Comptia 1002 Practice Test
35 community-sourced questions and answers. Free — no login.
Which operating system will be installed on your new Chromebook by default? a) macOS b) Google OS c) Chrome OS d) Windows 10
c) Chrome OS
A user complains that they can't launch Hyper-V from home. The user cannot even find the program settings. However, the user can access the Internet. In order to help this user, which question would you ask first? a) Can you access the company website? b) Can you ping the server? c) Which Edition of Windows is installed? d) What error message is being displayed?
c) Which Edition of Windows is installed? Since the user can access the Internet, there is no need to ask the user if he or she can access the company website access or ping the server. Since there is no error message, this would indicate that the user is using a Windows Edition that does not support Hyper-V. Windows 10 Pro, Enterprise, and Education Editions support Hyper-V. Windows 10 Home Edition does not. Answer: Which Edition of Windows is installed?
When upgrading a system from Windows 7 Home Premium Edition (SP1) to Windows 10, which Windows 10 Edition is recommended? a) Home b) Home Premium c) Professional d) Any edition that the hardware supports
a) Home Answer & Explanation: Windows 10 Home Edition is the recommended upgrade from Windows 7 Starter, Home Basic, and Home Premium editions. Windows 10 Professional Edition is the recommended upgrade for Windows 7 Professional and Windows 7 Ultimate Editions. Answer: Home.
By default, which type of script file will a script written with Windows 10 PowerShell ISE be saved as? a) .bat b) .ps1 c) .sh d) .py
b) .ps1
When configuring email you must enter: (Choose all that apply) a) Password b) SMTP c) DNS d) POP3 e) Account Name f) ISP
B/D/E SMTP/POP3/Account Name Email configuration requires setting the SMTP server name, the POP3 server name, and the account name. The password can be left to be entered each time you log in to get email. Remember that optionally, you can enter the password during configuration and check off to have it saved. Answers: SMTP, POP3, and Account Name.
Which of the following can provide some protection for your network from outside invaders? (Choose all that apply) a) Firewalls b) Class 3 modems c) Class 2 modems d) Packet-Filtering Routers e) Hidden Files f) Proxy Servers
A/D/F Firewalls/Packet-Filtering Routers/Proxy Servers
You have lost your iPhone. Fortunately, you have enabled the Find My iPhone feature. You log on to your account, access the map, but do not see the device. Fearing a breach of your privacy, which would best protect the data? a) Send message b) Remote lock c) Remote wipe d) Remote access
C: Remote Wipe The best choice to protect your data in this example is remote wipe. If the device is recovered, it can be restored from backup. Answer: Remote wipe.
You are using the Performance Monitor on a Windows 7 Professional workstation and make note of the following counters: Memory: Pages/sec 80; Processor: %utilization 90; Physical disk: % disk time 85. Which of the following solutions would overcome the bottleneck indicated by these results? a) Add a SCSI hard disk drive b) Upgrade to a faster processor c) Add a second CPU d) Add RAM
D: Add RAM These measurements from Performance Monitor are indicating overuse of virtual memory. Note the heavy paging per second, hard drive usage, and the CPU usage. Adding RAM is the right solution. Answer: Add RAM.
A Windows 7 Professional computer is having boot problems. You investigate and decide that the problem may be related to a process being initiated by Internet Explorer. Which one of the following Advanced Options would you choose to correct the problem? a) Safe Mode with Networking b) Safe Mode with Command Prompt c) Safe Mode d) Enable Boot Logging
A: Safe Mode with Networking Remember, Safe Mode prevents startup files and most of the drivers from loading. This simplification of the system can give you the chance to troubleshoot and detect needed fixes. Safe Mode with networking will permit internet access. Answer: Safe Mode with Networking.
Which device should not be plugged into a UPS? a) A monitor b) A laser printer c) A scanner d) A modem
b) A laser printer
A way to find out if a device has been rooted is to download and run the Root Checker Basic app. What type of condition and device does Root Checker Basic report on? a) Jailbroken iOS device b) Rooted Android device c) Rooted iOS device d) Rooted Windows Phone device e) Jailbroken Android device
b) Rooted Android device Root Checker Basic is a free app. that produces a report showing whether an Android device has been rooted or not. In regards to terminology Android and Windows Phone devices are said to "rooted" while iOS devices are referred to as "jailbroken".
The ALT+TAB keystroke produces which result in Windows 10? a) Switches between open programs. b) Closes the open program. c) Opens the closed program. d) Opens the Start Menu.
A) Switches between open programs.
How can disk management be accessed in Windows 10? a) Main Panel b) Device Manager c) Administrative Tools d) My Computer
C) Administrative Tools Most partition, boot sector, and drive configuration faults can be corrected or recovered from by using the Disk Management tool from the Computer Management utility of Administrative Tools.
You have one physical drive partitioned into two partitions C: and D:. You add a second drive and create a primary DOS partition. What will the drive letter of the new partition be? a) C: b) D: c) E: d) F:
D) F The OS assigns drive letters to the primary partitions first. This would make the first partition on the second disk D: and the extended partition on the first disk E:.
When formatting a large capacity drive what situation would cause it to format at a lower capacity when you set it up in an operating system? a) Operating system overhead. b) The new drive is not IDE compatible. c) The ram does not support the larger capacity hard drives. d) The disk is full.
A) Operating System Overhead The operating system uses a portion of the drive for file allocation, boot records and other overhead. The formatted capacity never matches the actual drive size.
What should be the first step when configuring a hard drive into a system? a) Format b) Install OS c) Configure DMA d) Partition
D) Partition The Disk Management is used to create logical boundaries which encompass all of the available space on a disk. After partitions are created, they must be formatted. This creates the file system which will store data.
The Windows PXE allows a properly configured and supported Windows PC to: a) Bypass startup screens and boot directly to repair mode b) Boot from the network c) Start in the RE without intervention d) Launch AIK
B) Boot from the network The PXE (Preboot eXecution Environment) boots the computer to a network server containing the PE (Preinstallation Environment) and performs an unintended installation.
You have been asked to load an image of Windows on 10 computers that just came in. How would this BEST be accomplished? a) Use the retail media on the server. b) Boot to PXE and load image from distribution point. c) Load the image to an SSD card and use on each machine. d) Make 10 copies of the image to DVD and load image from there.
B) Boot to PXE and load image from distribution point. A properly configured PXE distribution point (assuming no password) will allow the system to boot and automatically load the image. The other options all require more physical operations increasing time and labor requirements on the installer. You want this process to be as streamlined as possible.
Which type of security token is the least vulnerable to malware? a) Hardware token b) Software token c) Badge reader d) None of these
A) Hardware Token Hardware security tokens are standalone devices that provide a higher level of security than software tokens. Hardware tokens are often used with smart devices.
All of the following fall into one security classification: Lock Doors, Shredding documents, Biometrics, RSA tokens, Retinal. a) Digital security b) Strong passwords c) User Education d) Physical Security
D) Physical Security All the areas covered are considered Physical.
Which technique allows the path of local folders, such as Pictures or Documents, to appear as a network location while also being cached locally? a) OUs b) Groups c) Home folders d) Folder redirection
D) Folder Redirection Folder redirection allows the path of local folders to be redirected to a network share while also being stored locally, allowing for increased speed and reliability. OUs, Groups, and Home Folders are not factors in this process.
You are responsible for managing remote users. Their connections must adhere to the AAA management model. Which service would you choose? a) RADIUS b) PPP c) Dialup-Call back d) TACACS+
A) RADIUS RADIUS (Remote Access Dial-in User Service) provides the required Authentication, Authorization, and Accounting services needed for the AAA management model. Another viable option would be TACACS+ (Terminal Access Controller Access Control Service Plus) which is secure but lacks Authentication and Authorization functions.
Why is Shared Key authentication considered a security risk? a) The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key. b) The keys are shared through broadcast with all network nodes. c) A hacker can see the keys with a sniffer. d) The WEP keys used on all computers are the same.
A: The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key.
You have an area near the pool and bar at your home that you want to configure for wireless access with no security. The area is remote and secluded enough that you have no security concerns. You have a router in place. How should you configure it? a) No SSID b) No password c) Set encryption to Open d) Set MAC filter to allow all
C) Set encryption to Open All you need to do is disable your encryption to open. This will allow access to any device in range. You may want to decrease the radio power to be a little safer. The SSID is a network name and you will need one. Broadcasting it is not going to alter the need for its existence and in this case you would want it broadcast. Disabling security (open) will eliminate the need for users to have a password but you will still need one to change configurations, don't lose it. The MAC filter is a blocker not an open door, leave it unchanged.
Which of the following will: (1) help prevent malware from installing itself; and (2) protect the Windows configuration and other settings? a) The UAC box b) Shared permissions c) Workgroup security with user accounts and passwords d) Advanced encryption technologies
A) the UAC box
Which devices are loaded during safe mode? a) Mouse, CD-ROM, keyboard b) Mouse, SVGA, keyboard c) Mouse, VGA, keyboard d) Mouse, keyboard, speakers
C) Mouse, VGA, keyboard
In Windows 8, what should be done if a 32-bit Windows based program stops responding? a) Click on Start, Shutdown and select ~Shutdown the computer~. b) Press CTRL-ALT-DEL and select Shutdown. c) Press CTRL-ALT-DEL and select End Task. d) Press CTRL-ALT-DEL, select the program that is not responding and press EndTask.
D) Press CTRL-ALT-DEL, select the program that is not responding and press EndTask. Because of the nature of preemptive multitasking in the Windows O.S. you can selectively End a program that is not responding.
Which file is needed to start up Windows 8? a) NTLDR b) BOOT.INI c) BOOTMGR d) NTBOOTDD.SYS
C) BOOTMGR When booting a Windows 8 OS, the BOOTMGR in the MBR consults the BCD text file for operating system and boot partition information. This is similar to the relationship between NTLDR and BOOT.INI in legacy NT based systems.
You have a customer that has installed an updated device driver for their sound card and now it is not functioning properly. How can you roll back the driver? a) Go to Device manager and click Roll Back Driver. b) Go to Device Manager, click on the Device and Roll Back Driver. c) Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver. d) Restart the computer in Last known good configuration Mode.
C) Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver.
What is modified when changing the system startup boot sequence? a) CMD.EXE b) BOOTMGR c) BOOT.INI d) BIOS/CMOS
D) BIOS/CMOS The CMOS memory holds the BIOS settings. The boot sequence is a BIOS setting.
A customer calls and states that they are suddenly receiving emails from unknown parties that are automated replies of delivery failures or vacation messages. What do you suspect? a) Misconfigured email program b) Malware c) Spam d) Hijacked email
D) Hijacked email
You have a PC that will not run Windows Defender. Defender is disabled and the Action Center reports that another antivirus program is running. There are no other antivirus programs installed. What is the cause? a) Ransomware b) Rogue antivirus c) Invalid certificate d) All of these
B) Rogue antivirus This situation can be attributed to a rogue antivirus program that self-installed and disabled Windows Defender functionality. In this case, you will find that other functions like Windows Update will also fail. Ransomware blocks all system access until the ransom is paid. Your trusted root CA certificate will have no bearing on this situation.
You are working on a PC that you suspect has malware on it. Which System Restore option would you choose? a) Restore from the latest restore point b) Restore from the oldest restore point c) Disable System Restore d) Any of these
C) Disable System Restore In this case, disable System Restore since malware is capable of infecting restore points. Even when using a restore point that was created before the infection, there is no guarantee that the restore point is clean and that the infection will be removed.
Which of the following would you choose to track inventory that are on pallets in your company's warehouse? a) QR codes b) Barcodes c) RFID tags d) All of these
C) RFID tags RFID tags offer the most accurate tracking method of the choices provided. The other choices would require the codes to be scanned individually for each piece of inventory.
Which choice is a policy that covers how long data should be retained and how it should be disposed of? a) Data retention policy b) Disposal and destruction policy c) Storage and retention policy d) PII policy
B) Disposal and destruction policy A good disposal and destruction policy will address the length of time data will be kept and subsequently the method to be used for its destruction.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials