CYBR3.CompTIA A+ Practice Exam 2 (220-1102 Core 2) (61)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is used to block private customer information across a network?

DLP

DLP

Data Loss Prevention security technology to ID and block the transfer of materials through a network

Which of the following Windows Share permissions has the priority when assigning access on a mapped drive? ❍ A. Allow ❍ B. Full control ❍ C. List folder contents ❍ D. Deny

Deny most restrictive setting has priority over others (ex: if share is configured deny access, it will take priority over allow)

Which technology can support 4TB and partition free space into single partition?

GPT

Which Windows installation has max partition size of 2TB?

MBR

Domain (Windows)

A collection of computers and network devices that share resources Designed for larger organizations that need centralized management

System utility

A program that performs a very specific task, usually related to managing system resources. includes a remote tab for remote assistance and remote desktop

Access control vestibule

A secure entry system with two gateways, only one of which is open at any one time.

A system administrator has installed a SOHO network of five Windows computers. The administrator would like to provide a method of sharing documents and spreadsheets between all of the office computers. Which of the following would be the BEST way to provide this functionality? ❍ A. Domain ❍ B. Proxy server ❍ C. Workgroup ❍ D. Remote Desktop

Workgroup

A desktop administrator is troubleshooting an older computer that has been slowing down as more applications and files are stored on the hard drive. Which of the following commands would be the BEST choice for increasing the performance of this computer? ❍ A. defrag ❍ B. format ❍ C. sfc ❍ D. xcopy ❍ E. winver

defrag

Which Windows command moves the file fragments so they are continuous, improving overall read and write times?

defrag

Windows utility to view the version number of a device driver

device manager

Windows utility to add a partition to a volume

disk management

Windows command to compare files on a Windows workstation

.bat

Windows command to add animation to a website login screen

.js

Windows command to disable an active directory account

.ps1 (powershell)

Windows command to retrieve statistics from a network device

.py

Which of the following script extensions would commonly be used inside of a Microsoft Office application? ❍ A. .vbs ❍ B. .py ❍ C. .bat ❍ D. .js

.vbs

Windows command to import data into an excel spreadsheet

.vbs

A desktop administrator is moving an SSD from one laptop to another. Which of the following should be used to protect the SSD during the move? ❍ A. Padded envelope ❍ B. Anti-static bag ❍ C. Box with foam filler ❍ D. Cloth wrap

Anti-static bag

A local coffee shop has a public wireless network for customers and a private wireless network for company devices. The shop owner wants to be sure that customers can never connect to the company network. Which of the following should be configured on this network? ❍ A. Install a new access point for company devices ❍ B. Configure WPA3 on the company network ❍ C. Require static IP addresses on the customer network ❍ D. Assign MAC filters to the company network ❍ E. Use a firewall between the customer and corporate network

Configure WPA3 on the company network Would require password to connect and prevent customer from connecting

A network administrator has a report showing a single user with numerous visits to a website. This website is known to violate the company's AUP. Which of the following should the administrator do NEXT? ❍ A. Create a firewall filter to block the website ❍ B. Scan all computers with the latest anti-malware signatures ❍ C. Contact the company's security officer ❍ D. Change the user's password

Contact the company's security office violation of AUP --> legal issue

A manufacturing company performs a third-party audit of their accounting records each year. The auditors use laptops provided by the company to access internal resources. When the audit is complete, the auditors should be prevented from logging on until the following audit process begins. Which of the following would be the BEST way to accomplish this? ❍ A. Uninstall the audit software ❍ B. Disable the user accounts between audits ❍ C. Remove the auditor accounts from all Windows groups ❍ D. Require two-factor authentication for the auditor accounts

Disable the user accounts between audits --> can't login

Which of the following features would be found in Windows 10 Pro but not in Windows 10 Home? ❍ A. 32-bit and 64-bit versions ❍ B. Domain access ❍ C. RDP client ❍ D. Windows Workgroup

Domain access

A medical research company is using laptop computers when visiting testing centers. The IT security team is concerned about a data breach if a laptop is lost or stolen. Which of the following would be the BEST way to manage this issue? ❍ A. BIOS password ❍ B. Authenticator application ❍ C. Full disk encryption ❍ D. Biometric authentication ❍ E. Cable lock

Full disk encryption

A technician has been asked to power down and store a server that has been exploited by an external attacker. The legal department will be performing tests and gathering information from this server. Which of the following would be MOST important to ensure the integrity of the server data? ❍ A. Report the server location to the proper channels ❍ B. Compile all support tickets associated with the server ❍ C. Maintain a chain of custody ❍ D. Take photos of the server in the storage room

Maintain a chain of custody

Windows utility to view the long term CPU utilization of a server

Performance monitor

A system administrator needs to configure a laptop to support inbound Remote Desktop services for the help desk team. Which of these Control Panel features provides access to these settings? ❍ A. Internet Options ❍ B. Devices and Printers ❍ C. Network and Sharing Center ❍ D. System

