CompTIA A+ Certification 220-902

You have an iOS device that you just recently purchased. Select two ways that you can syncronize your device with your computer. (Select two.)

Options are :

  • IEEE-1284
  • IEEE-1394
  • RS-232
  • USB (Correct)
  • Wi-Fi (Correct)

Answer : USB Wi-Fi

Explanation Correct Answers:USB and Wi-Fi are the only methods to connect your iOS phone, music player, or tablet to your PC.Incorrect Answers:Apple has yet to implement syncing using the serial port (RS-232), the parallel port (IEEE-1284), or firewire (IEEE-1394). And I doubt they ever will.

After downloading and using a new game, a user complains that his phone unexpectedly dials unrecognized numbers, and downloads content from the internet. Which of the following is likely the issue with the phone?

Options are :

  • Social engineering
  • Spyware
  • Trojan horse (Correct)
  • Worms

Answer : Trojan horse

Explanation Correct Answer:Trojan horse is correct. A trojan horse appears to be a harmless program, but once activated, performs a malicious action. Incorrect Answers:Spyware is a software that enables a user to obtain information from another user's hard drive.Social engineering is incorrect, it is designed to get information from a system.A worm is incorrect. It is a destructive program that does not rely on another program for implementation.

A user reports that icons appeared on the desktop after visiting a website. The technician reviews the system, and identifies that the system has malware. Which of the following procedures would be performed NEXT?

Options are :

  • Disable System Restore
  • Educate the user on using the internet safely.
  • Quarantine infected system (Correct)
  • Report the issue to the information security officer.
  • Scan the system for malware, and verify security updates are current.

Answer : Quarantine infected system

Explanation Correct Answer:Quarantine the system, malware is easily propogated over a network. Incorrect Answers:Scanning the system and updating the security is a good step, but you need to quarantine first.Reporting issues are also key, but again quarantine first.Disable System Restore is good to do prior to running your virus scan, but again the order is key.Educating the user is one of the last things you do. Keep focus on the proper order.

Which of the following would be a digital security prevention method?

Options are :

  • Biometrics
  • ID badge
  • Load balancer
  • Mantrap
  • RFID badge (Correct)

Answer : RFID badge

Explanation Correct Answer:RFID badges or tags carry a HF or UHF frequency, and are widely used for identification. The tag can be tracked by RFID readers.Incorrect Answers:Mantrap is a device to catch people or control access.An ID badge uses physical characteristics to control access.Biometrics refers to using human characteristics to confirm identity and access.A load balancer is a device that helps distribute network traffic.

IT suspects that other people are frequently making changes to a computer when a user leaves her desk. Which of the following security policies can be implemented in order to prevent this situation?

Options are :

  • Change the default user name
  • Disable the Guest account
  • Password complexity
  • Set a screensaver password (Correct)

Answer : Set a screensaver password

Explanation Correct Answer:Setting a screensaver password enables you to automatically lock a computer when the screensaver comes up. For the best security, set the screensaver to come up relatively quickly.Incorrect Answers:A complex password is great, but if you don't lock the computer, it won't do you any good.Changing the default user name and disabling the Guest account won't help here.

A user installed a net SOHO router and new wireless NICs to increase his network's transmission speed from 802.11b to 802.11g. He didn't change the router from the manufacturer's default settings. The user lives in an apartment building and is still experiencing a slow Internet connection after the installations. Which of the following is the most secure option that a technician could implement to resolve this issue?

Options are :

  • Assign static IP addresses
  • Disable the WAN port
  • Enable MAC filtering (Correct)
  • Hide the SSID

Answer : Enable MAC filtering

Explanation Correct Answer:It's very likely that the user's neighbors are stealing his Wi-Fi and slowing down his network. Enabling MAC filtering so that only the user's devices can join the network will keep his obnoxious neighbors at bay.Incorrect Answers:Hiding the SSID is a good idea, but a tech-savvy neighbor would still be able to join the user's network.Static IP addresses wouldn't help.Disabling the WAN port would mean that the user would be getting no Internet at all, which is the only thing worse than slow Internet. At least his neighbors would probably quit using his network.

Which of the following allows a user to reset their password with a series of security questions that only the user should know?

