A+ practice test for 220-1002

¡Supera tus tareas y exámenes ahora con Quizwiz!

A server in your netowrk has stopped responding to legitimate requests from users due to a malicious influence. Which type of attack has occurred? A.DoS B.Keylogger C.Botnet D.Social engineering

A. A denial-of-service (DoS) attack is used to disrupt legitimate req from being answered. A keylogger is used to steal credentials by recording keystrokes. A botnet is a group of computers that are under the control of threat agent. Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. See chapter 22 for more info

Your system log files report an ongoing attempt to gain access to a single account. This attempt has been unsuccessful to this point. What type of attack are you most likely experiencing? A.Dictionary password attack B.Rootkit attack C.Worm attack D.TCP/IP hijacking

A. A dictionary password attack occurs when a user account is repeatedly attacked using a variety of passwords. A rootkit attack would not be immediately seen and would not show as an ongoing effort. A worm attack would not not be visible as an ongoing attempt to gain access. TCP/IP hijacking is a form of a man-in-the middle attack. See chapter 22 for more info

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? A.Rename default accounts B.Configure single sign-on C.Disable Windows update D.Disable Action Center pop-ups

A. Remaining the default accounts on a new Windows computer is the easiest way to secure for the operating system. Configure single sing-on should only be performed if a resource is required that only uses SSO as authentication. Disabling Windows Update will do the opposite of securing the operating system. Disabling Action Center pop-ups will also do the opposite of securing the operating system. See chapter 23 for more info

Which network protocol and port does RDP operate on? A.TCP port 3389 B.TCP port 22 C.TCP port 23 D.TCP port 443

A. The Remote Desktop Protocol (RDP) operates on tcp port 3389. The SSH protocol operates on TCP port 22. The telenet services operates on TCP port 23, and HTTPS operates on TCP port 443. See Chapter 21

You have found that several employees are using that organization's email system to solicit personal business. What policy would define the abuse of this system? A.Acceptable use policy (AUP) B.Mobile device management (MDM) C.Data loss prevention (DLP) D.Email filtering

A. The acceptable use policy (AUP) defines the appropriate use of the email and other organizational systems and resources. Mobile device management (MDM)

Which network feature allows a computer to resume operation when it receives a special network signal? A.WoL B.PoE C.QoS D.DNS

A. Wake-on-LAN (WoL) allows a computer to awake from sleep when it receives a special WoL.packet over the network. Power over Ethernet (PoE) is a standard of running power for a device over the network connection. Quality of Service (QoS) is a mechanism used by network protocols to give certain network protocols priority through the network. Domain Name System (DNS) us a naming system used by the Internet and Microsoft that translates domain names to IP addresses. See chapter 19

Which of the following are good measures to take to help prevent ESD? (Choose two.) A.Decrease the humidity B. Tie back long hair C. Take off your shoes D. Preform self-grounding

B, D. Long hair or neckties can very easily hold a static charge and damage computer parts. In addition, if you don't have ESD strap or mat, you should preform self-grounding befor you touch sensitive computer equipment. Lower humidity actually increases the risk of ESD. Taking off your shows will not limit ESD. See chapter 26

Which Windows 10 feature replaces Internet Explorer? A.Spotlight B. Edge C. Cortana D. UWP

B. Although Internet Explorer is still installed in Windows 10, the edge browser has largely replaced it's functionality in Windows 10. The spotlight feature will display a random wallpaper on the log in screen from bing.com. Cortana is a digital person assistant. The Universal Windows Platform (UWP) is a development platform. See chapter 17 for more info

Which of the following will accomplish a specific task for the user? A.Driver B.Appplication C.Operating system D.Filesystem

B. An application is written to preform a specific task for the user, such as word processing and data analysis. Drivers allow for the operating system to communicate with the hardware. The operating system and the filesystem assist in running applications. See Chaoter 15 for more info

Your mobile device is suffering from an intermittent wireless connection. What is recommended to alleviate signal drops? A.Shorten the SSID B.Use the 5 GHz band C.Reduce power on the WAP D.Use the 2.4 GHz band

B. By using the 5 GHz wireless band, you can limit the amount of interference from external devices, such as microwave ovens and Bluetooth devices. Shortening the SSID will have no effect on intermittent signal drops, nor will reducing power on the WAP. Using the 2.4 GHz band will probably make signal drops worse. See Chapter 24

Which type of software licensing agreement usually provides free trial software, with the expectations that you will pay for it if you decide to keep it? A.Freeware B. Shareware C. Open-source D.Single-user

B. Shareware often provides a free trial of a program, with the exception that you will pay for it if you keep it. Freeware and open-source applications are generally totally free, although the developers may ask for donations. Single-user software is licensed for one user. See chapter 26

A user to ensure that all contacts from her mobile device are copied onto her computer before migrating to a new device. Which of the following processes can accomplish this? A.Mirroring B.iOS C.Calling each contact D.Attaching the contacts to an email

B. Synchronization can copy all contacts, programs, email messages, pictures, music, and videos between a mobile device and a computer. Mirroring is a term reserved for when devices replace themselves to similar devices. Calling the contacts the contacts on the computer. See chapter 23 for more info

Which mobile operating system is typically associated with the .ipa extension? A.Android B.iOS C.Windows Phone D.BlackberryBerry OS

B. The .ipa file extension is for the iOS App Store package files. Android apps have an extension .apk. The Windows Phone OS is typically associated with the .xap extension. BlackBerry OS uses .jad. The latter of the two phone types were not discussed in detail in this book. See chapter 23 for more info

Where can you find updates for Apple operating systems? A.iTunes B.App C.Keychain D.Mission Control

B. The App Store is where you can find updates for the Apple operating system. iTunes is used to purchase and download music, videos, and other content. The Keychain is used to store credentials on behalf of the user. Mission control is used to view all the currently running applications. See chapter 20

You used to manage a remote Windows operating system. Which tool can you use to perform this task? A.msinfo32 B.mstsc C.msconfig D.telnet

B. The Microsoft Terminal Services Client (mstsc) is used to allow remote connections to Windows operating systems. Msinfo32 is used to collect information from the windows operating systems. Msconfig is used to configure start up and services. Telnet is not used to connect to Windows; it is normally used with Linux/UNIX. See chapter 16 for more info

You need to configure an IP address for Windows 7 to use in the event that the DHCP server is down. Which of the following will allow you to preform this task? A.The Configuration tab for the network adapter properties. B.The Alternate Configuration tab of the IPv4 Properties dialog box. C.The Set Up a New Connection or Network wizard. D.The Remote tab of the System Properties dialog box.

B. You can use the Alternante config tab of the IPv4 Properties dialog box to configure an IP address for Windows 7 to use in the event the DHCP server is down. The Config tab for the network adapter properties will allow you change the driver and settings for the adapter itself. The Set Up a New Connection or Network wizard is used for the initial setup of the network. The Remote tab of the System Properties dialog box allows you to select Remote Assistance and Remote Desktop settings. See chapter 19

Which edition of Microsoft Windows 10 does not include Cortana? A.Home B.Pro C.Education D.Enterprise

C. For privacy issues, Windows 10 Education does not include Cortana, since this edition is used for academic organizations. Windows 10 Home, Pro, and Enterprise all contain Cortana. See chapter 15 for more info

Which critical system generally requires third party tools to troubleshoot performance problems? A.RAM B.CPU C.Graphics D.Network

C. Graphics cards usually require third-party tools to diagnosis performance problems. RAM problems, CPU problems, and network problems can be diagnosed inside the operating system from Task Manager. See chapter 24 for more info.

Which regulation is enforced by Health & Human Services (HHS) to regulate the privacy of patient information related to health services? A.SOC B.FERPA C.HIPAA D.GLBA

C. The Health Insurance Portability and Accountability Act (HIPPA) affects health-care providers and providers that process health records. The Sarbanes-Oxley Act (SOX) is enforced by the Securities and Exchange Commission (SEC) and regulates sensitive financial information and financial records. The Family Educational Rights and Privacy Act (FERPA) affects education providers and organizations that process student records. The Gramm-Leach-Bliley Act (GLBA) affects providers of financial devices and safeguards customer information. See Chapter 25 for more info

What is the last step that should be performed when removing malware? A.Identify the malware B.Enable System Protection C. Educate the end user D.Schedule a scan

C. The Last step in the malware-removal process is the dictation of the end user to prevent future occurrences of infection. Identifying the malware is the first step in the malware-removal process. Enabling System Protection is one of the last steps, but it is not the last step. Scheduling a scan should be preformed after you have remediated the malware. See chapter 24

You need to change a computer's name and join it to a domain. Which tool should you use? A.Device Manager B.User Accounts C.System Properties D.Credential Manager

C. The System Properties applet (Sysdm.cpl) allows you to change a computer's name and join the system to a domain. Device manager is used to manage hardware resources. The User Accounts applet is used to manage user accounts. Credentials Manager is used to manage stores credentials. See chapter 16 for more info

Which filesystem performs on-the-fly defragmentation? A.FAT B.NTFS C.ext4 D.DNS

C. The extr4 filesystem does not suffer from fragmentation, because it preforms on-the-fly defragmentation. FAT is a 16-bit filesystem that suffers from fragmentation. NTFS is a journaled filesystem that suffers from fragmentation. FAT32 is a 32-bit filesystem that suffers from fragmentation. See chapter 20

Which line would be used to comment Windows batch script code? A.//comment B.'comment C.REM comment D. # comment

C. The line REM comment is used to comment Windows batch script code. The line //comment is sused to comment JavaScript code. The line 'comment is used to comment VBScript. the line # comment is used to comment Bash script code and PowerShell code. See chapter 21

Which tool will allow you to read the operating system for imaging? A.Microsoft Deployment Toolkit B.Windows Assessment and Deployment toolkit C.sysprep.exe D.Windows Imaging