System

Windows utility to schedule a batch file to run at 3am

Task scheduler

A user receives a browser security alert on his laptop when visiting any website that uses HTTPS. If he uses his smartphone, he does not receive any error messages. Which of the following would BEST describe this situation? ❍ A. The date and time on the laptop is incorrect ❍ B. The smartphone is not updated with the latest OS version ❍ C. The laptop has an incorrect subnet mask ❍ D. The laptop does not have the latest anti-virus signatures

The date and time on the laptop is incorrect

Key fob

a hand-held remote control device for locking and unlocking doors

Which editions of windows can use RDP?

all

devices and printers utility

allows for addition/removal of devices and printer

Windows utility to update a trusted root certificate

certificate manager

Which command to scan and repair any logical file system errors

chkdsk /f

A desktop administrator has just removed malware from a user's desktop computer and has configured the system to automatically update antivirus signatures and perform a scan each night. Which of the following should be the NEXT step in the removal process? A. Enable System Protection B. Educate the end-user C. Quarantine the computer D. Boot to Safe Mode

enable system protection before malware removed, system protection was disabled to delete infected restore points. now it must be reenabled

Which windows 10 editions supports 6TB of RAM

enterprise

Windows utility to view the logs associated with an application

even viewer

What can bypass many normal startup options, and prevents access to BIOS configuration?

faststartup

Windows utility to make a configuration change across all systems

group policy editor

Why is date and time important when encryption is involved?

if data is different between devices, the encryption process may fail or the certificate may appear to be expired

internet properties utility

includes configuration options for the browser and settings for the proxies

A system administrator is installing a new video editing application on a user's workstation from an installation USB flash drive. However, the installation process fails due to lack of available drive space. Which of the following would be the BEST way to complete the installation process? ❍ A. Use a share drive for the installation source ❍ B. Install the application to a network share

install application on a network share

A help desk technician has been tasked with rebuilding an email server that recently crashed. Which of the following would be the BEST source for this information? ❍ A. Compliance report ❍ B. Acceptable use policies ❍ C. Network topology map ❍ D. Knowledge base

knowledge base

What contains information about processes, procedures, and documentation for resolving technical issues?

knowledge base

A system administrator has inadvertently installed a Trojan horse that has deleted a number of files across many Windows file shares. The Trojan also had access to user documents and login credentials and transmitted numerous documents to an off-site file storage system. Which of the following would limit the scope of future exploits? ❍ A. Require multi-factor authentication ❍ B. Disable all guest accounts ❍ C. Modify the default permissions ❍ D. Configure full disk encryption

modify default permissions prevents malicious software from having admin access when exploited

Are antivirus signatures related to browser encryption?

no

Does BitLocker allow user to encrypt single file or group of files?

no

Would changing the installation media from a USB to a share drive provide additional free space on the destination storage drive?

no

Does full disk encryption stop trojan horse from accessing data, if it has admin permissions?

no once user logged in, data can be accessed normally

A user on the marketing team is experiencing slower load times and ongoing sluggishness with applications on their laptop. A technician examines the Windows Update logs and finds the monthly updates are failing. Which of the following should be the best NEXT step for resolving this issue?

perform an anti-malware scan

Which windows 10 editions include BitLocker

pro enterprise

Which windows 10 editions include RDS

pro enterprise

Which windows 10 editions include domain access

pro enterprise

network and sharing center utility

provides access to the network and file sharing

Linux command to move log files on a server

sh

A company has just performed annual laser printer maintenance, and has accumulated hundreds of used toner cartridges. What is the BEST way to dispose of the old cartridges - take a hazardous waste facility - return to manufacturer

take to a hazardous waste facility

An organization has distributed new laptops to all of their home-office employees. Although the users at home can successfully connect through the Internet to resources at the corporate office, there have been complaints that printers and shared drives at home are not accessible. Which of the following would explain this issue? ❍ A. Incorrect login credentials ❍ B. Port security is turned on ❍ C. The corporate VPN is enabled ❍ D. Blocked by DLP

the corporate VPN is enabled

Performance monitor

tracks and stores long term information on many different system resources, including CPU, memory, network performance, and more

A technician would like to modify a configuration in a user's UEFI BIOS, but the system will not provide a BIOS configuration hotkey after shutting down and powering on the computer. Which of the following would be the BEST way to address this issue? ❍ A. Change the File Explorer Options ❍ B. Modify the Indexing Options ❍ C. Turn off Fast Startup ❍ D. Start the computer in Safe Mode ❍ E. Modify the Ease of Access settings

turn off fast startup

Does EFS allow user to encrypt individual files?

yes


संबंधित स्टडी सेट्स

ECON 202 TEST 3 humpries chap 11

View Set

Networking + Post-Assessment Quiz

View Set

Kingfisher Security+ SYO-501 Chapter 5: Application Security

View Set

Advanced exercise physiology exam 1

View Set

Maternal & Child Health Nursing Chapter 8

View Set

Chapter 2: Medical-Surgical Nursing

View Set