COMPTia A+ Core 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

If suspect someone at your company has violated the AUP, what are your responsibilities as the first responder? (Select all that apply.) a. Identify the violation. b. Report it to the police. c. Preserve the data and device. d. Document the incident.

If suspect someone at your company has violated the AUP, what are your responsibilities as the first responder? (Select all that apply.) a. Identify the violation. c. Preserve the data and device. d. Document the incident.

What is the value of Counter when execution ends in the following pseudocode?Counter = 100Do While Counter < 100Counter = Counter - 1Loop a. 100 b. 0 c. 1 d. Endless loop

a. 100

Patricia is updating the antivirus software on her computer. She clicks on a link and starts the download. About five minutes later, the download fails, and crashes the antivirus program. Patricia tries to restart the program, and the antivirus program fails to restart. Patricia uses the Windows Action Center to try and run the antivirus software, but the software will not run. Instead, she is told that the antivirus software has been disabled, and a different antivirus program has been installed.What has happened to Patricia's computer? a. A rouge antivirus was installed. b. The Windows update uninstalled the antivirus program. c. The Windows OS has become corrupt. d. Patricia does not have permission to update the antivirus program.

a. A rouge antivirus was installed.

How is user authentication typically achieved when a computer is joined to a Windows domain? a. Active Directory is responsible for user authentication. b. Authentication must happen at the local computer. c. Authentication is achieved by brute force. d. Local Group Policy performs authentication.

a. Active Directory is responsible for user authentication

You want to install software that will recognize activity on your device that might be harmful to data and other resources.What type of software should you install on your computer? a. Antivirus b. Firewall c. VPN d. MDM

a. Antivirus

Mary is trying to access the Advanced options screen in Windows 10. She called the help desk and was told that she needs to press F8 while the computer is booting. Unfortunately, Mary has been trying this for several boots, and it is not working.Why doesn't pressing F8 work on Mary's computer? a. By default, Windows 10 does not allow Mary to use the F8 key to access the Advanced Boot Options menu. b. Mary is not pressing the F8 key at the right time during the boot process. c. The F8 key is not working properly, and she should replace her keyboard. d. F8 does not launch the Advanced Boot Options menu; instead, she should press F5.

a. By default, Windows 10 does not allow Mary to use the F8 key to access the Advanced Boot Options menu.

While using the CLI on a Windows 10 64-bit computer with a single HDD and a single volume, you want to move from the current directory to the directory where Windows is installed.Which of the following will perform this action? a. CD %SYSTEMROOT% b. CD %SYSTEMDRIVE% c. CD %PROGRAMFILES% d. CD %USERPROFILE%

a. CD %SYSTEMROOT%

What should Aiden do to help the situation? (Select all that apply.) a. Call his supervisor and ask for help. b. Continue to work on the problem. c. Walk away from the problem and come back later. d. Tell the user that he can't fix the computer and escalate the problem.

a. Call his supervisor and ask for help. c. Walk away from the problem and come back later. d. Tell the user that he can't fix the computer and escalate the problem.

At the completion of servicing a laptop computer, the technician replaced the laptop's battery.What is the proper step to take to dispose of the defective battery? a. Check the MSDS for the battery or the battery documentation for disposal instructions. b. Call emergency services and inform the dispatcher you need to dispose of a battery. c. Discharge the battery and dispose of it with the office trash service. d. Wrap the battery in paper and recycle it with the office recycle service.

a. Check the MSDS for the battery or the battery documentation for disposal instructions.

While working on a printer, you spill a liquid solution that was sitting on the floor next to the printer stand.What step should you take next for the safety of others as well as your own safety? a. Check the MSDS for the liquid and follow the instructions. b. Immediately flush your skin and mop the floor with warm water. c. Keep users away from the area and call emergency services. d. Call your supervisor and inform him of the spill.

a. Check the MSDS for the liquid and follow the instructions.

A user is having difficulties with a monitor not displaying the maximum number of colors while he is editing photos. The display driver is set to the monitor's native resolution.Which of the following Windows Display settings will the user likely need to adjust to resolve this issue? a. Color depth b. Resolution c. Refresh rate d. Multiple displays

a. Color depth

You want all sales team members to have read and write access to a folder on the file server. All other users on the network must be restricted from viewing or modifying the files in the sales folder.What should you do to configure this scenario? a. Configure both NTFS and share permissions on the sales folder. b. Configure NTFS permissions on the sales folder. c. Configure share permissions on the sales folder. d. Configure FAT32 permissions on the sales folder.

a. Configure both NTFS and share permissions on the sales folder.

Jacob wants to install Windows 10 Pro on his computer, which is currently running Windows 7 Home Premium.What type installation will Jacob be able to perform? a. Custom installation b. In-place upgrade c. Dual-boot d. Virtual installation

a. Custom installation

Your customer is using the Windows Settings app in Windows 10 to set up a new Bluetooth mouse on his laptop.What applet in the Windows Settings app should he select to set up his new mouse? a. Devices b. Mouse c. System d. Ease of Access

a. Devices

The Windows users in your organization utilize a shared folder on the network to save their data files. Several users disconnect their laptops from the network while traveling. When the users return to the office, they have difficulty keeping data files organized because they end up with one version of a file on the laptop and a different version of the same file on the network.How can you eliminate the issue of dissimilar files? a. Enable and configure Sync Center and Offline Files on the laptop computers. b. Create a separate user account on the laptop to be used when the laptop is disconnected from the network. c. Configure Credential Manager on the laptops and assign authentication credentials to be used when the laptop is connected to the network. d. Configure a separate Windows Firewall profile on the laptops to be used when the laptop is disconnected from the network.

a. Enable and configure Sync Center and Offline Files on the laptop computers

You are the IT support technician for a small organization. Your manager is asking what precautions you can put in place to protect the company's network-attached PCs from attacks over the Internet as well as attacks over the local network.Which of the following will be included in your recommendation? a. Enable and configure Windows Firewall on all Windows host PCs. b. Install and configure a Domain Controller with Active Directory. c. Create a folder share on a server and move all user data to the shared folder. d. Enable BIOS/UEFI passwords on all PCs.

a. Enable and configure Windows Firewall on all Windows host PCs.

The users in your accounting department are frequently away from their workstations to check inventory in the warehouse. During these times, the accounting application needs to remain open.How can you configure the user's workstations to prevent unauthorized employees from viewing information on the monitors while allowing the accounting application to remain open? a. Enable the screensaver and require a password to unlock the workstation. b. Require all users to turn off their monitors when they leave their work area. c. Configure password expiration on each workstation. d. Require each user to change their password every 30 days.

a. Enable the screensaver and require a password to unlock the workstation

Your manager is asking for precautions to be taken to prevent company data leaks if the Windows computers in the organization with locally stored data should be lost or stolen.Which of the following steps can you take to meet this requirement? (Select TWO.) a. Encrypt the HDDs with BitLocker. b. Configure a drive lock password on the systems. c. Configure EFS on the systems. d. Require that local user accounts have strong passwords. e. Encrypt the data with BitLocker To Go.

a. Encrypt the HDDs with BitLocker. b. Configure a drive lock password on the systems.

A mobile device has stopped receiving automatic OS updates that until recently were pushed to the device.What is the most likely reason for this issue? a. End-of-life limitation b. Product release information c. Cloud storage failure d. Single sign-on

a. End-of-life limitation

Which of the following is a partition type that cannot have a drive letter assigned? a. Extended b. Logical drive c. Simple volume d. Active e. Primary

a. Extended

Which of the following security methods is most likely to have the greatest negative impact on device performance by consuming processing resources? a. Full device encryption b. Fingerprint lock c. Locator applications d. Remote backup applications

a. Full device encryption

Which of the following partition types can hold up to 128 partitions or volumes? a. GPT b. MBR c. Active d. Primary

a. GPT

A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information. Today you received a call from one of your users stating they are unable to decrypt any of the emails sent by the accountants.Which of the following steps will you take to resolve this issue? a. Generate a new public and private key. b. Disable email encryption. c. Send your private key to the accountants. d. Have the accounting company send their private key to you.

a. Generate a new public and private key.

You are configuring a user account on a Windows 10 computer that visiting vendors and sales professionals will use in the company's reception area. The user account needs to be the most restrictive type of account.Which of the following account types will meet this requirement? a. Guest account b. Administrator account c. Standard User account d. Power Users group

a. Guest account

Which of the following operating systems historically comes up short on the number of available desktop applications? a. Linux desktop OS b. Mac OS X High Sierra c. Windows 10 Pro d. Windows 7 Home

a. Linux desktop OS

When should a technician work inside the PSU? a. Never, because of dangerous electrical charges b. When replacing the internal cooling fan c. After removing the antistatic wrist strap d. Only if a circuit breaker trips

a. Never, because of dangerous electrical charges

What type of regulated data are you expected to protect if you are working for the IT department of an online store? (Select all that apply.) a. PII b. PHI c. PCI d. GDPR

a. PII (personally identifiable information) c. PCI (payment card industry) d. GDPR (general data protection regulation) PHI is protected health information

Your company has decided that using a user name and password is not enough security for its employees and wants you to create the new policy. You have decided that the best option is to implement two-factor authentication.What are the types of two-factor authentication? (Select all that apply.) a. Passwords b. Security certificate c. Fingerprint d. Software token e. Smart card f. Access permissions

a. Passwords c. Fingerprint d. Software token e. Smart card

While watching a live stream on his computer using Microsoft Edge, Aiden is receiving random ads for Doritos.How can Aiden stop these random ads from interrupting his web browsing? a. Pop-up blocker b. Antivirus software c. Spyware removal tool d. Windows Security settings app

a. Pop-up blocker

You are troubleshooting a Mac computer with an app that stops responding to mouse or keyboard actions.How can you stop the application when it is nonresponsive? a. Press the Option+Command-Esc shortcut keys. b. Press the Command-a shortcut keys. c. Press the Command-x shortcut keys. d. Press the Command-Spacebar shortcut keys.

a. Press the Option+Command-Esc shortcut keys

A company wants to implement a single server computer to speed up Internet access and protect the private network from attack over the Internet.Which type of server will best meet these requirements? a. Proxy server b. Domain controller c. Mail server d. File server

a. Proxy server

An admin deleted an Active Directory user account by accident.What can be done to restore the account? a. Recover the account from the Active Directory Recycle Bin. b. The account is lost and must be re-created. c. Open the account and uncheck the box "Account is disabled." d. Copy another account and rename the copy to the account name that was deleted.

a. Recover the account from the Active Directory Recycle Bin.

You are trying to play music through the internal speaker of your mobile device but no sound can be heard. You verified the volume control is turned up and sound can be heard using a Bluetooth headset.What can you do to fix this problem? a. Redirect the sound output to the internal speaker. b. Turn off the Bluetooth headset. c. Disable the Bluetooth radio. d. Power cycle the mobile device.

a. Redirect the sound output to the internal speaker.

A Windows system is displaying an error when attempting to run an application. The error message states a program can't be started because a DLL file is missing from the computer.What steps should you take to resolve this error? (Select TWO.) a. Reinstall the application. b. Register the missing DLL component. c. Manually delete the registry entry for the missing DLL. d. Run Windows Update. e. Run the application as administrator.

a. Reinstall the application. b. Register the missing DLL component.

Before beginning to work inside a computer system unit, which of the following is the first step to take to ensure your safety and the safety of the equipment? a. Remove AC power from the system. b. Connect the PC to an UPS. c. Update all hardware drivers. d. Change into leather sole shoes.

a. Remove AC power from the system.

You are dealing with a customer and are having a hard time understanding her, and she is also having a difficult time explaining the problem.What can you do to make sure you understand the customer? a. Restate the issue or question. b. Provide proper documentation. c. Avoid distractions. d. Follow up with the customer later to verify the issue has been resolved.

a. Restate the issue or question.

Jerry uses an older computer that is running Windows 7. The computer has completed an update to a driver, and Jerry is having an issue with booting the computer. Jerry is not sure what his next step should be and notices that he can use the Last Known Good Configuration. He calls you inquiring about this option. Jerry would like to know when he can use Last Known Good Configuration.When should Jerry use the Last Known Good Configuration option? a. Roll back a device driver. b. Repair the registry. c. Roll back a bad Windows update. d. Recover from a bad software for installation.

a. Roll back a device driver.

You have been dispatched to deal with an escalated trouble ticket in which the user is receiving an error message stating Windows detected a hard drive problem reading from sector 153. The previous technician backed up the user's data and started troubleshooting but was unable to duplicate the error.Which of the following steps should you take next to help determine the cause of the error message? a. Run chkdsk on each HDD installed on the system. b. Execute taskkill on all storage service processes. c. Edit the registry using regedit to remove error messages. d. Revert the system to a previous restore point using System Restore.

a. Run chkdsk on each HDD installed on the system.

Which of the following will increase the level of security for personal and confidential information on a mobile device if the device is lost or stolen? (Select TWO.) a. Screen lock b. Remote wipe c. OS update/patch management d. Anti-malware/antivirus e. Remote backup application

a. Screen lock b. Remote wipe

A Windows 7 workstation is experiencing a problem when launching an application and displays a message indicating a dependent background service is not running. The technician assigned to the trouble ticket has determined that the dependent service needs to start automatically when Windows is started.Which of the following tools will allow the technician to configure the dependent service to start automatically? a. Services Console b. System Configuration c. Task Manager d. Task Scheduler

a. Services Console

A Mac user is trying to locate a file by name.Which macOS utility can be used to find the file? a. Spotlight b. Boot Camp c. Disk Utility d. Mission Control

a. Spotlight

Brandon just completed installing Windows 7 and wants to verify that all drivers installed properly.What Control Panel applet should Brandon use to verify that all drivers are installed correctly? a. System applet b. Event Viewer c. Device Manager d. Settings

a. System applet

You are again troubleshooting a mobile device that reboots immediately after the correct passcode is entered. You performed a factory reset last week for the same issue, and the problem disappeared. The device worked perfectly for several days, but the user returned today with exactly the same problem.Which of the following is the most likely reason for this behavior? a. The device is being infected with malware. b. An app relying on location services is failing. c. The device is not connected to a cellular provider. d. The device is overheating.

a. The device is being infected with malware.

A mobile device user installed several free apps that randomly present an advertisement. Recently, multiple advertisements are showing and dominating the screen even when none of the free apps are running.Which of the following is the most likely cause for the increase in advertisements? a. The device is infected with malware. b. The free apps need to be updated. c. The cellular service is sending the advertisements. d. The anti-malware app on the device is misbehaving.

a. The device is infected with malware.

A technician is upgrading a Mac computer from OS X Yosemite to OS X Mojave. The computer is using an SSD that was formatted using HFS+, meets the system requirements, and has sufficient free disk space.Which of the following steps will be required to upgrade the OS? a. The file system will need to be converted from HFS+ to APFS. b. The RAM will need to be upgraded to a minimum of 2GB. c. The SSD will require at least 12.5GB of free space. d. The SSD will require at least 18.5GB of free disk space.

a. The file system will need to be converted from HFS+ to APFS.

A mobile device user is experiencing faster than normal battery drain after connecting to a public Wi-Fi hotspot a few days ago.Which of the following could be a reason for the fast battery drain? a. The mobile device is infected with malware. b. The user has exceeded the limit on his data plan. c. The mobile device's Wi-Fi antenna is not functioning. d. The mobile device is connecting to multiple Bluetooth devices.

a. The mobile device is infected with malware.

End-user acceptance to change often fails because the focus of the change is on the technical side rather than the people side.To gain end-user acceptance, what must be conveyed and included in the end-user section of change documentation? (Select all that apply.) a. The purpose of the change, especially the business reasons for the change b. That the leadership of the company agrees with the change c. The technical aspects of the change d. How the change will affect the users and their jobs e. That their concerns, questions, and voices will be heard f. That they will receive end-user training on the changes that impact them

a. The purpose of the change, especially the business reasons for the change b. That the leadership of the company agrees with the change d. How the change will affect the users and their jobs e. That their concerns, questions, and voices will be heard f. That they will receive end-user training on the changes that impact them

A technician is troubleshooting a Windows computer in which an application failed to uninstall properly. The technician made several changes to the registry and now Windows crashes each time the system is rebooted. The only way to access the operating system is via the Windows Recovery Environment command prompt.What critical step did the technician forget to perform before editing the registry? a. The technician should have backed up the registry. b. The technician did not launch the registry editor using Run as administrator. c. The technician should have rebooted before making changes to the registry. d. The technician did not configure MSConfig.exe.

a. The technician should have backed up the registry.

A Windows 8.1 user is unable to connect to a Windows 10 system using Remote Desktop. Each user can ping the other computer, and the proper TCP ports are allowed on the firewalls between computers. The Windows 10 user verified that the remote settings are properly configured and that remote connections are allowed.Which of the following is the most likely reason the RDC connection is unsuccessful? a. The user account being used to connect to the Windows 10 computer does not have a password assigned. b. A computer running Windows 8.1 cannot use RDC to connect to a computer running Windows 10. c. The Windows 10 computer does not have valid IP address configuration. d. The Windows 8.1 computer is not properly configured for remote connections.

a. The user account being used to connect to the Windows 10 computer does not have a password assigned.

You have received a phone call from a user who is experiencing very sluggish performance on a Windows 10 computer. During the phone call, you determine an application is hung and the keyboard is not responding to keypress events. The user states the mouse is functioning and the computer is recognizing mouse clicks.How will you instruct the user to open Task Manager to terminate the hung application? a. The user will need to use the mouse to right-click the Taskbar and then left-click the Task Manager entry on the context menu. b. The user will need to press the Ctrl+Alt+Delete keys and then use the mouse to left-click the Task Manager entry on the security screen. c. The user should press the Ctrl+Shift+Esc keys, and the Task Manager will be displayed. d. The user will need to press the Win+X keys and type taskmgr.exe in the search box.

a. The user will need to use the mouse to right-click the Taskbar and then left-click the Task Manager entry on the context menu.

A technician is following instructions to resolve an issue on a Windows workstation that requires an elevated command prompt.Which of the following methods can be used to open an elevated command prompt? a. Type cmd in the search box, right-click Command Prompt, and click Run as administrator. b. Right-click the desktop and click Command Prompt (Admin). c. Open Computer Management and click Command Prompt. d. Type cmd in the search box and press Enter.

a. Type cmd in the search box, right-click Command Prompt, and click Run as administrator.

Your company is asking the IT department to take steps to plan and prepare for potential disasters that could disrupt business or result in data loss.Which of the following will minimize or prevent data loss or disruptions during a loss of power to the building? a. UPS b. Surge protector c. RDP d. MSTSC

a. UPS

Which of the following devices provides the best protection to the computer and user data during electrical anomalies? a. Uninterruptable power supply b. Surge suppressor c. Power strip d. 1000 watt power supply unit

a. Uninterruptable power supply

If your laptop's OEM recovery partition becomes corrupt, what can you do to restore it back to factory defaults? (Select all that apply.) a. Use the Windows recovery drive on a flash drive you created. b. Do a clean installation of Windows. c. Download recovery media from the manufacturer's website. d. Do an in-place upgrade.

a. Use the Windows recovery drive on a flash drive you created. c. Download recovery media from the manufacturer's website.

A technician has been dispatched to resolve an issue with a Windows 10 computer experiencing application crashes.What is the first step the technician should take? a. Verify critical user data has been backed up. b. Uninstall software the user no longer needs. c. Disable unused services. d. Disable unwanted scheduled tasks.

a. Verify critical user data has been backed up.

You are troubleshooting a mobile device with no sound output from the headset or external speakers.Which of the following steps should you take first? a. Verify the physical volume control is turned up. b. Reset the device to factory defaults. c. Perform a manual OS update. d. Close any unused apps.

a. Verify the physical volume control is turned up.

What is an indication that someone is hijacking your email? (Select all that apply.) a. Your computer is sending email out that you have not written. b. Your computer is no longer sending or receiving email. c. You receive automatic replies to emails that you did not send. d. You have email messages in the spam folder. e. Someone has contacted you about email from your account that you did not send.

a. Your computer is sending email out that you have not written. c. You receive automatic replies to emails that you did not send. e. Someone has contacted you about email from your account that you did not send.

Which of the following is a Linux terminal command that will show the most comprehensive information about the shutdown command? a. man shutdown b. help shutdown c. shutdown --help d. shutdown /?

a. man shutdown

A technician is attempting to initiate a Windows Remote Desktop Connection to repair a remote system. When the technician tries to access the Remote Desktop utility on the local computer, the graphical user interface consistently freezes.Which of the following will allow the technician to access the Remote Desktop utility using only the command line? a. mstsc.exe b. services.msc c. msconfig.exe d. msinfo32.exe e. taskmgr.exe

a. mstsc.exe

Which of the following will assist the user? (Select TWO.) a. shutdown /? b. help shutdown c. shutdown help d. shutdown /h e. reboot /? f. help reboot

a. shutdown /? c. shutdown help

Todd is using the Control Panel to try to fix his power options so that the computer's screen will stop turning off so often. The Control Panel on Todd's computer currently looks like the following picture. What can Todd do to change this view so that he can find the Power Options icon in the Control Panel? a. Change to Category view. b. Change to Classic view. c. Click each link to open it under the main category heading. d. Click adjust your computer's settings.

b. Change to Classic view.

Windows 10 has a new feature called a digital assistant. This feature allows you to ask your computer to set up reminders, find locations, search your computer and the Internet, and many other tasks.What is the name of the Windows 10 digital assistant? a. Microsoft Sam b. Cortana c. Alexa d. Siri

b. Cortana

Which type of device should you use to destroy a magnetic hard drive by using an electromagnetic field to destroy the hard drive's data and formatting? a. Drill b. Degausser c. Disk drive shredder d. ATA Secure Erase

b. Degausser

Lance is working on a customer's computer and thinks that the wireless NIC card needs to be replaced, which he tells the customer. After Lance replaces the wireless NIC, the problem on her computer still is not resolved.What should Lance tell the customer? a. Nothing. He should keep working on the problem. b. Explain that what he thought was the problem was incorrect. c. Explain that he will need more time to find the problem. d. Explain that she must have received a bad wireless NIC and keep looking for the problem.

b. Explain that what he thought was the problem was incorrect.

Jessica has completed a change to her company's Windows computers to make them more secure on the Internet.What is the last step that Jessica should complete? a. Inform the CAB. b. Inform all the users of the change. c. Complete the request for comments survey. d. Document the change in the change management software.

b. Inform all the users of the change.

While browsing the Internet, Tina received an annoying alarm along with a message stating that she needed to contact a security company using the 800-number provided to get assistance with the security issue on her computer. Tina could not close Windows or stop the annoying alarm.What kind of PC security issue is Tina experiencing? a. Windows has detected a virus. b. She is experiencing an online security alert scam. c. A rogue antivirus is running on her computer. d. Someone has hijacked her computer.

b. She is experiencing an online security alert scam.

Your company wants you to purchase a copy of bookkeeping software for every computer in the company.What type of license should you purchase? a. Personal license b. Site license c. Private license d. Commercial license

b. Site license

Kyle has discovered that his computer has software that has been collecting his personal information and sending it to a file on another computer, including his banking and credit card information.What type of malware attack is Kyle experiencing? a. Rootkit b. Spyware c. Ransomware d. Zombie

b. Spyware

When a standard user attempts to install software on her computer, what prevents her from installing software that might change the Windows registry? a. UCA. b. UAC. c. She can do this only from the Windows Store. d. Nothing prevents a standard user from installing software.

b. UAC.

What protocol or feature uses incoming TCP port 5900 for communication? a. macOS Screen Sharing b. Windows Remote Desktop Protocol c. Telnet protocol d. SSH protocol

b. Windows Remote Desktop Protocol

Taylor has been working with a client at his company who downloaded a program onto his company laptop that he was not authorized to install.What can Taylor show the client to help him understand the company policy on what he can and cannot do with a company laptop? a. Knowledge database b. Regulatory policy c. Acceptable use policy d. Compliance policy

c. Acceptable use policy

Lance has a computer that currently uses Windows 8.1 and wants to install the latest version of Windows 10 on the computer. He wants to keep the Windows 8.1 OS available for testing applications that he is developing for both operating systems.Which installation type do you recommend? a. Custom installation b. In-place upgrade c. Dual-boot installation d. Virtual installation

c. Dual-boot installation

During a phone conversation you are having with a client, he explains the problem with his computer, and you immediately know how to repair the problem.Which of the following should you not do in this case? a. Actively listen to the client while he tells you about the problem. b. Maintain a positive attitude while asking and answering questions. c. Interrupt the customer and tell him you know how to fix the problem. d. Offer different repair options if possible.

c. Interrupt the customer and tell him you know how to fix the problem.

Ray worked all morning trying to fix Lisa's broken computer. Ray discovered a problem with the RAM and replaced a bad module. He put the computer back together and tested the new RAM. He rebooted the computer into UEFI, and all the modules were read properly. Ray documented the problem and the solution in his tracking software and now is ready to head back to his work area.Who decides whether the work is completed and that Ray can return to his work area? a. Ray b. Ray's supervisor c. Lisa d. Lisa's supervisor

c. Lisa

Jerry is the company's new IT supervisor. The company recently started allowing employees to use their smartphone and tablets to connect to network resources over a secure connection.What is a possible vulnerability when allowing BYOD on the network? a. DDoS b. Shoulder surfing c. Non-compliant systems d. Spoofing

c. Non-compliant systems

For added security, everything users attempt to do or do once they are authenticated to the network can be tracked or logged for future auditing via three security measures. These three security measures are generally known in networking as AAA (authenticating, authorizing, and accounting) or triple A.What are the popular solutions used to provide AAA services for large networks? (Select TWO.) a. WEP b. WPA2 c. RADIUS d. WPA2-PSK e. TACACS+ f. AES

c. RADIUS e. TACACS+

Your company has a computer kiosk that shows customers where offices of individuals are located in your building.What can you do to prevent someone from connecting a USB device to this computer? a. Disable all USB ports. b. Require a biometric lock. c. Use USB locks. d. Prevent anyone from having physical contact with the computer.

c. Use USB locks

Luke is setting up a wireless network at home and is adding several devices to the network. During the setup of his printer, which uses 802.11g standard, he finds that he can't connect to the network. While troubleshooting the problem, he discovers that his printer is not compatible with the current wireless security protocol because it is an older version of hardware.What wireless network security protocol will allow Luke to use the printer on his wireless network? a. WPA b. WEP c. WPA2 d. WPA-PSK+WPA2-PSK

c. WPA2

You need a tool that allows you to run Windows Defender before Windows loads.What tool should you use? a. Windows Defender does not have a tool to run before Windows loads. b. You can use Windows RE to load Windows Defender before Windows loads. c. Windows Defender Offline allows you to run Windows Defender before Windows loads. d. You can run Windows Defender in Safe Mode, which will run a scan before Windows loads.

c. Windows Defender Offline allows you to run Windows Defender before Windows loads.

Luis is having a problem with his computer booting to Windows. He has received the following error message. Error loading operating system BOOTMGR is missing Press Ctrl+Alt+Del to restart Luis checked his setup BIOS and saw that the hard drive was connected. Luis has decided to boot to the Windows RE Command Prompt.What command should Luis use to repair the master boot record? a. bootrec /rebuildBCD b. bootrec /fixboot c. bootrec /fixmbr d. bcdedit /enum

c. bootrec /fixmbr

All computers in your company are required to have the same website as the home page. The page is supposed to be the company's intranet site. Today your supervisor's computer is opening to a different site.What type of attack might have occurred on your supervisor's computer? a. A network worm is overloading the network. b. A new web browser was installed. c. A new browser add-on was installed. d. A redirect virus has infected his computer.

d. A redirect virus has infected his computer.

Stephen's supervisor wants to create a system repair disc for Windows 7.Where should Steven navigate to in the Control Panel to create a system repair disc in Windows 7? a. Administrative Tools b. System Information c. Recovery d. Backup and Restore

d. Backup and Restore

Regina believes that her system might have a virus because it seems to crash all the time. She wants to see what is causing her system to crash.Where can Regina find information about the system crash in Windows? a. System Information b. System Configuration c. Security settings d. Event Viewer

d. Event Viewer

Your CIO would like a way to locate desktops if they are stolen. He does not want to purchase software but would like to be able to identify a computer that belongs to the company. Currently the computers are marked with asset tags.What is a more permanent way to label computers? a. LoJack b. Hardware token c. Port locks d. Theft prevention plate

d. Theft prevention plate

Bryson has noticed that when he is using the Internet, he receives ads that randomly appear in a Google Chrome browser window. When he tries to close the ad, another ad will randomly pop up.What can Bryson do to keep these random ads from occurring? a. Run an antivirus scan. b. Remove the computer from the Internet. c. Install a pop-up ad blocker. d. Use another Internet browser.

d. Use another Internet browser

You are experiencing unexpected pop-up windows, slow performance, suspicious hard drive activity, and missing files on your computer.What might be issue with your computer? a. Hard drive is going bad. b. Windows is corrupt. c. UEFI/BIOS is corrupt. d. Your computer has been infected by a virus.

d. Your computer has been infected by a virus.

You need to stop a running task so that you can delete a file.Which command in the Command Prompt allows you to stop a running process? a. takeown b. attrib c. icacls d. tasklist e. taskkill

e. taskkill

Your company has a policy that when users leave their desks, they are required to lock their computers.What does locking their computers prevent? a. Phishing b. Impersonation c. Shoulder surfing d. Tailgating

d. Tailgating


Conjuntos de estudio relacionados

Приветствие/Прощание - Greeting and farewell phrases

View Set

US History Industrial Revolution Test

View Set

Clinical Nutrition CH 18 Osteoporosis

View Set

NDE Certification Practice Questions (CyberQ)

View Set

Chapter 6: Interpersonal Communication

View Set