Comptia A+ 220-1102 Wrong Answers

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Question 15Incorrect Which of the following options in Windows 10 would create a small hibernation file saved on the storage device before shutting down the computer so that it reduces the time to boot up when powered on?

Fast startup

What kind of attack is an example of IP spoofing?

On-path attack

Which of the following encryption types was used by WPA to better secure wireless networks than WEP?

TKIP

You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which of the following settings should be configured on the workstation to achieve this?

Under Internet Options, configure the proxy server address as 10.0.0.15

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?

WEP

A file currently has permissions of 755. Which of the following commands would change file permission to r-xr--r--?

chmod 544 filename

Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?

dd

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?

exFAT

Which command would a Linux user need to enter to change their password?

passwd

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use?

.ps1

Which of the following file types are commonly used by scripts in a Linux command line environment?

.sh

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

1 GB

What is the minimum processor required to install Windows 10 (x64) on a device?

1 GHz single-core processor

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz single-core processor

Which of the following backup rotation schemes requires backups to be stored to at least two different types of media?

3-2-1 backup

How would you represent r-xrw-r-- in octal notation?

564

Which file system type is used by default when installing macOS on a modern workstation?

APFS

You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?

APIPA

You are helping to set up a backup plan for your organization. The current plan states that all of the organization's Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?

Attempt to restore to a test server from one of the backup files to verify them

Will, an IT technician, has been tasked with investigating a recent Windows upgrade and make a recommendation as to whether the company should upgrade its workstations. He notices that the upgrade will not work with a drawing program that is key to the Drafting Department. He asks the Drafting Department if they would consider using a different drawing program. Which upgrade consideration is represented by his conversation with the Drafting Department?

Backup files and user preferences

Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room's contents?

Biometric lock, Badge reader

Which of the following data types would be used to store the value of TRUE?

Boolean

You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?

Clear the app's cache

You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered?

Degaussing of the HDDs

Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA2 password?

Disable WPS

Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's memory properly?

Enterprise

Which of the following is used to communicate data and preferences to child processes within a script or batch file?

Environmental variables

Which attack utilizes a wireless access point made to look as if it belongs to the network by mimicking the corporate network's SSID to eavesdrop on the wireless traffic?

Evil twin

Which of the following types of software CANNOT be updated via the Windows Update program?

Firmware updates

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?

Install an anti-virus or anti-malware solution that uses heuristic analysis

What is the FIRST step of the seven-step malware removal process?

Investigate and verify malware symptoms

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

Loop

What type of structure is a "Do While" in scripting?

Loop

An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?

Mark each email as spam or junk

Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?

Notepad

Which type of antivirus scan provides the best protection for a typical home user?

On-access scans

When using an MBR, which of the following types of partitions can only have up to four partitions?

Primary

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

Proximity cards

A recently hired security employee at a bank was asked to perform daily scans of the bank's intranet to look for unauthorized devices. The new employee decides to create a script that scans the network for unauthorized devices every morning at 2:00 am. Which programming language would work best to create this script?

Python

You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?

Remove any jewelry you are wearing

Samuel's computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?

Remove unnecessary applications from startup, Defragment the hard drive

You recently built a new gaming PC for a customer. The system has an octa-core 64-bit processor, 32 GB of DDR4 RAM, 1 TB SSD, a PCI x16 video card with 8 GB of RAM, and Windows 10 Pro (x86) installed. When you turn on the system, you notice that Windows only recognizes 3.5 GB of RAM. Which component should be upgraded to correct this issue?

Replace the OS with Windows 10 Pro (x64) edition

Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?

SAE

Jason has built a custom Android application that he wants to install on an Android tablet without having to install it through the Play Store. Which of the following would be required to allow him to install the app's APK on the device?

Sideloading

Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?

Swap partition

Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason cannot access the network shares in his home network?

The laptop must join the network as private

Which type of installation would require an answer file to install the operating system?

Unattended

A laptop is running Windows 10 with Windows Defender on it. A user believes their laptop may have become infected with malware, so they install a second antivirus program that supposedly includes real-time protection. Now, the laptop is sluggish and sometimes non-responsive. Which of the following should you do FIRST to resolve this problem?

Uninstall the real-time protection antivirus

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

Update the anti-malware software, Disconnect the laptop from the network, Disable System Restore in Windows

You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?

Update the smartphone's OS

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?

VNC (Virtual Network Computing)

A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary placeholder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed?

Variable

Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take?

Verify that disabling one service has not affected others

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?

bootrec /fixboot

Which of the following commands is used on a Linux system to search for lines that match a pattern within a file?

grep

Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?

resmon.exe

What umask should be set for a directory to have 700 as its octal permissions?

rwx------

While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?

sfc


संबंधित स्टडी सेट्स

Portfolio MGMT CH 8: Asset Pricing Models

View Set

Microeconomics Chapter 9 Assignment

View Set

CH 1-3 Organizational Behavior Review

View Set

Chapter Five: Consolidated Financial Statements: Outside Interests

View Set

Chandra - Medical Terminology Quiz #1

View Set

PSYCH unit 3 Module 19. The Nonvisual Senses

View Set

Complete each term from its meaning

View Set

Business Finance Ch 6 Reading assignment - Connect

View Set