CompTIA 220-902 A+ Pop Quiz Online – Quiz #2← Back to the Pop Quiz Online indexLearn every important topic from the CompTIA exam objectiveswith my downloadable PDF Course Notes! Step 1 of 205%You have booted your computer into Windows 7 , but now you'd like to check the revision of BIOS on your computer. Which of these methods would be the best way to determine the current BIOS version? Use the "ver" command at the Windows XP Command Prompt Use a LiveCD utility to determine the BIOS version Check the System Summary of the System Information utility Use another computer to query the computer BIOS version using WMI Which of these utilities would be the best choice to help you increase the read and write time of files to a traditional hard drive? fixmbr chkdsk defrag ntbackup format Which of these utilities allow you to "back in time" to automatically revert your computer to a previous configuration without changing any of your documents and personal files? Task Scheduler Recovery Console System Information Backup and Restore System Restore Which of these would not meet the minimum requirements for Windows 7 Professional x64? 2 GB RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB free disk space 2 GHz processor Which of the following should be used to repair problems with a file system? fixmbr chkdsk format defrag ntbackup You need to modify the login credentials for a Linux user. Which of the following commands would be the best choice? passwd userpass pwd password What does the /r option of the CHKDSK command provide? Scans and reports on file system errors, but does not perform the fix Runs CHKDSK in safe mode Fixes any logical file system errors Runs CHKDSK and reports any errors, but does not make any changes Fixes file system errors and locates and recovers data from bad drive sectors During your Windows installation you have the option to define file system types for your data. Which of these file systems would provide the most compatibility with other operating systems? NTFS WIN32 EFS CDFS FAT32 Your company has just digitally imaged a year of corporate tax documents. Which of these would be the best way to dispose of the paper copies? Ship the paper back to the tax preparer Personally take the paper copies to the garbage bin Include the documents with the other building refuse Dispose of the paper at an off-site garbage facility Shred the paper documents In which of these situations would you make use of UAC? On login, always default to a particular network printer Limit applications from making changes to network settings Convert IP addressing from a public address to private addresses Prevent write access to a network share Force periodic updates to a Windows Domain password  Which of these tasks would be the best use of the Performance Monitor? Determine which applications launch during the Windows startup process Run a comprehensive memory diagnostic View the details of a BSOD that occurred yesterday afternoon Test Internet bandwidth utilization Run a report on memory utilization Which of these threats would be the best description of a fake email or web site that convinces users to willingly provide private information? Zero-day exploit Malware Spyware Phishing Vulnerability In which of these cases would you be most likely to use DISKPART? Check a drive for logical drive errors Remove temporary Internet files Delete duplicate files Copy part of the registry from one disk to another Add a new partition to a drive In which of these cases would you be most likely to use MSTSC? Update the operating system files View the system configuration details Modify the network adapter settings View the desktop of a remote device Check a disk for physical errors Which of these is responsible for managing virtual operating system resources? Virtual System Administrator (VSM) Group Policy Hyperthreading Hypervisor Virtualization Technology (VT) Which of these Windows features would be the best choice for allowing or restricting network communication? Windows Registry Performance Monitor Computer Management Windows Firewall Which of these security threats is effectively invisible to the operating system? Worm Rootkit Virus Ransomware Malware When would you use SFC? To perform an integrity scan of operating system files To perform a logical check of the file system To check the master boot record To check the physical sectors of a hard drive To check service permissions Which of these issues would be resolved through defragmentation? Lengthy file access times MBR missing No boot device found Bad drive sectors Which of these would be the best reason for grounding your equipment? Increase network throughput Protect against overclocking failures Allows the building of larger virtualization servers Prevent electrical shocks Brace against earthquakes and tremors ← Back to the Pop Quiz Online index