A+ 1102

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use? .deb .exe .vbs .app

.app

Which of the following is the MOST important environmental concern inside a data center? toner disposal battery disposal electrostatic discharge mats humidity levels

humidity levels

A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands would help the technician gain information about the network settings on the machine? sudo ifconfig or ip -a grep chmod

ifconfig or ip -a

Which of the following is not done/created before the change board approves a change? Risk Analysis Rollback plan Kickoff Meeting Sandbox Testing

Kickoff Meeting

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions? Set & Meet deadlines Adhere to users privacy policy Deal appropriately with customers confidential material Avoid distractions

Avoid distractions

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference? Disabling the SSID broadcast Changing channels Changing the AP name Modifying the wireless security

Changing channels

A user calls the help desk because they are not able to access the Internet. After asking a few questions, you discover that if they type in IP address in the browser, then the website pops up. Other users on the same switch aren't having this problem. Where will you start looking for the problem? DNS Settings File server Web Server DHCP Settings

DNS Settings If you can reach a website using an IP address, then the problem has something to do with DNS settings. The default DNS server can be configured using DHCP settings, but since the other users aren't having this problem, it's not a setting on the DHCP server. That means it must be configured on the local computer. The user is able to reach the file server, and if they're accessing a remote website the problem wouldn't be your company's web server.

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST? Full Differential Incremental Non-Parity

Full

You are on-site fixing a client's laptop that will not load the OS. You are waiting to hear about your friend's awesome party that they are hosting this weekend, and your phone starts to vibrate. And it keeps vibrating. You're sure that all your friends are texting information about the party. What should you do? (Choose two.) Text your friends back and tell them that you are working. Turn your phone off and apologize to the client. Tell them that the phone was distracting you from your job, but it won't be a problem now. Call your friend and tell them to wait until after this job before planning all the details because you want to help. Ignore your phone.

Ignore your phone. Turn your phone off and apologize to the client. Tell them that the phone was distracting you from your job, but it won't be a problem now.

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? Internet Options - Content Internet Options - Privacy Internet Options - Advanced Internet Options - Connections

Internet Options - Connections

A user has a computer that suddenly started running very sluggishly. Upon inquiry, you find that they wen to some websites yesterday that they don't normally visit, so you decide to follow the best practice procedures for malware removal. What is the first step? Disable System Restore in Windows. Investigate and verify malware symptoms. Quarantine infected systems. Schedule scans and run updates.

Investigate and verify malware symptoms. The seven steps of the malware removal process are as follows: Investigate and verify malware symptoms. Quarantine infected systems. Disable System Restore in Windows. Remediate infected systems. Update anti-malware software. Scanning and removal techniques (e.g., safe mode, preinstallation environment). Schedule scans and run updates. Enable System Restore and create a restore point in Windows. Educate the end user.

You have downloaded some open source license software. What are you usually allowed to do with it? (Choose two.) Modify the program to suit your needs. Make copies but credit the original source, and redistribute it under the same license you received it under. Resell the software to other people for a profit. Run only one copy on one machine.

Modify the program to suit your needs. Make copies but credit the original source, and redistribute it under the same license you received it under. The exact terms of what you can and cannot do with the software will be spelled out in the license, but it is common that you can use, modify, and share the source code, but not sell it for a profit, and you usually need to credit the original author of the software.

A user has a 32-bit application that they want to use on a 64-bit operating system and they have asked you if that will work. What do you tell them? 32-bit and 64-bit are interchangeable. A 64-bit application will run on a 32-bit operating system, but a 32-bit application will not run on a 64-bit operating system. No, the application must be 64-bit to run on a 64-bit operating system. Yes, a 32-bit application will work on a 64-bit operating system.

Yes, a 32-bit application will work on a 64-bit operating system. A 64-bit operating system will support both 32-bit and 64-bit applications. A 32-bit application will work on a 64-bit operating system, but it won't take advantage of the 64-bit speed. It will essentially run half as fast as a 64-bit application would. 32-bit operating systems only support 32-bit programs; you can't run a 64-bit application on a 32-bit operating system. Luckily, there aren't many computers with 32-bit operating systems around anymore.

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need? power user account standard account administrator account guest account

power user account

A Windows workstation is not booting properly, and you believe it's a problem with system files. Which utility can scan and repair corrupt Windows system files? chkdsk diskpart sfc tracert

sfc The purpose of the System File Checker (SFC) utility is to keep the operating system alive and well. sfc.exe automatically verifies system files after a reboot to see whether they were changed to unprotected copies. If an unprotected file is found, a stored copy of the system file overwrites it. The check disk utility, chkdsk, is used to verify the integrity of the filesystem and to identify bad sectors of a hard drive. In the graphical user interface (GUI) it is called error checking. diskpart is the Windows command-line utility that allows you to perform disk partition operations. The tracert utility traces the route a packet takes from one computer to another.


Kaugnay na mga set ng pag-aaral

Biology Chapter 1 The Science Of Life

View Set

Intro To Psychological Experimentation

View Set

Ch. 11 Decision Making, Communication, and Balance

View Set

BIO 142 Chapter 16: Endocrine System

View Set