /FS
convert C: /FS:NTFS
Tom has a 200 GB hard drive partition (Known as C:) on a Windows Computer. He has 15 GB free space on the partition. Which of the following statements best describes how he can defrag the partition?
He can run the Disk Defragmenter in Computer Management
He can run defrag.exe -f on the command line.
He can run defrag.exe -v on the command line.
He can run defrag.exe -A on the command line.
He can run defrag.exe -f on the command line.
Explanation:
Use defrag.exe -f. You ne...
You are utilizing WSUS and are testing new updates on the PCs. What is this an example of?
Host-Based Firewall
Application baselining
Patch Management
Virtualization
Patch Management
Which versions of Windows 8 allow for joining domains? (Select the Two Best Answers)
Standard
Pro
Ultimate
Enterprise
Pro
Enterprise
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Enter net stop spooler and then net start spooler on the command line | Enter net stop spooler and then net start spooler on the command line |
\%systemroot%\Windows | \%systemroot%\System32\Config |
Clinton needs a more secure partition on his hard drive. Currently, the only partition on the drive (C:) is formatted as FAT32. He cannot lose the data on the drive but must have a higher level of security, so he is asking you to change the drive to NTFS. Which of the following is the proper syntax for this procedure? change C: /FS:NTFS | convert C: /FS:NTFS |
He can run the Disk Defragmenter in Computer Management | He can run defrag.exe -f on the command line. Explanation: Incorrect answers: The -v switch gives you verbose (or wordy) output. The -a switch gives analysis only and does not perform defragmentation. L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 193). Pearson Education. Kindle Edition. |
You are utilizing WSUS and are testing new updates on the PCs. What is this an example of? Host-Based Firewall | Patch Management |
Which versions of Windows 8 allow for joining domains? (Select the Two Best Answers) Standard | Pro Enterprise |
One of your customers reports that there is a large amount of spam in her email inbox. Which of the following statements describes the best course of action to recommend to her? Advise her to create a new email account | Advise her to add the senders to the junk email senders list |
In Windows, where can devices like the display and hard drives be configured to turn off after a certain amount of time? Power Plans | Power Plans |
Which of the following procedures best describes how to find out which type of connection the printer is using? Right-Click the Printer, Select Properties, and Click Sharing Tab | Right-Click the Printer, Select Properties, and select the Ports Tab. |
Your customer is having problems printing from an application. You attempt to send a test page to the printer. Which of the following statements best describes why a test page should be used to troubleshoot the issues? It allows you to see the quality of the printer output | It verifies the connectivity and illuminates possible application problems. |
A user’s hard drive seems very slow in its reaction to when opening applications. Which of the following statements best describes the most likely cause of this? The drive needs to be initialized | The drive is fragmented |
Which of the following actions will NOT secure a functioning computer workstation? Setting a Strong Password | Sanitizing the Hard Drive |
Which utility enables you to implement auditing on a single Windows Computer? Local Security Policy | Local Security Policy |
Which of the following statements best describes the main function of a device driver? Modifies Applications | Allows the OS to talk to the devices |
The Recycler Folder | The System Volume Information Folder |
Which of the following is considered to be government-regulated data? DRM | PII |
Which of the following are types of social engineering? (Select the Two Best Answers) Malware | Shoulder Surfing Tailgating |
Which of the following is the service that controls the printing of documents in a Windows Computer? Printer | Print Spooler |
Which of the following is the best way to ensure that a hard drive is secure for disposal? Magnetically erase the drive | Magnetically erase the drive |
A month ago, you set up a wireless access point/router for a small business that is a customer of yours. Now, the customer calls and complains that Internet access is getting slower and slower. As you look at the WAP/router, you notice that it was reset at some point and is now set for Open Access. You then guess that neighboring companies are using the service connection. Which of the following statements best describes how you can restrict access to your customer’s wireless connection? (Select the Two Best Answers) Configure the wireless access point to use WPA2 | Configure the wireless access point to use WPA2 Disable SSID Broadcasting |
A first-level help desk support technician receives a call from a customer and works with the customer for several minutes to resolve the call, but the technician is unsuccessful. Which of the following steps should the technician perform next? The tech should explain to the customer that he will receive a callback when someone more qualified is available. | The tech should escalate the call to another tech. |
A customer complains that there is nothing showing on the display of his laptop. Which of the following should you attempt FIRST on the computer? You should replace the inverter | You should check whether the laptop is in Standby or Hibernate mode. |
CD-ROM | SCSI Drive Explanation: Incorrect answers: The BIOS/UEFI doesn’t use a driver; it is firmware. L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 198). Pearson Education. Kindle Edition. |
A Windows 10 Computer in a Windows Workgroup can have how many concurrent connections? 10 or Fewer | 20 or fewer |
Megan's laptop runs perfectly when she is at work, but when she takes it on the road, it cannot get on the Internet. Internally, the company uses static IP Address for all computers. What should you do to fix the problem? Tell Megan to get a wireless cellular card and service | Configure a static IP address in the Alternate Configuration tab of the user's TCP/IP properties and enable DHCP in the General Tab. |
Which power saving mode enables the best power saving, while still allowing the session to be reactivated later? Standby | Hibernate |
Files on the system drive can be secured | Files on the system drive can be secured | The cluster size is smaller, and storage is more efficient on the system drive. |
When using the command line, a switch _? enables the command to work across any operating system | alters the actions of a command, such as widening or narrowing the function of the command |
You need to view any application errors that have occurred today. Which tool should be used? Event Viewer | Event Viewer |
Which of the following commands can help you modify the startup environment? Msconfig | Msconfig |
Which of the following log files references third-party software error messages? Security Log | Application Log |
Which of the following provides the lowest level of wireless security protection? Disable the SSID Broadcast | Disable the SSID Broadcast |
Enable encryption on the Router and the Clients | Enable encryption on the Router and the Clients | Increase the level of security on the NTFS folder by changing the Permissions |
A customer is having difficulties with his hard drive, and the system won't boot. You discover that the operating system has to be reloaded. Which of the following statements best describes how to explain this to the customer? "I need to rebuild the computer." | "I need to restore the system, data loss might occur." |
Users in your accounting department are prompted to provide usernames and passwords to access the payroll system. Which type of authentication method is being requested in this scenario? MFA | Single-Factor |
Which of the following commands makes a duplicate of a file? Move | Copy |
Which tool in Windows enables a user to easily see how much memory a particular process uses? System Information Tool | Task Manager |
Windows was installed on a computer with two hard drives: a C: drive and a D: drive. Windows is installed to C:, and it works normally. The user of this computer complains that this applications are drive intensive and that they slow down the computer. Which of the following statements best describes how to resolve the problem? Move the Paging File to the D: Drive | Move the Paging File to the D: Drive. |
Which of the following tools should be used to protect a computer form electrostatic discharge (ESD) while you are working inside it? Multimeter | Antistatic Wrist Strap |
You are running some cable from an office to a computer located in a warehouse. As you are working in the warehouse, a 55-gallon drum falls from a pallet and spills what smells like ammonia. Which of the following statements best describes the first step you should take in your efforts to resolve this problem? Call 911 | Get out of the area |
While you are upgrading a customer's sever hard drives, you notice looped network cables lying all around the server room floor. Which of the following statements best describes how to resolve this issue? Ignore the problem | Tell the customer about safer alternatives |
Which of the following statements best describes the recommended solution for a lithium-ion battery that won't hold a charge any longer? Throw it in the trash | Connect the local municipality and inquire as to their disposal methods |
Which of the following statements is NOT assertive communication? "I certainly know how you feel, losing data is a terrible thing." | "Do your employees always cause issues on computers like these?" |
A customer has a malfunctioning PC, and as you are about to begin repairing it, the customer proceeds to tell you about the problem with the Server. Which of the following statements best describes how to respond to the customer? "Wait until I finish with the PC." | "Is the server problem related to the PC Problem?" |
Which of the following could be described as the chronological paper trail of evidence? First Response | Chain of Custody |
Which of the following statements best describes what NOT to do when moving servers and server racks? Remove Jewelry | Move a 70-pound wire rack by yourself |
Active communication includes which of the following? Filtering out unnecessary information | Clarifying the customer's statements |
You are troubleshooting a tablet PC that has a frozen application. You have attempted to end the underlying Task of the application but have not succeeded. Which of the following statements best describes the next recommended course of action? Hard reset | Soft reset |
Which of the following statements best describes the first course of action to removing malware? Schedule scans and run updates Enable system restore Identify malware symptoms Educate the end user Disable system restore Quarantine infected systems Remediate infected systems | Identify malware symptoms |
You are working on a Windows computer that is performing slowly. Which of the following commands should you use to resolve the problem? (Select the Two Best Answers) Format Dism Ipconfig chkdsk Dir diskpart | dism | chkdsk |
A customer reports that an optical drive in a PC is no longer responding. Which of the following statements best describes the first question you should ask the customer? "What has changed since the optical drive worked properly?" | "What has changed since the optical drive worked properly?" |
A coworker is traveling to Europe and is bringing her desktop computer. She asks you what concerns there might be. Which of the following statements best describes how to respond to the customer? (Select the Two Best Answers) Advise her that the computer is not usable in other countries. | Advise her to check for a compatible power adapter for that Country |
After you remove malware/spyware from a customer's PC for the third time, which of the following steps should be taken next? Tell him you can't fix the system again | Show him how to avoid the problem |
You are asked to fix a problem with a customer's Active Directory Domain Service domain controller that is outside the scope of your knowledge. Which of the following statements best describes the recommended course of action? Learn on the job by trying to fix the problem | Help the customer find the appropriate channels to fix the problem |
When you are working on a computer, which of the following should be disconnected to prevent electrical shock? (Select the Two Best Answers) Printer | Telephone Cord | Power Cord |
You are troubleshooting a Windows Server computer that you have little knowledge about. The message on the screen says there is a "DHCP Partner Down" error. No other technicians are available to help you, and your manager wants the server fixed ASAP or you are fired. Which of the following statements best describes the recommended course of action? (Select the Two Best Answers) Identify the problem. Escalate the problem. Establish a plan of action. Call tech support. Verify full system functionality Test the theory to determine cause. Tell your boss to kick rocks and quit and go find a job that has a more supportive, positive environment. | Identify the Problem | Call Tech Support |
Which of the following protects confidential information from being disclosed publicly? Classification | Classification |
Programs that run when Windows starts are stored in which of the following registry hives? HKEYCURRENTCONFIG | HKEYLOCALMACHINE |
Typically, which of the following Windows tools enables you to configure a SOHO router? Web Browser | Web Browser |
Format the Partition | Load RAID Drivers Explanation: Incorrect answers: L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 206). Pearson Education. Kindle Edition. |
A coworker maps a network drive for a user, but after boot, the drive is not seen within Explorer. Which of the following steps should be taken first to ensure that the drive remains mapped? Check Reconnect at Sign-In when Mapping the Drive | Check Reconnect at Sign-In when mapping the drive |
Based on the physical hardware address of the client's network device, which of the following is commonly used to restrict access to a network? WPA Key | MAC Filtering |
A Print job fails to leave the print queue. Which of the following services may need to be restarted? Print Driver | Print Spooler |
After installing a network application on a computer running Windows 10, the application does not communicate with the server. Which of the following actions should be taken first? Uninstall the latest service pack | Add the port number and name of the services to the Exceptions list of Windows Defender Firewall |
A customer reports a problem with a PC located in the same room as cement testing equipment. The room appears to have adequate cooling. The PC will boot up but locks up after 5-10 minutes of use. After a lockup, it will not reboot immediately. Which of the following statements best describes the most likely problem? The PC has a Virus | The PC Air Intakes are clogged with cement dust |
One of your Windows users is trying to install a local printer and is unsuccessfully based on the permissions for the user account. Which of the following types best describes this user account? Power User | Guest |
An active certificate | Local user access Explanation: Incorrect answers: Local user access is somewhat vague but doesn’t apply here; the reason is that when a user connects to a shared resource, that person does so over the network to a remote computer. L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 208). Pearson Education. Kindle Edition. |
You are contracted to recover data from a laptop. In which two locations might you find irreplicable, valuable data? (Select the Two Best Answers) ntoskrnl.exe Windows Folder Pictures System32 Folder | Pictures | Email |
Which utility enables auditing at the Local Level? OU Group Policy | Local Security Policy |
A customer has forgotten his password. He can no longer access his company email address. Which of the following statements best describes the recommended course of action? Tell him to remember his password | Ask him for information confirming his identity |
Which of the following can help locate a lost or stolen mobile device? Passcode | GPS |
Which of the following can be disabled to help prevent access to a wireless network? MAC Filtering | SSID Broadcast |
Time | Time |
In Windows, which utility enables you to select and copy characters from any font? Language Bar | Character Map |
Which of the following can be described as removing the limitations of Apple iOS? Rooting | Jailbreaking |
In Windows, which of the following built-in applets should be used by a Tech to enable and manage offline files, view conflicts and partnerships, and ensure locally stored files match those stored on an external device or server? File History | Sync Center |
Which language support for representing characters is built into Windows? Unicode EBCDIC ASCII ITU-T PS1 | Unicode |
Which of the following is the best source of information about malicious software detected on a computer? Operating system documentation | Anti-spyware software website |
You are working for a computer as a roaming PC tech and have been assigned work by a Network Admin. The admin notifies you that the company is experiencing a DDoS attack. Half a dozen internal Windows PCs are the source of the traffic. The admin gives you the Windows Computer names and tells you that they must be scanned and cleaned Immediately. Which of the following effects to the PCs should you as the PC tech focus on fixing? (Select the Two Best Answers) Zombies Spyware Ransomware Worm Virus Botnet | Zombie | Worm |
You are troubleshooting a network problem with Windows, and you can't seem to fix it using the typical Windows GUI-based troubleshooting tools or with the Command Prompt. You have identified the problem and established a theory of probable cause. (In fact, you are on your fourth Theory) Which tool should be used to troubleshoot the problem, and in what stage of the troubleshooting process should you do so? Regsvr32; Conduct external or internal resource based on symptoms. | Regedit; Test the Theory to Determine Cause |