CompTIA A+ Core 2 - Practice Exam Seven

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

.bat

Which of the following file types are commonly used to create simple scripts in the MacOS and Linux command-line environments?

.sh Explanation: A shell script is a file that contains a list of commands to be read and executed by the shell in Linux and macOS. A .sh file is used for a shell script and its first line always begins with #!/bin/bash that designates the interpreter.

Blocklist

A blocklist is a form of protection where only the items identified specifically on the list are blocked, whereas all others are allowed.

Rolling Release

A concept in software development where an application is frequently updated through the release of new features over time.

Developer Release

A developer release is a pre-release of a software product that is given out to software developers to test and modify their existing products to the upcoming version of an operating system or application.

An offsite tape backup storage facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the MOST likely reason for this?

A notice of a legal hold

Virus

A virus is malicious software designed to infect computer files or disks when it is activated. A virus may be programmed to carry out other malicious actions, such as deleting files or changing system settings.

Which of the following Control Panel sections contains various tools like computer management, disk cleanup, print management, and the registry editor?

Administrative Tools

Allow List

An allow list is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.

Extended Partition

An extended partition is a partition that can be divided into additional logical drives. Unlike a primary partition, you don't need to assign it a drive letter and install a file system.

You are configuring a SOHO network and only denying specific IP addresses from accessing the network while allowing any IP addresses not found on the list. Which of the following should be implemented?

Blocklist

Which of the following types of wireless connections requires a pin to be entered as part of the pairing process before it is utilized?

Bluetooth Explanation: Wireless devices with Bluetooth radios must be paired with each other before they can communicate. This involves making them discoverable and entering a PIN as part of the pairing process.

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?

Chain of custody

You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created?

Configure port forwarding

Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?

Connections

Which of the following backup rotation schemes overwrites the oldest media with the current backup being performed?

FIFO Backup

Which of the following types of backup requires the LEAST time to complete a backup?

Incremental

Jason's iPhone has not received any emails or SMS messages in the few 4 hours. Which of the following is the most cause of these issues?

Internet connectivity failure Explanation: Based on the symptoms, the most likely cause is an internet connectivity failure. Apple iPhones use internet connectivity and data to send their text messages by default.

Which version should you use when installing a Linux operating system and are concerned with end-of-life support?

LTS release

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee's laptop according to your company's procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police?

Maintain the chain of custody

What anti-malware solution is installed as a dedicated on-premise appliance to scan all incoming traffic and prevent malware from being installed on any of your clients without requiring the installation of any software on your clients?

Network-based anti-malware

Which of the following would NOT be included in a company's password policy? Password style Password age Password history Password complexity requirements

Password Style.

Which of the following password policies defines the number of previous passwords that cannot be reused when resetting a user's password?

Password history

A network technician must allow HTTP traffic from the Internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of?

Port forwarding Explanation: Port forwarding is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another.

Port Forwarding

Port forwarding occurs when a router takes requests from the Internet for a particular application, such as HTTP/port 80), and sends them to a designated host on the local area network.

Jason wants to configure his Windows 10 laptop to suspend individual USB ports when not in use. Which of the following Control Panel sections should he use to set the USB selective suspend feature?

Power Options Explanation: The Power Options section of the Control Panel allows technicians to customize how a computer manages its power to either conserve energy at the expense of performance or to maximize performance at the expense of energy savings by creating a power plan.

Primary Partition

Primary partitions are limited to only four primary partitions on a system using MBR. To overcome this limitation, extended partitions can be used.

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

RADIUS

Which partition of the hard drive is concealed from the user in the File Explorer within Windows 10 and is only used when imaging the computer back to its factory default state?

Recovery

Which of the following technologies would you use to securely access the command line interface of a network's switches and routers remotely for configuration?

SSH

Which of the following features allows a Linux server to provide file-sharing services to a company's Windows 10 workstations?

Samba

Samba

Samba is used by Linux computers to enable the sharing and access of resources with Windows-based networks. Samba can also be used by Linux servers to provide file-sharing services to Windows clients.

