CompTIA A+ 220-1202 Certification Core 2 Exam Dumps and Practice Test Questions Set 4 Q46-60

CompTIA A+ 220-1202 Certification Core 2 Exam Dumps and Practice Test Questions Set 4 Q46-60

Visit here for our full CompTIA 220-1202 exam dumps and practice test questions.

Question 46

A user reports that their Windows 10 PC is running slowly when accessing large files and applications. The CPU and RAM usage are low, but the hard drive shows continuous activity. Which upgrade would most likely improve performance?

A) Replace HDD with SSD
B) Increase RAM
C) Upgrade CPU
D) Upgrade GPU

Answer:  A) Replace HDD with SSD

Explanation:

Answer:  A) Replacing a hard disk drive (HDD) with a solid-state drive (SSD) is correct because the symptoms described—continuous disk activity and slow access to files and applications—indicate a storage bottleneck. Traditional HDDs rely on spinning platters and mechanical read/write heads, which are significantly slower than the flash memory used in SSDs. When a system has an HDD, even when CPU and RAM are underutilized, the operating system must wait for the hard drive to read and write data, which causes slow performance, especially when opening large files or launching applications. An SSD dramatically reduces latency and increases read/write speeds, allowing data to be accessed almost instantaneously. The transition to an SSD also improves system boot times, application load times, and overall responsiveness. Many users perceive this upgrade as the most noticeable improvement in daily system performance. Additionally, SSDs have no moving parts, reducing the risk of mechanical failure and improving durability.

Increasing RAM is incorrect because RAM is only relevant when memory usage is high. In this scenario, the CPU and RAM are underutilized, meaning the system is waiting for data from the storage device, so adding more memory will not address the performance issue.

Upgrading the CPU is incorrect because processor usage is low, indicating that the CPU is not the limiting factor. Replacing the CPU in this case would not significantly improve the system’s performance, as the bottleneck is in data access from storage.

Upgrading the GPU is incorrect because graphics performance is unrelated to reading or writing files or running general applications. While a better GPU improves graphical rendering, it has no impact on storage-related slowness. Replacing the HDD with an SSD is the most direct and effective way to improve performance in this scenario.

Question 47

A user wants to prevent unauthorized users from accessing specific folders and files on a Windows PC while allowing normal system operation. Which feature should the technician enable?

A) Encrypting File System (EFS)
B) BitLocker
C) System Restore
D) Disk Cleanup

Answer:  A) Encrypting File System (EFS)

Explanation:

Answer:  A) Encrypting File System (EFS) is correct because it allows file-level encryption on Windows systems, enabling users to protect individual files or folders. EFS integrates with NTFS and encrypts data such that only authorized user accounts can access it. The encrypted data is stored on the local drive and remains unreadable to anyone without the correct encryption key. This ensures that sensitive information remains secure even if the device is accessed by unauthorized personnel or if the drive is removed from the system. EFS is particularly useful in multi-user environments where full-disk encryption may be impractical but specific files need protection. The encryption is transparent for authorized users, meaning that they can work with their files normally without additional steps while unauthorized users cannot read the data. EFS also supports recovery keys, allowing administrators to decrypt files if necessary.

BitLocker is incorrect because it encrypts entire drives rather than individual files or folders. While BitLocker protects all data at rest, it is less flexible for scenarios where only selected files require protection, and it does not allow fine-grained control over specific folders.

System Restore is incorrect because it creates snapshots of system files and settings. It does not provide encryption or file-level protection.

Disk Cleanup is incorrect because it removes temporary and unnecessary files. While it helps maintain system performance, it does not secure or encrypt data. EFS is the proper solution for protecting specific files and folders while allowing normal system use.

Question 48

A user reports that their Windows PC occasionally loses network connectivity while other devices on the same network remain functional. Which tool should a technician use first to diagnose potential network configuration issues?

