100 Questions with Answers and Rationales
This exam covers the latest objectives including:
• Operating Systems – 31%
• Security – 25%
• Software Troubleshooting – 22%
• Operational Procedures – 22%
1. A user reports that their Windows 11 computer is running slowly. Which built-in tool
provides real-time CPU, memory, disk, network, and GPU utilization graphs?
• A) Performance Monitor
• B) Task Manager
• C) Resource Monitor
• D) System Configuration
Answer: B) Task Manager
Rationale: Task Manager (Ctrl+Shift+Esc) provides real-time performance graphs on the
Performance tab. Resource Monitor offers more detail but is not real-time graphing.
Performance Monitor is for logging over time. Task Manager is the quickest for initial
assessment.
2. Which of the following Windows commands will display the IP address, subnet mask, and
default gateway of all network adapters?
• A) ipconfig
• B) ipconfig /all
• C) ifconfig
• D) netstat -a
, Answer: B) ipconfig /all
*Rationale: ipconfig /all displays detailed TCP/IP configuration including MAC address,
DHCP status, DNS servers, and the requested information. ipconfig alone shows basic
IPv4/IPv6 address, subnet mask, and gateway. ifconfig is Linux/Unix. netstat -a shows
connections.*
3. A technician needs to prevent a specific application from launching at startup for the
current user only. Where should the technician look?
• A) HKLM\Software\Microsoft\Windows\CurrentVersion\Run
• B) HKCU\Software\Microsoft\Windows\CurrentVersion\Run
• C) Startup folder in C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
• D) Task Scheduler Library
Answer: B) HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Rationale: HKCU (HKEY_CURRENT_USER) Run keys affect only the currently logged-in user.
HKLM affects all users. The Startup folder in ProgramData affects all users. Task Scheduler can
also launch apps but is more complex. For per-user removal, check HKCU Run.
4. Which type of malware disguises itself as legitimate software but performs malicious
actions after installation?
• A) Virus
• B) Worm
• C) Trojan horse
• D) Rootkit
Answer: C) Trojan horse
Rationale: A Trojan appears legitimate (e.g., fake antivirus, game crack) but contains
malicious code. Unlike viruses/worms, Trojans do not self-replicate. They rely on user
execution. Rootkits hide their presence. Ransomware encrypts files.
5. A user receives an email claiming to be from their bank asking them to click a link and
verify their account details. This is an example of:
• A) Phishing
,• B) Spoofing
• C) Vishing
• D) Shoulder surfing
Answer: A) Phishing
Rationale: Phishing uses fraudulent emails or messages to trick users into revealing sensitive
information. Spear phishing targets specific individuals. Vishing uses phone calls. Smishing
uses SMS. Spoofing falsifies sender information.
6. Which Windows feature allows a technician to revert the operating system to a previous
state without affecting user files?
• A) System Restore
• B) File History
• C) Backup and Restore
• D) Reset this PC (Keep my files)
Answer: A) System Restore
Rationale: System Restore uses restore points to revert system files, registry settings, and
installed applications while preserving personal documents. "Reset this PC - Keep my files"
reinstalls Windows but removes apps (not a true rollback). File History backs up user files only.
7. What is the default file system for Windows 11 on a standard consumer installation?
• A) FAT32
• B) NTFS
• C) exFAT
• D) ReFS
Answer: B) NTFS
*Rationale: NTFS (New Technology File System) is the default for Windows 10/11, offering
security permissions, encryption (EFS/BitLocker), compression, journaling, support for large
volumes/files, and symbolic links. FAT32 has 4GB file limit; exFAT is for flash drives; ReFS is
for file servers.*
, 8. A technician needs to forcibly terminate a non-responsive application from the command
line. Which command should be used?
• A) tasklist
• B) taskkill /F /IM notepad.exe
• C) shutdown /r
• D) sfc /scannow
Answer: B) taskkill /F /IM notepad.exe
Rationale: taskkill /F forces termination of a process. /IM specifies the image name (process
name). Alternatively, use /PID with the process ID. tasklist lists
processes. shutdown restarts. sfc repairs system files.
9. Which of the following wireless security protocols is considered the most secure for
home networks as of the 220-1102 exam?
• A) WEP
• B) WPA
• C) WPA2
• D) WPA3
Answer: D) WPA3
*Rationale: WPA3 is the current standard, featuring SAE (Simultaneous Authentication of
Equals) replacing PSK, protecting against offline dictionary attacks, forward secrecy, and
improved encryption (GCMP-256). WPA2 is still acceptable but older. WEP and original WPA
are deprecated and insecure.*
10. A user's Windows 11 computer boots to a blue screen and restarts continuously. What is
the BEST initial step?
• A) Reinstall Windows immediately
• B) Boot into Safe Mode and disable automatic restart on system failure
• C) Replace the hard drive
• D) Run chkdsk /f
Answer: B) Boot into Safe Mode and disable automatic restart on system failure
Rationale: Disabling automatic restart allows the BSOD error code to be read. Safe Mode loads
minimal drivers and may bypass the problem. After identifying the error code, further
troubleshooting (driver rollback, sfc, chkdsk, or uninstalling recent updates) can proceed.