Options are :

  • Administration
  • Authentication (Correct)
  • Permission propagation
  • Verification

Answer : Authentication

Explanation Correct Answer:Security questions help to authenticate a user by making sure that they are who they say they are.Incorrect Answers:Permission propagation has to do with what happens to permissions when you move or copy a protected item.Administration is the act of managing a system's resources.Verification is a synonym for authentication, but it's not the word that techs actually used.

A technician is dispatched to a user's home to secure a wireless network. The SOHO user has only one system to connect wirelessly, yet wishes to protect her Wi-Fi network from unauthorized use. Which of the following will best meet the user's requirements?

Options are :

  • Configure the network to utilize a proxy
  • Configure the router to allow access by specific MAC addresses (Correct)
  • Configure the use of DHCP
  • Configure the use of static IP addresses

Answer : Configure the router to allow access by specific MAC addresses

Explanation Correct Answer:MAC filtering enables you to select which computers you want to allow on to the network based on their MAC addresses. In this case, only one system needs to connect, so that's the one you should allow.Incorrect Answers:Using DHCP won't prevent unauthorized computers from connecting. DHCP just hands out IP addresses automatically.Static IP addresses won't help, either.Using a proxy just makes your computer connect to the Internet through an intermediary server.

A user does not want her kids to be able to install software on the home desktop. Which of the following types of accounts should the user set up in Windows 7?

Options are :

  • Administrator
  • Power User
  • Remote Desktop Users
  • Standard (Correct)

Answer : Standard

Explanation Correct Answer:A standard user cannot install software on a Windows PC.Incorrect Answers:The Remote Desktop Users group is specifically for people logging into a PC remotely.Both Administrator and Power User accounts can install software.

A technician would like to limit computer access for certain users. Which of the following should be configured?

Options are :

  • Advanced Security
  • Boot.ini file
  • Local Security Policy (Correct)
  • System Configuration

Answer : Local Security Policy

Explanation Correct Answer:Local Security Policy enables you to limit the access that local users have to a system.Incorrect Answers:Advanced Security is part of the Windows Firewall in Windows 7 and Vista. It's mostly a marketing term.The boot.ini file is a list of all the operating systems installed on a system and the order in which they boot.System Configuration, more popularly known as MSCONFIG, enables you to select which programs and services start up with Windows.

A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would best accomplish this task?

Options are :

  • Drill into the hard drives (Correct)
  • Format the hard drives
  • Overwrite the hard drives
  • Sanitize the hard drives

Answer : Drill into the hard drives

Explanation Correct Answer:Drilling into the hard drives will ensure that the hard drives will never be used again.Incorrect Answers:Overwriting, sanitizing, or formatting the drives will not render them unusable.

Which of the following user accounts should be renamed to adhere to security best practices?

Options are :

  • Administrator (Correct)
  • Guest
  • Power User
  • Standard User

Answer : Administrator

Explanation Correct Answer: Renaming the default name for the Administrator account helps prevent people from using that account for nefarious purposes. Incorrect Answers: It's probably a good idea to rename any accounts you have, but renaming the Administrator account is by far the most important.

Which of the following is a security threat that uses e-mail to trick users?

Options are :

  • Phishing (Correct)
  • Shoulder surfing
  • Spyware
  • Virus

Answer : Phishing

Explanation Correct Answer:Phishing uses official-looking e-mail to trick users into providing sensitive information.Incorrect Answers:A virus is a type of malware that replicates itself on a system.Spyware is malware that tracks your browsing behavior.Shoulder surfing is the act of standing behind someone and watching over their shoulder as they compute, hoping to see some sensitive information.

Which of the following security measures is sometimes found in a laptop?

Options are :

  • Biometrics (Correct)
  • Bollard
  • Hypervisor
  • Key fobs

Answer : Biometrics

Explanation Correct Answer:Some laptops come with fingerprint readers as an added security feature.Incorrect Answers:A bollard is a short metal post that keeps people from driving where they shouldn't. A hypervisor is the software that runs a virtual machine. A key fob is a security device that goes on a keychain.

A technician would like to dispose of a hard drive that is no longer needed. According to company policy, all contents on the disk should be deleted before disposal. Which of the following OS command line tools should be used?

Options are :

  • CHKDSK
  • DEL
  • FORMAT (Correct)
  • SCANDSK

Answer : FORMAT

Explanation Correct Answer:The FORMAT command will erase the contents of a hard drive.Incorrect Answers:CHKDSK checks a hard drive's file system for errors.The DEL command is used to delete a file in the command line.SCANDISK was the command that predated CHKDSK, but it performed the same function on pre-NTFS drives.

A user receives a phone call from a person claiming to be from technical support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?

Options are :

  • Malware
  • Phishing
  • Social engineering (Correct)
  • Virus

Answer : Social engineering

Explanation Correct Answer:This is a social engineering attack, since it's being directed at a person instead of software.Incorrect Answers:Phishing attacks are similar to the one described in the problem, but they use e-mail rather than phone calls.Malware and viruses are software threats, not social threats.

Turnstiles and other mantraps will prevent which of the following security threats?

Options are :

  • Rootkits
  • Shoulder surfing
  • Tailgating (Correct)
  • Viruses

Answer : Tailgating

Explanation Correct Answer:An attacker can't follow victims through turnstiles as easily as through a door, and a mantrap enables a building's security staff to prevent a suspected attacker from leaving.Incorrect Answers:Shoulder surfing is looking over a user's shoulder to see sensitive information on the user's screen.A rootkit is a type of malware that hides itself on a system and grants an attacker remote access to the system.A virus is a type of malware that replicates within a system by making copies of itself.

A computer program that functions normally while quietly installing malicious software on a machine is known as a:

Options are :

  • DDoS attack
  • Phishing attack
  • Trojan (Correct)
  • Worm

Answer : Trojan

Explanation Correct Answer:Like a giant wooden horse containing a bunch of heavily armed bearded guys, a Trojan program looks innocuous (how does a giant wooden horse look innocuous?) while secretly containing harmful software. Hopefully you're running some anti-malware software to catch it before it does too much damage!Incorrect Answers:A distributed denial of service (DDoS) attack uses many computers (usually malware-controlled "zombies") to shut down a server.A worm is malware that replicates itself over a network.Phishing is a type of social engineering where an attacker sends official-looking e-mails in an attempt to gain sensitive information.

Which of the following is best used to prevent other people from viewing a user's computer screen?

Options are :

  • Anit-virus software
  • Biometric device
  • Key fob
  • Privacy filter (Correct)

Answer : Privacy filter

Explanation Correct Answer:A privacy filter reduces the viewing angle of your screen so that only the person right in front of it can see what's on screen.Incorrect Answers:Anti-virus software just cleans viruses off a computer.Key fobs and biometric devices are used for authentication, not to prevent shoulder surfing.

A user reports that a file she shared on her computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?

Options are :

  • The parent folder has explicit Allow rights set for this user
  • The parent folder has explicit Deny rights set for this user (Correct)
  • The parent folder likely has the "archive" attribute enabled
  • The user forgot to share the parent folder and only shared the specific file

Answer : The parent folder has explicit Deny rights set for this user

Explanation Correct Answer:Deny rights override Allow rights, so if there are Deny rights set for the third party on the parent folder, they won't be able to access the file. Incorrect Answers:Allow rights don't work if there are Deny rights set, too.You can't share files in Windows; only folders.Having the archive bit set lets backup programs know that the file is in need of backup.

The folder "Documents" is shared. The user sharing the folder can create and delete documents when on the local PC, but can only read documents when accessing them remotely from a different PC. Which of the following should be adjusted?

Options are :

  • Firewall settings
  • NTFS permissions
  • Read only attribute
  • Share permissions (Correct)

Answer : Share permissions

Explanation Correct Answer:Changing the folder's share permissions would enable the user to do more than just read shared documents.Incorrect Answers:Setting a file to read only makes it impossible any users on the PC to make changes to the file.Changing firewall settings wouldn't help with this issue.Changing NTFS permissions would only affect users on the local machine.

Which of the following types security threats include shoulder surfing and phishing?

Options are :

  • Man-in-the-middle
  • Social engineering (Correct)
  • Spyware
  • Trojan virus

Answer : Social engineering

Explanation Correct Answer:Shoulder surfing and phishing are social engineering attacks, because they both involve hackers interacting with people directly.Incorrect Answers:A man-in-the-middle attack is a form of eavesdropping where an attacker acts as an invisible intermediary between two parties that believe they are communicating solely with one another.A trojan and a virus are technically two different forms of malware.Spyware is a type of malware that tracks your browsing or computing habits.

