CompTIA A+ Core 2 - #1: 30 Questions (3/3)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A customer is complaining that her laptop is too slow. You have thoroughly checked the device but cannot find anything wrong with it. Which of the following is the best thing to say NEXT? "Can you tell me more about the problem? What do you mean by 'it is acting slow'?" "I don't understand what you are complaining about; this laptop seems plenty fast to me." "Excuse me for a moment; my phone is buzzing." "I found nothing wrong with this laptop that would make it slow."

"Can you tell me more about the problem? What do you mean by 'it is acting slow'?" - When dealing with a difficult customer or situation, you should follow five key principles: (1) Do not argue with customers and/or become defensive; (2) Avoid dismissing customer problems; (3) Avoid being judgmental; (4) Clarify customer statements (ask open-ended questions to narrow the problem's scope, restate the issue, or question to verify understanding); and (5) Do not disclose experiences via social media outlets.

An employee at Dion Training complains that their smartphone is broken. They state that it cannot connect to the internet, nor can it make or receive phone calls and text messages. You ask them to start up the music player on his phone, and it opens without any issues. It appears the common issue has to do with the device's network connectivity. Which of the following is MOST likely the problem with this smartphone? The Bluetooth connection is disabled The VPN password was entered incorrectly The cellular radio in it is broken Airplane mode is enabled on the device

Airplane mode is enabled on the device - If the smartphone is functioning properly except for applications that require network connectivity, then the issue is either a misconfiguration (like enabling airplane mode by mistake), a defective cellular radio chip, or a similar issue.

You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses that are not on the list. Which of the following should be implemented? Blocklist Allow list MAC filtering Port forwarding

Allow list - An allow list is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do? Answer the phone and politely ask the user to call back later Answer the phone, put the user on hold, and help them after their scheduled break Ask another Tier 2 technician to answer the call since it will take too long to solve Troubleshoot the issue for the user regardless of how long it takes

Ask another Tier 2 technician to answer the call since it will take too long to solve - Since the Tier 2 technician already knows that this will take some time to resolve, it would be best to ask another technician to help the user since they are scheduled for their break.

Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors? MAC address Location Asset ID IP address

Asset ID - The asset ID should be used to uniquely identify each piece of hardware tracked in an asset management database.

A user cannot change their iPad display from landscape to portrait when they are on the home screen. Which of the following is MOST likely the reason for this issue? NFC is disabled Developer mode is enabled Autorotate is disabled Smartphone has overheated

Autorotate is disabled - If the iPad will not change from landscape to portrait mode, it is likely that the autorotate feature has been disabled by the user accidentally. To enable autorotation, the user needs to swipe down from the top right corner of the screen to open their Control Center.

Which of the following policies or plans would describe the access requirements for connecting a user's laptop to the corporate network? Bring your own device policy Password policy Onboarding policy Remote access policy

Bring your own device policy - A bring your own device (BYOD) policy allows, and sometimes encourages, employees to access enterprise networks and systems using personal mobile devices such as smartphones, tablets, and laptops.

A user is having an issue with a specific application on their Android device. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue? Rollback the application to the previous version Update the operating system of the two smartphones Reinstall the malfunctioning application Clear the local application cache

Clear the local application cache - To solve an issue with a mobile application, you should normally attempt the following steps. First, clear the application cache since this locally stored information can become glitchy and cause an app to crash. If you have two of the same smartphones having the same issue, it is unlikely to be the application cache causing the issue. In this case, the technician would then attempt to update the OS of the smartphones. Updating the operating system can minimize compatibility issues and fix crashing applications. Third, you can try reinstalling the application if the other two options don't work.

Which of the following Control Panel sections would a technician use to configure a Windows 10 computer to use Narrator mode to read aloud the list of files that appear on the screen to the user? File Explorer Options Ease of Access Sound Indexing Options

Ease of Access - The Ease of Access section of the Control Panel brings together the functionality for the accessibility features in Windows, including visual, tactile input, and speech recognition settings to assist those with disabilities.

You are trying to copy a 4.7 GB file from your Windows laptop to an external hard drive using USB 3. The external hard drive is formatted with FAT32. Every time you attempt this copy, you receive an error. What is MOST likely the issue? USB 3 is too slow to transfer a file this large Files over 4 GB cannot be stored on a FAT32 formatted drive The external hard drive must be formatted as APFS to support this transfer The laptop must be reformatted as FAT32 to support this transfer

Files over 4 GB cannot be stored on a FAT32 formatted drive - Since this file is 4.7 GB in size, it cannot be stored as a single file on the FAT32 hard drive. The file allocation table 32-bit (FAT32) is the 32-bit file system supported by Windows, macOS, and Linux computers.

Elizabeth was replacing a client's security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem? DNS DHCP Content filter Firewall

Firewall - A firewall is an integral part of creating a screened subnet. If configured correctly, it can regulate exactly what traffic and users are allowed to access the server.

Which version of Windows 10 does NOT support joining a domain or using Group Policy management? Enterprise Pro Education Home

Home - Windows 10 supports domains and Group Policy management in every version except the Home edition. If you are using the Pro, Education, and Enterprise edition, you can join a domain and use Group Policy management.

You are troubleshooting a user's computer. As part of your efforts, you want to install a new login with administrative privileges. Which of the following utilities should you use? Group Policy Local Users and Groups System Configuration System Information

Local Users and Groups - Local users and groups (lusrmgr.msc) is a utility used to assign rights and roles to different users and groups on a local computer. Group policy editor (gpedit.msc) is a utility used to define and control how programs, network resources, and the operating system operate for users and computers in an organization.

Which of the following would leave a user's programs running on their Windows 10 laptop while preventing other users from accessing them without entering the correct password? Sleep Hibernate Shutdown Lock

Lock - If you need to leave your computer for a moment, you can use the lock option. This will allow any currently running programs and files to remain open while simultaneously preventing other users from accessing or using the computer while you are away.

A company has had several virus infections over the past few months. The root cause was determined to be known vulnerabilities in the software applications in use by the company. What should an administrator implement to prevent future outbreaks? Incident response team Patch management Acceptable use policies Host-based intrusion detection systems

Patch management - Since the viruses exploited known vulnerabilities, there should be patches available from the manufacturer/vendor. Patch management is the process of distributing and applying updates to the software to prevent vulnerabilities from being exploited by an attacker or malware.

A penetration tester sends an email out to 100,000 random email addresses. In the email the attacker sent, it claims that "Your Bank of America account is locked out. Please click here to reset your password." Which of the following attack types is being used? Whaling Phishing Spear phishing Vishing

Phishing - Phishing is an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to "click here" to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack? Spear phishing Phishing Whaling Brute force

Phishing - Phishing is an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

Jason is working in Microsoft Word, but the application appears to have become frozen and unresponsive. Which of the following features in the Task Manager should he use to terminate the unresponsive program? Performance Processes Services Startup

Processes - The task manager is an advanced Windows tool that has 7 tabs that are used to monitor the Processes, Performance, App History, Startup, Users, Details, and Services on a computer.

Jason has an old 2017 Dell Laptop that he uses to connect to his office network while traveling. The computer is slow and is running Windows 7. The laptop's screen was recently cracked and needs replacement. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend? Replace the display and contact the manufacturer for reimbursement Sell him an external 15" tablet/monitor to connect to the laptop as a workaround Replace the display and charge him for the parts/installation Purchase a new laptop as the cost to repair might be more than a new laptop

Purchase a new laptop as the cost to repair might be more than a new laptop - In this scenario, you should recommend that he purchase a new laptop. Since the laptop is 5-7 years old, it is unlikely to be worth the cost of repair since he could buy a new laptop for $200 to $500.

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing? Disable the laptop's wired and wireless network cards Remove, quarantine, or erase the infected files Enable System Restore and perform a backup Review the type, symptoms, purpose, and removal of the malware

Remove, quarantine, or erase the infected files - Based on the question, you are now in step four of the malware removal process: Remediate the infected system.

A web server has a planned firmware upgrade for Saturday evening. During the upgrade, the power to the building is lost, and the firmware upgrade fails. Which of the following plans should be implemented to revert to the most recent working version of the firmware on the webserver? Contingency plan Rollback plan Alternative plan Backup plan

Rollback plan - A backout plan or rollback plan is an IT governance integration approach that specifies the processes required to restore a system to its original or earlier state in the event of failed or aborted implementation.

You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the scope of work and change request before its approval? Rollback plan Risk analysis Plan for change End-user acceptance

Rollback plan - This is a difficult question because all of these items should be included in a Request for Change (RFC), but the most important is a proper backout plan.

A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation? Security log System log Setup Application log

Security log - The event viewer shows a log of application and system messages, including errors, information messages, and warnings.

You are renting space in another company's data center. To protect your server from being physically accessed when you are not in the building, what device should you use? USB lock Server lock Smart card Entry control roster

Server lock - A server lock is a physical locking mechanism installed on a server cabinet to prevent unauthorized from accessing the servers. The server lock could be a cipher lock, biometric lock, or a simple keyed lock depending on the level of security needed.

Christina recently purchased a new Android smartphone and is going on a trip. At the airport, she found a public wireless network called "FreeAirportWiFi" and connects to it. She noticed a question mark (?) icon showing in the toolbar next to the Wi-Fi icon. Christina attempts to open a webpage but gets an error of "The page cannot be displayed." She begins to troubleshoot the device by verifying that the airplane mode is disabled, Bluetooth is enabled, and tethering is enabled. Next, Christina attempts to make a phone call, which works without any issues. Which of the following is MOST likely the issue with Christina's smartphone? The smartphone does not have a valid data plan enabled The smartphone is connected to the FreeAirportWifi but is not authenticated yet The smartphone's SIM card is deactivated The smartphone can only support 3G data networks

The smartphone is connected to the FreeAirportWifi but is not authenticated yet - When an Android smartphone is connected to the Wi-Fi but shows a question mark (?) next to the Wi-Fi's radio icon, this indicates that there is a lack of internet connectivity on the current wireless network.

A customer's Android smartphone is only 6 months old but is becoming excessively slow. When questioned, the customer states it was acting fine until they recently installed a new stock market tracking app. What action should you take to troubleshoot the slow performance on this phone? Factory reset the smartphone and reinstall all the apps Uninstall the app, reboot the phone, and reinstall the app Replace the phone with a newer model Perform a hard reboot of the smartphone

Uninstall the app, reboot the phone, and reinstall the app - The best option in this scenario is to uninstall and reinstall the stock market app. When apps are updated automatically, they can sometimes become faulty or corrupted and slow down performance on the device.

Which version of Windows supports Virtual Desktops? Windows 8 Windows 7 Windows 8.1 Windows 10

Windows 10 - Windows 10 added support for Virtual Desktops like those long seen on Linux and Mac OS X.

During the reconnaissance phase of a penetration test, you have determined that your client's employees all use Android smartphones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these? Use a tool like ICSSPLOIT to target specific vulnerabilities Use social engineering to trick a user into opening a malicious APK Identify a jailbroken device for easy exploitation Use web-based exploits against the devices web interfaces

Use social engineering to trick a user into opening a malicious APK - When targeting mobile devices, you must first determine if the company uses iPhones or Android-based devices. If they are using Android-based devices, you can use social engineering to trick a user into installing a malicious APK.

Which of the following types of attacks occurs when an attacker specifically targets the CEO, CFO, CIO, and other board members during their attack? Spear phishing Vishing Whaling Phishing

Whaling - Whaling is an email-based or web-based form of phishing that targets senior executives or wealthy individuals. Spear phishing is the fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.

What permissions would be represented by the octal 517? r-xrwx--x r-x--xrwx rwx--xr-x --xr-xrwx

r-x--xrwx Explanation: R-X is 5, --X is 1, and RWX is 7. In Linux, you can convert letter permissions to octal by giving 4 for each R, 2 for each W, and 1 for each X. R is for read-only, W is for write, and X is for execute. The permissions strings are written to represent the owner's permissions, the group's permissions, and the other user's permissions.


संबंधित स्टडी सेट्स

Montanas, Sobrevivir en el Monte Everest

View Set

Chp.10 The Kingdom of God Interactive Questions

View Set

Supreme Court Cases dealing with Freedom of Speech

View Set

"Of Mice and Men" Chapter 1-2 Review, "Of Mice and Men" Chapter 1-2 Review

View Set

Mastering Biology Reading Quiz #14 and #15

View Set