CompTIA A+ 220-1102 Practice Exam B
Jack, a technician, is scheduled to replace a faulty motherboard today, but the motherboard delivery has been delayed and will not arrive until tomorrow. The new motherboard will repair a laptop used by a company executive. Which of the following would be the BEST way to handle these events?
Contact the end user and inform them of the shipping issue
Which of the following Windows Share permissions has the priority when assigning access on a mapped drive?
Deny
A server administrator is installing a 4 TB drive in a database server and would like to use all free space as a single partition. Which of the following technologies should be used with this drive?
GPT
Which of the following partition types limit a Windows installation to a maximum partition size of 2 TB?
MBR
A technician has been asked to power down and store a server that has been exploited by an external attacker. The legal department will be performing tests and gathering information from this server. Which of the following
Maintain a chain of custody
A manufacturing company is donating some older computers to a local charity. Which of the following should be done to ensure that the existing hard drives could still be used but none of the existing data would be recoverable?
Regular format
A technician is delivering a new laptop to a user and moving the older laptop to a different user. Which of the following would allow the existing hard drive to be used but prevent recovery of any of the previous user's data?
Regular format
A technician has created a Windows image that can be used across all of the computers in a test lab. Which of the following would be the best way to deploy these images?
Remote network installation
A user in the shipping department has logged into the Windows domain. However, the desktop does not show the user's normal wallpaper and all of the user's spreadsheets and documents in the "My Documents" folder are missing. Which of these would be the BEST way to restore the user's normal work environment?
Rename the user's folder and delete their profile in the registry
A user is performing a series of Google searches, but the results pages are displaying links and advertisements from a different website. This issue occurs each time a Google search is performed. The same Google search on a different computer results in a normal Google results page. Which of the following would resolve this issue?
Run a malware removal utility
A user runs a corporate app on their smartphone that downloads a database each time the app is started. This download process normally takes a few seconds, but today the download is taking minutes to complete. Which of the following should a technician follow as the best NEXT troubleshooting step?
Run a network speed check
A user is receiving alerts on their desktop computer stating, "Access to this PC has been blocked for security reasons." A technician has determined this message was not created by the company's security software. Which of the following would be the best NEXT step in this troubleshooting process?
Run an anti-malware utility
A desktop administrator is troubleshooting an older computer that has been slowing down as more applications and files are stored on the hard drive. Which of the following commands would be the BEST choice for increasing the performance of this computer?
defrag
A system administrator has been tasked with locating all of the log files contained within an application folder. The folder currently contains over a thousand files, and only a portion of them have a .log extension. Which of these Windows commands would be the BEST way to find these files?
dir
A desktop administrator is moving an SSD from one laptop to another. Which of the following should be used to protect the SSD during the move?
Anti-static bag
A security administrator has been asked to reinstall Windows on a web server diagnosed with a rootkit infection. Which of the following installation methods would be the BEST choice for this server?
Clean install
A local coffee shop has a public wireless network for customers and a private wireless network for company devices. The shop owner wants to be sure that customers can never connect to the company network. Which of the following should be configured on this network?
Configure WPA3 on the company network
A system administrator is analyzing a problem with a USB flash drive on a Windows 10 computer. When the flash drive is inserted, the CPU utilization increases to 100%. The administrator would like to disable one of the computer's USB controllers for troubleshooting. Which of the following would provide this functionality?
Device Manager
A manufacturing company performs a third-party audit of their accounting records each year. The auditors use laptops provided by the company to access internal resources. When the audit is complete, the auditors should be prevented from logging on until the following audit process begins. Which of the following would be the BEST way to accomplish this?
Disable the user accounts between audits
A system administrator has just updated fifty servers to the latest version of an application, and the updated software has been working as expected for the last three days. Which of the following change management steps should be followed NEXT?
Document the changes
Which of the following features would be found in Windows 10 Pro but not in Windows 10 Home?
Domain access
A user would like to encrypt a small group of files in a shared folder without modifying other files on the drive. Which of the following would be the BEST way to accomplish this?
EFS
Jack, a user, has opened a help desk ticket to remove malware from his laptop. A previous removal occurred two weeks earlier with a similar malware infection. Which of the following was missed during the first malware removal?
Educate the end-user
A data center manager would like to ensure that a power fault on a server would not be harmful to employees. Which of the following would be the BEST choice for this requirement?
Electrical ground
A desktop administrator has just removed malware from a user's desktop computer and has configured the system to automatically update antivirus signatures and perform a scan each night. Which of the following should be the NEXT step in the removal process?
Enable System Protection
A medical research company is using laptop computers when visiting testing centers. The IT security team is concerned about a data breach if a laptop is lost or stolen. Which of the following would be the BEST way to manage this issue?
Full disk encryption
A user's video editing workstation often performs an overnight rendering process. On some mornings, the user is presented with a login screen instead of the rendering completion page. A technician finds the building occasionally loses power overnight. Which of the following should be used to avoid these issues with the video editing workstation?
Install a UPS
A help desk technician has been tasked with rebuilding an email server that recently crashed. Which of the following would be the BEST source for this information?
Knowledge base
A system administrator has inadvertently installed a Trojan horse that has deleted a number of files across many Windows file shares. The Trojan also had access to user documents and login credentials and transmitted numerous documents to an off-site file storage system. Which of the following would limit the scope of future exploits?
Modify the default permissions
A user is reporting some apps launched on their mobile phone will show an error message and then disappear without starting. This problem occurs with a group of apps normally used during the work day. Which of the following tasks would be the FIRST step for troubleshooting this issue?
Power cycle the phone
Why would a technician use an ESD strap?
Prevent damage from static electricity
A security administrator is installing a new VPN connection for remote users. The administrator would like all users to authenticate with their Windows Active Directory credentials. Which of the following technologies would provide this functionality?
RADIUS
A desktop administrator is upgrading an older computer to support the 64-bit version of Windows 10 Pro. The computer currently has: 1 GHz CPU 1 GB of RAM 50 GB of free storage space 1024 x 768 video resolution Which of the following should be upgraded to support the Windows 10 installation?
RAM
A user in the shipping department has received a call from someone claiming to be from the IT Help Desk. The caller asks the user to disclose their location, employee ID, and login credentials. Which of the following would describe this situation?
Social engineering
A company has just performed annual laser printer maintenance, and has accumulated hundreds of used toner cartridges. Which of the following would be the BEST way to dispose of the old cartridges?
Take to a hazardous waste facility
A company's shipping department maintains ten different computers to print shipping labels and track outgoing shipments. All of the systems are displaying an error when they access a third-party shipping management website over a secure connection. Which of the following would be the MOST likely reason for this issue?
The website certificate has expired
A macOS server administrator needs a backup system to allow the recovery of data from any point in the last thirty days. Which of the following should be used for this requirement?
Time Machine
A mobile user is using apps on their smartphone for all business tasks. To ensure that no data will be lost, the smartphone will need to have multiple backups each day. The user travels most of the time and rarely visits the home office. Which of the following would be the best way to provide these backups?
Use a cloud backup service
Jack, a user in the accounting department, is having an issue with his smartphone reaching websites and retrieving mail when working from home. Inside the office, the phone appears to work normally. Which of the following would be the best NEXT step for troubleshooting this issue?
Verify the network configuration at home
A user needs to modify a spreadsheet for an upcoming meeting. The spreadsheet is currently stored on a remote computer in a shared drive. The user would like to access the shared drive as a drive letter inside of Windows File Explorer. Which of the following command line options would provide this functionality?
net use