A user reports problems browsing the internet and that their browser has a person with a headset that keeps asking them to "click here for help." When the user has clicked on the icon to try to resolve the issue, the browser is redirected to a website to purchase software. Which of the following should be performed FIRST to resolve the issue?

Options are :

  • Create a Restore Point
  • Identify the malware on the system. (Correct)
  • Patch all security updates for operating system.
  • Train the user of malicious software.

Answer : Identify the malware on the system.

Explanation Correct Answer:Identify the malware on your system. In troubleshooting, always identify your problem first. You cannot solve a problem, if you do not know the problem.Incorrect Answers:Creating a restore point will not help. Once your system has a problem. Remember this is what should happen first.Patching all security updates is also good, but you must do this before the problem. Remember this is what should happen first.Train the user of malicious software is not a first step, it is a last step.

What protocol must be enabled to configure a new workstation to boot an operating system from a network?

Options are :

  • PXE (Correct)
  • UPNP
  • WiFi
  • WOL

Answer : PXE

Explanation Correct Answer:Preboot Execution Environment (PXD) is an industry standard client/server interface. It allows a workstation to be remotely configured by an administrator.Incorrect Answers:Wake on Lan (WOL) refers to a standard that allows a computer to turn on when awakened by a network message. It does not permit for booting.WiFi is not required for booting a system from a network, it refers to the type of networking.UPNP, Universal plug and play refers to a protocal that permits networked devices to know that each other are on the network. It does not permit for booting from a network.

Which of the following services allows you to perform a backup while a system is running?

Options are :

  • Copy
  • Robocopy
  • Shadow copy (Correct)
  • Xcopy

Answer : Shadow copy

Explanation Correct Answer:Shadow copy will allow a file to be copied, if it is currently in use.Incorrect Answers:Robocopy replaced Xcopy as a robust copy utility that copied more than just files, but will not copy files in use.The copy command copies files from one directory to another, and will not copy files in use.Xcopy was a command that not only copied files, but allowed for multiple file and directory copy, however it does not support a copy of a file in use.

An office purchases a new color laser network printer that is only for hign-end graphic printing. The technician needs to limit users, although the printer is located centrally within an office environment. Which of the following would be the BEST to utilize to achieve this goal?

Options are :

  • Access control list (Correct)
  • Remote desktop protocol
  • User account control
  • Virtual private networking

Answer : Access control list

Explanation Correct Answer:Access Control List tool determines the access rights for a specific user to an object.Incorrect Answers:Virtual private networking (VPN) is a protocol for remote access to a network.Remote desktop protocol designed to allow access to another computer's desktop.User account control utility allows you to set access on an individual system for an individual user.

A large corporation that has more than 250 users is interested in updating their office software. Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms?

Options are :

  • Enterprise license (Correct)
  • Open source license
  • Personal license
  • Single Seat license

Answer : Enterprise license

Explanation Correct Answer:Enterprise licensing typically allows unlimited use of a program in an organization. It also can make installation on large number of systems easier for network administration.Incorrect Answers:Personal licenses are designed for an individual. Some allow for two installations, but are not designed for a corporate environment.Single seat licenses are registered and installed on one computer.Open source licenses allow for software to be freely used, modified and shared.

A technician has just installed a new SOHO router for several users to share an Internet connection. He received a call that, when one user streams media, the remaining user's browsing speed slows. What can the technician adjust, so the experience is universal for all users?

Options are :

  • DSL
  • QoS (Correct)
  • VNC
  • WAN

Answer : QoS

Explanation Correct Answer:QoS is the Quality of Service tool that allows your router to share the bandwith among users.Incorrect Answers:A digital subscriber line (DSL) is a type of internet connection.Virtual network computing (VNC) is a graphical desktop sharing system.Wide area network (WAN) is a computer network that covers a large geographical area.

Which of the following commands would at technician use to map a network share?

Options are :

  • COPY
  • IPCONFIG
  • NET (Correct)
  • NSLOOKUP

Answer : NET

Explanation Correct Answer:The NET SHARE command enables you to work with network shares.Incorrect Answers:NSLOOKUP helps resolve IP addresses to DNS names.IPCONFIG displays your computer's IP address information.The COPY command, you guessed it, copies files.

