CompTIA 220-1002 Core 2 A+ Take Ten Challenge #3Step 1 of 1010%3-1: Windows 10 requires a CPU that includes the NX feature. Which of these best describes this feature? Allows application developers to use a standard instruction set Multiple threads can be processed at the same time Protects against malicious software Ensures that operating system updates are genuine Allows 32-bit processors to use more than 4 GB of RAM 3-2: A user in the manufacturing department has brought their home laptop to work and connected it to the corporate network. Unfortunately, a worm on the laptop has now infected a number of other systems. Which of these security issues was the cause of this outbreak? Denial of service Brute force attack Non-compliant system Zero day attack Man-in-the-middle 3-3: A user has tried to install a Linux distribution for dual-boot with an existing Windows installation. When the system now boots, the only option is to start Linux. Which of the following would be the best way to restore boot access to Windows? Reinstall Windows from the original installation media Run bootrec from the recovery console Modify the startup partition from the BIOS configuration Run sfc from the recovery console Uninstall the Linux operating system 3-4: A system administrator is documenting the BIOS version running on all of their Windows servers. Which of these utilities can be used to provide this information? Event Viewer Component Manager System Information Registry Editor MSTSC 3-5: A home user has accidentally formatted a drive containing important documents. What type of drive formatting would allow for the recovery of information? Low level Regular format Quick format Safe format NTFS format 3-6: A user in the accounting department has noticed that their workstation appears to be working much slower than usual and some of the files in their documents folder now show the file size as 0 bytes. Which of the following would be the most likely cause of these issues? The computer is infected with malware The computer's motherboard is failing The browser's pop-up filter is disabled The accounting software is not configured with the proper permissions The browser is visiting sites with invalid certificates 3-7: Which of the following would be the best way to control ESD? Use a grounded electrical connection Use cloth gloves when working with components Disconnect the power cord when working inside of a computer Maintain humidity levels over 60% Use anti-virus or anti-malware software 3-8: Janet, a manager for the engineering team, travels extensively with her laptop. She would like to work on her documents, even when her laptop is not in an area where a network connection is available. She would like all of her updated documents to automatically update on the corporate servers when a connection is restored. Which of the following would allow for this functionality? File Manager Internet Options BitLocker Sync Center Windows Domain Services 3-9: While a company is announcing a new product to the media, the company's web site is overwhelmed with traffic requests from a single IP address. Because of this traffic, the web server is unable to serve any other requests. Which of the following would best describe this situation? Zero-day attack Denial of service Man-in-the-middle Spoofing Social engineering 3-10: A user in the shipping department is reporting that an application vanishes while they are working, and they have to start the application again to continue working. Which of these would be the best next step for troubleshooting this issue? Perform a defragmentation Run a hardware diagnostic Check the Event Viewer Reinstall the application Reboot the computer