Focus For Comptia A+ 1102

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A Windows computer user requires help from the IT department. A technician instructs the user to create an invitation file. What type of Windows help session does the user create?

Microsoft Remote Assistance

An iOS user struggles with wirelessly connecting a set of headphones to a phone. What does the user check on the phone while troubleshooting? (Select all that apply.)

Bluetooth connection Pairing mode

An IPv6 address is made up of bits that identity the network and host of a system. How many bits long is an IPv6 address in total, and how many bits identify the host portion? (Select all that apply.)

128 64

A systems administrator configures a hardware firewall to allow remote desktop connections to various Windows computers. This involves port forwarding. Which port will the administrator need to change so that each system uses a unique port?

3389

A user looks to implement virtual network computing (VNC) access to a Windows computer while traveling. Which port does the user open on a hardware firewall to allow access?

5900

A user opens a help desk ticket stating that web content within a particular webpage is not displaying as it should. What does a support technician conclude to be the most likely issue?

A plugin

A recent software installation on a Windows desktop fails. Which internal log file does a technician review to see what may have gone wrong?

Application

A user contacts an IT help desk to report that when trying to browse a web page for office supplies, a completely unrelated webpage about gambling is presented. What does the help desk determine the causes could be? (Select all that apply.)

Browser redirection DNS spoofing

An iOS smart device user notices that AirDrop is not working properly as files are not being received. What should the user check while troubleshooting? (Select all that apply.)

Bluetooth Contacts

A company uses a method that restricts its employees from messing with their computer settings. What is this method called?

BIOS

A problematic Windows system with multiple operating systems installed does not boot properly. A support technician tries to diagnose by outlining the boot process. The technician determines that the system uses an Extensible Firmware Interface (EFI) system partition. Which file does the technician inspect for problems related to a specific operating system boot problem?

BOOTMGFW

A computer user looks to map a network drive using the most basic scripting language possible. Which language does the user implement for a Windows system?

Batch script

A technician would like to set every Windows computer at an organization to have a company logo as a desktop wallpaper. What does the technician determine as the best method for deploying the setting?

Domain group policy

A computer security team investigates a high-level computer breach at a large company. While investigating the computer, the team learns that a USB drive is missing from the computer. A user states that the drive is now safe with the receptionist of the company. What concerns the team from this action? (Select all that apply.)

Chain of custody Data integrity

A technician configures a legacy computer for a user. Which account authentication policies does the technician implement? (Select all that apply.)

Change the default admin password. Disable the guest account.

A user would like to install an updated Windows operating system (OS) on a computer. There are no files that need to be saved. What options does the user have to accomplish this? (Select all that apply.)

Clean install In-place upgrade

A user suspects that a USB drive on their system has been tampered with. The user begins using the drive by saving a few reports while waiting for an IT technician to investigate. What does the user compromise?

Data integrity

A new help desk technician fields a support call from a user. What pertinent information does the technician ask the user to provide? (Select all that apply.)

Description of the issue Contact details

An administrator is backup chaining a database with the type of backup that utilizes a moderate time and storage requirement. What type of backup is this?

Full with differential

A Windows user runs the Defragment and Optimize Drives tool (dfrgui.exe) on a solid state disk (SSD). What action will the tool take on the drive? (Select all that apply.)

Identifying blocks that are deletable Tagging blocks as writable

An engineer configures numerous firewall rules on a system. The system processes the rules in order and then reaches the last default rule which blocks access. Which security principle is in place?

Implicit deny

A user claims that they cannot browse the internet but can access a local shared network server by name with no issue. After evaluating the computer's IP settings and pinging an internet host by IP address with no problem, what does a support technician determine as the cause?

Missing DNS address

A user looks to reconfigure an IP address for a network adapter. Which Control Panel applet does it use?

Network Connections

A systems administrator configures a new Windows workstation. The system uses the New Technology File System (NTFS). The system requires interaction with a Linux system and supports case sensitive file naming by utilizing which feature?

POSIX

An attacker uses a script to create fileless malware that requires no compilation. What scripting environment does the attacker utilize?

PowerShell

An engineer configures an Authentication, Authorization, and Accounting (AAA) server to authenticate credentials for remote users. Credentials are forwarded to the AAA server from a firewall. Which AAA method does the engineer utilize?

RADIUS

A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration?

Recovery partition

A user with a problematic Windows system tries to use a previously created system image. How does the user access the image? (Select all that apply.)

Repair disk Advanced boot

A user inspects and learns about the electrical components on the inside of a computer. Which component is measured in ohms?

Resistance

A tech has an Android tablet that no longer receives updates due to its age. Learning that a custom firmware with new features is available, what does the tech require to install the image?

Root access

Malware infects a user's computer. A support technician determines that the malware is executed without requiring any authorization using system privileges. What type of malware currently infects the system?

Rootkit

An organization looks to make a server available to internet traffic without bringing harm to its private network. An onsite engineer configures a separate network for the server. Which approach does the engineer utilize?

Screened subnet

A user installs an app on a smart device. The device's official app store does not list the app as it is a proprietary app for an organization. What type of installation does the user complete?

Sideload

A tech firm deploys wireless installations at client sites. As the firm uses Wi-Fi Protected Access (WPA) version 3, which security technology does the deployment utilize? (Select all that apply.)

Simultaneous Authentication of Equals mechanism AES Galois Counter Mode Protocol mode

How might a mobile-device management suite of software detect that a user has rooted an Android device?

There is no valid developer code signature.

A network engineer implements a proxy at a small company. To avoid management overhead, the configuration does not require settings on every client machine. What type of proxy does the engineer deploy? (Select all that apply.)

Transparent Intercepting

Which type of malware replicates between processes rather than infecting a file?

Worm

Which root-level file allows for the automatic execution of commands in a legacy version of Windows?

autorun.inf

A technician troubleshoots a Windows system by using the command prompt. If the technician is currently in the directory named C:\Backup and wishes to enter the directory C:\Backup\02102022, what command does the technician use?

cd 02102022

has multiple uses, including the ability to clone a disk in Linux

dd

creates and manages partitions on a hard disk in Linux

fdisk

A Windows user is not able to resolve server names on a local network. After updating the system's hosts file, which command does the user issue?

ipconfig /flushdns

used to format a partition in Linux

mkfs

used to format a swap partition in Linux

mkswap

used to attack a storage device to specific directory in Linux

mount

A user would like to delete a mapped drive labeled as "X" on a Windows system. Which command will the user issue at the command prompt?

net use X: /delete

A user interacts with a Linux distribution that has no desktop graphical user interface (GUI). As the user types, which stream handles the interaction?

stdin

Used to activate a partition as swap space in Linux

swapon

After typing in " sudo chown root:root hr_updates.text", the root account is the new owner of the file. t/f

true

after typing in " chmod 755 Managed_list.pdf" , the pdf gives the owner rwx permissions t/f

true


संबंधित स्टडी सेट्स

Questions de conversation: la politique, l'économie, et la société

View Set

Basic Nursing Care Provided by the Nurse Aide

View Set

UNIT 2: organ identification chart

View Set

GEL Test 2 (14, 7, 5, 3) questions/book questions

View Set

Chapter 11: Output and Costs Study Modules

View Set

Chapter 9 - Health Insurance Underwriting

View Set