CompTIA A+ 1102 Test 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following statements describe the characteristic features of open-source applications and OSs? (Select 2 answers)' Proprietary software Permission to modify and redistribute the application Free access to the application code Permission to use the application only under certain conditions Lack of free access to the application code

-Permission to modify and redistribute the application. -Free access to the application code

A user needs software installed on a Windows workstation. You visit the vendors website and notice there are multiple operating systems supported. Which file with you use to accomplish the user's request? Choose two. .dmg .msi .apk .exe

.exe .msi MSI files are also called Windows installer package files, which are used to distribute Windows updates and installers of third party programs that were developed for Windows-based systems. An EXE file is an executable program you can run in Microsoft Windows. Most EXE files contain either Windows applications or application installers.

Which of the following answers describe the minimum system requirements for 32-bit (x86) version of Microsoft Windows 10? (Select 4 answers) 1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 2 GB of system RAM 16 GB of free hard disk space 2 GHz CPU with support for PAE, NX, and SSE2

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 10? (Select 4 answers)' 1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 1 GB of system RAM 25 GB of free hard disk space 2 GHz CPU with support for PAE, NX, and SSE2

1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

What is the maximum size of a partition if you use the FAT32 file system? 2.2 terabytes 120 gigabytes 4 terabytes 32 gigabytes

32 gigabytes The FAT32 file system supports smaller cluster sizes and larger volumes than the FAT file system, which results in more efficient space allocation. FAT32 file systems support a maximum partition size of 32 GB for Windows XP and Windows Server 2003. The maximum size file size is 4 GB. A partition is a logical division of a hard disk that is treated as a separate unit by operating systems (OS) and file systems. The OS and file systems can manage information on each partition as if it were a distinct hard drive.

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 7? (Select 4 answers) (Select 4 answers) 800 MHz CPU 1 GB of system RAM 20 GB HDD with 15 GB of free hard disk space DirectX 9 graphics device with WDDM 1.0 or higher driver 2 GB of system RAM 16 GB of free hard disk space 1 GHz CPU

32-bit (x86) version of Microsoft Windows 7 - 1 GHz CPU - 1 GB of system RAM - DirectX 9 graphics device with WDDM 1.0 or higher driver - 16 GB of free hard disk space

A 32-bit system typically provides support for up to: 4 GB of RAM 8 GB of RAM 16 GB of RAM 32 GB of RAM

4 GB of RAM

What is the maximum amount of RAM that 32-bit versions of Windows can address? 1 gigabytes 2 gigabytes 4 gigabytes 32 gigabytes

4 gigabytes

Which of the following answers describe the minimum system requirements for 64-bit (x64) version of Microsoft Windows 7? (Select 4 answers) 800 MHz CPU 16 GB of free hard disk space 1 GHz CPU 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 1 GB of system RAM

64-bit (x64) version of Microsoft Windows 7 - 1 GHz CPU - 2 GB of system RAM - DirectX 9 graphics device with WDDM 1.0 or higher driver - 20 GB of free hard disk space

What is WPA2 also known as? WiFi Privileged access 802.11x 802.8i

802.11x WPA2-Enterprise with 802.1X Authentication 802.1X is an IEEE standard framework for encrypting and authenticating a user who is trying to associate to a wired or wireless network. WPA-Enterprise uses TKIP with RC4 encryption, while WPA2-Enterprise adds AES encryption. 802.1X can be transparent to wireless users. 802.1X utilizes the Extensible Authentication Protocol (EAP) to establish a secure tunnel between participants involved in an authentication exchange.

What is needed to use WPA/WPA2 Enterprise on a Wi-Fi network? A RADIUS server TACAC+ A hardware token It is not possible

A RADIUS server Remote Authentication Dial-In User Service (RADIUS) is a client-server networking protocol that runs in the application layer. The RADIUS protocol uses a RADIUS Server and RADIUS Clients. A RADIUS Client (or Network Access Server) is a networking device (like a VPN concentrator, router, switch) that is used to authenticate users. A RADIUS Server is a background process that runs on a UNIX or Windows server. It lets you maintain user profiles in a central database. Hence, if you have a RADIUS Server, you have control over who can connect with your network. When a user tries to connect to a RADIUS Client, the Client sends requests to the RADIUS Server. The user can connect to the RADIUS Client only if the RADIUS Server authenticates and authorizes the user

Which of the following statements is true? A 32-bit hardware provides support for both 32-bit and 64-bit OSs and applications. A computer with a 32-bit CPU can run 64-bit OSs and applications without compatibility issues. A 64-bit hardware provides support only for 64-bit OSs and applications. A computer with a 64-bit CPU can run most 32-bit OSs and applications without compatibility issues.

