1102 C Multiple Choice Pt. 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A user has purchased a computer that uses a 32-bit version of an operating system. Which of the following would be the maximum amount of RAM supported in this OS?

❍ A. 32 GB ❍ B. 2 TB ❍ C. 512 GB ❍ D. 128 GB ❍ E. 4 GB ❍ F. 16 GB The Answer: E. 4 GB A 32-bit operating system can store 232 values, or approximately 4 GB of address space.

A company is moving three computer racks of equipment from an old data center to a new facility. Which of these safety features should be the MOST important requirement at the new location?

❍ A. Air filter masks ❍ B. Anti-static mat ❍ C. Equipment grounding ❍ D. Surge protectors The Answer: C. Equipment grounding Electrical safety is one of the most important considerations in a data center, and the equipment racks used in the data center should always be connected to an electrical ground. If an electrical fault occurs, the power will be sent to the electrical ground instead of a person.

A system administrator has been notified that a serious security vulnerability has been identified in software used by the company. In order to quickly patch this vulnerability, the administrator has created change management documentation for the change control board. Which part of the documentation would explain the disadvantages of not quickly patching this software?

❍ A. Backout plan ❍ B. End-user acceptance ❍ C. Detailed change plan ❍ D. Risk analysis The Answer: D. Risk analysis The risk analysis provides documentation for the change control board to understand the risk with making the change, and the risk if the change is not made. The board can then decide if the change is worth those risks.

A security administrator is configuring VPN connectivity on company smartphones and tablets. The administrator would like to ensure the login requests are from corporate users and not unauthorized third-parties. Which of the following would provide this security feature?

❍ A. Biometrics ❍ B. PIN ❍ C. Unique usernames ❍ D. Passcode The Answer: A. Biometrics Of the available choices, the biometrics option would require the employee to be physically present when connecting to the VPN. From a smartphone or tablet, this biometric authentication would consist of a fingerprint or face recognition.

A user would like to configure their local printer to be accessible to anyone on the corporate network. Which of the following would be the BEST way to configure this connection?

❍ A. Configure a VPN connection ❍ B. Create a share name in printer properties ❍ C. Configure a metered connection ❍ D. Use a static IP address The Answer: B. Create a share name in printer properties The printer properties includes a sharing tab with the option to "Share this printer" and to create the name for the printer share.

A user's smartphone app shows a splash screen but disappears after a few seconds. Which of the following would be the BEST way for the a technician use to view logs and memory statistics for the app?

❍ A. Developer mode ❍ B. Cloud storage ❍ C. Jailbreaking ❍ D. Application spoofing The Answer: A. Developer mode Developer mode enables features commonly used by developers but can be used by anyone to help with troubleshooting and information gathering.

A company has configured a server for daily backups, and a full backup is created each Sunday based on the previous incremental backups. Which of the following would BEST describe this backup strategy?

❍ A. Differential ❍ B. GFS ❍ C. Synthetic ❍ D. 3-2-1 The Answer: C. Synthetic A synthetic backup combined a previously taken full backup with a series of updates to build a completely new full backup based on the most recent changes.

A user receives this message each time they visit a secure website: "The site's security certificate is not trusted." A technician investigates the issue and finds the problem only occurs on this user's computer and not with other computers in the same office. Which of the following would be the best NEXT troubleshooting task?

❍ A. Disable Windows Firewall for all HTTPS traffic ❍ B. Create a new certificate for the user's computer ❍ C. Check the date and time on the user's computer ❍ D. Release and refresh the IP address configuration The Answer: C. Check the date and time on the user's computer The message regarding the site's security certificate is shown because the local computer can't validate the certificate on the web server. The server's certificate has a specific issuing and expiration date and time, so time drift on the workstation could cause the validation to fail on the workstation.

A computer on a manufacturing floor has a virus, and the system administrator has removed the system from the company network. Which of the following virus removal tasks should occur NEXT?

❍ A. Discuss virus prevention with the end user ❍ B. Install the latest anti-virus signatures - C. Schedule a virus scan to run each morning ❍ D. Disable System Restore The Answer: D. Disable System Restore Before making any updates or changes to the system, it's important to remove any potentially infected restore points by disabling the System Restore feature.

A healthcare administrator, stores sensitive data on his laptop computer. His desk is in an open area near a busy hallway. Which of the following would add additional security to Jack's work area?

❍ A. Door lock ❍ B. Fingerprint scanner ❍ C. Magnetometer ❍ D. Bollards The Answer: B. Fingerprint scanner A laptop with a fingerprint scanner can limit access to everyone except those individuals with a registered fingerprint.

A desktop technician is moving hard drives from one set of training room computers to another. Which of the following would allow the drives to be used in the new computers but prevent any of the existing data from being recovered?

❍ A. Shredder ❍ B. Quick format ❍ C. Drill ❍ D. Standard format The Answer: D. Standard format The Windows standard format will overwrite each sector of the drive and prevent any recovery tools from restoring any of the previous data.

Which of the following would allow someone else in the room to maliciously obtain a username and password?

❍ A. Spoofing ❍ B. Tailgating ❍ C. DoS ❍ D. Shoulder surfing The Answer: D. Shoulder surfing Shoulder surfing is a low-tech method of obtaining login credentials and other sensitive information. With shoulder surfing, the attacker simply watches over the shoulder of someone else to obtain the information they need.

A financial services company is upgrading the storage drives on their SAN and need to dispose of one hundred older storage drives. The security administrator would like to permanently disable the drive and guarantee the data on the drives could not be recovered. Which of the following methods would be the BEST way to accomplish this goal?

❍ A. Standard format ❍ B. Full disk encryption ❍ C. Shredder ❍ D. Delete the master boot record The Answer: C. Shredder A shredder will cut a storage drive into small pieces, and larger shredders can completely destroy a drive in just a few seconds. It would not take long to dispose of one hundred drives.

A technician is troubleshooting a problem with user's laptop and very high utilization, even with no activity on the screen or user input to the operating system. Task Manager shows the CPU is operating at 100% utilization, memory utilization is slightly elevated, and there is a large amount of outbound network communication. Which of the following would be the MOST likely reason for these issues?

❍ A. System RAM is faulty ❍ B. User has not properly authenticated ❍ C. Laptop is part of a DDoS attack ❍ D. Network adapter is faulty The Answer: C. Laptop is part of a DDoS attack High CPU utilization, memory use, and network traffic with no user intervention indicates a possible malware infection and participation in a DDoS (Distributed Denial of Service) attack. Of the available options, this would be the most likely reason for these symptoms.

A company is updating all of their UPS systems with new batteries. Which of the following would be the best way to dispose of the old batteries?

❍ A. Take to a local hazardous waste facility ❍ B. Throw out with the paper trash ❍ C. Ship to a battery wholesaler ❍ D. Bury in a landfill The Answer: A. Take to a local hazardous waste facility Batteries contain chemicals that are dangerous to humans and the environment. The best disposal method is to deliver the batteries to professionals at a local hazardous waste facility.

A user is browsing to their corporate home page, but a different website appears instead. The user tries to connect with other browsers on the same computer, but the result is identical. Which of the following would be the best NEXT troubleshooting step?

❍ A. Try connecting to the site in Safe Mode ❍ B. Perform an anti-malware scan ❍ C. View all browsing results in the Event Viewer ❍ D. Roll back to a previous configuration The Answer: B. Perform an anti-malware scan If the browsers on a computer are redirected to a different website, then malware would be a likely suspect. Given that all of the browsers are being redirected, there's most likely something malicious on the computer.

A technician is troubleshooting a problem on a Linux server and needs to view the real-time CPU and memory utilization for each operating system process. Which of the following would provide this functionality?

❍ A. dig ❍ B. df ❍ C. cat ❍ D. top The Answer: D. top The linux top command is a common methods of viewing real-time information about CPU, RAM, and resource utilizations. This information is updated every second by default and can quickly identify highly utilized processes.

A user in the marketing department needs to move data between macOS and Windows computers using a USB flash drive. Which of the following file systems would be the BEST way to easily transfer files between these operating systems?

❍ A. exFAT ❍ B. APFS ❍ C. NTFS ❍ D. ext4 The Answer: A. exFAT The exFAT (Extended File Allocation Table) file system is designed for flash drives and can be used across Windows, Linux, macOS, and other operating systems.

A system administrator is installing a file server into the corporate data center. Which of the following would be the BEST way to improve security of the file sharing service? (Select TWO)

❍ A. Enable a BIOS user password ❍ B. Connect the server to a wireless network ❍ C. Limit the number of concurrent connections ❍ D. Disable guest account ❍ E. Enable file storage quotas ❍ F. Enable password complexity The Answers: D. Disable guest account, and F. Enable password complexity The only available options associated with server security are those to disable guest accounts and increase the complexity of the passwords. Guest accounts can be exploited, and passwords that are easy to guess or set to defaults can be discovered by an attacker.

Which of the following should a company use to reduce their legal liability if an employee is dismissed?

❍ A. End user licensing agreement ❍ B. Acceptable use policy ❍ C. Standard operating procedures ❍ D. Regulatory compliance documentation The Answer: B. Acceptable use policy An Acceptable Use Policy (AUP) provides detailed documentation on the correct and expected use of company assets. If someone is dismissed, this document will provide a well-documented set of reasons to legally justify the dismissal.

A company has created an internal process to ensure that all PII is encrypted. Which of the following would be the MOST likely reason for adding this additional security?

❍ A. Helps prevent identity theft ❍ B. Improves application performance ❍ C. Allows customer data to be easily deleted ❍ D. Uses less storage space The Answer: A. Helps prevent identity theft PII (Personally Identifiable Information) is any information that can identify an individual. This information can be an address, phone number, or date of birth. Encrypting PII will help prevent the unintended release of personal data and would assist with preventing identity theft.

A workstation technician manages a training center with thirty student computers in each room. All of the computers have the same hardware configurations. Which of these installation methods would be the BEST choice for quickly resetting the training rooms at the end of each week?

❍ A. In-place upgrade ❍ B. Image installation ❍ C. Repair installation ❍ D. Clean install The Answer: B. Image installation An image installation can install an operating system, applications, and customized system configurations to multiple devices in a single step. With a pre-built images, a large training room of systems can be updated with a specific configuration very efficiently.

A company is donating ten laptop computers to a local community center. Which of the following processes should be followed before making this donation?

❍ A. Inventory management ❍ B. Acceptable use policy ❍ C. Password policy ❍ D. Knowledge base article The Answer: A. Inventory management The donated systems must be removed from the inventory system and documentation needs to detail the donation process.

A user's smartphone contains company confidential information that should not be shared outside of the organization. Which of the following would be the BEST way to limit access to this data if the smartphone was lost or stolen?

❍ A. Locator application ❍ B. Remote wipe ❍ C. Authenticator app ❍ D. Cloud backup The Answer: B. Remote wipe The remote wipe feature of a smartphone or tablet allows the administrator or owner of the device to delete all information on the device from a website or secure app. If the device is lost or stolen, all of the data on the device can be immediately erased and recovery of the data would not be possible.

A technician has received a help desk ticket asking for help with a broken laptop keyboard. After calling the user, the technician learns the laptop is scheduled to be used for a press event the following day. Which of the following would be the best NEXT step with the ticket?

❍ A. Refer the ticket to the laptop group ❍ B. Escalate the issue with management ❍ C. Add the event information to the problem description ❍ D. Assign the ticket to the "laptop" category The Answer: B. Escalate the issue with management The time constraint associated with this issue needs to get the visibility of someone higher in the organization. Escalating the ticket to management will provide additional options for resolution.

A technician has just received fifty boxes of used laser printer toner cartridges removed during an annual preventive maintenance project. Which of the following would be the best NEXT step for managing these used cartridges?

❍ A. Refer to the MSDS ❍ B. Ship the cartridges to the original manufacturer ❍ C. Incinerate the cartridges ❍ D. Drill a hole in each cartridge The Answer: A. Refer to the MSDS The MSDS (Material Safety Data Sheets) provide information about the safety and health associated with products in the workplace. The MSDS will document hazard information, first aid measures, handling and storage, and more.

When a user starts their desktop computer, the Windows splash screen is shown with a rotating circle, but the login screen is never displayed. A technician researches the issue and finds the computer was just updated to the latest set of Windows patches. Which of the following would be the NEXT step the technician should follow to help solve this issue?

❍ A. Restart the computer ❍ B. Perform a Startup Repair ❍ C. Start in VGA mode ❍ D. Rebuild the user's profile The Answer: B. Perform a Startup Repair The Windows Startup Repair is an automated feature that will examine each phase of the startup process and reconfigure any invalid or incorrect settings. This is a common repair to use when the startup process is not working properly after an application or operating system update.

A user would like to use their smartphone for a payment during checkout at the grocery store, but the smartphone is not seen by the payment system. Which of the following would be the BEST next troubleshooting step?

❍ A. Restart the smartphone ❍ B. Replace the battery ❍ C. Perform a factory reset ❍ D. Enable Wi-Fi The Answer: A. Restart the smartphone There are limited troubleshooting options available for NFC (Near Field Communication) connections, and most smartphones enable the NFC feature by default. If the NFC feature is not seen at all, a restart of the smartphone may enable the functionality.

A network administrator has been asked to manage the router configurations at all company locations. Which of the following would be the BEST choice for this task?

❍ A. SSH ❍ B. VNC ❍ C. NFC ❍ D. RDP The Answer: A. SSH SSH (Secure Shell) is a secure protocol for encrypted console communication to a remote device. SSH is commonly used to manage remote devices using their command line interfaces.


Ensembles d'études connexes

محيط الاشكال الهندسية

View Set

CompTIA A+ Chapter 13: Users, Groups, and Permissions

View Set

Elasticity and Consumer Choices in Economics

View Set