A) ipconfig
B) Disk Cleanup
C) Task Manager
D) System Restore

Answer:  A) ipconfig

Explanation:

Answer:  A) ipconfig is correct because it is a command-line tool that displays detailed IP configuration information, including the IP address, subnet mask, default gateway, and DNS server settings for all network interfaces. When a single PC experiences intermittent connectivity while others remain functional, the issue is often related to IP assignment, DNS resolution, or DHCP lease conflicts. Using ipconfig, a technician can quickly determine whether the device has a valid IP address and is properly communicating with the network. Commands such as ipconfig /release and ipconfig /renew can reset the DHCP assignment, resolving issues caused by expired or conflicting leases. Additionally, ipconfig /flushdns clears cached DNS entries, which may resolve connectivity problems due to stale or corrupted DNS data. This tool provides immediate feedback and allows the technician to pinpoint the problem, making it the most appropriate first step in diagnosing device-specific network issues.

Disk Cleanup is incorrect because it removes temporary files. While it improves storage space and system efficiency, it does not provide information about network configurations or connectivity problems.

Task Manager is incorrect because it monitors active processes and system resource usage. While it can show network utilization, it does not display IP configuration details or assist in resolving DHCP or DNS issues.

System Restore is incorrect because it reverts the system to a previous state. While it can resolve software misconfigurations, it is not a targeted tool for diagnosing network configuration problems. ipconfig provides precise information and tools for correcting IP, DNS, or DHCP-related connectivity issues.

Question 49

A technician wants to ensure that users can restore their personal files in case of accidental deletion or modification without affecting system files. Which Windows feature should be enabled?

A) File History
B) System Restore
C) BitLocker
D) Windows Defender Antivirus

Answer:  A) File History

Explanation:

Answer:  A) File History is correct because it continuously backs up user-selected folders and allows recovery of individual files or previous versions. This feature periodically copies files to an external drive or network location, retaining multiple versions of each file. Users can browse and restore previous versions without affecting system files, applications, or operating system configurations. File History is ideal for protecting personal data, including documents, spreadsheets, pictures, and other user-generated content. Unlike full system backups, it focuses solely on user files, making recovery fast and targeted. File History also allows configuration of storage location, retention policies, and scheduling to balance protection with storage efficiency. In scenarios where accidental deletion or modification occurs, File History provides a reliable and user-friendly method for restoring data.

System Restore is incorrect because it only creates snapshots of system files and settings. While it can revert system changes, it does not protect user-generated documents or personal files.

BitLocker is incorrect because it encrypts entire drives. While it protects data from unauthorized access, it does not provide file recovery in case of accidental deletion.

Windows Defender Antivirus is incorrect because it protects the system from malware. It does not create backups or restore user files. File History is specifically designed to restore personal files safely and efficiently.

Question 50

A user wants to prevent unauthorized changes to critical system files and settings in Windows 10. Which built-in feature enforces this protection?

A) User Account Control
B) Windows Defender Antivirus
C) Disk Cleanup
D) System Restore

Answer:  A) User Account Control

Explanation:

Answer:  A) User Account Control (UAC) is correct because it enforces privilege separation by prompting for administrator approval when actions are performed that could affect system files, settings, or installed programs. By requiring confirmation or credentials before making changes, UAC prevents unauthorized or accidental modifications that could compromise system integrity. This feature protects against malware that attempts to make system-level changes and ensures that users without administrative rights cannot inadvertently alter critical files. UAC is a fundamental part of Windows security architecture, allowing normal users to operate with standard privileges while restricting system changes to authorized administrators. Enabling UAC ensures that any attempt to modify core system files, install software requiring elevated privileges, or alter security settings triggers a prompt, providing a safeguard against unauthorized or unintentional changes.

Windows Defender Antivirus is incorrect because it protects against malware and viruses but does not enforce restrictions on system file modifications.

Disk Cleanup is incorrect because it removes temporary files and optimizes storage, but it does not provide real-time protection for system files.

System Restore is incorrect because it allows recovery to a previous state after changes have occurred. While useful for undoing unintended modifications, it does not actively prevent unauthorized changes in real time. User Account Control is the feature that proactively enforces protection for critical system files and settings.

Question 51

A user reports that their Windows 10 PC takes an unusually long time to boot and frequently stalls during startup. Which built-in tool should a technician use to identify applications that may be causing delays?

A) Task Manager
B) Disk Cleanup
C) Device Manager
D) Event Viewer

Answer:  A) Task Manager

Explanation:

Answer:  A) Task Manager is correct because it provides a Startup tab that lists all applications configured to run automatically when Windows starts. Each entry displays the publisher, startup impact, and current status, allowing a technician to identify programs that may slow down boot times. Applications with high startup impact consume system resources during the boot process, which can cause delays or stalls. By using Task Manager, a technician can selectively disable or delay non-essential startup programs without uninstalling them, improving boot performance while retaining access to necessary software. Task Manager also provides real-time monitoring of CPU, memory, disk, and network usage, giving insights into resource utilization during startup. This is particularly useful in identifying resource-heavy applications or background services that may be contributing to slow boot times. Using Task Manager to analyze and manage startup programs is a standard and effective approach to improving Windows boot performance, ensuring that only essential applications launch immediately while minimizing unnecessary delays.

Disk Cleanup is incorrect because it removes temporary files and frees storage space. While this can slightly improve system efficiency, it does not provide detailed insight into startup applications or their impact on boot time.

Device Manager is incorrect because it manages hardware and drivers. While outdated or malfunctioning drivers can affect system performance, Device Manager does not provide a list of startup applications or allow direct management of boot processes.

Event Viewer is incorrect because it logs system events, warnings, and errors. While it may contain boot-related errors, it does not provide a user-friendly way to identify applications that are slowing down startup. Task Manager is the most practical tool for analyzing and optimizing startup performance.

Question 52

A technician wants to prevent unauthorized access to a Windows laptop while ensuring that only enrolled users can log in using biometric authentication. Which feature should be enabled?

A) Windows Hello
B) BitLocker
C) System Restore
D) File History

Answer:  A) Windows Hello

Explanation:

Answer:  A) Windows Hello is correct because it provides secure biometric authentication, including facial recognition, fingerprints, and iris scanning. By enrolling users, Windows Hello ensures that only authorized personnel can access the device. It stores biometric data locally in a secure enclave, preventing extraction or misuse even if the system is compromised. Windows Hello integrates with the Windows login framework and supports additional authentication factors, enhancing security while maintaining convenience. This feature eliminates the need for password-only login, reducing the risk of credential theft and unauthorized access. It also provides quick and seamless authentication, improving user experience without compromising security. Windows Hello is widely used in corporate and personal environments to enforce strong authentication while protecting sensitive information.

BitLocker is incorrect because it encrypts drives to protect data at rest. While important for security, it does not control who can log in or provide biometric authentication.

System Restore is incorrect because it restores system files and settings. It does not manage user authentication or access control.

File History is incorrect because it backs up user files for recovery. It does not prevent unauthorized logins. Windows Hello is specifically designed for user authentication using biometrics.

Question 53

A user reports that their Windows 10 PC cannot connect to a shared network drive. Other devices on the same network can access it. Which troubleshooting step should the technician perform first?

A) Check the user’s network permissions
B) Run Disk Cleanup
C) Open Task Manager
D) Enable BitLocker

Answer:  A) Check the user’s network permissions

Explanation:

Answer:  A) Checking the user’s network permissions is correct because file and folder access on shared network drives is controlled by permissions set on the server or host device. Even if the network and shared drive are functional, a user will not be able to access the resource without the correct permissions. The technician should verify that the user’s account has read, write, or full control as appropriate. Additionally, verifying group memberships and ensuring that the user is properly authenticated on the network is important. Many network access issues are caused by misconfigured permissions rather than hardware or network failures. By checking and adjusting permissions, the technician can restore access without unnecessary configuration changes.

Running Disk Cleanup is incorrect because it removes temporary files. It does not affect network access or permissions.

Opening Task Manager is incorrect because it monitors running processes and system resource usage. While useful for diagnosing performance issues, it does not provide information about network drive access.

Enabling BitLocker is incorrect because it encrypts drives. It does not grant or modify network access permissions. Checking network permissions is the direct and effective solution.

Question 54

A technician needs to ensure that a user can recover individual documents that were accidentally deleted on a Windows 10 PC. Which feature should be configured?

A) File History
B) System Restore
C) BitLocker
D) Windows Defender Antivirus

Answer:  A) File History

Explanation:

Answer:  A) File History is correct because it continuously backs up user-selected folders to an external drive or network location and retains multiple versions of each file. Users can restore individual files or previous versions without affecting system files or installed applications. This allows recovery of accidentally deleted or modified documents, ensuring minimal data loss. File History also supports scheduling and retention policies, giving users flexibility in managing backups. Unlike System Restore, which focuses on system files and settings, File History specifically targets user-generated data, making it ideal for document recovery. This feature is critical in environments where users frequently modify files and need the ability to restore prior versions quickly. Configuring File History ensures that users have a reliable and user-friendly method to recover lost or changed files without requiring complex recovery tools.

System Restore is incorrect because it only affects system files and settings. It does not recover individual user documents.

BitLocker is incorrect because it encrypts drives to protect data from unauthorized access but does not restore deleted files.

Windows Defender Antivirus is incorrect because it protects against malware and viruses but does not provide file recovery. File History is the correct choice for restoring individual documents.

Question 55

A user reports that their Windows PC randomly freezes and occasionally displays a blue screen. Which tool should a technician use to analyze the system and identify the cause?

A) Event Viewer
B) Task Manager
C) Disk Management
D) Device Manager

Answer:  A) Event Viewer

Explanation:

Answer:  A) Event Viewer is correct because it logs detailed system events, including warnings, errors, and critical failures. When a system freezes or encounters a blue screen, Event Viewer provides a record of the stop codes, error messages, and the drivers or applications involved. By analyzing the logs, a technician can identify patterns, determine the root cause, and implement corrective actions, such as updating drivers, replacing faulty hardware, or uninstalling conflicting software. Event Viewer allows filtering of events by severity and timestamp, making it easier to correlate the system crash with specific actions or applications. This post-mortem analysis is essential for diagnosing intermittent system freezes and blue screens, as it provides historical data that cannot be observed in real time. Technicians rely on Event Viewer to systematically troubleshoot critical errors, ensuring that corrective measures address the underlying cause rather than just the symptoms.

Task Manager is incorrect because it monitors active processes and resource usage but does not provide historical crash logs or stop codes.

Disk Management is incorrect because it manages disk partitions and volumes, which is unrelated to analyzing blue screen errors.

Device Manager is incorrect because it manages hardware devices and drivers but does not provide detailed error logs for system crashes. Event Viewer provides the necessary information for identifying and resolving system instability.

Question 56

A user reports that their Windows PC frequently prompts for administrator approval when trying to run common applications. Which feature should be adjusted to reduce unnecessary prompts while maintaining system security?

A) User Account Control
B) BitLocker
C) Disk Cleanup
D) File History

Answer:  A) User Account Control

Explanation:

Answer:  A) User Account Control (UAC) is correct because it manages the level of notifications and prompts when changes are made to the system that require administrative privileges. UAC is designed to prevent unauthorized modifications to critical system files or settings by prompting users for confirmation or credentials before executing potentially harmful actions. If the prompt frequency is high, it may indicate that UAC is set to a stricter notification level, causing even standard operations to trigger alerts. Adjusting the UAC slider allows a technician to balance security and convenience, reducing unnecessary prompts while ensuring that elevated actions are still protected. UAC also helps protect against malware by requiring administrative approval for any application attempting to modify system-critical components, thus serving as a first line of defense against unauthorized changes. By configuring UAC appropriately, a user can work efficiently without compromising security, and administrators can ensure that legitimate applications run smoothly without constant interruptions.

BitLocker is incorrect because it encrypts drives and protects data at rest. While important for data security, BitLocker does not control application prompts or administrative approval.

Disk Cleanup is incorrect because it removes temporary and unnecessary files to free storage space. It does not provide control over administrative prompts or system notifications.

File History is incorrect because it is designed for backing up user files and restoring previous versions. While it protects data, it does not manage user account privileges or administrative approvals. User Account Control is the correct feature to manage prompts related to application execution and system changes.

Question 57

A technician wants to protect sensitive information on a Windows 10 PC from unauthorized access if the device is lost or stolen. Which feature should be enabled?

A) BitLocker
B) Windows Defender Firewall
C) Task Manager
D) Disk Cleanup

Answer:  A) BitLocker

Explanation:

Answer:  A) BitLocker is correct because it provides full-disk encryption, securing all files and data stored on a Windows device. If the device is lost or stolen, unauthorized users cannot access the encrypted drive without the correct password, PIN, or recovery key. BitLocker integrates with Windows operating systems and supports both internal drives and removable storage through BitLocker To Go. It uses advanced encryption algorithms to protect data at rest, including system files, documents, and applications. For corporate environments, administrators can enforce BitLocker policies, ensuring that all sensitive devices are encrypted. Recovery keys can be securely stored in Active Directory or Microsoft accounts to allow authorized access if needed. BitLocker provides peace of mind by ensuring that even if the physical device falls into the wrong hands, the data remains inaccessible, reducing the risk of data breaches and maintaining compliance with organizational security policies.

Windows Defender Firewall is incorrect because it protects against network threats and unauthorized network access but does not encrypt or secure local files.

Task Manager is incorrect because it monitors system processes and resource usage. It does not provide data encryption or protection.

Disk Cleanup is incorrect because it removes temporary files and frees storage space. It does not secure sensitive information. BitLocker is the correct choice for encrypting and protecting data on a Windows device.

Question 58

A user reports that their Windows 10 PC is infected with malware. Which built-in tool should a technician use to scan and remove threats?

A) Windows Defender Antivirus
B) Disk Cleanup
C) System Restore
D) File History

Answer:  A) Windows Defender Antivirus

Explanation:

Answer:  A) Windows Defender Antivirus is correct because it provides real-time protection against malware, viruses, and other malicious software. It monitors system files, applications, and network traffic for suspicious behavior and automatically quarantines or removes detected threats. Windows Defender allows manual scans of the entire system, specific drives, or individual folders, making it versatile for different types of malware infections. It continuously updates its virus definitions to ensure protection against new threats and integrates with the Windows Security Center for alerts and recommendations. In cases where a PC is actively infected, Windows Defender is the first-line tool for detection and removal. It can isolate malicious software and prevent further damage, protecting both the operating system and user data. The integration of Windows Defender with Windows 10 provides a user-friendly interface and automated protection without requiring additional third-party software, making it highly effective for routine malware protection and remediation.

Disk Cleanup and System Restore are two built-in Windows utilities that serve important purposes in system maintenance and recovery, but neither is designed to detect or remove malware. Understanding their functions and limitations is critical for ensuring comprehensive system security and stability.

Disk Cleanup is primarily a storage management tool. Its main function is to scan the system for temporary files, system cache, log files, leftover files from Windows updates, and other nonessential data, and then remove these files to free up disk space. By reducing clutter and reclaiming storage, Disk Cleanup can improve system performance and help maintain an organized file system. It is particularly useful for systems with limited storage capacity or for machines that have accumulated large amounts of temporary files over time. The tool allows users to safely delete files that are no longer needed, often providing options to clean system files, empty the Recycle Bin, or remove old setup files. While these features help with maintenance and optimization, Disk Cleanup is not a security tool. It does not scan for malware, detect viruses, or remove malicious software from the system. Files created or modified by malware, including viruses, spyware, or ransomware, are generally not considered “temporary” or “unnecessary” by the utility, so they are not targeted for deletion. As a result, relying on Disk Cleanup to protect against malware is ineffective and could give a false sense of security.

System Restore, on the other hand, is a recovery utility that allows users to roll back the operating system, system files, installed applications, and registry settings to a previous point in time known as a restore point. This is especially useful for recovering from misconfigured system settings, problematic driver updates, or software installations that cause instability. By restoring the system to a prior state, users can often resolve issues without having to perform a complete reinstall of Windows. However, System Restore also has limitations with regard to malware removal. It does not target malware specifically and does not scan or clean malicious files. If malware has infected the system and become part of files that are included in the restore point, restoring to that point may inadvertently preserve the malware. Additionally, System Restore does not affect personal files in user directories, so malware that resides within documents, downloads, or other personal folders will remain on the system after a restore. Consequently, using System Restore to address malware infections is not sufficient, and additional tools such as antivirus or antimalware software are necessary to detect and remove threats.

The distinction between Disk Cleanup and System Restore is in their focus and functionality. Disk Cleanup focuses on optimizing storage and improving system performance by deleting unnecessary files, whereas System Restore focuses on reversing system-level changes to recover stability. Neither tool is designed as a security solution or malware removal utility. While they can complement security practices by maintaining a clean and stable system environment, neither replaces antivirus or antimalware software in protecting a system from threats. Effective malware protection requires dedicated security tools that actively scan for malicious software, remove detected threats, and, in some cases, prevent future infections.

In practical system maintenance, Disk Cleanup and System Restore can be used alongside security tools to enhance system performance and recover from errors, but they should not be relied upon for malware defense. Disk Cleanup ensures that the system runs efficiently by freeing disk space, and System Restore can revert problematic system changes, but malware detection and removal require antivirus programs or specialized antimalware utilities.

Disk Cleanup is incorrect as a malware solution because it only removes temporary and unnecessary files to free storage, and System Restore is incorrect as a malware solution because it rolls back system files and settings, but does not remove malware, which may even be preserved in the restored system. Both tools have important roles in system maintenance and recovery, but are insufficient for comprehensive malware protection.

File History is incorrect because it backs up files for recovery. While it protects user data, it does not remove malware. Windows Defender Antivirus is the proper tool for identifying and eliminating malware infections on Windows systems.

Question 59

A technician wants to ensure that a user can recover the entire Windows system in case of a critical failure, including system files, installed applications, and user settings. Which feature should be used?

A) System Image Backup
B) File History
C) Disk Cleanup
D) Windows Defender Antivirus

Answer:  A) System Image Backup

Explanation:

Answer:  A) System Image Backup is correct because it creates a full snapshot of the operating system, applications, system settings, and user data. In the event of a critical failure, such as a hard drive crash, malware infection, or corrupted system files, a system image allows the user or technician to restore the PC to the exact state it was in when the backup was created. Unlike file-level backups, which only preserve individual files, a system image captures the entire system configuration, ensuring complete recovery. Technicians can store system images on external drives, network shares, or other storage media, making recovery possible even if the primary drive is compromised. System Image Backup minimizes downtime, eliminates the need to reinstall Windows and applications manually, and ensures that user data, application settings, and system configurations are restored seamlessly. This is particularly important for critical systems where extended downtime could disrupt business operations or result in data loss.

File History and Disk Cleanup are both utilities in Windows that serve specific purposes, but neither is sufficient for full system recovery. Understanding their roles and limitations is important for developing a comprehensive data protection and maintenance strategy.

File History is a Windows feature designed to provide continuous backup of user files. It monitors selected folders, such as Documents, Pictures, Music, Videos, and Desktop, and automatically creates versioned backups to an external drive, network location, or secondary storage. The primary benefit of File History is that it allows users to recover individual files or previous versions of files that may have been modified, deleted, or corrupted. This functionality is particularly useful in cases where a document is accidentally overwritten or an important file is deleted. Users can browse through the version history of a file and restore it to a previous state, providing a convenient and targeted method for protecting personal data.

However, File History has a significant limitation: it does not back up system files, operating system configurations, or installed applications. As a result, it is not suitable for full system recovery in the event of a major system failure, hardware replacement, or operating system corruption. If the Windows installation becomes corrupted or the entire drive fails, File History alone cannot restore the operating system or reinstall applications. It focuses exclusively on user data, meaning that while files can be recovered, the system environment, settings, and software installations must be reconfigured or reinstalled separately. This makes File History an excellent tool for document recovery, but inadequate for restoring a complete system to a previous working state. Full system recovery requires additional tools such as Windows Backup and Restore, system image backups, or third-party full-disk backup solutions.

Disk Cleanup, in contrast, is a utility focused on maintaining system performance and optimizing storage space. It identifies and removes temporary files, system cache, log files, leftover Windows Update files, and items in the Recycle Bin. By freeing up disk space, Disk Cleanup can help improve system responsiveness, reduce clutter, and prevent storage-related performance issues. Its value lies in routine system maintenance rather than data protection. While it helps the system run more efficiently, Disk Cleanup does not create copies of user files or system files, nor does it maintain any version history. Therefore, it cannot be used to restore lost files, recover corrupted data, or return the system to a previous functional state. Running Disk Cleanup affects only storage space management and performance optimization, not data security or recovery.

The key distinction between File History and Disk Cleanup lies in their objectives. File History provides file-level protection, enabling recovery of user documents but not the system itself, while Disk Cleanup manages storage resources and helps maintain system performance without offering any form of backup or recovery. Users who rely solely on these tools may mistakenly assume that their system or important data is fully protected, but they would remain vulnerable to scenarios such as operating system corruption, drive failure, or accidental deletion of system-critical files.

To achieve comprehensive protection, File History and Disk Cleanup should be used alongside complementary solutions. File History can protect personal files, while system image backups or third-party backup software can capture the entire system, including operating system files, installed applications, and configurations. Disk Cleanup can then be used to maintain system efficiency by removing unnecessary files without interfering with the backup strategy.

File History and Disk Cleanup are valuable tools for user data protection and system maintenance, respectively, but they are insufficient for full system recovery. File History backs up user files but does not capture system files or applications, and Disk Cleanup frees disk space but does not provide backup or restoration capabilities. Effective data and system protection requires combining these tools with full-system backup solutions to ensure both file recovery and complete system restoration when needed.

Windows Defender Antivirus is incorrect because it protects against malware but does not create backups or recover the system after failure. System Image Backup is specifically designed for complete system restoration, making it the correct solution for critical system failures.

Question 60

A user wants to ensure that sensitive files on a Windows PC are protected from unauthorized access but still wants to back them up regularly. Which combination of features should be used?

A) Encrypting File System (EFS) and File History
B) BitLocker and Disk Cleanup
C) System Restore and Windows Defender Antivirus
D) Task Manager and Windows Hello

Answer:  A) Encrypting File System (EFS) and File History

Explanation:

Answer:  A) Using Encrypting File System (EFS) and File History together is correct because this combination ensures both security and recoverability of sensitive files. EFS allows the user to encrypt individual files or folders, ensuring that only authorized accounts can access them. Even if the system is compromised or the files are copied to another device, encrypted files remain unreadable without the correct encryption key. File History complements this by creating regular backups of user-selected folders, retaining multiple versions of each file on an external drive or network location. This provides protection against accidental deletion or file corruption, ensuring that users can restore previous versions while maintaining the security of the encrypted content. Using EFS for encryption and File History for backup provides a robust solution that balances data security with recoverability, addressing both the risk of unauthorized access and accidental data loss.

BitLocker, Disk Cleanup, System Restore, and Windows Defender Antivirus are all important Windows tools, but each serves a distinct purpose, and none of them provides comprehensive data backup or recovery functionality. Understanding their individual roles and limitations is critical to implementing a complete data protection and system maintenance strategy.

BitLocker is a built-in encryption tool in Windows that encrypts entire drives, including the operating system and data partitions. Its main purpose is to prevent unauthorized access to data if a device is lost or stolen. By encrypting the drive, BitLocker ensures that even if someone removes the storage medium or attempts to bypass the operating system, the files remain inaccessible without the proper authentication, such as a password or recovery key. While this provides strong security for stored data, BitLocker does not create copies of files or maintain version histories. Therefore, if a file is accidentally deleted, overwritten, or corrupted, BitLocker cannot recover it. It secures data against unauthorized access but does not serve as a backup or recovery solution. Users must still implement separate backup strategies to protect against data loss due to deletion, corruption, or hardware failure.

Disk Cleanup is another Windows utility, but its function is completely different from BitLocker. It is designed to free up storage space by removing unnecessary files, such as temporary files, system cache, log files, and items in the Recycle Bin. Disk Cleanup helps maintain system performance and can prevent storage-related slowdowns, but it provides no security or recovery capabilities. It cannot recover deleted files, protect sensitive data, or create backups. In fact, running Disk Cleanup without caution may even permanently delete files that a user might have needed, highlighting that its purpose is optimization rather than protection.

System Restore is a utility that allows users to revert the system to a previous state by restoring system files, registry settings, and installed applications to an earlier point in time. This feature is useful for undoing misconfigurations, resolving problems caused by faulty software installations, or recovering from driver conflicts. However, System Restore has a critical limitation: it does not protect or restore individual user files such as documents, photos, or videos. Its scope is limited to system-level components, which means it can fix system instability but cannot recover lost, deleted, or corrupted personal data. Relying solely on System Restore for data protection leaves users vulnerable to data loss in case of accidental deletion or corruption of personal files.

Windows Defender Antivirus protects against malware, viruses, ransomware, and other security threats. It actively scans the system, detects malicious activity, and removes threats to prevent damage or unauthorized access. While it is essential for maintaining a secure environment and protecting files from malicious attacks, Windows Defender does not provide backup functionality, encryption, or file versioning. It cannot restore deleted or corrupted files, nor can it ensure recovery from accidental data loss. Its primary role is threat prevention rather than data recovery or long-term protection of user files.

In combination, these tools provide important but limited protections: BitLocker secures data against unauthorized access, Disk Cleanup optimizes storage, System Restore addresses system-level issues, and Windows Defender Antivirus protects against malware. None of them, however, offers a comprehensive solution for data backup, file versioning, or recovery of lost or corrupted files. Effective data protection requires using these tools alongside dedicated backup solutions that create copies of personal files, maintain version histories, and allow recovery in case of accidental deletion, hardware failure, or ransomware attacks.

BitLocker and Disk Cleanup are insufficient for file recovery because BitLocker focuses on encryption, and Disk Cleanup focuses on storage optimization. System Restore and Windows Defender Antivirus also fall short because System Restore only addresses system files, and Windows Defender protects against malware without providing backup or encryption. A robust data protection strategy requires combining these tools with dedicated backup and recovery mechanisms to ensure both security and recoverability of personal and system data.

Task Manager and Windows Hello are incorrect because Task Manager monitors processes, and Windows Hello provides authentication. Neither provides file encryption or backup capabilities. Combining EFS and File History is the correct approach to ensure security and recoverability for sensitive files.