A computer with a 64-bit CPU can run most 32-bit OSs and applications without compatibility issues.

What information must be given to anyone you want to share files with in a HomeGroup? A password The IP address of the computer The computer name A username and password

A password A HomeGroup is a group of PCs on a home network that can share files and printers. Using a HomeGroup makes sharing easier. You can share pictures, music, videos, documents, and printers with other people in your HomeGroup.

What is read by the system, to ensure that only authorized devices or users are allowed to access a resource on the system? Directory permissions VPN Principle of lease privilege Access control list

Access control list A filesystem ACL is a table that informs a computer operating system of the access privileges a user has to a system object, including a single file or a file directory. Each object has a security property that connects it to its access control list. The list has an entry for every user with access rights to the system.

Which of the following logical security implementations allows an administrator to create, manage and maintain user and groups accounts with enterprise-level scalability? ACL Active Directory Port Security Screened subnets

Active Directory Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information.

When installing Windows using the unattended installation method, what file must be present for this to be successful? An answer file An install file An attend file Nothing must be present

An answer file

Which of the following is an open-source mobile OS designed for smartphones and tablets? Windows Android iOD Chrome OS

Android open-source mobile OS -Permission to modify and redistribute the application. -Free access to the application code

What physical security measure is used to ensure that portable devices will be more difficult to steal? Password PIN VPN Cable lock

Cable lock

You are supporting your company's security team task of increasing security for the company's wireless network. Your company recently performed a factory reset on the wireless access point. You perform a wireless analysis and notice the company now has a new network name. Which of the following techniques could you use to increase the security of the wireless network? Change the default SSID Increase the radio transmission power Change the firewall settings Implement WEP

Change the default SSID To improve the security or usability of your home wireless network, consider changing the router's SSID to a different name than the default. An SSID is case sensitive and can contain up to 32 alphanumeric characters.

What is the name of a lightweight operating system designed by Google for small-factor PCs, laptops, tablets and mobile devices? iOS macOS Android Chrome OS

Chrome OS

Which of the following OSs uses a Web browser as its main user interface? Linux Chrome OS MS Windows macOS

Chrome OS

Before installing an application in Windows, what should be the first thing verified? Compatibility Drive space RAM requirements Security impact

Compatibility

Prior to installing an operating system, what is the BEST consideration? Location of user data Compatibility and System requirements Screen type Network speed

Compatibility and System requirements

Which Windows Control Panel utility allows you to store digital certificates for websites? BitLocker Windows Firewall Sync Center Credential Manager

Credential Manager

Which administrative tool can be used to reinstall drivers for a device that isn't working correctly? Device Manager System Configuration Component Services System Management

Device Manager

When trying to speed up the computer, what two utilities can assist the most? Choose 2 MMC Disk cleanup Disk defragmenter DxDiag

Disk cleanup Disk defragmenter

What are examples of a configuration tasks following the installation of an operating system? (choose two) Determine system requirements. Check hardware compatibility via the vendor HCL Driver installation Network configuration

Driver installation Network configuration

Which of the following terms refers to a software that no longer receives continuing support? OEM SDLC EOL SPOF

EOL = End of Life >>>> software that no longer receives continuing support OEM = Original Equipment Manufacturer SDLC = Software Development Life Cycle SPOF= single point of failure. Potential risk posed by a flaw in the design, implementation or configuration of a circuit or system.

Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are mandatory CPU requirements for Microsoft Windows 7/8/8.1/10, therefore Windows 7/8/8.1/10 cannot be installed on computer systems that lack support for these features.

