COMPTIA 102
An organization executes a project to replace all of its servers. A change that is requested by management goes through a risk analysis exercise before moving to approval. What attributes are associated with qualitative approaches? (Select all that apply.)
Previous experience Opinions
A user enables privacy settings on a Windows 10 computer. Which settings pertain to app permissions? (Select all that apply.)
Location service AND Camera and microphone
Malware infects a user's computer. A support technician determines that the malware is executed without requiring any authorization using system privileges. What type of malware currently infects the system?
Malware may be able to execute without requiring any authorization using system privileges and it may escalate privileges after installation. Malware running with this level of privilege is referred to as a rootkit.
A user inspects and learns about the electrical components on the inside of a computer. What is measured in ohms?
A resistor creates resistance. Resistance is the degree of opposition to the current caused by characteristics of the conductor and is measured in ohms.
An iOS smart device user notices that AirDrop is not working properly as files are not being received. What should the user check while troubleshooting? (Select all that apply.)
Bluetooth AND Wi-Fi
A user installs an application on a Linux system by using which method in the operating system?
An app distribution method is the means by which the vendor makes it available to install. Linux uses DEB packages with the APT package manager or RPM for YUM.
A computer user looks to map a network drive using the most basic scripting language possible. Which language does the user implement for a Windows system?
A shell script written for the basic Windows CMD interpreter is often described as a batch script. A batch script would be the simplest way to create the script.
A user finds their Android smartphone to be unresponsive when trying to use an app. How might the user resolve the problem so that they may use the phone?
A soft reset is usually effective in restoring unresponsive or frozen systems and is one of the first things to try when faced with a malfunctioning app or slow performance.
A user loses their smartphone that is set up for roles as both personal and work-related functions while traveling. The IT department initiates the securest measure possible to impact work-related data only. What action does the IT department take?
An enterprise wipe can be performed against the corporate/work container only. This removes any corporate accounts and files but leaves personal items on the phone.
A company implements several types of security mechanisms around a high-risk data center. One of the mechanisms allows for a panic button to be pressed. Which security type does this button represent?
A duress alarm is triggered manually and could be implemented as a wireless pendant, concealed sensor or trigger, or call contact.
A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration?
A factory recovery partition is a tool used by the original equipment manufacturers (OEMs) to restore the OS environment to its ship state. The recovery partition is created on the internal fixed drive.
A user would like to install an updated Windows operating system (OS) on a computer. There are no files that need to be saved. What options does the user have to accomplish this? (Select all that apply.)
A clean install of an OS is an installation option where no previous operating system will be repaired. This is a good option for a new install. An in-place upgrade means running setup from an existing version of the OS so that third-party applications, user settings, and data files are kept and made available in the new version.
A user contacts an IT helpdesk. The complaint is that the computer is very sluggish. Support personnel notices high graphics processing unit (GPU) use. What does the helpdesk determine to be the issue?
A cryptominer hijacks the resources of the host to perform cryptocurrency mining. This is also referred to as cryptojacking. A graphics processing unit (GPU) is used in cryptomining.
A user builds a new computer for gaming purposes. The ability to upgrade the performance graphics processing unit (GPU) over time is desired. What GPU type does the user invest in?
A dedicated graphics card will have its own random access memory (RAM). This allows the card to focus on rendering graphics without using system RAM.
A technician would like to set every Windows computer at an organization to have a company logo as a desktop wallpaper. What does the technician determine as the best method for deploying the setting?
A domain group policy configures computer settings and user profile settings for all computers and user accounts within a domain. This type of policy would satisfy the requirement.
An iOS user struggles with wirelessly connecting a set of headphones to a phone. What does the user check on the phone while troubleshooting? (Select all that apply.)
Bluetooth connection AND Pairing mode
A user experiences difficulty paying a retailer with a touchless near-field supported phone. What does the user check while troubleshooting?
Airplane mode
A new support technician interfaces with a user that has a computer problem. While discussing the problem, the technician gives undivided attention to the user and asks questions where the person creates their own response. When discussing the problem, what does the technician practice? (Select all that apply.)
An open-ended question is a question that invites the other person to compose a response that allows them to openly discuss what they are seeing versus locking them down into a fixed response. Active listening is the skill of listening to an individual so that that person is given full attention and is not argued with, commented on, or misinterpreted in what they have said.
Which proprietary file system does a Mac workstation use?
Apple File System (APFS), which supports journaling, snapshots, permissions/ownership, and encryption.
A user contacts an IT help desk to report that when trying to browse a web page for office supplies, a completely unrelated webpage about gambling is presented. What does the help desk determine the causes could be? (Select all that apply.)
