Comptia A+ 220-1102 Wrong Answers
Question 15Incorrect Which of the following options in Windows 10 would create a small hibernation file saved on the storage device before shutting down the computer so that it reduces the time to boot up when powered on?
Fast startup
What kind of attack is an example of IP spoofing?
On-path attack
Which of the following encryption types was used by WPA to better secure wireless networks than WEP?
TKIP
You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which of the following settings should be configured on the workstation to achieve this?
Under Internet Options, configure the proxy server address as 10.0.0.15
Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?
WEP
A file currently has permissions of 755. Which of the following commands would change file permission to r-xr--r--?
chmod 544 filename
Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?
dd
You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?
exFAT
Which command would a Linux user need to enter to change their password?
passwd
Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use?
.ps1
Which of the following file types are commonly used by scripts in a Linux command line environment?
.sh
What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?
1 GB
What is the minimum processor required to install Windows 10 (x64) on a device?
1 GHz single-core processor
What is the minimum processor required to install Windows 10 (x86) on a device?
1 GHz single-core processor
Which of the following backup rotation schemes requires backups to be stored to at least two different types of media?
3-2-1 backup
How would you represent r-xrw-r-- in octal notation?
564
Which file system type is used by default when installing macOS on a modern workstation?
APFS
You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?
APIPA
You are helping to set up a backup plan for your organization. The current plan states that all of the organization's Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?
Attempt to restore to a test server from one of the backup files to verify them
Will, an IT technician, has been tasked with investigating a recent Windows upgrade and make a recommendation as to whether the company should upgrade its workstations. He notices that the upgrade will not work with a drawing program that is key to the Drafting Department. He asks the Drafting Department if they would consider using a different drawing program. Which upgrade consideration is represented by his conversation with the Drafting Department?
Backup files and user preferences
Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room's contents?
Biometric lock, Badge reader
Which of the following data types would be used to store the value of TRUE?
Boolean
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?
Clear the app's cache
You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered?
Degaussing of the HDDs
Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA2 password?
Disable WPS
Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's memory properly?
Enterprise
Which of the following is used to communicate data and preferences to child processes within a script or batch file?
Environmental variables
Which attack utilizes a wireless access point made to look as if it belongs to the network by mimicking the corporate network's SSID to eavesdrop on the wireless traffic?
Evil twin
Which of the following types of software CANNOT be updated via the Windows Update program?
Firmware updates
A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?
Install an anti-virus or anti-malware solution that uses heuristic analysis
What is the FIRST step of the seven-step malware removal process?
Investigate and verify malware symptoms
A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?
Loop
What type of structure is a "Do While" in scripting?
Loop
An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?
Mark each email as spam or junk
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
Notepad
Which type of antivirus scan provides the best protection for a typical home user?
On-access scans
When using an MBR, which of the following types of partitions can only have up to four partitions?
Primary
Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?
Proximity cards
A recently hired security employee at a bank was asked to perform daily scans of the bank's intranet to look for unauthorized devices. The new employee decides to create a script that scans the network for unauthorized devices every morning at 2:00 am. Which programming language would work best to create this script?
Python
You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?
Remove any jewelry you are wearing
Samuel's computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?
Remove unnecessary applications from startup, Defragment the hard drive
You recently built a new gaming PC for a customer. The system has an octa-core 64-bit processor, 32 GB of DDR4 RAM, 1 TB SSD, a PCI x16 video card with 8 GB of RAM, and Windows 10 Pro (x86) installed. When you turn on the system, you notice that Windows only recognizes 3.5 GB of RAM. Which component should be upgraded to correct this issue?
Replace the OS with Windows 10 Pro (x64) edition
Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?
SAE
Jason has built a custom Android application that he wants to install on an Android tablet without having to install it through the Play Store. Which of the following would be required to allow him to install the app's APK on the device?
Sideloading
Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?
Swap partition
Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason cannot access the network shares in his home network?
The laptop must join the network as private
Which type of installation would require an answer file to install the operating system?
Unattended
A laptop is running Windows 10 with Windows Defender on it. A user believes their laptop may have become infected with malware, so they install a second antivirus program that supposedly includes real-time protection. Now, the laptop is sluggish and sometimes non-responsive. Which of the following should you do FIRST to resolve this problem?
Uninstall the real-time protection antivirus
You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)
Update the anti-malware software, Disconnect the laptop from the network, Disable System Restore in Windows
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?
Update the smartphone's OS
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?
VNC (Virtual Network Computing)
A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary placeholder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed?
Variable
Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take?
Verify that disabling one service has not affected others
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?
bootrec /fixboot
Which of the following commands is used on a Linux system to search for lines that match a pattern within a file?
grep
Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?
resmon.exe
What umask should be set for a directory to have 700 as its octal permissions?
rwx------
While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?
sfc