COMPTIA PT 2 (220-1102) Quiz 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the minimum amount of storage space required to install Windows 11 (x64) on a device?

64GB

OBJ-1.6: Private IP addresses are any addresses in a specified range that are not allowed to be routed over the Internet. This allows companies to use these private IP addresses in their local area networks without having to purchase them from an internet registry. The class A private IP address range contains the addresses from 10.0.0.0 to 10.255.255.255.255. The class B private IP address range contains the addresses from 172.16.0.0 to 172.31.255.255. The class C private IP address range contains the addresses from 192.168.0.0 to 192.168.255.255. The APIPA/link-local autoconfiguration range is from 169.254.0.0 to 169.254.255.255.

SAE

Sarah is installing Windows 10 (64-bit) in a virtual machine. The installation is continually failing and producing an error. She has configured the virtual machine with a dual-core 950 MHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

The processor is insufficient

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?

VNC

OBJ-4.4: Before working on a computer or server, you should always remove your jewelry. Jewelry such as bracelets and necklaces can often dangle and come into contact with sensitive components or electrical connections that can cause damage to the components or injure you. Therefore, all jewelry should be removed before working on an electrical system or computer to reduce the risk of shock. A grounding probe is not required to discharge the power supply since the technician should never be opening up the case of a power supply. The old power supply should be safely disposed of after it is removed, but it should not be removed until you have removed your jewelry. Proper cable management is important when installing a power supply, but again this should only occur after removing your jewelry.

-Face ID -Touch ID

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz single-core processor

OBJ-1.9: An unattended installation is a traditional method of deploying a Windows operating system in a large enterprise environment. Unattended installations use an answer file that contains user input to various GUI dialog boxes that would otherwise appear during the installation process. Unattended installation is the most practical way to install Windows when the client computers have different hardware components, and an image file cannot be used. Unattended installations save deployment time and can be used either for clean installs or in-place upgrades. A clean install is a means of installing the operating system to a new computer or completely replacing the operating system on an old computer. All existing user data or settings will be deleted during the setup process when a clean installation is conducted. An in-place upgrade is a means of installing an operating system on top of an existing version of the operating system. Applications, user settings, and data files are retained when conducting an in-place upgrade. A repair is used to check and replace any modified system files within the operating system.

10.5.34.15

Which file system type is used by default when installing macOS on a modern workstation?

APFS

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active

Which of the following physical security controls would be the most effective in preventing an attacker from driving a vehicle through the glass doors at the front of the organization's headquarters?

Bollards

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT ?

Clear the browser's cookies and history, enable the pop-up blocker, and scan the system for malware

OBJ-2.7: The FaceID and TouchID screen locks rely upon biometric data to securely unlock the device. Face ID is a facial recognition system designed and developed by Apple. Touch ID is an electronic fingerprint recognition feature designed and released by Apple. Since biometrics are body measurements and calculations related to human characteristics, the use of a person's face or fingerprint is classified as a biometric authentication system. A swipe lock is a term for unlocking a device by tracing a predetermined on-screen pattern or joining dots on the screen. This was commonly used in Android devices until biometric methods like fingerprint scanners and facial recognition became more prevalent. A passcode unlock is a term for unlocking a device by entering a 4 to 6 digit pin.

Devices and Printers

An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?

Dictionary

Which of the following types of backups only copies data modified since the last full backup?

Differential

Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it?

ESD strap

Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 laptops. When connected to a public network, the firewall has been configured to allow only inbound connections that match an existing rule and to only allow outbound connections that do match an existing rule to achieve the highest level of security. What type of security posture has Dion Training implemented?

Explicit allow for inbound, explicit allow for outbound

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring? Install an anti-virus or anti-malware solution that uses heuristic analysis (Correct) Install a host-based intrusion detection system on all of the corporate workstations Install a Unified Threat Management system on the network to monitor for suspicious traffic Monitor all workstations for failed login attempts and forward them to a centralized SYSLOG server (Incorrect)

Install an anti-virus or anti-malware solution that uses heuristic analysis

Which of the following data types would be used to store the number 21?

Integers

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. Which of the following actions should you perform FIRST?

Investigate malware symptoms

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

Loop

An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?

