Comptia A+ Question Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Where are 64-bit shared system files stored?

%SystemRoot%\system32 Windows' 64-bit shared system files (DLLs and EXEs) are stored in %SystemRoot%\system32; that is, the same system folder as 32-bit versions of Windows.

You are going to upgrade a 64-bit Windows 10 Home to Windows 10 Pro for business purposes. In addition to more features with the operating system, what will the new maximum memory limit be?

2TB All Windows 10 64-bit editions only support different amounts of RAM (Random Access Memory). In this case, moving from a 64-bit edition (Home) to 64-bit edition (Pro) will result in an increase in the RAM restriction from 128GB to 2TB.

Which of the following operating systems does not have an end of life policy?

Apple macOS Apple does not publish end of life policies. Check the Apple support website for the technical specification for any particular macOS release.

Which of the following is NOT a reason to select 64-bit architecture over 32-bit architecture?

Availability of hardware device drivers Although 32-bit applications are compatible with 64-bit systems, hardware device drivers are not. The availability of drivers is becoming less of a problem as manufacturers are experiencing more demand for 64-bit drivers and less demand for 32-bit drivers.

What is the benefit of enabling Network Address Translation (NAT) on a router?

External hosts won't be able to identify and connect directly to internal clients.

Which of the following is NOT a recommended method of bringing a non-compliant system into compliance with security best practices?

Remove the computer from the user's possession and patch it. A heavy-handed approach to security, such as confiscating a user's computer, is not a recommended approach to keeping users' computers from violating security best practices.

Which of these is a principal Windows log file?

Setup Setup is a default principal Windows log file that records events generated during installation. Each log file has a default maximum size (usually about 20 MB), but you can change this by selecting Properties on the appropriate log.

Which of the following is NOT a general function of a rootkit?

Compromise multiple systems to use as handlers to conceal malicious activities. The compromise of multiple systems describes the function of a botnet where attacks are launched from multiple compromised systems. A rootkit is a set of tools designed to gain control of a computer without revealing its presence.

Which mobile device plan addresses many of the concerns with bring your own device (BYOD) programs, but still provides some flexibility for users?

Corporate Owned, Personally Enabled (COPE) Corporate Owned, Personally Enabled (COPE) devices are corporate owned and controlled, which is far more secure for the company, but users can also use the devices for personal use and not have to carry two devices. It is a compromise that some companies are willing to make to ensure data safety while providing a device that employees can enjoy as well.

The administrator runs the anti-virus software to scan the computer files and detects something suspicious. After the scan has been completed, the software allows the user to decide how to proceed. Which set of decisions are most likely available in the software?

Disinfect, quarantine, delete, ignore In anti-virus software, the following options are most likely available to resolve a suspicious file. The user can decide to try to disinfect the file, quarantine it to block further access, delete it or ignore the alert.

What is the best course of action when a user experiences black screen issues?

Give the system time to complete the update. Windows is prone to black screen issues, where nothing appears on the screen. This will often occur during update installs, where the best course of action is to give the system time to complete the update.

What is a symptom of a rootkit?

Hide the actions of other types of malicious software A rootkit is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software.

Which of the following is NOT a reasonable bring your own device (BYOD) security requirement from a company to its employees?

Install no personal apps on the device A company policy that states that users who bring their own devices may not install personal apps on those devices is unreasonable. Bring your own device (BYOD) is a program in which users own the devices that they use.

A workstation at work is found to be unsecured. The account used on the computer does not have a password, the data is not encrypted, and the computer itself is located in an area with easy access. This particular workstation contains personal information about its customers. In regards to the regulation of data, which is being compromised?

PII Personally Identifiable Information (PII) is data that can be used to identify a person and can also be used for malicious purposes such as identity theft. Personally Identifiable Information (PII) data can include personally assigned information including a social security number or even a website challenge response answer such as a favorite movie.

You will be documenting a customer's network with several network diagrams. One diagram you will be creating will show the actual connectivity of devices. Which type of diagram will you be creating?

Physical Physical network diagrams detail the actual connections between devices. This gives an overview of how connectivity within the infrastructure works.

What type of authentication is suitable for server/domain-based networks?

RADIUS (Remote Authentication Dial-in User Service) RADIUS is a suitable authentication for server/domain-based networks. RADIUS is an AAA server where data passes between the AAA server and the remote user rather than storing and validating user credentials directly.

You need to implement a backup storage security plan for the company backups. Which of the following is NOT considered a security best practice?

Redundant connectivity Redundant connectivity does not apply to security practices. It does, however, improve network throughput or failover capability. For example, having a backup device with multiple network connections.

As part of your standard preventative maintenance, you periodically scan your systems to ensure that all system files are the correct Microsoft versions. Which command, with proper syntax, do you use to perform that scan?

SFC /SCANNOW The System File Checker (SFC) command will scan the integrity of all protected system files and replace them with correct Microsoft versions. The syntax is SFC /SCANNOW.

Which command line command do you use to reboot a Windows computer?

SHUTDOWN /r To reboot the computer, you use SHUTDOWN /r. This command is used to shut down, restart, log off, or hibernate a computer. Specify which state you would like to put the computer in by using options and parameters with the command. You can also use options to specify whether (and how long) to wait until the command does what you specified.

You have created a detailed network diagram for the company CTO (Chief Technology Officer) to review. Your work is outstanding and you have been asked to provide a simplified version as well that shows the general placement of equipment. Which type of diagram will work?

Schematic A schematic is an abbreviated network diagram that shows the physical location of nodes and objects (such as computers and printers) without necessarily showing the connections between them.

What term refers to submitting the authorization as proof that the user is authenticated?

Software Token The system grants a software token to the device or app, therefore, every time the user performs an action the app submits the authorization token as proof that the user is authenticated.

You are creating a documentation repository. You need to submit documentation for critical tasks including, restoring a production server and process nightly firewall log reports. What type of documents will you be creating?

Standard operating procedure (SOP) A SOP (Standard Operating Procedure) is a procedural document created to outline goals and considerations for performing tasks and the associated responsibility. Budgets, security, and customer contact standards are examples of SOP items.

You are working on a user's PC. You decide that the PC needs to be opened to fix a hardware issue. In which way would you NOT self-ground?

Surge protector A surge protector is used to protect a system from voltage spikes and not for self-grounding. Having this type of protection on a system should be part of a disaster prevention program. Furthermore, it is best practice to power off and unplug a system before performing any repair.

Setting a Basic Input/Output System (BIOS) password is an excellent security practice, but what is the downside of setting such a password?

The user might forget the password. The greatest shortcoming of setting a Basic Input/Output System (BIOS) password is that the user might forget the password. BIOS main functionality is to provide standard program code that operates the essential components of the PC. It is critical for the user to remember the password.

How do viruses spread from one computer to another?

They attach themselves to other files that are executed. A virus is a malicious computer code that reproduces itself on the same computer. Viruses are spread from computer to computer because they attach themselves to other files that, when executed, infect even more files.

A department has a legacy DOS program that they need to use daily. What is the best way to configure the program to run after the department upgrades workstations to Windows 10?

Use compatibility mode. Compatibility mode provides a degree of support for legacy DOS and Windows 9x programs. Compatibility mode allows you to configure the program's original operating system environment and force it to use compatible display settings.

What is the one critical point that is also a disadvantage of single sign-on (SSO) access control?

User authentication must be strong. Single sign-on is a simplified logon system that provides authenticated users widespread access to network resources. The critical point is that user authentication must be strong because once authenticated, users have access to a lot of different assets and systems.

What is the most common modern cause of a "Invalid boot disk" error?

Using USB (Universal Serial Bus) for boot. The most common modern cause of boot disk errors is for the system firmware to be set to use USB for boot. Check for any removable disks and change the boot device priority/boot order if necessary.

The current directory is "C:\Users\David\Documents\Tech_files." Which of the following commands could you enter to move into the parent directory?

cd .. Typing cd .. will take you up one directory, to the parent directory of your current location. This would take you to "C:\Users\David\Documents." You could also type cd c:\users\David\documents, but cd .. is much simpler. Note that the Windows file system is not case sensitive by default, so a "Documents" folder and "documents" folder are the same thing.

Which of the following is the Linux disk maintenance utility that is roughly equivalent to the Windows CHKDSK utility?

fsck The fsck, or filesystem check, utility checks the filesystem for damage and optionally repairs files. It is analogous to the Windows CHKDSK utility.

What is the recommended command to use when copying an entire folder structure to a new location?

robocopy robocopy (or "robust copy") is a file copy utility. Microsoft now recommends using robocopy rather than xcopy. robocopy is designed to work better with long file names and NTFS attributes.


संबंधित स्टडी सेट्स

1.16 Unit Test: Basic Tools and Transformations - Part 1

View Set

HFT 4866C Chapters 1-3 Questions

View Set

Information System Analysis & Design Chapter 10

View Set

Allison's Bad-to-the-Bone CISSP Flashcards (Domain 4: Communications and Network Security

View Set

CompTIA A+ Core 2 (Exam 220-1102)

View Set