You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST?

Secure the area Explanation: As a forensic investigator, you should always 'secure the area' before taking any other actions.

An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?

Security Groups

You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented?

Smart card

What is the name of a program that monitors user activity and sends that information to someone else?

Spyware

Administrative Tools

The Administrative Tools section of the control panel is used to collect various tools on the computer that are commonly used by system administrators. These tools include computer management, disk defragmentation, disk cleanup, the event viewer, the performance monitor, print management, the registry editor, the resource monitor, services, system configuration, system information, the task scheduler, and others.

Connections

The Connections tab in the Internet Options is used to set up the dial-up and VPN settings and the LAN settings. Under the LAN settings, you can configure the proxy server settings for the system.

First-In, First-Out (FIFO)

The First In First Out (FIFO) backup scheme uses a set number of tapes and overwrites the oldest tape with the newest information. Example: Like a security camera writing over footage after 10 days.

Long-Term Support (LTS) Release

The LTS release is well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements. These LTS releases are supported for a long time (approximately 10 years), so they are great to use in production systems like servers.

Tower of Hanoi

The Tower of Hanoi is a backup rotation scheme that rotates backup media sets throughout the backup process to minimize wear and failure of tape backup media. For example, when using this method with four backup tapes labeled A, B, C, and D, a total of 16 days of backups can be maintained with just 4 tapes. Tape A is used every odd-numbered day for 16 days. Tape B is used on days 2, 6, 10, and 14. Tape C is used on days 4 and 12. Tape D is used on days 8 and 16. This allows Tape A to be overwritten every other day, while Tapes B is overwritten every four days and Tapes C and D are overwritten every 8 days.

Recovery Partition

The recovery partition is a disk partition that is accessible via the startup sequence that contains an image of the system partition as produced by the PC vendor. This can be used to recover the PC to its factory state by performing a repair install but will erase any user data or installed programs.

Swap Partition

The swap partition on a Linux system is a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it. It can only be used by the memory manager and not for the storage of ordinary data files.

Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes?

Tower of Hanoi

Which of the following file system formatting types should be used with a DVD?

UDF (Universal Disk Format)

Disk Management Tool

Used to display the drive status, mount the drive, initialize the drive, and create/split/extend/shrink drive partitions. From the Disk Management console, you can see the S.M.A.R.T. status of each hard disk.

A co-worker just sent you a macro-enabled Microsoft Word document. After you opened the file, your computer began to delete the photos stored in your c:\photos directory. What type of malware did you MOST likely receive?

Virus Explanation: A virus is malicious software designed to infect computer files or disks when it is activated. A virus may be programmed to carry out other malicious actions, such as deleting files or changing system settings.

Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

WPS

Wi-Fi Protected Setup (WPS)

WPS is a mechanism for auto-configuring a WLAN securely for home users. On compatible equipment, users push a button on the access point and connect adapters to associate them securely.

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the EFI/BIOS of the system. Which of the following commands should you use to add the Windows installation to the boot manager?

bootrec /rebuildbcd Explanation: The Boot Configuration Data (BCD) stores the list of known Windows installations that can be booted from a hard drive. If the Windows installation is not listed, the computer will be unable to boot into Windows. To add a missing Windows installation to the Boot Configuration Database (BCD), you should use the command "bootrec /rebuildbcd" and reboot the computer.

Which command would be used to display the network address and subnet mask for the wired network connection on a Linux system?

ip

Which of the following Windows tools can a technician use to gather information about a workstation and create a comprehensive list of hardware, system components, and the software environment used by that workstation?

msinfo32.exe

You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use?

netstat Explanation: The netstat command is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine.

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem?

rm -rf /


Kaugnay na mga set ng pag-aaral

Unit 2 - Types and Characteristics of Fixed-Income (Debt) Securities

View Set

Psych Exam 2 - Ch. 16 (Trauma, Stressor-Related & Dissociative Disorders)

View Set

Ch. 1 Managing Strategy Making Process for Competitive Advantage

View Set