CompTIA A+ Core 2 Question E-92

A user has Share permissions of “Allow Full Control” and NTFS permissions of “Allow Read, Allow Write, Deny Modify” to a shared file. In which of the following ways can they manipulate the file?

A. They can delete the file.
B. They can open the file.
C. They can take ownership of the file.
D. They can edit permissions on the file.

Correct Answer: B

CompTIA A+ Core 2 Question E-91

Which of the following is an advantage of installing a 64-bit processor versus a 32-bit processor?

A. Uses less bandwidth on the front side bus
B. Only requires half of the clock speed
C. Able to access a larger amount of RAM memory
D. Able to be used as two 32-bit processors

Correct Answer: C

CompTIA A+ Core 2 Question E-90

Which of the following boot methods receives the bootstrap files from a network server?

A. IDS
B. PAN
C. PXE
D. NAT

Correct Answer: C

CompTIA A+ Core 2 Question E-89

A user reports slow performance on their PC after importing some photos. Which of the following maintenance tasks should a technician recommend in order to increase performance?

A. Defragmentation
B. Install new camera drivers
C. Update anti-virus definitions
D. Run CHKDSK

Correct Answer: A

CompTIA A+ Core 2 Question E-88

A technician adds a second monitor to a system that supports dual video output. Which of the following tabs in Display properties will allow the technician to extend the Windows desktop onto the second monitor?

A. Themes
B. Desktop
C. Settings
D. Appearance

Correct Answer: C

CompTIA A+ Core 2 Question E-87

Which of the following relies on individual characteristics unique to each person?

A. Rootkits
B. Phishing
C. Antispyware
D. Biometrics

Correct Answer: D

CompTIA A+ Core 2 Question E-86

A night shift employee constantly fails to logoff at the end of their shift. The employee on the next shift regularly does not bother to log in because they are not prompted to do so. Which of the following actions would be BEST for the technician to do to correct this issue?

A. Write up each employee every time the login and logoff policy is ignored.
B. Have each employee report to their supervisor at the end of their shift.
C. Set the computer to restart after each employees shift.
D. Educate employees to log off within an hour of their shift.

Correct Answer: C

CompTIA A+ Core 2 Question E-85

Which of the following is the common term for software designed to steal information, disrupt files and an operating system’s integrity, and spy on a user’s activity?

A. Malware
B. Spyware
C. Rootkit
D. Virus

Correct Answer: A

CompTIA A+ Core 2 Question E-84

Which of the following is the correct path to add new local user accounts to a Windows 7 computer?

A. Click on the Start button> Right click on Computer> Select Manage> Expand Local Users and Groups> Right click on Users> Select New User
B. Click on the Start button> Right click on My Computer> Select Manage> Right click on Local Users and Groups> Select Add Users from the menu
C. Click on the Start button> Right click on Computer> Select Manage> Right click on Local Users and Computers> Select New User
D. Click on the Start button> Right click on Network Neighborhood> Select Manage> Right click on Users> Select New User

Correct Answer: A