An alert needs to be sent to the administrator when the CPU usage stays above 90% for a period of time. Which of the following tools would best be used to accomplish this?

Options are :

  • Performance Monitor (Correct)
  • System Configuration
  • Task Manager
  • Task Scheduler

Answer : Performance Monitor

Explanation Correct Answer:The Performance Monitor can be used to send alerts when certain conditions are met.Incorrect Answers:The Task Scheduler is used to schedule automated events.Task Manager is used to view and change running processes and services, as well as to view simplified performance information.System Configuration, or MSCONFIG, is used to select which programs and services start up with Windows.

A service technician is installing a second hard drive on a desktop PC running Windows 7. The second hard drive is the same make and model as the first hard drive. The technician would like to provide data redundancy. Which of the following should the technician use to accomplish this?

Options are :

  • Data Sources
  • Device Manager
  • Disk Management (Correct)
  • System Configuration

Answer : Disk Management

Explanation Correct Answer:The Disk Management tool enables you to set up a software RAID 1 for data redundancy.Incorrect Answers:Device Manager enables you to control driver installations.System Configuration shows you information about your computer and OS.The Data Sources window is used when working on Visual Studio projects.

A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?

Options are :

  • CHKDSK
  • DISKPART
  • SYSPREP (Correct)
  • Windows 7 Advisor

Answer : SYSPREP

Explanation Correct Answer:SYSPREP can be used to prepare duplicate images of a Windows installation when dealing with a mass deployment.Incorrect Answers:The Windows 7 Upgrade Advisor is used to see if a computer can potentially be upgraded to Windows 7.CHKDSK scans a hard drive's file system for errors and fixes any that it finds.DISKPART is used to partition hard drives.

Which of the following would be the best format for optical media?

Options are :

  • CDFS (Correct)
  • EXT3
  • FAT32
  • NTFS

Answer : CDFS

Explanation Correct Answer:CDFS is a file system for compact discs that enables them to play music in CD players.Incorrect Answers:FAT32 is an older file system for hard drives. EXT3 is a popular Linux file system.NTFS is the file system used in Windows PCs.

A technician wants to know the MAC address of a computer. Which of the following commands would the technician use?

Options are :

  • IPCONFIG (Correct)
  • NETSTAT
  • NSLOOKUP
  • PING

Answer : IPCONFIG

Explanation Correct Answer:The IPCONFIG command, when combined with the /ALL switch, displays the MAC address for all of a computer's network adapters.Incorrect Answers:NSLOOKUP is used to find the DNS name for an IP address, or vice-versa.NETSTAT shows all of a computer's network connections.PING tests connectivity between two systems.

If a computer does not have an optical drive, which of the following is the most efficient method to install an operating system?

Options are :

  • Bluetooth connection
  • Emergency restore disc
  • Floppy disk
  • USB flash drive (Correct)

Answer : USB flash drive

Explanation Correct Answer:Installing an OS from a USB flash drive is both fast and effective.Incorrect Answers:A restore disc requires an optical drive.Modern OSes don't come on floppy disks.You can't install an OS over Bluetooth.

Which of the following operating systems can fully support 8 GB of DDR3 RAM?

Options are :

  • Windows 7 Home Premium x64 (Correct)
  • Windows 7 Professional x86
  • Windows Vista Home Premium x86
  • Windows XP Professional

Answer : Windows 7 Home Premium x64

Explanation Correct Answer:Any 64-bit (or x64) OS can support over 4 GB of RAM.Incorrect Answers:32-bit OSes can only support up to 4 GB of RAM.

Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?

Options are :

  • CHKDSK (Correct)
  • FDISK
  • ROBOCOPY
  • SCANDISK

Answer : CHKDSK

Explanation Correct Answer:CHKDSK scan's a disk's integrity after restarting the computer.Incorrect Answer:ROBOCOPY, or robust copy, is a very powerful command-line copying command in Windows.SCANDISK was an old command for scanning FAT-formatted drive pre-Windows 2000.FDISK is a partitioning tool.

Which of the following options will easily enable you to enable File and Print sharing on a network of three workstations running Windows 7 Home Edition x64?