Mark each email as spam or junk

You are troubleshooting a computer that is operating slowly. Which of the following tools should you use to troubleshoot this workstation? Task scheduler DxDiag Device manager (Incorrect) Performance monitor (Correct)

Performance monitor

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

Proximity cards

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

SOP

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet?

SSH

Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?

Sleep

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

Update the anti- malware software Disable system restore in windows Disconnect the laptop from the network

Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take?

Verify that disabling one service has not affected the others

Dion Training wants to implement a new wireless network in their offices. Which of the following types would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate?

WPA3

Which of the following types of encryption is considered the most secure to utilize in a SOHO network?

WPA3

A user with an older laptop running Windows 7 that has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows 7 is now considered end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer?

Windows 10

Jason is building an inexpensive workstation for one of the employees at Dion Training. The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation?

Windows 10 enterprise, Windows 10 pro

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk? bootrec /fixboot (Correct) bootrec /fixmbr (Incorrect) bootrec /rebuildbcd diskpart list

bootrec /fixboot

OBJ-1.2: The robocopy tool is used to mirror or synchronize directories and their contents. Robocopy will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files. The xcopy tool, on the other hand, copies all of the files from one directory to another. To meet your boss's requirements to synchronize the two hard drive's contents, you must use robocopy since it will also remove files from the second drive that were removed from the first drive, too. The copy command is used to copy one or more files from one location to another. The copy command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories. The cp command is used in Linux to copy one or more files and directories from one location to another.

by matching a MAC address to an IP address within the DHCP scope

Samuel's computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense? Terminate processes in the Task Manager Perform a Disk Cleanup Defragment the hard drive (Correct) Remove unnecessary applications from startup (Correct) Replace the hard drive with an SSD (Incorrect) Install additional RAM (Incorrect)

defragment the disk remove unnecessary applications from the startup

OBJ-2.2: Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method used in WPA3 that replaced the 4-way handshake used in WPA-based wireless networks. The SAE handshake is also known as the dragonfly handshake. Enhanced Open enables encryption for traffic being sent and received over a wireless network when still using open authentication. AES Galois Counter Mode Protocol (GCMP) is a high-performance mode of operation for symmetric encryption that supports authenticated encryption with associated data (AEAD). Management protection frames protect unicast and multicast management action frames to protect against eavesdropping and forgery in WPA3-based wireless networks.

exFAT

OBJ-1.4: Sleep or standby mode is used to save the current session to memory and put the computer into a minimal power state to save battery life when the system is not being used. The computer takes less time to start up again from the sleep or standby mode than it does from the hibernate mode. Hibernate mode is used to save the current session to disk before powering off the computer to save battery life when the system is not being used. The computer takes longer to start up again from hibernate mode than it does from the sleep or standby mode. Shutdown mode completely powers off the computer and does not save the current user session to disk. Instead, the shutdown will close all open files and log out the user during the shutdown process. A lock will secure the desktop with a password while leaving programs running.

firmware updates

Which command-line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system? dism /force gpresult /force sfc /force (Incorrect) gpupdate /force (Correct)

gpupdate /force

OBJ-1.8: The only file system format that would work for this situation is exFAT. A macOS system can format a hard drive as APFS, HFS+, HFS, exFAT, or FAT32. The Windows system would only be able to read exFAT or FAT32. Unfortunately, FAT32 only supports drive sizes up to 32 GB, and file sizes up to 4 GB. Therefore, exFAT should be used as it supports sizes up to 128 petabytes.

loop

OBJ-3.2: If an automated system update fails to install, you should research the error number for the failed update to determine if the issue is a known error. Based on the error code, you can then determine the best method to overcome the issue. For example, a common cause of errors is inadequate space on the hard disk. If a technician needs to determine how to solve this issue best, researching the error code at Microsoft.com can help.

primary

OBJ-4.8: A loop deviates from the initial program path to some sort of logic condition. In a loop, the computer repeats the task until a condition is met. Often implemented with For, For Next, While, or Do While statements. For example, a short script like (For i=1 to 100, print I, next) would print the numbers from 1 to 100 to the screen. A branch is used to control the flow within a computer program or script, usually based on some logic condition. Often, these are implemented with IF THEN ELSE statements. A variable is a placeholder in a script containing a number, character, or string of characters. Variables in scripts do not have to be declared (unlike in programming languages) but can be assigned a value. Then, the variable name is referenced throughout the script instead of the value itself. A constant is a specific identifier that contains a value that cannot be changed within the program. For example, the value to convert a number from F to C is always 5/9 because the formula is C = (F -32) * 5/9.

ps1

OBJ-4.8: Windows PowerShell enables you to perform management and administrative tasks in Windows 7 and later. It is fully integrated with the operating system and supports both remote execution and scripting. Microsoft provides the Windows PowerShell Integrated Scripting Environment (ISE) to help create and manage your Windows PowerShell scripts. If you want to save a series of PowerShell commands in a file to rerun them later, you effectively create a PowerShell script by creating a text file with a .ps1 extension. The file can contain a series of PowerShell commands, with each command appearing on a separate line. Python is a general-purpose programming language that can develop many different kinds of applications. It is designed to be easy to read, and the programs use fewer lines of code compared to other programming languages. The code runs in an interpreter. Python is preinstalled on many Linux distributions and can be installed on Windows. Python scripts are saved using the .py extension. Batch scripts run on the Windows operating system and, in their simplest form, contain a list of several commands that are executed in a sequence. A .bat file is used for a batch script. You can run the file by calling its name from the command line or double-clicking the file in File Explorer. Generally, batch file scripts run from end to end and are limited in branching and user input. A shell script is a file that contains a list of commands to be read and executed by the shell in Linux and macOS. A .sh file is used for a shell script and its first line always begins with #!/bin/bash that designates the interpreter. This line instructs the operating system to execute the script. Shell scripts allow you to perform various functions. These functions include automation of commands and tasks of system administration and troubleshooting, creating simple applications, and manipulating text or files.

remove any jewerly you are wearing

The video editor at Dion Training is having issues with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system files with a new copy of the same version. The technician has been told to ensure the user's data and applications are not modified or deleted during the upgrade or installation. Which types of upgrades or installations should the technician use?

repair installation

You recently built a new gaming PC for a customer. The system has an octa-core 64-bit processor, 32 GB of DDR4 RAM, 1 TB SSD, a PCI x16 video card with 8 GB of RAM, and Windows 10 Pro (x86) installed. When you turn on the system, you notice that Windows only recognizes 3.5 GB of RAM. Which component should be upgraded to correct this issue?

replace the OS with Windows 10 Pro (x64) edition

OBJ-1.8: The Windows Update program can download critical fixes, security patches, and driver updates. The Windows Update program cannot download and install firmware updates because the firmware must be updated before the Windows operating system begins running during the boot process.

research the error number for the failed update and determine if there is a known issue with this update

OBJ-1.4: The Devices and Printers section of the Control Panel allows a technician to manage the printers, scanners, and other external devices connected to a Windows computer. The System section of the Control Panel allows a technician to see information about the workstation, including the processor type, amount of memory, and operating system version installed on the computer. The Device Manager is used to view and control the hardware attached to the computer. The device manager will highlight a piece of hardware that is not working so that a technician can repair or replace it. The Programs and Features section of the Control Panel allows a technician to install or remove applications, software packages, and features in the Windows operating system.

robocopy

What umask should be set for a directory to have 700 as its octal permissions?

rwx------

OBJ-1.9: Primary partitions are limited to only four primary partitions on a system using MBR. To overcome this limitation, extended partitions can be used. An extended partition is a partition that can be divided into additional logical drives. Unlike a primary partition, you don't need to assign it a drive letter and install a file system. When using MBR, you can support up to 23 logical drives in an extended partition. The swap partition on a Linux system is a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it. It can only be used by the memory manager and not for the storage of ordinary data files.

unattended


Conjuntos de estudio relacionados

HEA 113 Ch. 6 Self-Test Musculo/Skeletal System

View Set

evolve Quiz: Pregnancy, Labor, Childbirth, Postpartum - Uncomplicated

View Set

Skin, Hair, and Nails Review Questions

View Set

Enthalpy, Entropy, and Free Energy

View Set

ATI TEAS 7 - English and language NEW

View Set

NUR251 EXAM PREP formative quiz module 3: Haemodynamics Part B

View Set

Chapter 2: Culture: Giving Meaning to Human Lives

View Set

Hydration: Heat Stroke, Heat Cramps, and Heat Exhaustion

View Set