comptia a+ exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

You are configuring MDM policies regarding failed login attempts on smartphones. Which setting value disables device wipe upon incorrect password attempts?

0

Which Windows command line tool manages EFS?

cipher

Which Linux command switches to the root account?

su

Which points would be classified under maintaining "clear" communication?

Avoiding jargon Understanding the audience

What is the difference between a wireless router and a wireless access point?

Wireless routers can send WLAN traffic to other remote networks

How might you resolve a frozen/locked out system?

Check third-party apps Run a factory reset Restart the device

Which web browser provides the most privacy online?

Tor Browser

Where can a false virus warning come from?

Weblink Email SMS message

Which port do ICMP echo requests use?

none

To which component of a power supply should you connect the alligator clip of an electrostatic discharge wrist strap?

The outer casing

Which Windows feature can prevent apps from making changes without your consent?

UAC

What can an attacker potentially gain from hacking a mobile android device?

Unauthorized access to the camera Unauthorized location tracking Unauthorized access to data

You need to ensure that data on decommissioned hard disk drives cannot be recovered before the drives are sent to a shredding facility. Which option is the best choice?

Use degaussing to eliminate magnetic fields

Which tools can be used to identify running processes?

Windows Task Manager Process Explorer

EFS

Encrypting File System provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS. EFS is a functionality of New Technology File System (NTFS) and is built into a device via the OS.

Which type of license or licensing component allows for a software application to be installed by many users within an organization?

Enterprise

An asset management system would most likely be used to track and manage which types of assets?

Hardware Software Data

Active listening involves the implementation of which behaviors or characteristics?

Taking notes Repeating or clarifying Listening to understand

Which is the default TCP port number for HTTPS?

443

Which types of operations are likely to be performed in a logon script?

installing or connecting to printers Mapping network drives

Which options do you have to deal with infected files?

Disinfect them Quarantine them Remove them

By which method are commands submitted to a remote target system when using Secure Shell (SSH)?

Command console Selected Correct answer.

If a data breach occurs on a system owned by a user you recently assisted, which activity or behavior can help you ensure that you aren't implicated?

Explicitly looking away when the user enters their password

Which data regulation expands the definition of personally identifiable information to include data such as the IP address of a device?

GDPR

Which Windows tool in an Active Directory domain can apply a single AutoPlay configuration to all domain-joined computers?

group policy

Which factors would generally be considered the primary reasons for replacing a power supply as opposed to servicing it?

internal components of a power supply can retain a charge even when disconnected It will likely cost less to replace

Which network diagnostics tools should you know how to use to troubleshoot network issues?

ipconfig nslookup ping

You are managing the properties of an Active Directory user account using the Active Directory Users and computers tool. You need to set login time restrictions. Which tab should you click?

Account

Backing up information such as the Active Directory in a Windows environment, or the specific users on a mobile device, is considered to be part of which process of a disaster prevention and recovery plan?

Account recovery

When dealing with a customer as an IT support technician, in which situations or circumstances would it be acceptable for you to ask them to avoid distraction?

If they have a noisy pet If there is a loud television or a radio playing

A material safety data sheet contains which type of information with respect to technological components?

Proper handling and disposal instructions

PKI certificate

Public key infrastructure (PKI) governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications.

Which component of a business process document describes a manner to discard recent changes that have been implemented in the business, or to the processes themselves?

Defining a roll-back plan

In which situations would eye and face safety be of primary concern?

Working with batteries or toner cartridges

Port triggering

Port triggering is a configuration option on a NAT-enabled router that controls communication between internal and external host machines in an IP network. It is similar to port forwarding in that it enables incoming traffic to be forwarded to a specific internal host machine, although the forwarded port is not open permanently and the target internal host machine is chosen dynamically.

Which type of backup always uses the most recent full back up as a reference to determine which files should be backed up?

Differential

Which types of scripting applications or file types are more likely to be used in a Unix or Linux environment?

Shell Python

GDPR

The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing of personal information

Which component of a change management plan defines how wide-spread changes might be?