False

All modern applications are designed as cross-platform software which allows them to be run on different operating systems (e.g. Windows, Linux, or macOS) without any modifications in the application source code. True False

False An operating system cross-platform compatibility feature allows certain types of data files created on one type of OS to be seamlessly read and modified on a different OS type

On a 64-bit MS Windows OS, both 32-bit and 64-bit applications are stored in the Program Files folder. True False

False On a 64-bit version of Windows, 64-bit programs are stored in the "C:\Program Files" folder and 32-bit programs are stored in the "C:\Program Files (x86)" folder. That's why different programs are spread across the two Program Files folders, seemingly at random.

This security component can be either network or host-based? Firewalls AAA server DHCP server Smart card reader

Firewalls While Network Based Firewall filters traffic going from Internet to secured LAN and vice versa, a host based firewall is a software application or suite of applications installed on a single computer and provides protection to the host.

Which of the following physical security implementations BEST allows an administrator to mitigate the risk of laptop theft? Camera Hardware token Kensington lock USB lock

Kensington lock

Which of the following are not examples of proprietary software? (Select 2 answers) MS Windows macOS Linux iPhone OS (iOS) Android OS

Linux Android OS Proprietary software is any software that is copyrighted and bears limits against use, distribution and modification that are imposed by its publisher, vendor or developer. EX. - Windows and OS X operating systems. - Microsoft Office productivity suite. - Adobe Creative Suite productivity software. - Logic music creation software. - paid-for games for consoles.

You work for the XYZ company's IT staff, recently your company has invested in mobile devices to be used by employees. You need to recommend a solution to manage these devices. Which of the following would BEST accomplish the goals of your company? Passwords Patch management MDM Antivirus

MDM = Mobile Device Management MDM is the process of enhancing corporate data security by monitoring, managing and securing the mobile devices such as laptops, smartphones and tablets that are used in enterprises.

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in Windows is known as: Control Panel PowerShell MMC Administrative Tools

MMC MMC is a command that runs an elevated prompt without a need to change your identity. Depending on your settings in the /etc/sudoers file, you can issue single commands as root or as another user.

Which of the following answers refers to the MS Windows client application for Remote Desktop Services (RDS)? GoToMyPC RDP TeamViewer MSTSC

MSTSC MSTSC is a command used in Windows to run Remote Desktop (RDP)

What is the application of No-eXecute bit (NX bit)? Parity checks Malware Protection Biometric Authentication Data Backups

Malware protection

What security measure is used to slow the movement of personnel when entering or leaving a secure area? Badge reader Mantrap Biometric lock Entry control roster

Mantrap

Examples of workstation operating systems include: (Select 3 answers) iOS Microsoft Windows Chrome OS Apple Macintosh OS Linux

Microsoft Windows Apple Macintosh OS Linux

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1? (Select 4 answers) 1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 2 GB of system RAM 16 GB of free hard disk space 1 GHz CPU

Microsoft Windows 8/8.1 1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

Which of the following are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1? (Select 4 answers) 1 GHz CPU 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 1 GB of system RAM 25 GB of free hard disk space 1 GHz CPU with support for PAE, NX, and SSE2

Microsoft Windows 8/8.1 1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher drive 20 GB of free hard disk space

A type of feature used by CPUs for isolating areas of memory to prevent the execution of code from non-executable memory locations is known as: Data Loss Prevension (DLP) Non-eXecute bit (NX bit) Error-Correcting Code (ECC) Physical Address Extension

No-eXecute bit (NX bit) A type of feature used by CPUs for isolating areas of memory to prevent the execution of code from non-executable memory locations is known as:

What is the theoretical limit of addressable RAM for a 64-bit CPU? 8 GB 16 GB 32 GB 64 GB

None of the above

How many factors of authentication are a username and password? One Two Three None

One There are three common factors used for authentication: - something you know (password, username..) - something you have (a smart card, a key nob...) - something you are (fingerprint or other biometric method...)

Your company has recently deployed a series of new workstations. Your company has decided to donate the old workstations to a local school. The Chief Information Officer of the company is worried that PII still remains on these old workstations, which of the following with BEST solve the concern and allow the company to donate the old workstations? Drill or hammer Incineration Overwriting Formatting

Overwriting Don't format, overwrite. The key isn't to format or erase a hard drive, as Windows will allow you to do. That just hides a file from view. To secure it, you'll need to overwrite the entire thing with 1's and 0's, creating a random sea of bits. And you'll need to do it over and over, just to be sure.

You get a message to reboot your computer. When it boots back up you see a message asking you to pay for a key to unlock your files. What likely caused this message? Trojan Ransomware Worm Logic bomb

Ransomware Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In many cases, the ransom demand comes with a deadline. If the victim doesn't pay in time, the data is gone forever or the ransom increases.

Which of the following is a complimentary instruction set that extends the capabilities of a CPU? RISC SSE2 EIDE SSID

SSE2 = Streaming SIMD Extensions 2 One of the Intel SIMD (Single Instruction, Multiple Data) processor supplementary instruction sets first introduced by Intel with the initial version of the Pentium 4 in 2000. It extends the earlier SSE instruction set, and is intended to fully replace MMX. RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS EIDE = Enhanced (sometimes "Expanded") IDE is a standard electronic interface between your computer and its mass storage drives. EIDE's enhancements to Integrated Drive Electronics (IDE) make it possible to address a hard disk larger than 528 Mbytes. SSID = stands for Service Set IDentifier and is your network's name

What tool in the Mac OS assists with finding files on the computer? Finder Search Bar Spot Light Dock

Spot Light Command + Space Bar

When you need to install something in Linux what command should be used to elevate privileges? Grep Sudo Admin/admin Dd

Sudo "superuser do or substitute user do" is a command that runs an elevated prompt without a need to change your identity. Depending on your settings in the /etc/sudoers file, you can issue single commands as root or as another user.

Why should you avoid using WEP on the Wi-Fi network? It is an old Cisco-only standard The initialization vectors aren't random enough It is still okay to use but there are better solutions User authentication is too complicated

The initialization vectors aren't random enough (WEP) Wired Equivalent Privacy. Wireless encryption standard. The main problem with WEP is that it only uses one static key when sending data from your computer. This wasn't a problem when WEP first arrived; however, as time went on, hackers cracked the code behind the keys. As such, once a hacker knows the key for your Wi-Fi communication, they can break the encryption and read the data you're sending.

What is the SFC command used for? To scan and restore system files To scan for corrupted files To replace DLLs To check for file integrity

To scan and restore system files SFC = System File Checker Sfc /scannow will inspect all of the important Windows files on your computer, including Windows DLL files. If System File Checker finds a problem with any of these protected files, it will replace it.

An operating system cross-platform compatibility feature allows certain types of data files created on one type of OS to be seamlessly read and modified on a different OS type. True False

True

Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory. True Flase

True

You notice that your computer is slow and it takes a long time to access websites. What is the likely reason for this? Trojan Keylogger Virus Worm

Worm A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system. Typically, a worm spreads across a network through your Internet or LAN (Local Area Network) connection.

Can you upgrade Windows 8 Enterprise to Windows 10 Enterprise with an in-place upgrade? Yes Yes, but only after upgrading to Windows 8.1 Enterprise No It depends on the terms of the license purchased

Yes, but only after upgrading to Windows 8.1 Enterprise In-Place Upgrade: The installation of an operating system or application on the computer without removing the older version first and without saving any data beyond normal precautions. In-place installations of operating systems have a tendency to cause problems, especially if the new version is very different from the previous one.

A user submits a support ticket stating that the PC is performing very slowly. You need to utilize a tool that will increase the performance of the PC. Which of the following tools would BEST fit this situation? Performance Monitor System Restore msinfo32.exe defrag.exe

defrag.exe Defragmentation is only performed in mechanical drives, not in SSDs. Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.

You have a task that requires formatting a drive after installing it in a workstation running the Linux operating system, which of the following utilities can you use to accomplish this task? Diskpart Disk Management fdisk Disk Utility

fdisk Fdisk is the oldest disk partition tool with DOS program. Since you have Fdisk in your Windows 10, you can use it to divide disk. However, the earlier Fdisk has no format functions to meet your requirements of formatting partitions and allocating file systems after dividing.

An Apple-proprietary OS designed for tablets, smartphones and mobile devices is called: macOS Android iOS Chrome OS

iOS = iPhone Operating System


संबंधित स्टडी सेट्स

The Building of the Great Pyramid

View Set

Introduction to Aviation: Unit 2

View Set