Comp TIA A+ ch 15-16

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Where in Group Policy can you locate the policy that requires a smart card to be used to authenticate a user to Windows?

Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options

Which definition describes a virus?

A program that can replicate by attaching itself to another program

Which definition describes a Trojan?

A program that does not need a host program to work; it substitutes itself for, and pretends to be, a legitimate program

What tool is best to use when destroying data on an SSD?

ATA Secure Erase

Which of the following security settings can best help minimize brute force attacks on local user account passwords?

Account lockout threshold

You see multiple errors about device drivers failing to launch at startup. Of the following, which is the best option to try first? Second?

Apply a restore point. Perform a Startup Repair.

An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group.What is the purpose of the Power Users group in Windows 7 and later?

Backward compatibility for legacy operating systems and applications.

An error message is displayed during Windows startup about a service that has failed to start, and then the system locks up. You try to boot into Safe Mode, but you get the same error message. What should you try next?

Boot to Windows RE, and perform a Startup Repair.

Which registry files, if deleted, can be restored from those saved in what folder?

C:\Windows\System32\Config\RegBack

Among the following, which is the best protection against ransomware?

Carbonite

What is the best way to determine if an email message warning about a virus is a hoax?

Check websites that track virus hoaxes.

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows.How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script.

Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.What step can be taken to limit access to the computer?

Configure logon time restrictions.

Which tool is the least invasive solution to repair Windows?

Startup Repair

Your computer displays the error message, "A disk read error occurred." You try to boot from the Windows setup DVD, and you get the same error. What is most likely the problem?

The boot device order is set to boot from the hard drive before the optical drive.

As a computer starts up, you see an error message about a missing operating system. At what point in startup does this error occur?

When BIOS/UEFI is searching for an OS using devices listed in the boot priority order

Which command can be used to scan for Windows installations not stored in the BCD?

bootrec /scanOS

Which of the following is responsible for authenticating users?

Lsass.exe

When a driver is giving problems in Windows 10, which tool offers the least intrusive solution?

Device Manager

What security policy can be implemented to prevent removable media from automatically launching potentially harmful applications?

Disable AutoRun.

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.What is best practice for the remaining unused account?

Disable the account until the employee is ready to use it.

What key combo can be used to display the Advanced Boot Options screen?

F8

Dealing with security and keeping data safe is an important topic for any organization. Without protecting resources from unwanted users and applications, those resources are useless.Which of the following are unwanted applications that intend harm and are transmitted without your knowledge?

Malware

A customer reports their recently purchased computer does not consistently run their old applications. Application errors occur intermittently, and data files get corrupted. They have tried uninstalling and reinstalling the apps, and the problems persist. As you troubleshoot the problem, you reboot the system and get a BSOD error. The customer tells you the BSOD has occasionally appeared. Which subsystem is most likely causing the problem, and what is the next best step?

Memory is faulty; run Memory Diagnostics.

Which security features are available on Windows 10 Home? (Choose all that apply.)

NTFS permissions

Which of the following is true about NTFS permissions and share permissions? (Choose all that apply.)

NTFS permissions work only on an NTFS volume.

Which Windows tool is used to reset the password for a user's Windows account?

Network Places Wizard (netplwiz.exe)

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable.What term best describes this method of printer connectivity?

Network printer

What is one difference between a video surveillance camera and a webcam? Select all that apply.

One camera is a part of the IoT, and the other is not. One camera has an IP address, and the other does not.

At a restaurant, you overhear people discussing an interesting case they treated while working in a dental office that day. Which type of regulated data policies are most likely to have been violated?

PHI

You suspect a boot sector virus has infected your computer. How can you remove the virus?

Perform a Microsoft Defender Offline scan.

You work in the IT department of a large hospital, and your manager has asked you to dispose of several old laptops previously used by the medical staff. How do you proceed?

Physically destroy all the hard drives, and then donate the laptops to the computer repair labs at the local community college.

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

Quarantine the computer. Update installed anti-malware software.

In some cases, system issues can be resolved by an all-or-nothing recovery option. This option replaces the entire contents of a hard drive with whatever operating system state and personal data are saved in the system image.Which of the following terms would apply to this all-or-nothing approach?

Reimage

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes, and you see a blue screen of death. You have important document files on the drive that are not backed up. What do you do first?

Remove the hard drive from the computer case, and install it in another computer.

Sometimes, changes to a system need to be undone. Mistakes in settings, application type, or other issues can make undoing various changes necessary.Which of the following would be used to uninstall various changes to your system?

Roll back updates

Which of the following is a boot feature that does not involve turning the power off or on using the power switch?

Soft boot

As an administrator, understanding what processes and steps are taken during the boot process can be an important part of keeping system and network health at an optimal state.Which of the following is a place where the Boot Manager, Boot Configuration Data and other files and folders needed to begin the Windows startup?

System partition

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user.How can you best solve this issue without losing data in the folder?

Take ownership of the folder and then change permissions.

When you started your new job, your training included reading through the company intranet website AUP pages. This morning you see a coworker violating a policy. You ask whether they are aware that they are violating the policy, and they respond that they are aware. What is your next step?

Tell your manager about the situation.

If you are having a problem with a driver, which of the following should you try first? Second?

Update the driver. Update Windows.

Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times.Choose the tool you would use to help repair your computer system.

Use Safe Mode to boot.

Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet.Choose the location Eric can go to look up the device driver's filename that would determine what device uses the device driver.

Windows\System32\drivers folder

When NTFS and share permissions are used on the local file server, can a user signed in on a Windows 10 Home computer access these shares? Why or why not?

Yes, because the user is authenticated on the file server to access its shares

You open a folder Properties dialog box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem?

You are not using an edition of Windows that supports encryption.

Your computer has a single HDD formatted with NTFS with the following data folders:C:\DocumentsC:\PicturesYou create a new child folder under the C:\Documents folder.What term describes the permissions the new folder automatically attains from the C:\Documents folder?

Inherited permissions

What is the likely error messages that will appear if the BIOS/UEFI cannot find a Windows Boot Manager or cannot turn over operations to the boot manager?

Invalid partition table Missing operating system Error loading operating system

Sara installed Windows 10 for the first time on her computer. During the installation process, she noticed that a new system partition called ESP partition was created. Sara cannot access this new partition to see what it contains.Choose the best response to Sara about the ESP partition.

It was created by GPT to store Windows boot and startup files.

You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords.Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

Lengthen the time period between forced password changes.

Which Windows program must be running before a user can sign in to Windows?

Lsass.exe

A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32.What happens to the permissions of the file on the D:\ drive when copied?

The file will lose all permissions.

On a computer with Windows 11 installed, you have used Disk Management to verify that a laptop has a recovery partition, but when you do a Windows reset, you don't see the option to restore preinstalled apps. What is the most likely problem?

The laptop factory state uses an OS other than Windows 11.

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results.What is the most likely reason for the difficulties that the technician is experiencing?

The technician should be setting NTFS permissions instead of using Group Policy.

Understanding the various types of attacks that a network can experience is a constant learning experience for administrators. Knowing the basic types and categories is important.Which of the following explains what a DoS attack is?

This type of attack is commonly referred to as a denial-of-service attack

What command can be used to totally wipe a hard drive clean, including the partitioning system?

diskpart

You sign in to your personal computer with your Microsoft account, and you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called _____.

multifactor authentication

Choose the command that you would select to verify and restore your files if you suspected corrupted systems files are causing your issues.

sfc /scannow

Which of the following best meets the requirements of a strong password?

t*M&2.zY7

Which of the following describes why a normal hard boot takes longer than a normal soft boot.

The initial steps must be performed by the BIOS/UEFI

As a computer starts up, you see an error message about the HAL. At what point in startup does this error occur?

When Windows attempts to launch critical device drivers

You have set up a user group named Accounting and have put all employees in the accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the accounting department allowed to access this folder. What is the best way to configure the new share?

Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder.

James's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead, the computer asks you to choose an option from the Startup Settings screen. James has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart.Choose the option in the Startup Settings screen that would enable James to see which driver might be failing and causing his computer not to boot.

Enable Boot Logging

As the new network administrator managing Active Directory in your organization, you decide to set up a backup system for all folders in the domain authorized for users to store their data. Which tasks should you do first before you configure the backup routine? (Choose all that apply.)

Evaluate backup software and storage requirements. Apply folder redirection to the Home folder for each user.

Your friend mentioned in question 4 is having problems finding the bootmgr file and asks for your help. What is your best response?

Explain to your friend that performing a Startup Repair is a better option.

You have important data on your hard drive that is not backed up, and your Windows installation is so corrupted you know that you must reinstall Windows. What do you do first?

Make every attempt to recover the data.

When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?

Policies generally apply to either computers or users.

What device can be installed on a laptop to prevent shoulder surfing?

Privacy filter

Stop errors happen when which types of processes encounter an error?

Processes created by Windows components running in kernel mode

You sign in to your banking website on a new computer and get a request that the bank needs to send you a text code to your cell phone to authenticate the sign in. Why is this method of authentication not secure?

SMS text is not encrypted.

A company asked you to help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. What options can be included when securing user accounts? (Select THREE.)

Set failed logon restrictions. Require user account passwords. Require strong passwords.

The users in the sales department needs a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.What is the first step in implementing the data share?

Share the folder or volume on the file server that will store the shared data files.

An employee uses a key fob to access corporate resources from their home office. What type of authentication are they using?

Soft token

What key can you press to display the Windows Boot Manager during the Windows 7 startup process?

Spacebar

What is responsible for getting a system up and finding an OS to load?

Startup BIOS/UEFI

Knowing what tools can be tried to ensure that a device is operating at peak efficiency is important. Having the skills to be able quickly, easily and seamlessly address system-based issues is extremely to an organization being able to operate effectively.Which of the following would be one of the first steps to try when addressing powerup issues with a device?

Startup repair

Knowing some of the common symptoms that a device might experience can be an important part of discovering when malware and grayware applications are installed on a device. Administrators need to be aware of these symptoms when troubleshooting a device that is behaving strangely.Which of the following might be a symptom of adware?

Strange notifications

Your friend sees an error message about a corrupted bootmgr file during Windows startup. They have another computer with a matching configuration and decide to copy the bootmgr file from the working computer to the computer with the problem. Where is the bootmgr file stored?

System Reserved\bootmgr

When error messages indicate that the Windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem? The second-best option?

Use bootable media to launch Windows RE and perform a Startup Repair. Use bootable media to launch Windows RE, and use System Restore to apply a restore point.

A stop error halts the Windows 10 system while it is booting, and the booting starts over in an endless loop of restarts. How can you solve this problem?

Use the Windows Startup Settings screen to disable automatic restarts.

Your Windows system boots to a blue screen stop error and no desktop. What do you do first?

Use the web to research the stop error messages and numbers.

A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled.What is the most likely reason the encryption option is disabled?

Windows Home editions do not support EFS.

Choose the command that can be used to repair a dual boot system.

bootsect


संबंधित स्टडी सेट्स

PrepU chapter 39: Fluid, electrolyte, and acid-base balance

View Set

psych / human development > Chapter 10

View Set

Chapter 10-16 True or False (Pharmacology)

View Set

Business Law II Midterm Chp 32-35 48-49

View Set

Ch 18/19: Cell- Division Cycle /Apoptosis/ Mitosis

View Set

Cardiac Output, Venous Return, and Their Regulation

View Set