CompTIA A+ Practice Exam 6 (220-1102)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Tamera trying to install Windows 11 (64-bit) on an older laptop she found in her closet. The installation is continually failing and producing an error. The laptop has a dual-core 1.2 GHz processor, 2 GB of memory, a 250 GB hard drive, and a 1280 x 720 screen resolution. Which item in the laptop must be upgraded to meet the minimum requirements for installing Windows 11? 1) Amount of memory 2) Amount of hard drive space 3) The screen resolution 4) Number of CPU cores

1) Amount of memory

You need to move a 75-pound box with a rack-mounted UPS in it. Which of the following actions should you take? 1) Ask a coworker to team lift it with you 2) Lift with your back and not your legs 3) Open the box and carry up the UPS in pieces 4) Lift with your legs and not your back

1) Ask a coworker to team lift it with you

What is the THIRD step of the seven-step malware removal process? 1) Disable System Restore in Windows 2) Quarantine the infected system 3) Enable System Restore and create a restore point in Windows 4) Update the applications and the operating system

1) Disable System Restore in Windows (1) Investigate and verify malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore in Windows, (4) Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques, (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point in Windows, and (7) Educate the end user.

Which of the following types of backup requires the LEAST time to complete a backup? 1) Incremental 2) Full 3) Differential 4) Synthetic

1) Incremental

Which of the following policies should be created to provide employees with the guidelines and limitations they must follow when using company-provided email, computers, and network access? 1) DLP 2) AUP 3) PII 4) GDPR

2) AUP acceptable use policy (AUP) Data loss prevention (DLP) General Data Protection Regulation (GDPR) Personally identifiable information (PII)

Which of the following Control Panel sections contains various tools like computer management, disk cleanup, print management, and the registry editor? 1) Devices and Printers 2) Administrative Tools 3) System 4) Device Manager

2) Administrative Tools The Administrative Tools section of the control panel is used to collect various tools on the computer that are commonly used by system administrators.

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of several settings: Email (never), Maps (always), Calender (while using), Messages (while using), Photos (never), App Store (while using), Bank (while using), and Weather (while using). Based on the information provided, what should be changed to resolve this client's problem? 1) Change the App Store to never 2) Change the Maps setting to while using 3) Change the Email setting to while using 4) Change the Weather setting to always

2) Change the Maps setting to while using

You are configuring a new printer for a small real estate office. There are only 4 computers in the network, and they are all connected to a single 4-port switch/router/cable modem device. There are no additional open ports on the device and no servers configured within the network. All the computers operate as part of a single workgroup with no domain controller. You need to configure the printer to allow all 4 computers to print to it as long as they are connected to the switch. Which of the following methods would BEST allow the users to print to the printer based on this network's configuration? 1) Configure the printer to support cloud printing 2) Configure it as a shared printer connected to one of the four workstations 3) Configure the printer to support Bluetooth printing 4) Configure a print server and connect the printer to it

2) Configure it as a shared printer connected to one of the four workstations

You have just finished installing a new workstation for a user in your office. They need to be able to see the other workstations on the company's workgroup. Which of the following settings should you ensure is enabled? 1) Enable file and folder sharing 2) Enable network discovery 3) Enable BitLocker 4) Enable an RDP connection

2) Enable network discovery

Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off? 1) Balanced 2) Hibernate 3) Power saver 4) Sleep

2) Hibernate

Which of the following allows users to save their current session to disk and before powering down their Windows 10 laptop? 1) Shutdown 2) Hibernate 3) Sleep 4) Lock

2) Hibernate

You have been asked to help a user upgrade their laptop from Windows 10 to Windows 11. The user has asked that all of their applications, user profiles, documents, and PST files be preserved during the upgrade. Which of the following types of upgrades or installations should you perform on this laptop? 1) Clean installation 2) In-place upgrade 3) Repair upgrade 4) Unattended installation

2) In-place upgrade

Jason wants to configure his Windows 10 laptop to more quickly find files when he is searching its hard drive. Which of the following Control Panel sections should he use to configure his laptop for optimal searching performance? 1) Power Options 2) Indexing Options 3) File Explorer Options 4) Internet Options

