CompTIA A+ 220-1002

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following characters indicates that a Windows network share is intended for administrative access?

$

Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network?

- Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab - Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab ( Your answer)

Which type of script filename extension would be used to create a script file that extends the scope of interaction between a user and a web page?

.js

Which of the following answers refers to an example of filename extension used in a cross-platform, general-purpose programming language?

.py

Which of the following answers refer(s) to the Windows Remote Assistance utility? (Select all that apply)

1. Access based on one-time password 2. Temporal remote access 3. The host and invited user can both see the host's screen 4. The host and invited user share control over host's mouse and keyboard 5. Windows tool used for assisted remote troubleshooting

Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers)

1. Dial-up phone number 2. Username 3. Password

Which of the following locations in Windows provide access to dial-up and VPN settings?

1. Internet Options (Connections tab) ( Your answer) 2. Network and Sharing Center ( Your answer) 3. Settings menu

Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)

1. Internet address (domain name or IPv4/IPv6 address) 2. Destination name 3. Smart card (optional)

What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply)

1. Network Name 2. Security Type 3. Encryption Type 4. Security Key

Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)

1. Permanent access 2. Access based on local password (local user account password) 3. Windows tool used for connecting remotely to the user's own computer

Which of the following locations/steps allows to view network shares in Windows?

1. Windows Command Prompt -> net share -> Enter (all network shares) 2. Windows Run dialog box -> \\computer name -> Enter (user shares only) 3. Shared Folders menu in the Computer Management utility (all network shares) 4. Windows Command Prompt -> net view \\computer name -> Enter (user shares only) 5. Windows Command Prompt -> net view \\computer name /all -> Enter (all network shares)

In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: (Select all that apply)

1. Windows Defender Firewall Control Panel applet 2. Firewall & network protection menu in Windows Settings (accessed via Start menu) 3. Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties

Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? (Select 2 answers)

1. Windows Defender Firewall applet in Control Panel 2. Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection

Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? (Select 3 answers)

1. Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item 2. Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall 3. Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

In Windows 7, Windows Firewall can be enabled/disabled in: (Select all that apply)

1. Windows Firewall Control Panel applet 2. Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties

Which of the following locations provide access to proxy settings in Windows? (Select 2 answers)

1. Windows Settings menu -> Network & Internet -> Proxy 2. Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)

1. Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device 2. Control Panel -> Devices and Printers applet -> Add a printer

What physical device or software application is used to restrict which TCP and UDP ports can be used by a network device?

A Firewall is used to restrict network access. In it's simplest form it will block TCP and UDP ports based on number or protocol, but many modern firewalls include complex algorithms to block unusual traffic, detect possible network attacks and monitor or block traffic based on many other factors.

In order for a NIC to work, it may need to be...

Activated in the BIOS menu

Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu?

Advanced

Restoring data from an incremental backup requires:

All copies of incremental backups made since the last full backup Copy of the last full backup

Which of the following statements describing share permissions in MS Windows are true? (Select 2 answers) Apply only to network users Can be set on a file level Apply to both network and local users Can be set on a folder level

Apply only to network users Can be set on a folder level

What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications?

BYOD

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?

COPE

The Internet Properties applet tab containing an option for configuring VPN settings is called...

Connections

Which of the Windows Internet Properties system utility tabs provides access to proxy settings?

Connections

Which of the following is an application software that selectively blocks access to websites?

Content Filter

Which of the following steps provide access to Windows Reliability Monitor? (Select 2 answers)

Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history

Which of the following locations in MS Windows provide access to an automated printer troubleshooting tool? (Select 3 answers) Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> Troubleshooting -> Printer Control Panel (Category view) -> Administrative Tools -> Troubleshooting -> Printer Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot

Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot

Which of the following steps enable displaying protected system files in Windows 8/8.1/10? (Select 2 answers) Control Panel -> Folder Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> General tab -> clear the checkbox next to Hide protected operating system files Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> General tab -> select Show hidden files, folders, and drives

Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files

Which of the following steps enable displaying protected system files in Windows 7? (Select 2 answers) Control Panel -> File Explorer Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> General tab -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot? (Select all that apply) Damaged hard drive BIOS does not detect the hard drive Windows starts in VGA mode System partition not set as active Corrupt Master Boot Record (MBR)

Damaged hard drive BIOS does not detect the hard drive System partition not set as active Corrupt Master Boot Record (MBR)

When a magnetic hard disk is used, what solution can help improve file read/write speeds?

