CompTIA A+ Core 2 Final Assessment

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An organization executes a project to replace all of its servers. A change that is requested by management goes through a risk analysis exercise before moving to approval. What attributes are associated with qualitative approaches? (Select all that apply.) Previous experience Opinions Discrete values Data

Previous experience Opinions

A Windows user runs the Performance Monitor tool to check disk activity. What counter is the best option the user can evaluate to understand how busy the disk is at any given time? % disk time Average disk queue length Available bytes Pages/sec

% disk time

A user enables privacy settings on a Windows 10 computer. Which settings pertain to app permissions? (Select all that apply.) Location service Language settings Use of speech Camera and microphone

Location service Camera and microphone

A Windows 7 computer user requires help from the IT department. A technician instructs the user to create an invitation file. What type of Windows help session does the user create? Microsoft Remote Assistance Microsoft Remote Desktop Microsoft Quick Assist Secure Shell

Microsoft Remote Assistance

An IPv6 address is made up of bits that identify the network and host of a system. How many bits long is an IPv6 address in total, and how many bits identify the host portion? (Select all that apply.) 128 32 256 64

128 64

A systems administrator configures a hardware firewall to allow remote desktop connections to various Windows computers. This involves port forwarding. Which port will the administrator need to change so that each system uses a unique port? 22 5900 443 3389

3389

A user looks to implement Virtual Network Computing (VNC) access to a Windows computer while traveling. Which port does the user open on a hardware firewall to allow access? 443 22 5900 3389

5900

A company implements several types of security mechanisms around a high-risk data center. One of the mechanisms allows for a panic button to be pressed. Which security type does this button represent? Circuit Motion Duress Proximity

Duress

An iOS user struggles with wirelessly connecting a set of headphones to a phone. What does the user check on the phone while troubleshooting? (Select all that apply.) Bluetooth connection WiFi connectivity AirDrop properties Pairing mode

Bluetooth connection Pairing mode

A user upgrades the memory in a Windows corporate workstation from 4 GB to 8 GB. After the upgrade, the user notices that only 4 GB is recognized by the system. What does the user conclude the problem to be? A 64-bit version of Windows The Enterprise version of Windows A 32-bit version of Windows The Server version of Windows

A 32-bit version of Windows

A user opens a help desk ticket after seeing that a company video, embedded within a particular internal webpage, is not displaying as it should. What does a support technician conclude to be the most likely issue? A plugin An extension A search provider An API

A plugin

Which proprietary file system does a Mac workstation use? NTFS APFS ext4 FAT32

APFS

A user experiences difficulty paying a retailer with a touchless near-field supported phone. What does the user check while troubleshooting? AirDrop Airplane mode Bluetooth Pairing

Airplane mode

A recent software installation on a Windows desktop fails. Which internal log file does a technician review to see what may have gone wrong? System Application Security Setup

Application

A user contacts an IT help desk to report that when trying to browse a web page for office supplies, a completely unrelated webpage about gambling is presented. What does the help desk determine the causes could be? (Select all that apply.) Certificate problem Browser redirection DNS spoofing Service problems

Browser redirection DNS spoofing

An iOS smart device user notices that AirDrop is not working properly as files are not being received. What should the user check while troubleshooting? (Select all that apply.) LAN Bluetooth Wi-Fi Near-field

Bluetooth Wi-Fi

A problematic Windows system with multiple operating systems installed does not boot properly. A support technician tries to diagnose by outlining the boot process. The technician determines that the system uses an Extensible Firmware Interface (EFI) system partition. Which file does the technician inspect for problems related to a specific operating system boot problem? BOOTMGR NTOSKRNL HAL BOOTMGFW

BOOTMGFW

A computer user looks to map a network drive using the most basic scripting language possible. Which language does the user implement for a Windows system? PowerShell VBScript Python Batch script

Batch script

A company looks to dispose of old computers and related equipment. Which items require special care? (Select all that apply.) Mouse Pad Batteries Toner Motherboard

Batteries Toner Motherboard

A user contacts an IT helpdesk. The complaint is that the computer is very sluggish. Support personnel notices high graphics processing unit (GPU) use. What does the helpdesk determine to be the issue? Ransomware Cryptominer Keylogger Remote access Trojan

Cryptominer

A systems engineer would like to keep a company's wireless network a secret. How can the engineer accomplish this? Use content filtering. Disable service set ID broadcast. Enable port forwarding. Use port-triggering rules.

Disable service set ID broadcast.

A company establishes a mobile device deployment model. The policy states that a corporate-owned phone may be used for personal reasons. Which deployment is in use? BYOD COBO COPE CYOD

COPE

A computer security team investigates a high-level computer breach at a large company. While investigating one of the computers in question, the team found that computer equipment was improperly secured, causing the equipment to be passed around during the investigation with no tracking. What are the primary concerns for the team from this discovery? (Select all that apply.) Incident documentation Latent evidence Chain of custody Data integrity

Chain of custody Data integrity

A technician configures a legacy computer for a user. Which account authentication policies does the technician implement? (Select all that apply.) Change the default admin password. Disable the guest account. Set any user permissions. Secure any critical hardware.

Change the default admin password. Disable the guest account.

A user would like to install an updated Windows operating system (OS) on a computer. There are no files that need to be saved. What options does the user have to accomplish this? (Select all that apply.) Recovery partition Windows reset Clean install In-place upgrade

Clean install In-place upgrade

A technician would like to set every Windows computer at an organization to have a company logo as a desktop wallpaper. What does the technician determine as the best method for deploying the setting? Login script Domain group policy Local group policy Administrative template

Domain group policy

A new support technician works on entry-level trouble tickets. Which question does the technician use as a closed type of question? What caused the problem to happen? What happened to create the problem? What is the computer's problem? Did you read the message?

Did you read the message?

A technician configures a backup routine on an important workstation. Which type does the routine use when only backing changes since the last full backup? Synthetic Full Incremental Differential

Differential

A user suspects that a USB drive on their system has been tampered with. The user accidentally dropped the USB drive, breaking the chip inside it. What does the user compromise? Incident documentation Latent evidence Data integrity Chain of custody

Data integrity

A user builds a new computer for gaming purposes. The ability to upgrade the performance graphics processing unit (GPU) over time is desired. What GPU type does the user invest in? Integrated graphics Video RAM Dedicated graphics System RAM

Dedicated graphics

A company disposes of old computer systems. While doing so, all hard drives are removed and scheduled for physical destruction. Which method will NOT work with a solid state drive (SSD)? Shredding Incinerating Degaussing Drill and hammer tools

Degaussing

A new help desk technician receives a support call from a user. What initial information does the technician ask the user to provide? (Select all that apply.) Description of the issue Contact details System specifications Hard drive type

Description of the issue Contact details

A company has several offices within the United States. Engineers look to configure Microsoft DirectAccess virtual private networking technology for remote connections. Engineers instruct IT to deploy which operating system to Windows desktops? Enterprise Pro Home Education

Enterprise

A user loses their smartphone that is set up for roles as both personal and work-related functions while traveling. The IT department initiates the securest measure possible to impact work-related data only. What action does the IT department take? Remote lock Device wipe Enterprise wipe Remote call

Enterprise wipe

A computer store help technician installs a Windows 10 edition that is designed for domestic consumers and SOHO business use. What edition has been installed in this instance? Pro Education Enterprise Home

Home

A data analyst is creating new disaster recovery and prevention method guidelines after exposure to a recent data breach. What factors should be considered when developing a disaster recovery plan? (Select all that apply.) Identify scenarios for natural and man-made disasters. Perform backups of data and configuration files on a regular basis. Identify tasks, resources, and responsibilities for responding to a disaster. Create a custom recovery image for use in restoring a computer.

Identify scenarios for natural and man-made disasters. Identify tasks, resources, and responsibilities for responding to a disaster.

A Windows user runs the Defragment and Optimize Drives tool (dfrgui.exe) on a solid state drive (SSD). What action will the tool take on the drive? (Select all that apply.) Rewriting of data into contiguous clusters Identifying blocks that are deletable Tagging blocks as writable Tracking files that can be safely erased

Identifying blocks that are deletable Tagging blocks as writable

An engineer configures numerous firewall rules on a system. If no specific rule or permission explicitly grants access and is automatically denied by default, what security function is in place? Implicit deny Explicit deny Least privilege Physical control

Implicit deny

A novice user wants to use a feature where they do not have to manually clear their cache after conducting browsing activity. Which feature fulfills this need? Cache clearing Incognito mode Pop-up blocker Browser settings

Incognito mode

While implementing security on a small network, an administrator ensures that any data modification is legitimate. What security property pertains to this principle? Confidentiality Integrity Availability Acceptability

Integrity

A user modifies a Windows 10 computer's ease of access settings. Which settings group configures Keyboard usability? Vision Hearing Power Interaction

Interaction

A user claims that they cannot browse the local shared network by name. After evaluating the computer's IP settings and pinging the local share by IP address with no problem, what does a support technician determine as the cause? Missing IP address Missing gateway address Missing DNS address Missing subnet address

Missing DNS address

A user wishes to enable multiple desktops within macOS for different work environments. What feature makes this possible? Mission Control Terminal Spotlight Search Dock

Mission Control

A user looks to reconfigure an IP address for a network adapter. Which Control Panel applet is the most direct? Network & Internet Network Connections Network and Sharing Center Advanced sharing settings

Network Connections

A user boots and installs a legacy Windows operating system on a computer. The user notices that after installation, the system requires many drivers and updates to bring it to a healthy and up-to-date state. The user finds that it is not possible to add updates to which installation media type? Network boot Non-Writeable Optical Disk Flash drive Internet-based

Non-Writeable Optical Disk

A new support technician interfaces with a user that has a computer problem. While discussing the problem, the technician gives undivided attention to the user and asks questions where the person creates their own response. When discussing the problem, what does the technician practice? (Select all that apply.) Close-ended questions Open-ended questions Active listening Use of jargon

Open-ended questions Active listening

A systems administrator configures a new Windows workstation. The system uses the New Technology File System (NTFS). The administrator needs the system to interact with a Linux system and support a set of common interface standards for compatibility. Which compliance does the administrator need to ensure? Indexing Journaling Snapshots POSIX

POSIX

A user installs an application on a Linux system by using which method in the operating system? Package manager Add remove programs Partition manager Optical drive

Package manager

A user finds their Android smartphone to be unresponsive when trying to use an app. How might the user resolve the problem so that they may use the phone? Perform a factory reset. Remove the battery. Run an update. Perform a soft reset.

Perform a soft reset.

What might a security engineer suggest as a solution to deter lunchtime attacks? Strong password Biometrics Permissions Policies

Policies

An attacker uses a script to create fileless malware that requires no compilation. What scripting environment does the attacker utilize? PowerShell VBScript Python Javascript

PowerShell

An engineer configures an Authentication, Authorization, and Accounting (AAA) server to authenticate credentials for remote users. Credentials are forwarded to the AAA server from a firewall. Which AAA method does the engineer utilize? TACACS+ RADIUS Kerberos Active Directory

RADIUS

A security engineer suggests the use of proximity technology to track the movement of portable equipment. What solution does the engineer recommend? Passive infrared Microwave radio Radio frequency Concealed sensor

Radio frequency

A user at an organization calls the IT help desk in a panic. The user exclaims that according to a message on the computer, someone is trying to extort them. What type of malware does the user experience? Rootkit Worm Ransomware Trojan

Ransomware

A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration? Windows refresh Recovery partition Clean install In-place upgrade

Recovery partition

A user experiences a blue screen of death (BSoD) while using a Windows desktop computer. Upon initial inspection, no debris is observed in the tower. What does a support technician determine to be a good first troubleshooting step? Check the system for malware. Reinstall the operating system. Remove any newly installed hardware. Clean any dust from the system.

Remove any newly installed hardware.

A user with a problematic Windows system tries to use a previously created system image. How does the user access the image? (Select all that apply.) Start Menu Repair disk Reset this PC Advanced boot

Repair disk Advanced boot

A user inspects and learns about the electrical components on the inside of a computer. What is measured in ohms? Current Voltage Resistance Watts

Resistance

An administrator reviews an audit log and notices strange logins when the business is closed. Which policy does the administrator use to deter this activity? Restrict login times Failed login lockout Concurrent logins Use timeout

Restrict login times

A tech has an Android tablet that no longer receives updates due to its age. Learning that a custom firmware with new features is available, what does the tech require to install the image? Jailbreak Root access Sideload Wipe

Root access

Malware infects a user's computer. A support technician determines that the malware is executed without requiring any authorization using system privileges. What type of malware currently infects the system? Ransomware Keylogger Rootkit Trojan

Rootkit

An organization looks to make a server available to internet traffic without bringing harm to its private network. An onsite engineer configures a separate network for the server. Which approach does the engineer utilize? Port forwarding Port triggering Inbound filtering Screened subnet

Screened subnet

A user installs an app on a smart device. The device's official app store does not list the app, as it is a proprietary app for an organization. What type of installation does the user complete? Bootleg Spoofed Root Sideload

Sideload

An IT professional for a company wants to deploy an app outside the app store on company-managed devices. What requirement does the user complete to accomplish this? Sideload Sim unlock Root access Wipe

Sideload

A tech firm deploys wireless installations at client sites. As the firm uses Wi-Fi Protected Access (WPA) version 3, which security technology does the deployment utilize? (Select all that apply.) Rivest Cipher 4 (RC4) Simultaneous Authentication of Equals mechanism 4-way handshake association AES Galois Counter Mode Protocol mode

Simultaneous Authentication of Equals mechanism AES Galois Counter Mode Protocol mode

An IT administrator creates a repository for standard operating procedures (SOPs). What documents does the administrator upload to the repository? (Select all that apply.) Software installation instructions New-user setup checklist Server decommissioning checklist Acceptable computer use policy

Software installation instructions New-user setup checklist Server decommissioning checklist

Windows allows for several types of installable software. Which type may be transferred between computers when a user utilizes a Microsoft account? Windows features Store apps Windows subsystem for Linux Desktop apps

Store apps

A systems administrator looks to have a daily backup of a server located across a wide area network (WAN) link. As the link is not fast, the administrator creates a backup scheme that uses little to no bandwidth and acquires an entire backup of the system. Which scheme does the administrator implement? Full Synthetic Incremental Differential

Synthetic

A company tightens system security in several ways. One approach implements on-access scanning of files for malware. Shortly after implementation, users complain to the help desk. What is the complaint? Backups have malware. Browser pop-ups are frequent. System restore is disabled. Systems are slow.

Systems are slow.

An engineer surveys risks tied to environmental impacts for a service computer stored in a server closet. What does the engineer focus on? (Select all that apply.) Temperature Humidity Noise Ventilation

Temperature Humidity Ventilation

A user with tech knowledge and some access permissions browses the network to identify any available shares on all servers. While browsing, the user found a share known to contain payroll information. However, the user is unable to access the information within the share. Assuming that the user is not authorized to access the payroll information, what is the most likely reason why the user cannot view the information within the share? The permissions are incorrect. The user does not have permissions to access the share. The share is a hidden share. The user is on the wrong server.

The user does not have permissions to access the share.

How might a mobile-device management suite of software detect that a user has rooted an Android device? The device is in developer mode. There is no valid developer code signature. The iOS device is jailbroken. The battery life is significantly reduced.

There is no valid developer code signature.

A technician receives a company laptop from an employee who states they are unable to authenticate from one Windows system to another in a domain but fails with no error message and has verified the username and password are correct. What does the technician determine the issue to be? Application crash Time drift Failed service Blue screen of death

Time drift

Due to a recent breach, a cyber architect is tasked with drafting a company-wide memorandum on social engineering attacks and how they can be mitigated. Which statement does NOT support the organization in defeating social engineering attacks? Train employees to release information based on personally-preferred procedures. Establish a reporting system for suspected attacks. Train employees to identify current phishing-style attacks as well as newer styles in the future. Train employees not to release any work-related information on external sites.

Train employees to release information based on personally-preferred procedures.

A network engineer implements a proxy at a small company. The configuration does not require settings on every client machine. What type of proxy does the engineer deploy? (Select all that apply.) Manual Transparent Autoconfiguring Intercepting

Transparent Intercepting

A business needs to deploy a Windows operating system on devices that will be used for both advanced business functions and personal use. They require an edition that includes business features like BitLocker, Remote Desktop, and Group Policy, along with Windows Sandbox for testing applications safely. Which Windows edition should they choose? Windows 10 Home Windows 10 Enterprise Windows 10 Pro Windows 10 Education

Windows 10 Pro

Which type of malware replicates between processes rather than infecting a file? Worm Trojan Virus Pop-up

Worm

Which root-level file allows for the automatic execution of commands in a legacy version of Windows? Start button Execution control AutoPlay autorun.inf

autorun.inf

A technician troubleshoots a Windows system by using the command prompt. If the technician is currently in the directory named C:\Backup and wishes to enter the directory C:\Backup\02102022, what command does the technician use? cd\ 02102022 cd.. 02102022 cd 02102022 cd .\Backup\02102022

cd 02102022

After a recent driver update on a Windows system, the display adapter does not function properly. A technician tries to roll back the driver by using which management console? devmgmt.msc diskmgmt.msc dfrgui.exe lusrmgr.msc

devmgmt.msc

A Windows user is not able to resolve server names on a local network. After updating the system's hosts file, which command does the user issue? ipconfig /renew ipconfig /release ipconfig /flushdns ipconfig /all

ipconfig /flushdns

A user would like to delete a mapped drive labeled as "X" on a Windows system. Which command will the user issue at the command prompt? net use X: /delete net delete X: net delete * net use X: \\server\share

net use X: /delete

A Windows user needs to transfer and retain an entire directory structure from one disk to another. There is also a need to retain New Technology File System (NTFS) attributes. Which command does the user determine will fulfill the need? move copy rmdir robocopy

robocopy

A user interacts with a Linux distribution that has no desktop graphical user interface (GUI). As the user types, which stream handles the interaction? stderr std stdout stdin

stdin


संबंधित स्टडी सेट्स

consumer behavior chp 14 (exam 2), Consumer behavior chp 15(exam 2), Consumer Behavior Chp 16 (Exam 2), Consumer Behavior Chp 18 (Exam 2)

View Set

Equations Review #1, Systems of Equations Word Problems

View Set

SOCL 240 CH 12: Work and Families

View Set

psych 460 ch 16- personality disorders

View Set

Legal Environment of Business Ch. 10

View Set

AP Psychology Chapter 16 - Social Psych

View Set

History Mid-Term East Asia and Europe & Tokugawa Japan

View Set