An application is unresponsive and causing system instability. Which of the following command line options would only close the application?
A. taskkill
B. shutdown
C. chkdsk
D. tasklist
CompTIA exam questions
An application is unresponsive and causing system instability. Which of the following command line options would only close the application?
A. taskkill
B. shutdown
C. chkdsk
D. tasklist
A user states that their wireless connection drops when the phone rings. Which of the following solutions BEST shows what the technician should do to prevent this from happening?
A. Move the access point closer to the user
B. Remove the phone
C. Change the frequency that the wireless router is using
D. Change the wireless security encryption settings
The network administrator is called to assist a user, Peter, who has trouble accessing his network drive. Peter states he logs on with his credentials with no problem, however, when he attempts to access a folder via UNC the system asks for credentials. Which of the following is the BEST explanation for this?
A. Joe is logging in with a disabled network user name.
B. Joe does not have local share permission to access that folder.
C. Joe is logging in to the local user account.
D. Joe is not typing in the correct network password.
A user will be installing a switch in a public location and will allow the six users in the office to connect to it with CAT6 Ethernet. Which of the following actions would BEST ensure that there is no unauthorized access to the switch?
A. Assign static IP addresses
B. Disable new VLANS
C. Disable unused ports
D. Disable PoE
A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?
A. NTFS
B. FAT16
C. CDFS
D. FAT32
IT suspects that other people are frequently making changes to a computer when a user leaves their desk. Which of the following security policies can be implemented in order to prevent this situation?
A. Auto-lock
B. Password complexity
C. Change the default username
D. Disable the guest account
A technician is working on a consumer computer that has multiple virus infections. The end user states that all of their data documents are stored on a backup drive. Which of the following methods are commonly available to do a clean install and return the computer back to factory condition? (Select TWO).
A. Upgrade installation disc
B. Repair installation
C. Factory recovery partition
D. OS installation disc
E. Remote network installation
A technician would like to ensure all previous data is erased before reloading Windows 7 Home Premium onto a laptop. Which of the following procedures would accomplish this?
A. Virtual RAID configuration
B. Quick format
C. New partition
D. Full format
A technician discovers a networked computer has been infected with a zero day virus. Which of the following is the FIRST thing that should be done to the workstation?
A. Document the symptoms of the virus.
B. Turn off the computer using the power switch.
C. Unplug it from the network.
D. Run an antivirus update and then a full scan.
A technician is testing a connection from the main building to a newly networked off-site location. The main network and off-site both have fast transfer times, however any data sent between the two sites is taking much longer than expected. Which of the following command line tools could the technician use to determine where this slowness is originating?
A. NETSTAT
B. TRACERT
C. NSLOOKUP
D. PING