Exam : CompTIA A+ Certification 220-902

You are cleaning the desk area around your computer and you notice that your UPS has a small flashing LED on the front, however, the PC is running just fine. When you first installed the UPS about a year ago, you noticed the light was a steady green. What does this indicate?

Options are :

  • The UPS battery needs replacement (Correct)
  • The UPS is charging the batteries
  • The UPS is running a self-diagnostic
  • The UPS is working and ready

Answer : The UPS battery needs replacement

Explanation Correct Answer:The UPS batteries need to be replaced. When the lights start flashing, it usually indicates this. Just be lucky it didn’t start beeping at you.Incorrect Answers:When you first turn on the UPS, it should run through a diagnostic test, in which lights will be going on and off at random times according to its bootup procedure.There shouldn't be any flashing lights while the UPS is charging or if it's in a ready state.

A user's video card is starting to show random colors on the screen. Before replacing the card, which of the following troubleshooting steps should you do?

Options are :

  • Document your findings
  • Establish a theory of probable cause (Correct)
  • Identify the problem
  • Nothing, just implement the solution

Answer : Establish a theory of probable cause

Explanation Correct Answer:Check to see what caused this random color phenomenom by establishing a theory.Incorrect Answers:You've already identified the problem… random colors, remember? You don't want to implement a solution yet, because you don't know what caused it (is it a software or hardware issue?) And finally, you can't document anything just yet. You'll handle that part later in the troubleshooting process.

You are a technician at a call center. You receive a call from customer complaining about a hard drive problem. What is the first thing you should do?

Options are :

  • Based on the level of urgency, give the user a priority number.
  • Identify the hard drive’s make, model, and serial number.
  • Introduce yourself, then identify the user and the problem. (Correct)
  • Transfer the call to level two tech support.

Answer : Introduce yourself, then identify the user and the problem.

Explanation Correct Answer:If you don't understand the hint I gave, that means you don't know one of the greatest rappers of the modern era. Fear not though, he took the liberty of introducing himself all the way back in 1999 with his song, "My Name is." Which, of course, is the first thing you should do when dealing with any type of customer support. Although, come to think of it, his name is not actually Slim Shady. Weird. Incorrect Answers:Identifying the hard drive is a great thing to do, but not the first thing. Transferring the call to level two might be good, but only if you can't handle the situation yourself. And determining urgency, while good, should not be the first thing done in this scenario.

Ronnie's on a call to a customer who's complaining that his Blu-ray Disc-equipped home theater PC "isn't working right." Talking to the customer, Ronnie discovers that the Blu-ray Disc image isn't in high definition, but instead looks like a standard TV signal. He notices the connection between the computer and monitor is an old component connection. He thinks to himself: "That Blu-ray Disc device requires an HDMI cable for high-resolution." Based on the CompTIA troubleshooting theory, what should he do next?

Options are :

  • Document findings
  • Establish a theory of probable cause
  • Test the theory (Correct)
  • Verify full system functionality

Answer : Test the theory

Explanation Correct Answer:Based on CompTIA's troubleshooting theory, he should test the theory next.Incorrect:The technician had followed the first two steps in the troubleshooting theory: identify the problem and establish a theory of probable cause. The third step in the process is to test the theory. Here are the next three steps in order:4. Establish a plan of action to resolve the problem5. Verify full system functionality6. Document findings

A technician is installing a webcam in a nursery for a user to monitor her baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?

Options are :

  • Block the outbound port (Correct)
  • Enable static IPs
  • Change the default SSID
  • Enable MAC filtering

Answer : Block the outbound port

Explanation Correct Answer:Blocking the webcam's outbound port in the router ensures that the camera feed goes no further than the local network.Incorrect Answers:MAC filtering keeps unauthorized computers from joining a network.Static Ips would do nothing here.Changing the default SSID of the wireless network, while a good idea, would do nothing for this problem.

Which of the following would be the best way to combat social engineering?

Options are :

  • Deny social networks through the firewall
  • Windows Update
  • Strong password usage
  • User education (Correct)

Answer : User education

Explanation Correct Answer:Educating users is the best way to make sure that they don't fall victim to a social engineering attack.Incorrect Answers:Social networks don't actually have anything to do with social engineering (usually).Windows Update doesn't prevent social engineering attacks.Using a strong password won't help if some crafty social engieer tricks you into giving it out.

An older computer has recently been upgraded to Windows 8.1. Since the upgrade, the computer is running unusually slow. The hardware does not meet the Microsoft requirements for the OS, and tested good. Which of the following is the MOST likely solution?

Options are :

  • Defragment the hard drive (Correct)
  • Utilize virtualization
  • Switch the BIOS to UEFI
  • Enable file paging

Answer : Defragment the hard drive

Explanation Correct Answer:Disk fragmentation happens to a hard drive over time as you save, change, or delete files. Disk defragmentation is the process of consolidating fragmented data on a hard drive, so it will work more efficiently.Incorrect Answers:File paging manages your computer's memory usage.Virtualization allows you to utilize your system hardware to create multiple operating sytem images.UEFI replaces your BIOS and enables new hardware technology support on your motherboard.

What tool can you use in the Recovery Console to partition a hard drive?

Options are :

  • PARTITION
  • Disk Management
  • DISKPART (Correct)
  • FDISK

Answer : DISKPART

Explanation Correct:DISKPART is the Recovery Console tool that enables you to partition a hard drive. Incorrect:Disk Management is the graphical partitioning program in Windows. It does not work in the Recovery Console.FDISK was the tool used for partitioning drives in DOS and Windows 9x.PARTITION is not a valid tool.

A technician has 50 identical computers that need to be upgraded to Windows 7. The computers are all capable of booting from the network. They are running a Gigabit network with a Windows deployment server. Which of the following will be the best to use in this scenario?

Options are :

  • Windows 7 DVD
  • PXE (Correct)
  • UEFI
  • USB flash drive

Answer : PXE

Explanation Correct Answer:The Windows Preboot Execution Environment (or PXE) enables a computer to boot from a network device, enabling a networked install of Windows.Incorrect Answers:UEFI is a replacement for the traditional BIOS boot environment.Physical media such as DVDs or flash drives are not needed for a remote network boot.

An entry-level network analyst calls and is not sure which Windows OS features to use to check for users who are currently logged on. Which of the following would best assist this analyst?

Options are :

  • MSCONFIG
  • Administrative Tools
  • Task Manager (Correct)
  • Disk Management

Answer : Task Manager

Explanation Correct Answer:The Users tab on the Task Manager enables you to view any users currently logged into the PC.Incorrect Answers:MSCONFIG enables you to select which programs and services start up with Windows.Disk Management enables you to partition, format, and otherwise manage drives.Administrative Tools is a collection of utilities for maintaining and configuring Windows.

Jim sees a Windows error saying the "error log is full." Where can he go to fix this?

Options are :

  • Event Viewer (Correct)
  • Users Accounts
  • Local Security Policy
  • Registry Editor

Answer : Event Viewer

Explanation Correct Answer:Jim can use the Event viewer to delete error log files when they become full - or to have the files delete themselves when they reach a certain size.Incorrect Answers:The other options do not deal with error logs. The Registry Editor edits the registry, User Accounts configures user accounts, and Local Security Policy configures local security policies.

A user regularly has to walk away from her computer and is worried someone may access her workstation. Which of the following would best prevent this?

Options are :

  • Shutdown the computer
  • Set the screensaver password
  • Logon using the unprivileged guest account
  • Lock the workstation (Correct)

Answer : Lock the workstation

Explanation Correct Answer:Locking your workstation is the simplest and most effective way to keep others from accessing your computer.Incorrect Answers:Shutting down the computer takes a while and won't actually prevent anything if you don't have a password set.Logging on to a guest account is still giving others access. Less access, but still access.Setting a screensaver password is a great idea, but what if someone gets to your computer before the screensaver activates?

A technician is working on an issue and has identified the problem and worked out the cause. Which of the following would most likely be the next step the technician should make?

Options are :

  • Establish a plan of action (Correct)
  • Inform the user
  • Report to the supervisor
  • Document the cause and solution

Answer : Establish a plan of action

Explanation Correct Answer:After you've figured out the problem, it's time to figure out what you're going to do about it.Incorrect Answers:Documentation comes last.Inform the user after you've fixed the problem.Reporting to a supervisor isn't part of the troubleshooting process. Only do it if you need to escalate a problem you can't otherwise solve.

When working on a Windows 7 computer, which option will be available to you when you are presented with the Recovery Environment dialog box?

Options are :

  • System Information utility
  • Performance Monitor
  • System Restore (Correct)
  • Services

Answer : System Restore

Explanation Correct Answer:You will get the choice of entering System Restore, along with Command Prompt, Windows Memory Diagnostic Tool, System Image Recovery, and Startup Repair.Note: In Vista, the System Image Recovery is called Windows Complete PC Restore. Same function, different name.Incorrect Answers:The following can be found in the Adminstrative Tools section in Control Panel… System Information utility, Performance Monitor, and Services.

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select two.)

Options are :

  • Install anti-virus applications
  • Disable DHCP
  • Change the SSID
  • Apply an administrator password (Correct)
  • Disable the Guest account (Correct)

Answer : Apply an administrator password Disable the Guest account

Explanation Correct Answer:To secure a PC, disable the Guest account and make sure to set a password on all administrator accounts.Incorrect Answers:Anti-virus programs won't keep people off a computer.Disabling DHCP makes it so that your computer doesn't get an IP address assigned automatically.Changing the SSID is something you'd do in a WAP, not on a computer.

Which of the following user accounts should be disabled to adhere to security best practices?

Options are :

  • Administrator
  • Guest (Correct)
  • Standard User
  • Power User

Answer : Guest

Explanation Correct Answer:It might seem OK to leave the Guest account active, but it can give unauthorized parties access to your computer. It's a good idea to disable this account.Incorrect Answers:Your day-to-day accounts should all be Standard User accounts.You need at least one Administrator account on the PC, but make sure that it's password-protected.A Power User account is slightly less powerful than the Administrator account, so make sure it's password-protected if you have one.

A technician is reconfiguring a mobile e-mail client for offline mode. Which of the following describes the expected time it will take to synchronize the account with the e-mail server?

Options are :

  • It will depend on the SMTP settings of the e-mail server
  • It will depend on the POP settings of the e-mail server
  • There is no offline mode for e-mail
  • It will depend on the time when the account was last synchronized (Correct)

Answer : It will depend on the time when the account was last synchronized

Explanation Correct Answer:If it's been a while since the last sync, it will take longer to download the increased amount of e-mail.Incorrect Answers:The other answers will not affect the sync time for e-mail

The benefit of MAC filtering in wireless networking is that the network:

Options are :

  • is encrypted
  • uses static IP addresses
  • is more secure (Correct)
  • is not visible

Answer : is more secure

Explanation Correct Answer:Using MAC filtering can keep out some unwanted users.Incorrect Answers:MAC filtering does not encrypt or hide a wireless network, and it doesn't force you to use static IP addresses.

Which of the following utilities will display a listing of active TCP/IP ports on the computer?

Options are :

  • NETSTAT (Correct)
  • TRACERT
  • IPCONFIG
  • PING

Answer : NETSTAT

Explanation Correct Answer:NETSTAT is short for network statistics. The command shows you a list of all active TCP and UDP connections being made to your PC at a given moment.Incorrect Answers:PING is the utility used to test a remote connection's availability.IPCONFIG is the utility used to show your IP configuration information such as your IP address, subnet mask, and default gateway.TRACERT is the utility used to trace the path of IP packets as they hop from router to router.

What protocol should you follow when handling evidence in a criminal investigation?

Options are :

  • MSDS documents
  • Chain of custody (Correct)
  • Channel escalation
  • Change control management

Answer : Chain of custody

Explanation Correct Answer:The chain of custody is a record of everyone who has had possession of a piece of evidence.Incorrect Answers:Change control management is a way of ensuring that changes are made to a product or system in a controlled manner.Channel escalation is a made up term.MSDS documents cover all the relevant safety details about a product.

You are about to install a microATX motherboard in an ATX computer case. What should you do FIRST?

Options are :

  • Remove the processor
  • Remove the power supply unit
  • Put on your anti-static wrist strap (Correct)
  • You cannot install a microATX motherboard into an ATX case

Answer : Put on your anti-static wrist strap

Explanation Correct Answer:The FIRST thing you should do when installing or replacing any hardware component is to put on your anti-static wrist strap.Incorrect Answers:Removing the CPU is a great idea—I would probably do that after I put on the wrist strap, though.Removing the PSU is also a great idea, but I would still do that after the strap.You can put a microATX motherboard into an ATX case without any issues at all. Just move your brass stand-outs into the correct positions.

You are working with a customer and want to tell them all the new features of Windows 7 so they'll upgrade from Windows Vista. What is one thing you could tell them about?

Options are :

  • It has a feature called UAC, which prevents programs from running unless given specific permission
  • It features a new Task Bar that enables you to pin items to it like a dock (Correct)
  • It comes with the all-new Aero interface
  • It has a Side Bar, which enables you to install Gadgets

Answer : It features a new Task Bar that enables you to pin items to it like a dock

Explanation Correct Answer:That new Task Bar is totally cool, isnt' it? You can pin just about any application to it. I have 10 applications pinned to mine. It's really helped in cleaning up my desktop.Incorrect Answers:The UAC, Aero, and Side Bar were all features introduced in Windows Vista.Side Note:The Side Bar was removed from Windows 7 as a stationary "place" to put your gadgets. Now you can place your gadgets anywhere. If you really want to get technical though, Side Bar still exists! On your Windows 7 PC open up the Task Manager and check out sidebar.exe. It's alive and well!

When securing a small office home office (SOHO) that has empty cubicles with unused network ports, which of the following can be used to secure only the unused ports?

Options are :

  • Use DHCP addressing on the network
  • Power down the router when it is not being used
  • Disable DNS on the network
  • Disable the ports on the router or switch (Correct)

Answer : Disable the ports on the router or switch

Explanation Correct Answer:Disabling the unused network ports will prevent anyone from plugging into them.Incorrect Answers:DHCP is in charge of automatically assigning IP addresses, and wouldn't help with securing network ports.Powering down the router won't secure unused ports.Disabling DNS won't help secure ports.

Which of the following home computer synchronization methods are possible with an iOS device? (Select two.)

Options are :

  • USB (Correct)
  • FireWire
  • Parallel
  • Wi-Fi (Correct)
  • Infrared

Answer : USB Wi-Fi

Explanation Correct Answer:iOS devices can sync using USB or W-Fi only.Incorrect Answer:No iOS device has ever used infrared for synchronization, and none have used FireWire for several years.

Jill unsuccefully attempts to install an application on a client's computer. The computer is running Windows 7 Professional, 64-bit. What should she try FIRST after that failure?

Options are :

  • Right click on the installation file and select "Run as administrator." (Correct)
  • Reinstall Windows.
  • Contact the manufacturer to see if the program works with 64-bit versions of Windows.
  • Escalate the problem to her supervisor.

Answer : Right click on the installation file and select "Run as administrator."

Explanation Correct:Windows 7 requires elevated privileges when installing some software. The simple first step she should take is running the installation file as an administrator.Incorrect:These were pretty tough, because all three incorrect answers are steps in the troubleshooting process. If running as an administrator doesn't work, then researching compatibility issues or escalating the problem would be the next steps. Reinstalling Windows would be the last thing to try.

A technician needs to initiate a Remote Desktop Assistance connection for a customer who is experiencing email issues. Once the customer agrees, what should the technician ask the customer to complete, prior to establishing the connection?

Options are :

  • Take steps to reproduce the problem.
  • Reboot the system.
  • Log off, and log back on.
  • Close any files that are personal. (Correct)

Answer : Close any files that are personal.

Explanation Correct Answer:You should always treat any customer information as confidential. It is easiest to be preventative and remind customers to close personal items prior to troubleshooting a system.Incorrect Answers:Rebooting the system will only delay assisting the customer.Logging on and off the system will only delay assisting the customer.You may need to reproduce the problem, but first you need to ensure the system does not have private information open.

A user wants to copy a graphic into another user's folder, but when they attempt to paste, the file save is denied. Which of the following is the MOST likely reason the file save cannot be completed?

Options are :

  • The user requires read permission to the folder.
  • The user must be a member of the Administrators group.
  • The user must be a member of the Users group.
  • The user requires write permissions to the folder. (Correct)

Answer : The user requires write permissions to the folder.

Explanation Correct Answer:The user requires write permission. Windows allows you to set user permissions, which can allows or disallow permission to specific groups or all users. Although permissions can be advanced, the basic permission are Read, Write, Modify and Full Control. In order to save a file to another user's folder, you must have write permissions; it allows you to write to the folder.Incorrect Answers:Even being a member of a Users group does not always give you the permission required. If the group does not have write permission, you cannot save the file.Read permission will allow a user to see the files, but not to save a file to the folder.User permissions are varied. You can give users permission to save files, without giving the user full administrator rights.

Which of the following has the highest-level rights?

Options are :

  • Standard User
  • Power User (Correct)
  • Remote Desktop User
  • Guest User

Answer : Power User

Explanation Correct Answer:A Power User is the second most powerful account type next to an Administrator account.Incorrect Answers:A Standard User cannot install software without an Administrator or Power User account's permission.A Guest User is the least powerful account type.A Remote Desktop User is an account type specifically for users logging in remotely.

A user reports that every time he uses a search engine and clicks on a link to go to a Web, site, he is instead taken to a site blocked by his company's content filter. The user is not trying to go to the blocked site, buthe needs to be able to successfully use the search engine to complete his assignment. Which of the following tools would a technician use to best resolve this issue?

Options are :

  • Recovery console
  • Factory pre-installation
  • System restore
  • Anti-malware software (Correct)

Answer : Anti-malware software

Explanation Correct Answer:It sounds like the user has gotten some malware on his PC, so it's time to run an anti-malware scan. Sit back and let the software do all the work!Incorrect Answers:All the other answers involve lengthy processes that would necessitate data backups, application reinstallation, and all sorts of other hassles. Use them as last resorts!

Which of the following types of screen locks is the MOST secure way to secure your mobile device?

Options are :

  • Passcode lock (Correct)
  • Swipe lock
  • Fingerprint lock
  • Face lock

Answer : Passcode lock

Explanation Correct Answer:The passcode lock is the most secure screen lock. On current Apple products, a forgotten passocde could potentially disable your device. The only way for recovery is to erase the device, which will remove all your data.Incorrect Answers:Fingerprint locks are not advised for security. Fingerprint security can be easily tricked, and compromises your biometric information.Swipe lock does not provide any security for your device.Face lock can be fooled with a good quality picture of you!

A laptop is setup at a podium for a presentation. The presentation that is projecting extends the laptop's desktop to the projection screen. The presenter would like it to show exactly what the laptop screen is showing. Which of the following would be the QUICKEST way to accomplish this?

Options are :

  • Adjust the screen orientation
  • Use the dual display function key to switch how the laptop treats the display, (Correct)
  • Adjust the display setting in control panel.
  • Reboot the laptop

Answer : Use the dual display function key to switch how the laptop treats the display,

Explanation Correct Answer:Most manufacturers provide quick use function keys that can be used from the keyboard.Incorrect Answers:Although you can use applets in the Control Panel to adjust between the dual display functions, the quickest way is to use the shortcut keys that are set up on they keyboard.The screen orientation will only change portrait or landscape.Rebooting the laptop will not change the way the laptop uses the multi-screen environment.

Which command can be run on a workstation to determine the Group Policies applied on a workstation?

Options are :

  • extract
  • tasklist
  • gpresult (Correct)
  • chkdsk
  • gpupdate

Answer : gpresult

Explanation Correct Answer:Gpresult is a command line tool that will access the RSoP of a workstation connected to a network with group policy settings.Incorrect Answers:Extract is not a command line command.Tasklist will show all running applications and services.Gpupdate will udate group policy settings.Chkdsk will check and repair disk problems.

Android smartphones are different from other smartphone devices in that:

Options are :

  • Android devices operate on a proprietary operating system.
  • Android devices are able to use other manufacturer apps.
  • Android apps are more secure that other manufacturer devices
  • Android devices use open source operating systems. (Correct)

Answer : Android devices use open source operating systems.

Explanation Correct Answer:Andriod uses open source operating system. Open source refers to a program in which the source code is available to the general public for use and modification from its original design free of charge. Since open source can be modified, it is not proprietary.Incorrect Answers:The operating system does not determine the security on an application.Manufacturers write the same application for different types of smartphone systems, but apps can only be used for the operating system for which it was written.Andriod uses open source operating system, it is not proprietary.

When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured?

Options are :

  • Daily
  • Differential
  • Incremental
  • Full (Correct)

Answer : Full

Explanation Correct Answer:A full backup backs up everything that is set to be backed up, whether the archive bit is on or not.Incorrect Answers:Differential backups save only the data that has changed since the last full backup.Incremental backups save only the data that has changed since the last backup of any kind.A daily backup is just a backup of any type that is preformed every day.

Which of the following file systems enable you to encrypt an image, thus making it un-viewable by any account except your own?

Options are :

  • FAT
  • EFS (Correct)
  • OSR
  • FAT32

Answer : EFS

Explanation Correct:EFS, or Encrypted File System enables you to encrypt an image.Incorrect:FAT, FAT32, and OSR are older file systems that do not include this function.

A technician needs to format a file system to be compatible with the widest range of operating systems. Which of the following file systems should be used?

Options are :

  • CDFS
  • NTFS
  • FAT32 (Correct)
  • FAT16

Answer : FAT32

Explanation Correct Answer:FAT32 is an older file system that is supported by just about every desktop or server OS out there.Incorrect Answers:NTFS is a Windows-only file system with only limited support on other Oses.FAT16 doesn't support hard drives as large as FAT32, and it's mostly found in removable media.CDFS is a Linux-based file system for, you guessed it, CDs.

Uhura has just accepted an SSL certificate, but she's not comfortable about the source and now wishes to make it "go away." What should she do?

Options are :

  • Configure her firewall to block all incoming SSL certificates
  • Right-click on the certificate in question and select "Confirm"
  • Clear the SSL cache (Correct)
  • Rebuild her SSL cache

Answer : Clear the SSL cache

Explanation Correct Answers:In order to get rid of that certificate, she must clear the SSL cache.Incorrect Answers:A firewall cannot be configured that way. Confirming the certificate will not make it go away. There is no option to rebuild an SSL cache.

How does the Windows 7 Experience Index generate its base score?

Options are :

  • Based on the highest of your subscores
  • Based on the age of the computer
  • Based on an average of your subscores
  • Based on the lowest of your subscores (Correct)

Answer : Based on the lowest of your subscores

Explanation Correct Answer:The Windows Experience Index in both Vista and 7 generates its base score from the lowest of your subscore categories.Incorrect Answers:Not from an average or the highest score.Basing it from age would be a really hard number to define and track. Based on the age since the last format? Since the last install? Too many variables.

A technician has a client's laptop that is randomly shutting down. Which of the following is the first step of the troubleshooting theory that the technician should perform to resolve the laptop's issue?

Options are :

  • Identify the problem (Correct)
  • Establish a plan of action to resolve the problem
  • Establish a theory
  • Document finding, actions, and outcomes

Answer : Identify the problem

Explanation Correct Answer:First off, you've got to identify the problem. No sense in fixing it before you understand what it is.Incorrect Answers:All of the other options come later in the troubleshooting process.

A user has too many applications starting when they log into Windows. From the command line, which of the following tools is the fastest option to prevent these applications from running on startup?

Options are :

  • SERVICES.MSC
  • MSCONFIG (Correct)
  • MSINFO32
  • REGEDIT

Answer : MSCONFIG

Explanation Correct Answer:The MSCONFIG tool enables you to select which programs start up with Windows.Incorrect Answers:SERVICES.MSC enables you to start and stop various Windows services.REGEDIT enables you to edit the Windows Registry.MSINFO32 enables you to view information about your system.

Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

Options are :

  • SHUTDOWN
  • TASKKILL (Correct)
  • ERASE
  • DEL

Answer : TASKKILL

Explanation Correct Answer:The TASKKILL command does exactly what it says: it kills a task.Incorrect Answers:ERASE is a command used back in MS-DOS to delte files.SHUTDOWN also does exactly what it says: it shuts down the computer.DEL is used to delete files.

Jabba is working on a Windows Vista computer. He has just saved his new Microsoft Word document into his Documents folder. He now wants to copy that file to his flash drive, but doesn't know where to go in order to copy it. Guide him to the correct path.

Options are :

  • C:\Documents and Settings\Jabba\My Documents
  • C:\Documents and Settings\Jabba\Documents
  • C:\Users\Jabba\My Documents
  • C:\Users\Jabba\Documents (Correct)

Answer : C:\Users\Jabba\Documents

Explanation Correct Answer:C:\Users\Jabba\DocumentsIncorrect Answers:Anything with Documents and Settings belongs to Windows 2000 or XP. Also, in Vista they took away the "My" Documents. It's just Documents in Vista.

The shared folder named C$ is an example of which of the following?

Options are :

  • Permission propagation
  • Inheritance
  • Administrative share (Correct)
  • Local share

Answer : Administrative share

Explanation Correct Answer:The $ symbol at the end of the share name marks this as a hidden administrative share, which enable system administrators to access systems remotely.Incorrect Answers:None of the other answers account for the format of the share name.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions