A+ 902 Mix Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent? A. Measured service B. Rapid elasticity C. On-demand D. Resource pooling

A

A customer reports very slow wireless connection speeds in the new office. Which of the following tools should a technician use to troubleshoot the issue? A. WiFi analyzer B. Loopback plug C. Signal booster D. Packet sniffer

A

A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue? A. The PC's Windows firewall is misconfigured B. The PC has an incorrect IP address configured C. The PC is on the wrong wireless network D. The PC does not have remote assistance turned on

A

A technician has decided to upgrade all users' iPhones to the latest model. Which of the following is the FIRST thing the technician should advise the users to do with the old phones before turning them in? A. Back up the mobile data with a cloud backup service. B. Enable remote wipe to clear all personal and corporate data. C. Go into the device settings to remove personal customizations. D. Factory reset the old phones to ensure the data is no longer on the device.

A

A technician installs a new application and restarts the computer. After signing in to Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following tools would be used to troubleshoot this problem? A. msconfig B. appwiz.cpl C. gpedit D. regsrv32

A

A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this? A. Place directional antennas B. Use omni-directional antennas C. Enable MAC filtering D. Disable SSID broadcast

A

A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task? A. msconfig B. perfmon C. taskmgr D. dxdiag

A

A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements? A. GPT B. Logical C. MBR D. Extended

A

A technician's is onsite troubleshooting a user's issue and receives a call from another customer. Which of the following is the BEST course of action for the technician to take in this situation? A. Let the call go to voicemail and respond when time permits. B. Leave the current appointment to assist the calling customer. C. Ignore the call and continue with the scheduled itinerary. D. Apologize to the customer and answer the call.

A

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices? A. Identify symptoms, quarantine infected system, and create restore point. B. Quarantine infected system, identify symptoms, and create restore point. C. Identify symptoms, educate end user, and create restore point. D. Create restore point, identify symptoms, and quarantine infected system.

A

A user frequently travels with a Windows laptop and connects to several wireless networks. At a new location, the user reports that the locally shared printers are not available on the wireless connection. Which of the following would be causing the issue? A. The location profile is set to public. B. Workgroup is disabled. C. The proxy settings are misconfigured. D. Remote assistance is not configured.

A

A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the email to only be stored on this tablet. Which of the following email server setting types would the technician use to accomplish this task? A. POP3 B. IMAP C. S/MIME D. SMTP

A

A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access? A. Check the phone for unauthorized root access B. Disable the phone's Bluetooth chip C. Erase all personal data from the phone D. Check the phone for location tracking

A

A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices? A. IMAP B. S/MIME C. POP3 D. SMTP

A

A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC. Which of the following would the technician use to accomplish this? A. IMAP B. SMTP C. SMNP D. POP3

A

A user notices the social media apps are constantly updated with the user's precise location. The user is worried about privacy and would like to keep this information from being broadcast online. Which of the following features should the user adjust in order to accomplish this? A. Geotracking B. Filtering C. WiFi D. Tethering

A

An IT manager needs to reimage 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST? A. Boot from PXE. B. Install Windows using DVD. C. Reboot computers with USB drive. D. Press F8 while rebooting.

A

An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user? A. Power user B. Administrator C. Standard D. Guest

A

An end user calls the company's IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following BEST represents a possible cause? A. A valid certificate suitable for S/MIME is not installed. B. Emails received by the user lack suitable digital signatures. C. SSL/TLS certificates stored on the device are expired. D. The sender did not have the addressee's public certificate.

A

An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue? A. System Restore B. Computer Management C. Disk Management D. System Configuration

A

Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST action to troubleshoot this problem? A. Check running apps B. Reset to factory default C. Disable cloud syncing D. Replace the device's battery

A

Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk? A. NFC B. Virtual assistant C. SDK D. Bluetooth

A

Which of the following is a risk of implementing a BYOD policy? A. Introducing malware onto the network B. DHCP may fail due to incompatibility C. Different encryption technology D. Higher risk of phishing attacks

A

Which of the following is a security threat that disguises itself as legitimate software? A. Trojan B. Worm C. Virus D. Spyware

A

Which of the following security threats happens when another person enters a secured area with an authorized person? A. Tailgating B. Shoulder surfing C. Spoofing D. Phishing

A

Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up? A. defrag B. chkdsk C. cleanmgr D. diskpart

A

Which of the following would a technician use to search for a specific string within a file name? A. grep B. chmod C. wget D. sudo

A

A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO). A. Install more physical memory. B. Increase the size of the virtual hard drive. C. Install a different hypervisor. D. Reduce physical memory allocated to the VM. E. Clear temporary files in the VM. F. Install additional physical hard drives.

AD

A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO). A. Mask B. ESD mat C. ESD strap D. Antistatic bag E. Safety goggles F. Rubber gloves

AE

A customer's Windows 7 Home Premium computer displays a stop error and automatically reboots. Which of the following system utilities can a support technician use to find more information about the cause of the error? A. Action Center B. Event Viewer C. File Explorer D. Disk Management

B

A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be: A. a detriment to employer/employee relations. B. personally identifiable information. C. a violation of information access policies. D. proof of employee corporate affiliation.

B

A technician has just installed a video card in a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem? A. Task Manager B. Device Manager C. System Configuration D. Computer Management

B

A technician is noticing extremely slow performance on a computer and would like to see what application is consuming resources. Which of the following tools should the technician use to view the system performance? A. msconfig B. Task Manager C. Event Viewer D. netmon

B

A technician is working a trouble ticket for a user. After addressing the issue, the technician asks the user to verify functionality. The user confirms the system is functioning, but the computer's speakers now emit an irritating noise. The technician states this is a byproduct of the solution, and the user will eventually get used to the noise. Which of the following professionalism principles is the technician failing to address? A. Avoiding being judgmental B. Avoiding dismissal of the customer's problems C. Avoiding an argument with the customer D. Maintaining a positive attitude

B

A user in a corporate environment needs to have a laptop device repaired and takes the device to the appropriate technician. Which of the following should the technician offer to the user in order to maintain professionalism? A. Ask to user to wait in the area while repairs are being made. B. Offer a temporary loaner laptop for the user to work on. C. Inform the user that it will be ready "sometime" and to come back later. D. Ask the user to bring the laptop back when the department is less busy.

B

A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario? A. Remote desktop B. Remote assistance C. telnet D. FTP

B

A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this? A. AES B. VPN C. UTM D. WPA2

B

A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition? A. Credential Manager B. Computer Management C. Device Manager D. TPM Manager

B

A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the NEXT step? A. Allow the user to speak with a supervisor. B. Identify the problem. C. Establish a theory. D. Immediately go to the user's office.

B

An IPS appliance is installed on the network. Which of the following is the purpose of the IPS? A. To check the network for unwanted activity B. To check and stop unwanted activity C. To provide connectivity to the network D. To test the resilience of the network

B

Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively? A. Microsoft Virtual PC B. Compatibility mode C. Hyper-V D. Virtual XP mode

B

Which of the following Windows utilities would MOST likely be used to identify system errors? A. System Restore B. Event Viewer C. Security Center D. Windows Defender

B

While navigating a Windows machine through command prompt, which of the following commands will a technician use to display the contents of the current folder? A. cd B. dir C. md D. rd

B

A user's personal laptop was hacked. A technician troubleshooting the issue discovers the user used the numbers 123456789 as their account password. The user has not changed the password in two years. Which of the following best practices should the technician recommend the user implement to prevent future hacking? (Select TWO). A. Configure screen saver B. Set a strong password C. Set login time restrictions D. Use a more secure browser E. Change the password frequently

BE

A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized users from following others, which of the following should be implemented? A. Biometric locks B. CCTV C. Mantraps D. Badge readers

C

A network administrator notices a new WiFi connection has appeared as a wireless network choice and is always at the top of the list. As a result, users are constantly trying to connect to the wrong network. Which of the following should the administrator do to correct this issue? A. Adjust the wireless router antennas to 90 degrees clockwise from the current position. B. Ask the new wireless network owner to adjust the radio power level so it is listed below the company's network. C. Set all of the WiFi users' wireless profiles to automatically connect to the company network. D. Change the company's channel to a lower number than the new network's channel.

C

A technician has just upgraded RAM on a user's workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the "Min" portion of the page file setting if using these best practices? A. 4096MB B. 8192MB C. 12288MB D. 16328MB

C

A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use? A. NLX B. IDS C. UTM D. ATX

C

A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline review. Which of the following Windows command line tools would allow the technician to accomplish this task? A. gpedit.msc B. gpupdate C. gpresult D. gpmc.msc

C

A technician needs to install a clean Windows OS on several laptops in the office. The office is running a 100Base-T network. The owner would like the installations completed as soon as possible. Which of the following installation methods should the technician use? A. FireWire External Hard Drive B. PXE-based Network Installation C. USB 3.0 Flash Drive D. DVD-ROM

C

A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue? A. Unsupported operating system B. Unacceptable CPU type and speed C. Insufficient airflow and cooling D. Inadequate video RAM amount

C

A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next? A. Hosts files B. IPv6 settings C. Proxy settings D. Lmhosts files

C

An administrator must upgrade multiple workstations with a new image being deployed using Windows Deployment Services. Which of the following client-side boot methods initiates the deployment of the new image? A. USB flash drive B. CD-ROM C. PXE D. GRUB

C

Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack? A. Shoulder surfing B. Man-in-the-middle C. Social engineering D. Ransomware

C

Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies? A. USB authentication token B. Filesystem access controls C. Trusted platform module D. Fingerprint reader

C

Joe, a technician, arrives onsite at a customer's home. Upon entering the home, Joe notices an unpleasant odor. In response to this, Joe pinches his nose and holds his breath. After Joe leaves, the customer reports the behavior to Joe's supervisor. The supervisor decides the issue must be addressed. Which of the following topics would the supervisor be MOST likely to cover? A. Maintaining good communications with the customer B. Maintaining good personal hygiene C. Avoiding being judgmental D. Avoid dismissing the customer's problems

C

The system administrator is tasked with installing Windows to 100 computers over the network. The systems administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this? A. Windows Deployment Services B. Remote Installation Services C. System Preparation Tool D. Unattended installation

C

Which of the following file formats does Android use for application installation? A. .ipa B. .api C. .apk D. .exe E. .sdk

C

Which of the following is the BEST option to prevent data breaches on lost mobile devices? A. Install a locator application on the mobile device so that it can be traced. B. Apply a restriction to lock the device after a certain number of failed login attempts. C. Configure the device to remote wipe as soon as it is reported lost. D. Utilize the fingerprint scanner and passcode for multifactor authentication.

C

Which of the following is the FASTEST way for a user to synchronize data between an iPhone and a work PC? A. Transfer data via WiFi Direct to the user's laptop. B. Use Bluetooth to share data from the phone. C. Connect the iPhone's USB cable and use iTunes. D. Copy the data from the phone to a MicroSD card.

C

Which of the following commands are used from a Linux command line interface to elevate a user's access level to administrative privilege? (Select TWO). A. chmod B. passwd C. sudo D. su E. runas F. pwd

CD

A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation? A. extract B. tasklist C. gpupdate D. gpresult E. chkdsk

D

A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this? A. BitLocker To Go B. Set strong passwords C. Disable usermin D. Disable AutoRun

D

A technician has been informed by the IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device. Which of the following should the technician perform to address the issue? A. Power off the device B. Install an add-on card C. Update the WiFi antenna D. Update firmware

D

A technician is called into the office during a thunderstorm. Users are reporting that machines are intermittently powering off. Which of the following will BEST prevent user data loss? A. Auto save B. A surge protector C. An ESD mat D. A UPS

D

A technician is installing Windows 7 on a computer with a previously used hard drive. After receiving an error, the technician realizes the hard drive does not support this install. Which of the following tasks should the technician perform? A. Partition the hard drive in Extended format. B. Use Windows Update to download the appropriate driver. C. Enable Multiboot in the BIOS. D. Convert the file system to NTFS.

D

A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, "The file is in use by another program." Which of the following tools would be the BEST to use to correct the issue? A. Terminal B. SFC C. Event Viewer D. Services Console E. Recovery Console

D

A technician is using a domain account to access files located on a server at the path \\computername\C$. The technician receives an "Access denied" error message. Which of the following is MOST likely the cause of the error? A. The server is no longer accepting connections since reaching its limit of open shares. B. The password is incorrect, requiring the user to reset it before authentication will proceed. C. The username should be prefixed by the domain, followed by a backslash (e.g., domain\username). D. The account does not have local administrative permissions to access the server share.

D

A user wants to be able to access email from all devices. Which of the following formats should be used to allow this synchronization? A. SMTP B. iCal C. POP3 D. IMAP

D

An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies? A. DRM B. EULA C. IRP D. PII

D

A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll? A. gpresult B. msconfig C. regedit D. gpupdate E. regsrv32

E


Ensembles d'études connexes

Maternal Exam 4 example Questions

View Set

consumer, producer, Carnivore, Herbivore, Omnivore, Decomposer, Producer, Sun, Predator, prey, photosynthesis

View Set

Earth Science - Oceans & Coast - quizzes 21 & 22

View Set