Scope

You have configured Active Directory Group Policy password settings. Which command refreshes Group Policy immediately on a host?

gpupdate

Which common troubleshooting steps help deal with battery issues?

Disable background app refresh Upgrading the operating system Adjusting the screen brightness

MDM

Master data management (MDM) is a technology-enabled discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, semantic consistency and accountability of the enterprise's official shared master data assets.

Which common troubleshooting items may show up on a Computer System Checklist?

Check physical connections Restart the device Check event viewer/logs

NTFS

New Technology File System

What access to a device does someone with root access have?

Complete access to everything

Which term describes running multiple passes of random data writing to wipe storage media?

Hard wipe

Which common troubleshooting step will solve a good portion of issues you run into?

Reboot

With asymmetric encryption, which key is used to decrypt a message?

Private

Most remote management platforms require which component to be installed or configured on client systems to facilitate communications?

Agent

TPM

(Trusted Platform Module) is used to improve the security of your PC. It's used by services like BitLocker drive encryption, Windows Hello, and others, to securely create and store cryptographic keys, and to confirm that the operating system and firmware on your device are what they're supposed to be, and haven't been tampered with.

What is an expected value for the voltage rating of a surge suppressor?

330 volts

Which type of client application or service is required on a device to establish a VPN connection using SSL?

A browser

Port forwarding

Also called "port mapping," port forwarding is directing traffic from the outside world to the appropriate server inside a local TCP/IP network. Internet services are identified by a standard port number; for example, Web traffic uses port number 80. If the local network hosts a Web server that is accessible on the public Internet, the port forwarding panel in the router would be configured to direct Web/HTTP packets (port 80 traffic) to the IP address of the Web server in the local network (LAN).

Which component of knowledge base best practice allows users to skip directly to desired content or information?

Anchor links

When dealing with a difficult customer, which types of behavior are most likely to exacerbate the situation?

Being dismissive Being judgmental

A compliance or a government regulation would most likely not address which aspect of an organization's day-to-day operations?

Best practices

What are some of the common network traffic types?

Business critical traffic Unnecessary traffic Everyday traffic

Which level of dress is typically considered to be the most conservative in a business environment?

Business professional

Which mobile device provisioning strategy consists of devices being provided by the organization?

COPE

COPE

COPE (corporate-owned personally enabled) is a business model in which an organization provides its employees with mobile computing devicesand allows the employees to use them as if they were personally owned notebook computers, tablets or smartphones.

Which certificate errors may indicate that you have malware on your machine?

Certificate assigned from an untrusted root certificate authority Certificate has been revoked

Which steps or processes would most likely be involved with on-boarding a user?

Creating an account Assigning a mobile device Assigning a phone

Which component of an incident response process ensures that incriminating data is not modified or deleted?

Data and device preservation

In which situation or scenario would you be most likely to use the Microsoft Remote Assistance (MSRA) tool?

Helping a user to resolve a problem

Which type of standard operating procedure documentation might implement sub-steps, or require step 1 to be fully completed before moving to step 2?

Hierarchical

Which type of language components should generally be avoided when dealing with customers/users who require support?

Jargon Acronyms Slang

Which security strategy can minimize the harm caused by a compromised IoT device?

Isolate IoT devices on their own VLAN

What is the purpose of a web browser extension?

It provides additional functionality to a web browser

Which applications or services operate over the Remote Desktop Protocol (RDP)?

Microsoft Remote Assistance (MSRA) Remote Desktop Connection

What would be considered best practice for users to consider when replying to emails?

Never include financial or personal information Do not provide passwords in plaintext

Which is most commonly used to secure a password manager vault?

PKI certificate

Which term defines sending a malicious email message to a user in an attempt to trick them into divulging sensitive information or clicking a link?

Phishing

Which are some typical symptoms that a computer may show when infected with spyware?

Pop-up windows begin to appear The browser homepage has changed The local firewall has been disabled

How is port triggering different from port forwarding?

Port forwarding leaves a TCP or UDP port open all the time

Which implementation can help to reduce the amount of dust that might accumulate in a given area?

Positive pressure

Which cloud computing characteristic best relates to autoscaling?

Rapid provisioning

What is the primary benefit of off-site backup storage?

Recovery from any location

Which component of determining how frequently backups should be performed defines the amount of acceptable downtime?

Recovery time objective

Which type of documentation refers to a set of rules that govern the way your company does business?

Regulatory and compliance policy

How can enterprise settings and data be destroyed over a network by IT admins for a stolen smart phone?

Remote wiping

Which other media would you want to enable automatic scanning of?

Removeable media Email attachments

Which common issues can cause a service to fail to start?

Service dependency problems Resource conflicts Logon errors

Which malware characteristics would you want to look for when conducting malware research?

Services attacked Vulnerabilities exploited Malware category

Which common troubleshooting steps can be taken to fix device connectivity issues?

Switch from Wi-Fi to mobile Restart the device

Which type key is normally used to encrypt storage on a smartphone?

Symmetric

Which issues could potentially cause casting to a monitor to fail?

The monitor is on a different wireless network The wireless connection is poor The external display settings are incorrect

How do NTFS permissions differ from share permissions?

They are enforced locally

Which statements about using electrostatic discharge mats are correct?

They should be used in conjunction with wrist straps They should each be grounded when using multiple mats They are often infused with carbon as the conductor

Why do you want to create a system restore point once the malware has been remediated?

This gives a technician the first known good configuration as a point to restore to in case of any problems with future updates or application installations

Why do you want to disable system restore on malware removal?

To prevent a future technician from restoring the virus back onto the machine

How does disabling SSID broadcast enhance Wi-Fi security?

The WLAN name is not visible to user devices

Which statement correctly describes the 3-2-1 backup rule?

3 data copies, 2 media types, 1 off-site copy

What does it mean to have a security mindset?

Ability to identify potential or actual compromise

What can members of the ADMINISTRATORS group do that members of the POWER USERS group cannot?

Change display settings

Which issues could potentially cause your mobile device to randomly reboot?

Corrupted or poorly designed software is installed The battery connector has become loose The device is overheating

Which potential power threats or situations can be overcome by grounding?

Direct lightning strikes Electrostatic discharge

What are signs that a malicious application has been installed on your mobile device?

High CPU usage Rapid power drain High network bandwidth usage

Symmetric key

In cryptography, a symmetric key is one that is used both to encrypt and decrypt information. This means that to decrypt information, one must have the same key that was used to encrypt it. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.

Which name is given to private browsing mode in the Google Chrome web browser?

Incognito

What are some potential causes of a No OS Found error on boot?

Incorrect boot device order Non-system disk in the floppy drive Corrupted or missing boot sector

You manage a fleet of Android and iOS smartphones. Updates must be applied for the mobile OS and apps. Which tool allows the central management of smartphones?

MDM

If providing a permanent solution to a customer involves several visits from varying personnel, which method or approach will most likely help to ensure that you meet their expectations and provide a positive customer experience?

Maintaining a thorough paper trail

A dissipative antistatic bag functions primarily by which method?

Moisture attraction

Which type of condition or scenario is most likely to result if a script overcommits system resources on a target system?

System crash

Which third-party utility offers free client and server versions and operates using the Remote Frame Buffer (RFB) protocol?

Virtual Network Computing (VNC)

Which method of enhancing the security of remote connections first establishes a secure connection between endpoints before any data is transmitted?

Virtual private network (VPN)


Conjuntos de estudio relacionados

CH 5: The Secularization Thesis and its Challenges

View Set

Vocabulary Workshop Level G Unit 3 practice test

View Set

business and finance chapter 1 and 2

View Set

DSST Principles of Public Speaking (CLEP) New & Improved

View Set

Strategy - 8. Design, Structure & Evaluation and Leadership & Change

View Set

CIS 2530 Midterm Study Guide ch 8

View Set

日本語総まとめN2 漢字 4週③

View Set