2) Indexing Options

You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first? 1) Require all employees to wear security badges when entering the building 2) Install an access control vestibule at the entrance 3) Install CCTV to monitor the entrance 4) Install an RFID badge reader at the entrance

2) Install an access control vestibule at the entrance

Your son just attempted to start up three programs at once on his Windows 10 Home laptop. The system appears to be unresponsive, and a spinning circle has replaced his mouse cursor on the screen. What is the BEST solution to this problem? 1) Reboot the system 2) Kill the unresponsive task 3) Restart the network services 4) Disable the application startup

2) Kill the unresponsive task

Which version should you use when installing a Linux operating system and are concerned with end-of-life support? 1) Beta release 2) LTS release 3) Developer release 4) Rolling release

2) LTS release LTS (Long-Term Support)

What anti-malware solution is installed as a dedicated on-premise appliance to scan all incoming traffic and prevent malware from being installed on any of your clients without requiring the installation of any software on your clients? 1) Host-based anti-malware 2) Network-based anti-malware 3) Cloud-based anti-malware 4) Signature-based anti-malware

2) Network-based anti-malware

A user is complaining that the touchscreen on their smartphone is not responding to their touch. What is the FIRST step you recommend to solve this issue? 1) Replace the defective touchscreen 2) Enable and disable airplane mode 3) Have the user restart the device 4) Reinstall the OS

3) Have the user restart the device

ason's iPhone has not received any emails or SMS messages in the few 4 hours. Which of the following is the most cause of these issues? 1) Bluetooth connectivity failure 2) Mail client error 3) Internet connectivity failure 4) OS update failure

3) Internet connectivity failure

Which of the following would NOT be included in a company's password policy? 1) Password history 2) Password complexity requirements 3) Password style 4) Password age

3) Password style

David is a brand new help desk technician. To perform his job, he needs to install programs and printers but should not have full access to change everything on a Windows workstation. Which of the following types of user accounts should David be given to perform his job as a help desk technician? 1) Guest 2) Remote Desktop User 3) Power User 4) Administrator

3) Power User

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used? 1) WPA2 2) WEP 3) RADIUS 4) WPS

3) RADIUS With RADIUS and SSO configured, users on the network can provide their user credentials one time when they initially connect to the wireless access point or another RADIUS client and are then automatically authenticated to all of the network's resources.

Dion Training utilizes a federation authentication model for all of its internal and external services. If an employee needs to access one of the company's web applications from their smartphone, they use a username and password to log in to the main website. They then are transferred and authenticated to all of the other sites and services automatically. Which of the following type of authentication is this known as? 1) FaceID 2) TouchID 3) SSO 4) MFA

3) SSO

Which of the following features allows a Linux server to provide file-sharing services to a company's Windows 10 workstations? 1) Pathping 2) Yum 3) Samba 4) Keychain

3) Samba Samba is used by Linux computers to enable the sharing and access of resources with Windows-based networks.

Which of the following types of attacks involves changing the system's MAC address before it connects to a wireless network? 1) Zombie 2) DDoS 3) Spoofing 4) Botnet

3) Spoofing

What is the name of a program that monitors user activity and sends that information to someone else? 1) Virus 2) Keylogger 3) Spyware 4) Rootkit

3) Spyware

An employee at Dion Training is complaining that every time they reboot their Windows 10 workstation a music application is loaded. Which of the following commands would you use to disable the program from starting up each time Windows reboots? 1) Event viewer 2) User account control 3) Task manager 4) System information

3) Task manager

Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button? 1) WEP 2) WPA 3) WPS 4) WPA2

3) WPS The Wi-Fi Protected Setup (WPS) is a mechanism for auto-configuring a WLAN securely for home users. On compatible equipment, users push a button on the access point and connect adapters to associate them securely.

Which of the following operating systems are NOT used in modern smartphones or tablets? 1) iPadOS 2) Android 3) macOS 4) iOS

3) macOS

What is the minimum processor required to install Windows 11 (x64) on a device? 1) 2 GHz single-core processor 2) 2 GHz dual-core processor 3) 1 GHz single-core processor 4) 1 GHz dual-core processor

4) 1 GHz dual-core processor

What is the minimum amount of storage space required to install Windows 10 (x86) on a device? 1) 20 GB 2) 32 GB 3) 64 GB 4) 16 GB

4) 16 GB

Which of the following is an APIPA or link-local address? 1) 33.52.7.83 2) 192.168.1.34 3) 127.0.0.1 4) 169.254.64.23

4) 169.254.64.23

John is a PC technician. To perform his job, he needs to be able to install and remove programs, modify system files, and change user permissions on the Windows workstation in his office. Which of the following types of user account types should he have to perform his role? 1) Power User 2) Guest 3) Remote Desktop User 4) Administrator

4) Administrator

Which of the following types of wireless connections requires a pin to be entered as part of the pairing process before it is utilized? 1) Radiofrequency 2) Infrared 3) NFC 4) Bluetooth

4) Bluetooth

An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives? 1) Home Folder 2) Credential Manager 3) Group Policy 4) Security Groups

4) Security Groups A security group is a collection of user accounts that can be assigned permissions in the same way as a single user object. In most corporate environments, security groups control access to share drives, mailing lists, and other network resources.

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be? 1) Spoofing 2) VLAN hopping 3) Zero-day attack 4) Social engineering

4) Social engineering

A user contacts the service desk and states a hardware conflict error is showing in their Device Manager. Which of the following log files should you review to determine the source of the conflict? 1) Security log 2) Application log 3) Setup 4) System log

4) System log

A customer is complaining that they cannot connect to the local network share drive. You run the command 'ipconfig /all' from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation? 1) The workstation couldn't reach the gateway 2) The workstation couldn't reach the DNS server 3) The workstation couldn't reach the proxy server 4) The workstation couldn't reach the DHCP server

4) The workstation couldn't reach the DHCP server

Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes? 1) FIFO Backup 2) Grandfather-father-son 3) 3-2-1 backup 4) Tower of Hanoi

4) Tower of Hanoi The Tower of Hanoi is a backup rotation scheme that rotates backup media sets throughout the backup process to minimize wear and failure of tape backup media.

Which of the following file system formatting types should be used with a DVD? 1) NTFS 2) CDFS 3) FAT32 4) UDF

4) UDF Universal Disk Format (UDF) CD file system (CDFS) NT file system (NTFS) is a Windows file system file allocation table 32-bit (FAT32) is the 32-bit file system supported by Windows, macOS, and Linux computers

Your Windows 10 workstation is attempting to boot up when it receives the following error, "BOOTMGR is missing; Press Ctrl+Alt+Del to restart." To fix this, you insert your Windows installation disc and reboot into the Command Prompt under the System Recovery Options. Which of the following commands should you enter in the command prompt? sfc /fixboot chkdsk /repair diskpart /repair bootrec /fixboot

bootrec /fixboot

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address? 1) 169.254.1.52 2) 10.1.2.3 3) 172.18.21.252 4) 192.168.3.5

2) 10.1.2.3

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment? 1) .bat 2) .js 3) .py 4) .sh

1) .bat Batch scripts run on the Windows operating system and, in their simplest form, contain a list of several commands that are executed in a sequence.

An offsite tape backup storage facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the MOST likely reason for this? 1) A notice of a legal hold 2) A chain of custody breach 3) The process of discovery 4) A data transport request

1) A notice of a legal hold

Every new employee at Dion Training must sign a document to show they understand the proper rules for using the company's computers. This document states that the new employee has read the policy that dictates what can and cannot be done from the corporate workstations. Which of the following documents BEST describes this policy? 1) AUP 2) SOW 3) MOU 4) SLA

1) AUP acceptable use policy (AUP) service level agreement (SLA) statement of work (SOW) memorandum of understanding (MOU)

Which of the following policies should be created to provide employees with the guidelines and limitations they must follow when using company-provided email, computers, and network access? 1) Acceptable use policy 2) Password policy 3) Group policy 4) Local security policy

1) Acceptable use policy

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel's Wi-Fi network. Michael's laptop appears to be connected to the hotel's wireless network, but his email client cannot download any new messages and states, "Network Offline." Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve this issue? 1) Open a web browser, enter google.com, and see if a redirect page is displayed 2) Disable and reenable the wireless network adapter on his laptop 3) Disconnect and reconnect to the hotel's wireless network 4) Perform a full system scan for malware on his laptop

1) Open a web browser, enter google.com, and see if a redirect page is displayed

Jason wants to configure his Windows 10 laptop to suspend individual USB ports when not in use. Which of the following Control Panel sections should he use to set the USB selective suspend feature? 1) Power Options 2) Indexing Options 3) Internet Options 4) File Explorer Options

1) Power Options

Your company is concerned about the possibility of power fluctuations that may occur and cause an immediate loss of power for several minutes to their server room. To prevent this condition, they are installing a large rack-mounted UPS to protect the server. Which type of condition are they trying to prevent using this UPS? 1) Power failure 2) Power spikes 3) Power surge 4) Under-voltage event

1) Power failure

Which of the following devices should you NEVER disassemble during troubleshooting due to the risk of electrocution? 1) Power supply 2) Tablet 3) LCD display 4) Printer

1) Power supply

Which partition of the hard drive is concealed from the user in the File Explorer within Windows 10 and is only used when imaging the computer back to its factory default state? 1) Recovery 2) Primary 3) Swap 4) Extended

1) Recovery

Which of the following technologies would you use to securely access the command line interface of a network's switches and routers remotely for configuration? 1) SSH 2) RDP 3) HTTPS 4) Telnet

1) SSH

You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST? 1) Secure the area 2) Implement the chain of custody 3) Turn off the workstation 4) Document the scene

1) Secure the area

You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented? 1) Smart card 2) Biometric reader 3) Cable lock 4) Key fob

1) Smart card PIV (Personal Identity Verification)

You just installed a flat panel television in a conference room in your office building. The facilities manager is concerned that a lightning strike could damage it. The company is not worried about the threat of power outages because the conference room is only used a few times per week. Which of the following should be installed to BEST mitigate the facilities manager's concerns without spending too much money? 1) Surge suppressor 2) Line conditioner 3) Power strip 4) UPS

1) Surge suppressor

A co-worker just sent you a macro-enabled Microsoft Word document. After you opened the file, your computer began to delete the photos stored in your c:\photos directory. What type of malware did you MOST likely receive? 1) Virus 2) Trojan 3) Rootkit 4) Worm

1) Virus

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem? 1) rm -rf / 2) rm -rf *.* 3) rm *.* 4) rm /

1) rm -rf /

A user's SOHO wireless network appears to have significantly slowed down today. Normally, they can download files at 900 Mbps or more, but today, they only averaged 23 Mbps when downloading. You check their wireless settings and see the following: Network SSID: DionTraining Security: WPA2 Password: diontraining Mode: AC ISP: Fiber1Gbps Which of the following is MOST likely the problem? 1) WPA2 reduces download speeds and the user should switch to WPA3 2) Other users have connected to the WiFi due to a weak password 3) Additional transmission power is needed for the wireless signal 4) The WAN type needs to be upgraded to DSL or cable

2) Other users have connected to the WiFi due to a weak password

A network technician must allow HTTP traffic from the Internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of? 1) Dynamic DNS 2) Port forwarding 3) Dynamic NAT 4) Static NAT

2) Port forwarding

Which of the following components presents the largest risk of electrical shock to a technician? 1) Solid-state device 2) Power supply 3) Laptop battery 4) LCD monitor

2) Power supply

Which editions of Windows 10 can you connect to using Remote Desktop? 1) Home 2) Pro 3) Education 4) Enterprise

2) Pro 3) Education 4) Enterprise

Which of the following operating systems cannot be run on a laptop? 1) Android 2) iOS 3) Windows 4) Linux

2) iOS

Which command would be used to display the network address and subnet mask for the wired network connection on a Linux system? 1) nslookup 2) ip 3) ipconfig 4) netstat

2) ip

Which of the following Windows tools can a technician use to gather information about a workstation and create a comprehensive list of hardware, system components, and the software environment used by that workstation? 1) devmgmt.msc 2) msinfo32.exe 3) resmon.exe 4) dxdiag.exe

2) msinfo32.exe System information (msinfo32.exe) is a utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues.

Which of the following commands is used on a Linux system to change a user's password on the system? 1) chmod 2) passwd 3) chown 4) pwd

2) passwd

Which of the following MacOS features allows the user to create a user account that is used to sign in to the App Store, iCloud, and iTunes? 1) Passwd 2) Keychain 3) Apple ID 4) Spotlight

3) Apple ID

A small business recently experienced a catastrophic data loss due to flooding from a recent hurricane. The customer had no backups, and flooding destroyed all of the hardware associated with the small business. As part of the rebuilding process, the small business contracts with your company to help create a disaster recovery plan to ensure this never reoccurs again. Which of the following recommendations should you include as part of the disaster recovery plan? 1) Local backups should be verified weekly to ensure no data loss occurs 2) Purchase waterproof devices to prevent data loss 3) Backups should be conducted to a cloud-based storage solution 4) Local backups should be conducted

3) Backups should be conducted to a cloud-based storage solution

You are configuring a SOHO network and only denying specific IP addresses from accessing the network while allowing any IP addresses not found on the list. Which of the following should be implemented? 1) Port forwarding 2) Allow list 3) Blocklist 4) MAC filtering

3) Blocklist

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence? 1) Secure copy protocol 2) Legal hold 3) Chain of custody 4) Financial responsibility

3) Chain of custody

You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created? 1) Configure your Wi-Fi to use Channel 11 2) Update the firmware 3) Configure port forwarding 4) Enable DHCP

3) Configure port forwarding

Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure? 1) Privacy 2) Content 3) Connections 4) General

3) Connections

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of their location settings, which are summarized below: * Storage (49 GB Used, 15 GB Free, 64 GB Total) * Mail Client (Corporate account set to push, Personal account set to pull hourly) * Display (Auto brightness, Lock after 30 minutes, Night mode disabled) * Calls (33 minutes used during last 24 hours) * Data (52 MB used during last 24 hours) * Location (All apps set to "allow while using") Based on the information provided, what should be changed to resolve this client's problem? 1) Storage settings 2) Mail settings 3) Display settings 4) Location settings

3) Display settings

Which of the following backup rotation schemes overwrites the oldest media with the current backup being performed? 1) Grandfather-father-son 2) Tower of Hanoi 3) FIFO Backup 4) 3-2-1 backup

3) FIFO Backup The First In First Out (FIFO) backup scheme uses a set number of tapes and overwrites the oldest tape with the newest information.

You just received your monthly smartphone bill. As you review your charges, you notice that this month shows three times as much data usage as a normal month. You don't remember changing your usage pattern, so there should not have been a large increase in data used. Which of the following should you do FIRST to determine the source of the increased usage? 1) Configure your applications to only download large files over WiFi 2) Conduct a factory restore of the smartphone and reload your applications 3) Enable biometric login for the lock screen to ensure no one else uses your device 4) Check network permissions and data usage for any applications installed within the last month

4) Check network permissions and data usage for any applications installed within the last month

Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera's security concerns? (Select TWO) 1) Configure the thermostat to use the WEP encryption standard for additional confidentiality 2) Disable wireless connectivity to the thermostat to ensure a hacker cannot access it 3) Upgrade the firmware of the wireless access point to the latest version to improve the security of the network 4) Configure the thermostat to use a segregated part of the network by installing it into a screened subnet 5) Enable two-factor authentication on the device's website (if supported by the company) 6) Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password

4) Configure the thermostat to use a segregated part of the network by installing it into a screened subnet 6) Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password

You are troubleshooting a workstation and want to check if any S.M.A.R.T. errors are being reported. Which of the following tools should you use to troubleshoot this workstation? 1) DxDiag 2) Task scheduler 3) Performance monitor 4) Disk management

4) Disk management The disk management tool is used to display the drive status, mount the drive, initialize the drive, and create/split/extend/shrink drive partitions.

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee's laptop according to your company's procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police? 1) Quarantine the system 2) Document the changes 3) Preserve the evidence 4) Maintain the chain of custody

4) Maintain the chain of custody

Which of the following password policies defines the number of previous passwords that cannot be reused when resetting a user's password? 1) Password length 2) Password complexity 3) Password expiration 4) Password history

4) Password history

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation? 1) VNC 2) Telnet 3) SSH 4) RDP

4) RDP

What is the FOURTH step of the seven-step malware removal process? 1) Update the applications and the operating system 2) Quarantine the infected system 3) Enable System Restore and create a restore point in Windows 4) Remediate the infected systems

4) Remediate the infected systems (1) Investigate and verify malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore in Windows, (4) Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques, (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point in Windows, and (7) Educate the end user.

Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded the corporate database to his work laptop. On his way home, he left the laptop in an Uber, and a few days later, the data was posted on the internet. Which of the following mitigations would have provided the greatest protection against this data breach? 1) Require data masking for any information stored in the database 2) Require a VPN to be utilized for all telework employees 3) Require all new employees to sign an NDA 4) Require data at rest encryption on all endpoints

4) Require data at rest encryption on all endpoints

Dion Training has recently replaced the batteries in their rack-mounted UPS in their data center. Which of the following should their technicians do to dispose of the depleted batteries? 1) Place the batteries in the recycle bin behind their office building 2) Review the material safety data sheet for disposal instructions 3) Wrap the batteries in plastic and place them in the trash 4) Research local regulations for toxic waste disposal in their area

4) Research local regulations for toxic waste disposal in their area

You are troubleshooting a user's laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which of the following actions should you attempt to fix the problem in Windows 10? 1) Restart Windows Defender 2) Rollback the USB drivers 3) Disable/enable the wireless network adapter 4) Restart the print spooler service

4) Restart the print spooler service

After a company rolls out software updates, Ann, a lab researcher, can no longer use the lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest version of the drivers. Which of the following should the technician perform to get the researcher back to work as quickly as possible? 1) Reset Ann's equipment configuration from a backup 2) Downgrade the PC to a working patch level 3) Restore Ann's PC to the last known good configuration 4) Rollback the drivers to the previous version

4) Rollback the drivers to the previous version

You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user's workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You noticed that the systems all received a security patch and other updates from the Microsoft Endpoint Configuration Management (MECM) server last night. Which of the following actions should you take to resolve this issue? 1) Disable the DirectX service in services.msc 2) Reboot the system into Safe Mode and allow the user to continue their work 3) Use SFC to ensure all system files are correct and not corrupted 4) Rollback the video card driver and wait for a new driver to be released

4) Rollback the video card driver and wait for a new driver to be released

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the EFI/BIOS of the system. Which of the following commands should you use to add the Windows installation to the boot manager? 1) bootrec /fixmbr 2) diskpart list 3) bootrec /fixboot 4) bootrec /rebuildbcd

4) bootrec /rebuildbcd The Boot Configuration Data (BCD) stores the list of known Windows installations that can be booted from a hard drive. If the Windows installation is not listed, the computer will be unable to boot into Windows. To add a missing Windows installation to the Boot Configuration Database (BCD), you should use the command "bootrec /rebuildbcd" and reboot the computer.

You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use? 1) ipconfig 2) ping 3) net use 4) netstat

4) netstat The netstat command is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine.

What is the symbolic representation of the octal numeric permission 644? 1) r--rw-rw- 2) rw------- 3) rwx-r-xr-x 4) rw-r--r--

4) rw-r--r--


संबंधित स्टडी सेट्स

The Three Branches of Government and Checks and Balances

View Set

Adult Health-Test 3-Immunity-Rheumatoid Arthritis (Exemplar 8.3) & Systemic Lupus Erythematosus (Exemplar 8.4)

View Set