Browser redirection AND DNS spoofing
A problematic Windows system with multiple operating systems installed does not boot properly. A support technician tries to diagnose by outlining the boot process. The technician determines that the system uses an Extensible Firmware Interface (EFI) system partition. Which file does the technician inspect for problems related to a specific operating system boot problem?
BOOTMGFW
A company looks to dispose of old computers and related equipment. Which items require special care? (Select all that apply.)
Batteries Toner Motherboard
A technician configures a backup routine on an important workstation. Which type does the routine use when only backing changes since the last full backup?
Differential jobs select new files and files modified since the original full job. A differential chain has moderate time and storage requirements.
A systems engineer would like to keep a company's wireless network a secret. How can the engineer accomplish this?
Disable service set ID broadcast.
A computer security team investigates a high-level computer breach at a large company. While investigating one of the computers in question, the team finds a USB drive inserted into the back of the shared user desktop tower. What are the primary concerns for the team from this discovery related specifically to the USB drive found? (Select all that apply.)
Chain of custody AND Data integrity
A technician configures a legacy computer for a user. Which account authentication policies does the technician implement? (Select all that apply.)
Change the default admin password. AND Disable the guest account.
A new support technician works on entry-level trouble tickets. Which question does the technician use as a closed type of question?
Did you read the message?
A user suspects that a USB drive on their system has been tampered with. The user begins using the drive by saving a few reports while waiting for an IT technician to investigate. What does the user compromise?
Data integrity
A new help desk technician receives a support call from a user. What initial information does the technician ask the user to provide? (Select all that apply.)
Description of the issue AND Contact details
A user upgrades the memory in a Windows corporate workstation from 4 GB to 8 GB. After the upgrade, the user notices that only 4 GB is recognized by the system. What does the user conclude the problem to be?
Each version and edition of Windows 10 was originally available as 32-bit (x86) or 64-bit (x64) software. All 32-bit Windows editions are limited to 4 GB of system memory.
A data analyst is creating new disaster recovery and prevention method guidelines after exposure to a recent data breach. What factors should be considered when developing a disaster recovery plan? (Select all that apply.)
Identify scenarios for natural and man-made disasters. AND Identify tasks, resources, and responsibilities for responding to a disaster.
A Windows user runs the Defragment and Optimize Drives tool (dfrgui.exe) on a solid state drive (SSD). What action will the tool take on the drive? (Select all that apply.)
Identifying blocks that are deletable. Tagging blocks as writable.
An engineer configures numerous firewall rules on a system. If no specific rule or permission explicitly grants access and is automatically denied by default, what security function is in place?
Implicit deny means that unless there is a rule specifying that access should be granted, any request for access is denied.
An IPv6 address is made up of bits that identify the network and host of a system. How many bits long is an IPv6 address in total, and how many bits identify the host portion? (Select all that apply.)
In IPv6, the address is 128 bits long and the network prefixes are used to identify logical networks within the first 64 bits. IPv6 uses hexadecimal values for notation. In IPv6, the address is 128 bits long and the interface address portion is always the last 64 bits.
A user interacts with a Linux distribution that has no desktop graphical user interface (GUI). As the user types, which stream handles the interaction?
In a Linux distribution with no graphical user interface, a terminal interface is used. The default shell command interpreter uses the stream stdin (0) for the user's keyboard input.
A company establishes a mobile device deployment model. The policy states that a corporate-owned phone may be used for personal reasons. Which deployment is in use?
In a corporate-owned, personally enabled (COPE) program, a device is chosen and supplied by the company and remains its property. The employee may use it for personal reasons.
Which root-level file allows for the automatic execution of commands in a legacy version of Windows?
In a legacy versions of Windows, an inserted disk (USB or optical) would automatically run commands defined in an autorun.inf file stored in the root of the drive.
An organization looks to make a server available to internet traffic without bringing harm to its private network. An onsite engineer configures a separate network for the server. Which approach does the engineer utilize?
In an enterprise network, a screened subnet is a means of establishing a more secure configuration. The idea of a screened subnet is that some hosts are placed in a separate network segment.
A computer store help technician installs a Windows 10 edition that is designed for domestic consumers and SOHO business use. What edition has been installed in this instance?
In this scenario, Windows 10 Home is the appropriate software for installation as it is designed for domestic consumers and Small Office Home Office (SOHO) business use. The home edition cannot be used to join a Windows domain network.
While implementing security on a small network, an administrator ensures that any data modification is legitimate. What security property pertains to this principle?
Integrity is a part of the CIA triad (the "I") and means that the data is stored and transferred as intended and that any modification is authorized.
A user modifies a Windows 10 computer's ease of access settings. Which settings group configures Keyboard usability?
Interaction configures options for keyboard and mouse usability. The user can also enable speech- and eye-controlled input methods.
