Exam Prem CompTIA A+ 220-1102 Practice - Set A Part 1
Which of the following provide the BEST security for a server room?
Badge reader Biometric lock
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?
Date and time
A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place?
Default login WEP
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business?
MAC filtering Signal strength
A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?
Reboot into safe mode and roll back the updates
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network?
Reduce the transmit power Disable the SSID broadcast
An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense?
Remove applications from startup Defragment the hard drive
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?
Remove the user-installed antivirus software
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?
Ask another technician to take the call
Ann, an employee at a company, calls the help disk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue?
Check all browser cached files on Ann's laptop and log on to another vendor's website Ask Ann about the notification and review the installed programs
A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?
Check the application permissions
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer?
Cloud storage Hot site
A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)
Disable guest account Modify AutoRun settings
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?
Disable the user accounts
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?
Internet Options -> Connections
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)
Mapped drives Denied write/delete permissions
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
Power levels
An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security?
Put the terminal server into the router’s DMZ Block all unused ports on the LAN smart switch
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?
Set up alerts to let administrators know when backups fail
Emily, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Emily is experiencing?
There is unauthenticated wireless connectivity
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Select two.)
UPS Server rack
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
Use an antivirus product capable of performing heuristic analysis
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement?
WPA2 Multifactor
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)
Zombies Worm
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue?
chdsk dism