Defragmentation

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?

Degaussing

What is standard/regular formatting?

Every sector is overwritten with zeros and the data cannot be recovered. Implemented on Windows Vista and later.

What is the correct hierarchy of precedence for permissions settings in NTFS? Explicit Allow -> Inherited Allow -> Explicit Deny -> Inherited Deny Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow Explicit Allow -> Explicit Deny -> Inherited Allow -> Inherited Deny Explicit Deny -> Inherited Deny -> Explicit Allow -> Inherited Allow

Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow

T or F? The amount of computer's that can be on a workgroup is limitless...

F. There are typically no more than twenty computers on a single workgroup.

T or ? In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions).

False

T or F? All members of a Windows domain must be on the same local network or subnet

False

T or F? If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files.

False

T or F? In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.

False

T or F? In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.

False

T or F? The Administrative Tools Folder does not have a Disk Cleanup icon.

False

T or F? BranchCache is a feature available to Windows operating systems that allows reading and writing to cached files in the event connectivity is lost to the file server.

False. BranchCache allows files to be read even when a connection cannot be made with the file server. For example, if a warehouse loses connectivity to the file server in the corporate office hundreds of miles away BranchCache could be used to allow warehouse employees to read locally cached files. BranchCache does not support writing to files unless connectivity to the file server can be established.

T or F? The Windows "Work" network profile imposes the strongest security settings...

False. The "Public" profile does.

Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?

File Explorer -> This PC -> Computer tab -> Map Network drive

Which of the following adversely affect performance of a magnetic hard drive? (Select 3 answers) Disk striping Disk mirroring File fragmentation Excessive paging / disk thrashing Insufficient amount of RAM Disk duplexing

File fragmentation Excessive paging / disk thrashing Insufficient amount of RAM

What is low-level formatting?

Formatting provided by the factory that is at the storage medium level, thus bypassing the file system layer.

What Active Directory feature can be used to apply default user account permissions?

Group Policy

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

IP

Which of the following enables installation of software that is not available through the official Apple App Store?

Jailbreaking

Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?

Kerberos

Which of the following terms is used to describe initial hard drive formatting typically performed at the factory by the drive manufacturer?

Low-level format

A user with a laptop running Windows 10 Pro is frequently slowing down when the user leaves their desk. They describe that the machine is fine when they are at their desk, but when in meetings large Excel documents and PowerPoints become sluggish. What is most likely the cause?

Many laptops will enter a power-saving mode while not charging. The power-saving mode is most likely configurable, and will reduce power available to components like the CPU thereby reducing their functionality. You could consider providing a more powerful laptop, disabling the power-saving mode or instructing the user to plug in the charger while in meetings.

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation? Login time restrictions Password complexity setting Account lockout threshold setting Maximum password age setting

Maximum password age setting

Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address?

Port Security also known as MAC Filtering is used to restrict which devices can physically connect to the network. This is done by whitelisting which MAC addresses (the physical address of a Networking Interface Card (NIC) are permitted on the network. It is most commonly done where a network port like an RJ-45 is publicly accessible like in an office waiting area.

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?

Power level controls

What are the pros and cons of a Windows OS?

Pros: Large industry support, broad selection of OS options, and wide variety of software support. Cons: Large install base means a bigger target for security exploitation; large hardware support can create challenges; integration exercises.

What are the pros and cons of a macOS?

Pros: Easy to use, extremely compatible and relatively few security concerns. Cons: Apple hardware only, less industry support, and greater hardware cost.

What are the pros and cons of Linux?

Pros: Free (open source), works on a wide variety of hardware, and has a passionate and active user community. Cons: Limited driver support, especially with laptops; Limited support options.

A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as...

Public

Which format type in MS Windows does not erase disk data?

Quick Format

Which formatting type(s) would typically be performed by a user to reinstall an OS? (Select all that apply)

Quick, Standard, and High-Level Format

The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels? (Select 2 answers)

Read when accessing the share remotely Read when accessing the folder locally

Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions? (Select 3 answers) Right-click on an application icon -> select Run as administrator from the pop-up menu Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Enter In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter In Windows Start menu press and hold Alt + Shift keys -> Left-click on an application icon

Right-click on an application icon -> select Run as administrator from the pop-up menu In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter

What is quick formatting?

Sets up the file system and install a boot sector. Doesn't actually delete the data but rather the pointer to that data (the file index)

An application is opening itself on multiple server and desktop PCs on your employer's network. The application is named Antispyware Remover 2020™ and offers to remove infected malware for a price of $99 per infected operating system. The application is very persistent and pop-ups frequently with flashing colors. What term best describes this scenario?

Some malware, known as Rogue antivirus or Rogue security software, will pretend to be antivirus software in an attempt to trick users into paying a fee to remove malware. Most likely it will just install more malicious software or do nothing (after charging the user of course).

Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors?

Standard Format

Which of the following locations in Windows 7 allows to enable/disable startup applications?

Startup tab of the System Configuration (msconfig.exe) utility

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?

System

What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows? (Select 2 answers)

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive

T or F? Windows-based computers on a network must be part of a workgroup or a domain...

T

T of F? The Security tab of the Internet Properties utility in Windows allows for imposing restrictions on web content allowed in Microsoft Internet Explorer web browser.

True

T or F? BIOS/UEFI passwords improve the security of a workstation. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on, or restrict the scope of changes a user can make in the BIOS/UEFI interface. A type of BIOS/UEFI password with the highest level of permissions is known as supervisor or administrator password; the other type of password is user password.

True

T or F? Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts.

True

A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as:

WPS

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

War driving

Which of the following steps provide access to the disk defragmenter utility in MS Windows? (Select 3 answers) Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Disk Management utility shortcut icon -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Optimize and defragment drive -> Optimize

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize

Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?

Windows Explorer -> Computer -> Map network drive

Which of the following locations provides access to Windows Firewall settings in Windows 7?

Windows Firewall applet in Control Panel

Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects? (Select 3 answers) Control Panel -> Programs and Features -> Optimize visual display -> Personalize appearance and sound effects -> Visual Effects Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> Power Options -> select a power plan -> Change plan settings -> Change advanced power settings -> Desktop background settings -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects

Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:

Wireless site survey

Which of the following answers lists the correct syntax for applying the read-only attribute to a file? attrib +R [drive:] [path] [filename] attrib [drive:] [path] [filename] /read-only attrib /R [drive:] [path] [filename] attrib [drive:] [path] [filename] +R

attrib +R [drive:] [path] [filename]

Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2 and Microsoft Windows?

bat

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error?

bootrec /rebuildbcd

The run command for Computer Management is....

compmgmt.msc

The run command for Disk Management is...

diskmgmt.msc

Windows-based computers on workplace networks are usually part of a...

domain

The run command for Internet Properties is...

inetcpl.cpl

Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)? (Select 3 answers) localhost ::1 FE80::/10 169.254/16 127.0.0.1

localhost ::1 127.0.0.1

The run command for System Configuration is...

msconfig.exe

The run command for System Information is...

msinfo32.exe

What is the run command for performance monitor?

perfmon.exe

Which of the following answers lists the filename extension of a Microsoft PowerShell script files?

ps1

What is the run command for Resource Monitor?

resmon.exe

Which of the following answers refers to a script file type designed to be run in Unix command line?

sh

The run command for System properties is...

sysdm.cpl

What is the run command for task manager?

taskmgr.exe

Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language.

vbs

Windows-based computers on home networks are usually part of a...

workgroup


संबंधित स्टडी सेट्स

verbal and non verbal communication Dr Barba FTC

View Set

Exam 2 Social Psychology Honors KU 361

View Set

Mental Health Exam 3 - Schizophrenia Spectrum Disorders

View Set

Week 12: Measurement and Data Collection

View Set

Ch 35 NC of Pts with Liver, Pancreatic, and Gallbladder Diseases

View Set