A Windows 7 computer user requires help from the IT department. A technician instructs the user to create an invitation file. What type of Windows help session does the user create?
Microsoft Remote Assistance (MSRA) allows a user to ask for help from a technician or co-worker via an invitation file protected by a passcode.
A user claims that they cannot browse the local shared network by name. After evaluating the computer's IP settings and pinging the local share by IP address with no problem, what does a support technician determine as the cause?
Missing DNS address
A user looks to reconfigure an IP address for a network adapter. Which Control Panel applet is the most direct?
Network Connections
A user boots and installs a legacy Windows operating system on a computer. The user notices that after installation, the system requires many drivers and updates to bring it to a healthy and up-to-date state. The user finds that it is not possible to add updates to which installation media type?
Non-Writeable Optical Disk
A systems administrator configures a new Windows workstation. The system uses the New Technology File System (NTFS). The administrator needs the system to interact with a Linux system and support a set of common interface standards for compatibility. Which compliance does the administrator need to ensure?
POSIX (Portable Operating System Interface) is a set of common interface standards designed to facilitate compatibility between different operating systems, including but not limited to Unix-like systems and Windows. Ensuring POSIX compliance allows a Windows system, using NTFS, to interact more seamlessly with a Linux system.
A user opens a help desk ticket stating that web content embedded within a particular webpage is not displaying as it should. What does a support technician conclude to be the most likely issue?
Plugins play or show some sort of content embedded in a web page, or other video/multimedia format. In this case, a plugin is missing a particular page that is not displaying content.
What might a security engineer suggest as a solution to deter lunchtime attacks?
Policies
An attacker uses a script to create fileless malware that requires no compilation. What scripting environment does the attacker utilize?
PowerShell
A novice user wants to use a feature where they do not have to manually clear their cache after conducting browsing activity. Which feature fulfills this need?
Private/incognito browsing mode disables the caching features of the browser so that no cookies, browsing history, form fields, passwords, or temp files will be stored when the session is closed.
A security engineer suggests the use of proximity technology to track the movement of portable equipment. What solution does the engineer recommend?
Radio frequency
A user at an organization calls the IT help desk in a panic. The user exclaims that according to a message on the computer, someone is trying to extort them. What type of malware does the user experience?
Ransomware is a type of malware that tries to extort money from the victim. One class of ransomware will display threatening messages, such as requiring Windows to be reactivated.
An engineer configures an Authentication, Authorization, and Accounting (AAA) server to authenticate credentials for remote users. Credentials are forwarded to the AAA server from a firewall. Which AAA method does the engineer utilize?
Remote Authentication Dial-in User Service (RADIUS) is one way of implementing the AAA server when configuring enterprise authentication. The firewall is configured as a client of the RADIUS server.
A user experiences a blue screen of death (BSoD) while using a Windows desktop computer. Upon initial inspection, no debris is observed in the tower. What does a support technician determine to be a good first troubleshooting step?
Remove any newly installed hardware.
A user with a problematic Windows system tries to use a previously created system image. How does the user access the image? (Select all that apply.)
Repair disk AND Advanced boot
An administrator reviews an audit log and notices strange logins when the business is closed. Which policy does the administrator use to deter this activity?
Restrict login times is typically used to prevent an account from logging in at an unusual time of the day or night or during the weekend.
A tech has an Android tablet that no longer receives updates due to its age. Learning that a custom firmware with new features is available, what does the tech require to install the image?
Root access
A user installs an app on a smart device. The device's official app store does not list the app, as it is a proprietary app for an organization. What type of installation does the user complete?
Sideload
An IT professional for a company wants to deploy an app outside the app store on company-managed devices. What requirement does the user complete to accomplish this?
Sideloading is the correct answer as it refers to the action of installing applications obtained outside of the device's official app store, which is what the question is asking about.
A tech firm deploys wireless installations at client sites. As the firm uses Wi-Fi Protected Access (WPA) version 3, which security technology does the deployment utilize? (Select all that apply.)
Simultaneous Authentication of Equals (SAE) in WPA3 replaces the 4-way handshake in WPA2. The 4-way handshake mechanism is vulnerable to manipulations that allow a threat actor to recover the key. AES Galois Counter Mode Protocol mode
An IT administrator creates a repository for standard operating procedures (SOPs). What documents does the administrator upload to the repository? (Select all that apply.)
Software installation instructions, New-user setup checklist, AND Server decommissioning checklist
Windows allows for several types of installable software. Which type may be transferred between computers when a user utilizes a Microsoft account?
Store apps are installed via the Microsoft Store. Store apps can be transferred between any Windows device where the user signs in with that Microsoft account.
A systems administrator looks to have a daily backup of a server located across a wide area network (WAN) link. As the link is not fast, the administrator creates a backup scheme that uses little to no bandwidth and acquires an entire backup of the system. Which scheme does the administrator implement?
Synthetic
A company tightens system security in several ways. One approach implements on-access scanning of files for malware. Shortly after implementation, users complain to the help desk. What is the complaint?
Systems are slow.
An engineer surveys risks tied to environmental impacts for a service computer stored in a server closet. What does the engineer focus on? (Select all that apply.)
TEMPERATURE, HUMIDITY, AND VENTILATION
A Windows user runs the Performance Monitor tool to check disk activity. What counter is the best option the user can evaluate to understand how busy the disk is at any given time?
The % disk time metric is the percentage of elapsed time that the selected disk drive is busy servicing read or write requests.
22 of 87 Question After a recent driver update on a Windows system, the display adapter does not function properly. A technician tries to roll back the driver by using which management console?
The Device Manager (devmgmt.msc) console allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices.
A user wishes to enable multiple desktops within macOS for different work environments. What feature makes this possible?
The Mission Control feature is used for window management and enables the user to set up multiple desktops with different sets of apps and backgrounds.
A systems administrator configures a hardware firewall to allow remote desktop connections to various Windows computers. This involves port forwarding. Which port will the administrator need to change so that each system uses a unique port?
The Remote Desktop Protocol on a Windows workstation or server runs on TCP port 3389 by default but can be changed to another port.
A recent software installation on a Windows desktop fails. Which internal log file does a technician review to see what may have gone wrong?
The application log contains information regarding non-core processes and utilities for some third-party applications. Third-party application installers write events to the application log.
A Windows user is not able to resolve server names on a local network. After updating the system's hosts file, which command does the user issue?
The domain name system (DNS) is used to resolve IP addresses to host names. Whether a server or a hosts file is used, the ipconfig /flushdns command clears a system's DNS cache.
A user installs an application on a macOS device. The user determines that installation will require running an additional service. What installer format does the application use?
The macOS .pkg format is used where app setup needs to perform additional actions, such as running a service or writing files to multiple folders.
A Windows user needs to transfer and retain an entire directory structure from one disk to another. There is also a need to retain New Technology File System (NTFS) attributes. Which command does the user determine will fulfill the need?
The robocopy command (or "robust copy") is a Windows file copy utility. This utility is designed to work better with long file names and NTFS attributes.
A user with tech knowledge is browsing the network to identify any available shares on all servers. While browsing, the user found a share known to contain payroll information. However, the user is unable to access the information within the share. Assuming that the user is not authorized to access the payroll information, what is the most likely reason why the user cannot view the information within the share?
The user does not have permissions to access the share.
A user would like to delete a mapped drive labeled as "X" on a Windows system. Which command will the user issue at the command prompt?
There are several net and net use command utilities that are useful in viewing and configuring shared resources on a Windows network. To delete a drive mapping, the correct syntax is net use X: /delete.
How might a mobile-device management suite of software detect that a user has rooted an Android device?
There is no valid developer code signature.
A technician receives a company laptop from an employee who states they are unable to authenticate from one Windows system to another in a domain but fails with no error message and has verified the username and password are correct. What does the technician determine the issue to be?
Time drift
Due to a recent breach, a cyber architect is tasked with drafting a company-wide memorandum on social engineering attacks and how they can be mitigated. Which statement does NOT support the organization in defeating social engineering attacks?
Train employees to release information based on personally-preferred procedures.
A network engineer implements a proxy at a small company. The configuration does not require settings on every client machine. What type of proxy does the engineer deploy? (Select all that apply.)
Transparent AND Intercepting
A user looks to implement Virtual Network Computing (VNC) access to a Windows computer while traveling. Which port does the user open on a hardware firewall to allow access?
Virtual Network Computing (VNC) is a freeware product with similar functionality to the Remote Desktop Protocol (RDP). It works over TCP port 5900.
A company has several offices within the United States. Engineers look to configure Microsoft DirectAccess virtual private networking technology for remote connections. Engineers instruct IT to deploy which operating system to Windows desktops?
Windows Enterprise edition has several features that are not available in the Pro edition, such as support for Microsoft's DirectAccess virtual private networking technology.
A company disposes of old computer systems. While doing so, all hard drives are removed and scheduled for physical destruction. Which method will NOT work with a solid state drive (SSD)?
With degaussing, a hard disk is exposed to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface. Degaussing does not work with SSDs or optical media.
Which type of malware replicates between processes rather than infecting a file?
Worms replicate between processes in system memory rather than infecting an executable file stored on a disk. Worms can also exploit vulnerable client/server software to spread between hosts in a network.
A technician troubleshoots a Windows system by using the command prompt. If the technician is currently in the directory named C:\Backup and wishes to enter the directory C:\Backup\02102022, what command does the technician use?
cd 02102022