C. The sysprep.exe utility will allow you to ready the operating system for imaging, by resetting specific information, such as the computer name. The Microsoft Deployment Toolkit can assist in creating the steps, but it calls on the syspre tool. The Windows Assessment and Deployment Kit allow you to customize the Windows operating system for imaging, but it does not ready the operating system for imaging. Windows Imaging (WIM) is a file format to contain the image. See chapter 18

While installing a new network card, you accidentally broke a component off of the card. What should you do ? A.Explain that the card was broken out of the box B.Install the card anyway C.Inform the customer of the situation D.Leave everything as-is until you can locate a new card

C. You should be honest and inform the customer of the situation. Explaining that the card was broken out of the box is untruthful and deceptive. Installing the anyway will cause new problems. Leaving everything as-is until you can locate a new card does not help the customer, since you've created a new dilemma l. See chapter 25

While working on a user's system, you discover a sticky note attached to the bottom of the keyboard that has their username and password written on it. The user is not around, and you need to verify that the network connection is working. What should you do? A.Log in, verify access, and then log out B.Log in and stay logged in when you are finished C.Text the user D.Log in and change the user's password

C. You should text the user and let them know that you need to verify their network connection. You should not log in as another person, with their username and password. You should not log in and stay logged in when you are finished. You should definitely not log in and change the user's password. See chapter 25 for more info

Which of the following screwdrivers has a splined head? A.Flat-tipped B.Philips C.Axial D.Torx

D. A Torx screwdriver has a splined head, which is used for greater gripping of the screw. A flat-tipped screwdriver, as the name suggests, has a flat tip. A Philips screwdriver has a cross, which is used for better gripping over a normal flat-tip screwdriver. An axial screwdriver is not a type of screwdriver. See chapter 26 for more info

Which feature allows you to create simple network, secured by a single password, to share files and printers with other Windows 7 clients? A.Domain B.Workgroup C.Libraries D.HomeGroup

D. HomeGroup allows sharing of files and printers with other Windows 7 clients, secured with a single password. Domains Require domain controllers and individual accounts. Workgroups require user accounts to be set up on each workstation in the network. Libraries are components of the Windows 7 operating system and HomeGroups that allow for the logical grouping of files. See chapter 19

Which RAId system req three or more disks to provide fault tolerance? A.Mirroring B.Stripping C.RAID-1 D.Stripping with parity

D. Stripping with parity, also known as RAID-5, requires three or more disks and provides fault tolerance. Mirroring, also known as RAID-1, requires only two disks. Stripping, also known as RAID-0, provides no fault tolerance. See chapter 16 for more information

Which Windows Update branch will allow you to install preview releases of updates for Windows 10? A.Semi-Annual Channel B.Semi-Annual Channel (Targeted) C.Long-Term Servicing D.Insider program

D. The Insider Program allows for the installation of brand new features before they are publically released. The Semi-Annual Channel is normally delayed by three to four months. The Semi-Annual Channel (Targeted) branch will install updates as they are released to the general public. The Long-Term Servicing Channel never installs new features during the life of the version of Windows. See chapter 17

Which element of the boot process holds the information that instructs the operating system to load from a specific partition? A.winload.exe B.Bootmgr C.winresume.exe D.BCD

D. The boost Config Data (BCD) holds the information that instructs the Windows Boot Manager (bootmgr) to load the operating system from a specific partition. Winload.exe loads the operating system kernel. Bootmgr is the initial bootstrap program that reads BCD. Winresume.exe is used when resuming a previous session that has been suspended. See chapter 18

Which operating system is a cloud-based operating system? A.Linux B.Android C.Windows 10 D.Chrome OS

D. The google chrome OS IS A TRYE CLIUD-based operating system, because all the data is stored in the cloud. Cloud-based operating systems require an Internet connection to access information. Android and Windows 10 use cloud storage but are not considered cloud-based operating systems l. Linux is strictly a workstation operating system. See chapter 15 for more info

Which macOS feature is similar to Windows File Explorer? A.Keychain B.iCloud C.Spotlight D.Finder

D. The macOs Finder is the equivalent to Windows File Explorer. The keychain is a password management system for the operating system. iCloud is a cloud-based storage and backup service. Spotlight helps you find applications, documents, and other files. See chapter 20

You need to check the status of your User Account Control (UAC) and Windows Activations on Windows 8/8.1. Which toll will display both of these? A.User Settings B.Action Center C.Firewall with Advanced Security D.Windows Update

b. The Action center will allow you to see the status of both the UAC and Windows Activation. User Settings will show only the UAC status . Firewall with Advanced Security and Windows Update will not show you either of these. See chapter Chapter 18


Conjuntos de estudio relacionados

Chapter 10 - Pricing: Understanding and Capturing Customer Value

View Set

Physical Fitness: Unit 3: QUIZ 1: CARDIOVASCULAR TRAINING; QUIZ 2: INTENSITY VERSUS DURATION; QUIZ 3:CARDIOVASCULAR EXERCISE AND WEIGHT CONTROL

View Set

Clinical Practice of Dental Hygiene Chapter 11

View Set

Sociology study guide chapter 5,7,9,11

View Set

Stress, Physiology, and Health Mid term

View Set