Options are :

  • Active Directory
  • Domain Setup
  • HomeGroup (Correct)
  • Workgroup

Answer : HomeGroup

Explanation Correct Answer:Setting up a HomeGroup enables you to turn on File and Print sharing with very little difficulty.Incorrect Answers:Active Directory is used for authentication and authorization in Windows domain networks.A Workgroup is Microsoft's earlier, less easy attempt at creating a simple SOHO network system.A domain is typically seen in larger companies, as it requires a server to act as a domain controller.

From which of the following tools can a technician locate the PID of an application?

Options are :

  • Computer Management
  • Local Security Policy
  • MSCONFIG
  • Task Manager (Correct)

Answer : Task Manager

Explanation Correct Answer:Task Manager enables you to view the process ID for an application.Incorrect Answers:Local Security Policy is in charge of local user permissions.MSCONFIG controls which programs launch with Windows and other boot options.Computer Management is a collection of tools such as Disk Management, Device Manager, and so forth.

A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive using the UNC?

Options are :

  • \\password\share
  • \\servername\share (Correct)
  • \\share\servername
  • \\username\servername

Answer : \\servername\share

Explanation Correct Answer:The correct syntax for the Universal Naming Convention (UNC) is \\servername\share. Simply map to that UNC and you will be able to access the folder "share" on the computer "servername" any time.Incorrect Answers:All of the other answers mislabel the Universal Naming Convention (UNC). The server needs to go first, then the shared resource.

What is the maximum size a partition can be using the FAT32 file system?

Options are :

  • 1024 GB
  • 2048 GB (Correct)
  • 32768 MB
  • 4096 MB

Answer : 2048 GB

Explanation Correct Answer:2048 GB. Which, normally would be written out as 2 TB. But I wanted to see if you could move your decimal point around. Did you know that even though Windows won't let you CREATE a FAT32 partition over 32 GB, you can still make one with another partitioning tool and then just load up Windows and it will recognize it just fine?Incorrect Answers:1024 GB (1 TB) is not the maximum.32768 MB (32 GB) is the maximum FAT32 partition you can create when using a Windows partitioning tool such as Disk Management.4096 MB (4 GB) is the maximum size a file can be using the FAT32 file system.

You have just turned on your Windows 7 computer and you decided to do a bit of Internet surfing. While cruising the Internet, you download a ZIP file. How would you go about opening the ZIP file?

Options are :

  • Download a 3rd party application, such as 7zip to open the file
  • Just double-click it (Correct)
  • Right-click the file and rename the ZIP extension to EXE
  • Use regedit.exe to change the registry to enable the use of ZIP files

Answer : Just double-click it

Explanation Correct Answer:Just double-click and open it! Ever since Windows XP, we have had native (built-in) support for files with the ZIP extension.Incorrect Answer:Download a 3rd party application like 7zip. Yeah, in the days of Windows 98, you had to have a program to open ZIP files. These days, not so much. (Call me old fashioned, but I still use these programs for support on files like RAR, TAR, CAB, ISO, etc.)Using REGEDIT won't do you any good. You might actually render your system unusable.Renaming it to an EXE file will just render the file unusable.

You want to install Windows 7 32-bit onto your computer. What is the bare minimum amount of hard drive space required to do this?

Options are :

  • 12 GB
  • 16 GB (Correct)
  • 20 GB
  • 8 GB

Answer : 16 GB

Explanation Correct Answer:You'll need 16 GB of hard drive space. That is the bare minimum.Incorrect Answers:8 GB and 12 GB are not correct. 20 GB is the minimum requirement for a Windows 7 64-bit PC.

You are using Windows Vista, but you miss the good ol' days of Windows 2000's Start Menu. How would you go about changing your Start Menu to a more "classic" style?

Options are :

  • Alt. click on the desktop > Personalize > Start Menu
  • Alt. click on the the Start Menu > Properties > Start Menu tab (Correct)
  • Start > Control Panel > Ease of Access
  • Start > Control Panel > System and Maintenance

Answer : Alt. click on the the Start Menu > Properties > Start Menu tab

Explanation Correct Answer:Alt. click on the Start Menu > Properties > Start Menu tab. After that, you'll have all kinds of choices as to how your Start Menu works.Note: This option is not present in Windows 7.Incorrect Answers:The Ease of Access applet, along with System and Maintenance, will not have this option available.It is also not present in the Personalization applet.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions