Skip survey header

A+ Practice Quiz: 220-1002 Quiz 7

Enjoy the following 10 question quiz from TestOut

1. You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible.

Which of the following steps are required to accomplish this? (Choose two)
2. You have a workstation running a 64-bit version of Windows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the lowest cost and least effort.

Which of the following would be the BEST way to install Windows 10?
3. As you are working on your Windows 10 computer during a fierce thunder storm, lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message.

Which of the following tools is MOST likely to rectify this issue?
4. You have just received a call from one of your customers. He informs you that after turning his computer on, he received the following error:

Press Ctrl+Alt+Del to restart

Every time he restarts his computer, the same error is shown.

Which of the following tools is BEST for fixing this issue?
5. When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command.

Which of the following situations would require their use?
6. Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

7. A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small middle eastern nation. The user was offered a 25 percent share of this account if she would help the sender transfer it to a bank in the United States. The user responded and was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender since.

Which of the following BEST describes the type of attack which as occurred in this scenario?

8. Which of the following describes a man-in-the-middle attack?
9. You have a network that uses a logical ring topology. How do messages travel through the network?
10. You have implemented an ad hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
Thank you to our sponsor for providing this free practice quiz.