Showing posts with label COMPTIA 220-802 Practice Exam. Show all posts
Showing posts with label COMPTIA 220-802 Practice Exam. Show all posts

Monday, November 18, 2013

CompTIA A+ 220-801 Practice Exam Question 14

CompTIA A+ 220-801 Practice Exam Question 14
Which tool enables you to find out how much memory a particular application is using?

A. Msconfig
B. Task Manager
C. Chkdsk
D. System Information

Answers: C
Explanations

Adding the port number and name of service to the Windows Firewall Exceptions list is the correct answer. But I’m going to pontificate more as I usually do. Uninstalling and reinstalling the SP will not help this particular situation. By default, any Windows OS after and including Windows XP SP2 enables the Windows Firewall automatically and won’t allow inbound connections from the server to the network application. Therefore, you need to make an “exception.” You can access this in Windows XP by going to Local Area Connection Properties > Advanced tab. In Windows 7/Vista, use the Windows Firewall with Advanced Security: Start > All Programs > Administrative Tools. If you decide to add a port, you need to know the port number of the application. For example, RealVNC is normally port 5900 for incoming connections.

CompTIA A+ 220-801 Practice Exam Question 13

CompTIA A+ 220-801 Practice Exam Question 13
What is the minimum requirement of RAM for Windows XP Professional?

A. 64 MB
B. 128 MB
C. 256 MB
D. 32 MB

Answers: B
Explanations
The print spooler needs to be restarted on the computer that started the print job or the computer that controls the printer. This can be done in the Services console window or in the Command Prompt with the net stop spooler and net start spooler commands, or anywhere else where services can be started and stopped such as the Task Manager. Okay, that was an easy one, but the real exam will have a couple easy ones thrown in as well. Don’t think too hard when you actually do receive an easier question.

CompTIA A+ 220-801 Practice Exam Question 4

CompTIA A+ 220-801 Practice Exam Question 4
Where is the Notification Area located in Windows 7?

A. In the System Properties dialog box
B. In the System32 folder
C. On the Taskbar
D. Within the Start menu

Answers: C
Explanations:
HKEY_LOCAL_MACHINE is the registry hive that stores information about the programs Windows runs when it starts. The actual hives are stored in \%windir%\System32\Config. But it’s okay to call HKEY_LOCAL_MACHINE and the other HKEYs hives. Most technicians do it, and you might see them referred to that way on the exam as well. The HKEY_LOCAL_MACHINE hive is the one you will access the most often. You can configure advanced settings for TCP/IP, the GUI of the OS, and lots more from here. HKEY_CURRENT_CONFIG contains data that generated when the system boots; nothing is permanently stored. HKEY_USERS stores the information for each user profile. HKEY_CLASSES_ROOT contains information about registered applications and file associations.

CompTIA A+ 220-801 Practice Exam Question 2

CompTIA A+ 220-801 Practice Exam Question 2
Of the following, which is not a method of installing Windows 7?

A. Over the network
B. CD-ROM
C. DVD-ROM
D. USB flash drive
E. Image

Answers: A
Explanations:
The classification of data helps prevent confidential information from being publicly disclosed. Some organizations will have a classification scheme for their data, such as normal, secret, and top secret. Policies are implemented to make top secret data the most secure on the network. By classifying data, you are determining who has access to it. This is generally done on a need-to-know basis. Social engineering is the art of manipulating people into giving classified information. A remote access server (RAS) allows users to connect remotely to the network. To protect the connection (and data that passes through it), an organization might opt to use a VPN or RADIUS server, or both. Wiping a hard drive is vague. How is it being wiped? If it is being formatted, then that is not enough to protect confidential information. You need to perform bit-level erasure with third-party software, degauss the drive, or destroy it to make sure that no one can access the data. The thing is that data is always stored somewhere on a server or NAS device, so properly disposing of a single hard drive doesn’t protect any and all confidential information from being publicly disclosed.