A+ Core 2 - Final Exam
Your company is asking the IT department to take steps to plan and prepare for potential disasters that could disrupt business or result in data loss.
UPS
What wireless network security protocol will allow Luke to use the printer on his wireless network?
WPA Wrong.
Patricia is updating the antivirus software on her computer. She clicks on a link and starts the download. About five minutes later, the download fails, and crashes the antivirus program. Patricia tries to restart the program, and the antivirus program fails to restart. Patricia uses the Windows Action Center to try and run the antivirus software, but the software will not run. Instead, she is told that the antivirus software has been disabled, and a different antivirus program has been installed.
a. A rouge antivirus was installed.
How is user authentication typically achieved when a computer is joined to a Windows domain?
a. Active Directory is responsible for user authentication.
You want to install software that will recognize activity on your device that might be harmful to data and other resources.
a. Antivirus
Aiden is working at a satellite office for his company. He is asked to go offsite to deal with a Windows 8.1 computer that is not working properly. Aiden is unfamiliar with Windows 8.1, so he has difficulty finding the solution to the problem. He finds himself becoming frustrated and angry at the computer?
a. Call his supervisor and ask for help. Partially correct c. Walk away from the problem and come back later. Partially correct
At the completion of servicing a laptop computer, the technician replaced the laptop's battery.
a. Check the MSDS for the battery or the battery documentation for disposal instructions.
While working on a printer, you spill a liquid solution that was sitting on the floor next to the printer stand.
a. Check the MSDS for the liquid and follow the instructions.
Which of the following Windows Display settings will the user likely need to adjust to resolve this issue?
a. Color depth
You want all sales team members to have read and write access to a folder on the file server. All other users on the network must be restricted from viewing or modifying the files in the sales folder.
a. Configure both NTFS and share permissions on the sales folder.
Your customer is using the Windows Settings app in Windows 10 to set up a new Bluetooth mouse on his laptop.
a. Devices
Your company has a computer kiosk that shows customers where offices of individuals are located in your building.
a. Disable all USB ports. Wrong.
Shawn's supervisor has tasked him with determining how the company can increase the security of its Wi-Fi. Shawn plans to present several options to his supervisor and ask her to check his work.
a. Disabling SSID
The Windows users in your organization utilize a shared folder on the network to save their data files. Several users disconnect their laptops from the network while traveling. When the users return to the office, they have difficulty keeping data files organized because they end up with one version of a file on the laptop and a different version of the same file on the network.
a. Enable and configure Sync Center and Offline Files on the laptop computers.
You are the IT support technician for a small organization. Your manager is asking what precautions you can put in place to protect the company's network-attached PCs from attacks over the Internet as well as attacks over the local network.
a. Enable and configure Windows Firewall on all Windows host PCs.
How can you configure the user's workstations to prevent unauthorized employees from viewing information on the monitors while allowing the accounting application to remain open?
a. Enable the screensaver and require a password to unlock the workstation.
Your manager is asking for precautions to be taken to prevent company data leaks if the Windows computers in the organization with locally stored data should be lost or stolen.
a. Encrypt the HDDs with BitLocker. Right. c. Configure EFS on the systems. Wrong.
A mobile device has stopped receiving automatic OS updates that until recently were pushed to the device.
a. End-of-life limitation
Which of the following is a partition type that cannot have a drive letter assigned?
a. Extended
Which of the following security methods is most likely to have the greatest negative impact on device performance by consuming processing resources?
a. Full device encryption
Which of the following partition types can hold up to 128 partitions or volumes?
a. GPT
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information. Today you received a call from one of your users stating they are unable to decrypt any of the emails sent by the accountants.
a. Generate a new public and private key.
You are configuring a user account on a Windows 10 computer that visiting vendors and sales professionals will use in the company's reception area. The user account needs to be the most restrictive type of account.
a. Guest account
If suspect someone at your company has violated the AUP, what are your responsibilities as the first responder? (Select all that apply.)
a. Identify the violation. Partially correct d. Document the incident. Partially correct
When should a technician work inside the PSU?
a. Never, because of dangerous electrical charges
What type of regulated data are you expected to protect if you are working for the IT department of an online store? (Select all that apply.)
a. PII Right. b. PHI Wrong.
While watching a live stream on his computer using Microsoft Edge, Aiden is receiving random ads for Doritos.
a. Pop-up blocker
You are troubleshooting a Mac computer with an app that stops responding to mouse or keyboard actions.
a. Press the Option+Command-Esc shortcut keys.
A company wants to implement a single server computer to speed up Internet access and protect the private network from attack over the Internet.
a. Proxy server
An admin deleted an Active Directory user account by accident.
a. Recover the account from the Active Directory Recycle Bin.
A Windows system is displaying an error when attempting to run an application. The error message states a program can't be started because a DLL file is missing from the computer.
a. Reinstall the application. b. Register the missing DLL component.
Before beginning to work inside a computer system unit, which of the following is the first step to take to ensure your safety and the safety of the equipment?
a. Remove AC power from the system.
You are dealing with a customer and are having a hard time understanding her, and she is also having a difficult time explaining the problem.
a. Restate the issue or question.
You have been dispatched to deal with an escalated trouble ticket in which the user is receiving an error message stating Windows detected a hard drive problem reading from sector 153. The previous technician backed up the user's data and started troubleshooting but was unable to duplicate the error.
a. Run chkdsk on each HDD installed on the system.
Which of the following will increase the level of security for personal and confidential information on a mobile device if the device is lost or stolen? (Select TWO.)
a. Screen lock b. Remote wipe
A Mac user is trying to locate a file by name.
a. Spotlight
Which of the following is the most likely cause for the increase in advertisements?
a. The device is infected with malware.
A technician is upgrading a Mac computer from OS X Yosemite to OS X Mojave. The computer is using an SSD that was formatted using HFS+, meets the system requirements, and has sufficient free disk space.
a. The file system will need to be converted from HFS+ to APFS.
A mobile device user is experiencing faster than normal battery drain after connecting to a public Wi-Fi hotspot a few days ago.
a. The mobile device is infected with malware.
End-user acceptance to change often fails because the focus of the change is on the technical side rather than the people side.
a. The purpose of the change, especially the business reasons for the change d. How the change will affect the users and their jobs f. That they will receive end-user training on the changes that impact them
A technician is troubleshooting a Windows computer in which an application failed to uninstall properly. The technician made several changes to the registry and now Windows crashes each time the system is rebooted. The only way to access the operating system is via the Windows Recovery Environment command prompt.
a. The technician should have backed up the registry.
Which of the following methods can be used to open an elevated command prompt?
a. Type cmd in the search box, right-click Command Prompt, and click Run as administrator.
Which of the following devices provides the best protection to the computer and user data during electrical anomalies?
a. Uninterruptable power supply
If your laptop's OEM recovery partition becomes corrupt, what can you do to restore it back to factory defaults? (Select all that apply.)
a. Use the Windows recovery drive on a flash drive you created. c. Download recovery media from the manufacturer's website.
A technician has been dispatched to resolve an issue with a Windows 10 computer experiencing application crashes.
a. Verify critical user data has been backed up.
You are troubleshooting a mobile device with no sound output from the headset or external speakers.
a. Verify the physical volume control is turned up.
You need a tool that allows you to run Windows Defender before Windows loads.
a. Windows Defender does not have a tool to run before Windows loads. Wrong.
What is an indication that someone is hijacking your email? (Select all that apply.)
a. Your computer is sending email out that you have not written. c. You receive automatic replies to emails that you did not send. e. Someone has contacted you about email from your account that you did not send.
Luis checked his setup BIOS and saw that the hard drive was connected. Luis has decided to boot to the Windows RE Command Prompt.
a. bootrec /rebuildBCD Wrong.
What protocol or feature uses incoming TCP port 5900 for communication?
a. macOS Screen Sharing
Which of the following is a Linux terminal command that will show the most comprehensive information about the shutdown command?
a. man shutdown
A technician is attempting to initiate a Windows Remote Desktop Connection to repair a remote system. When the technician tries to access the Remote Desktop utility on the local computer, the graphical user interface consistently freezes.
a. mstsc.exe
What can Todd do to change this view so that he can find the Power Options icon in the Control Panel?
b. Change to Classic view.
Windows 10 has a new feature called a digital assistant. This feature allows you to ask your computer to set up reminders, find locations, search your computer and the Internet, and many other tasks.
b. Cortana
Which type of device should you use to destroy a magnetic hard drive by using an electromagnetic field to destroy the hard drive's data and formatting?
b. Degausser
Your company has a policy that when users leave their desks, they are required to lock their computers.
b. Impersonation Wrong.
Jacob wants to install Windows 10 Pro on his computer, which is currently running Windows 7 Home Premium.
b. In-place upgrade Wrong.
Which of the following operating systems historically comes up short on the number of available desktop applications?
b. Mac OS X High Sierra Wrong.
Mary is trying to access the Advanced options screen in Windows 10. She called the help desk and was told that she needs to press F8 while the computer is booting. Unfortunately, Mary has been trying this for several boots, and it is not working.
b. Mary is not pressing the F8 key at the right time during the boot process. Wrong.
Kyle has discovered that his computer has software that has been collecting his personal information and sending it to a file on another computer, including his banking and credit card information.
b. Spyware
A Windows 7 workstation is experiencing a problem when launching an application and displays a message indicating a dependent background service is not running. The technician assigned to the trouble ticket has determined that the dependent service needs to start automatically when Windows is started.
b. System Configuration Wrong.
You are trying to play music through the internal speaker of your mobile device but no sound can be heard. You verified the volume control is turned up and sound can be heard using a Bluetooth headset.
b. Turn off the Bluetooth headset. Wrong.
When a standard user attempts to install software on her computer, what prevents her from installing software that might change the Windows registry?
b. UAC.
What is the value of Counter when execution ends in the following pseudocode?Counter = 100Do While Counter < 100Counter = Counter - 1
c. 1 Wrong.
While browsing the Internet, Tina received an annoying alarm along with a message stating that she needed to contact a security company using the 800-number provided to get assistance with the security issue on her computer. Tina could not close Windows or stop the annoying alarm.
c. A rogue antivirus is running on her computer. Wrong.
While using the CLI on a Windows 10 64-bit computer with a single HDD and a single volume, you want to move from the current directory to the directory where Windows is installed.
c. CD %PROGRAMFILES% Wrong.
Which of the following steps will minimize attacks on the default, built-in user accounts created during a Windows setup?
c. Change the default user account password. Wrong.
What Control Panel applet should Brandon use to verify that all drivers are installed correctly?
c. Device Manager
Lance has a computer that currently uses Windows 8.1 and wants to install the latest version of Windows 10 on the computer. He wants to keep the Windows 8.1 OS available for testing applications that he is developing for both operating systems.
c. Dual-boot installation
Lance is working on a customer's computer and thinks that the wireless NIC card needs to be replaced, which he tells the customer. After Lance replaces the wireless NIC, the problem on her computer still is not resolved.
c. Explain that he will need more time to find the problem. Wrong.
Bryson has noticed that when he is using the Internet, he receives ads that randomly appear in a Google Chrome browser window. When he tries to close the ad, another ad will randomly pop up.
c. Install a pop-up ad blocker.
During a phone conversation you are having with a client, he explains the problem with his computer, and you immediately know how to repair the problem.
c. Interrupt the customer and tell him you know how to fix the problem.
Ray worked all morning trying to fix Lisa's broken computer. Ray discovered a problem with the RAM and replaced a bad module. He put the computer back together and tested the new RAM. He rebooted the computer into UEFI, and all the modules were read properly. Ray documented the problem and the solution in his tracking software and now is ready to head back to his work area.
c. Lisa
For added security, everything users attempt to do or do once they are authenticated to the network can be tracked or logged for future auditing via three security measures. These three security measures are generally known in networking as AAA (authenticating, authorizing, and accounting) or triple A.
c. RADIUS] e. TACACS+
You have received a phone call from a user who is experiencing very sluggish performance on a Windows 10 computer. During the phone call, you determine an application is hung and the keyboard is not responding to keypress events. The user states the mouse is functioning and the computer is recognizing mouse clicks.
c. The user should press the Ctrl+Shift+Esc keys, and the Task Manager will be displayed. Wrong.
All computers in your company are required to have the same website as the home page. The page is supposed to be the company's intranet site. Today your supervisor's computer is opening to a different site.
d. A redirect virus has infected his computer.
Where should Steven navigate to in the Control Panel to create a system repair disc in Windows 7?
d. Backup and Restore
Your company wants you to purchase a copy of bookkeeping software for every computer in the company.
d. Commercial license Wrong.
Taylor has been working with a client at his company who downloaded a program onto his company laptop that he was not authorized to install.
d. Compliance policy Wrong.
Jessica has completed a change to her company's Windows computers to make them more secure on the Internet.
d. Document the change in the change management software.
Where can Regina find information about the system crash in Windows?
d. Event Viewer
Jerry uses an older computer that is running Windows 7. The computer has completed an update to a driver, and Jerry is having an issue with booting the computer. Jerry is not sure what his next step should be and notices that he can use the Last Known Good Configuration. He calls you inquiring about this option. Jerry would like to know when he can use Last Known Good Configuration.
d. Recover from a bad software for installation.
Your company has decided that using a user name and password is not enough security for its employees and wants you to create the new policy. You have decided that the best option is to implement two-factor authentication.
d. Software token Right. f. Access permissions Wrong.
Jerry is the company's new IT supervisor. The company recently started allowing employees to use their smartphone and tablets to connect to network resources over a secure connection.
d. Spoofing Wrong.
Which of the following is the most likely reason the RDC connection is unsuccessful?
d. The Windows 8.1 computer is not properly configured for remote connections. Wrong.
You are again troubleshooting a mobile device that reboots immediately after the correct passcode is entered. You performed a factory reset last week for the same issue, and the problem disappeared. The device worked perfectly for several days, but the user returned today with exactly the same problem.
d. The device is overheating. Wrong.
Your CIO would like a way to locate desktops if they are stolen. He does not want to purchase software but would like to be able to identify a computer that belongs to the company. Currently the computers are marked with asset tags.
d. Theft prevention plate
You are experiencing unexpected pop-up windows, slow performance, suspicious hard drive activity, and missing files on your computer.
d. Your computer has been infected by a virus.
A Windows user cannot remember how to structure the shutdown command to perform a reboot instead of a shutdown.
e. reboot /? Wrong. f. help reboot Wrong.
You need to stop a running task so that you can delete a file.
e. taskkill