A+ 1002 Missed questions set 2
Ctrl
You are troubleshooting a workstation and need to run some diagnostic tools as an administrator on this Windows 10 workstation. Which of the following keys should you hold while left-clicking the mouse to open the Command Prompt as an administrator?
Attempt to restore to a test server from one of the backup files to verify them
You are helping to set up a backup plan for your organization. The current plan states that all of the organization's Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?
4
You are partitioning a 1 TB hard drive on a new workstation. The hard disk has been partitioned into four different partitions with 100 GB, 150 GB, 250 GB, and 500 GB. How many different file system types could you support on this 1 TB hard drive?
Remove the replace the CMOS battery
You are troubleshooting a workstation and need to enter the BIOS. Unfortunately, the user does not remember their BIOS password. What action should you take to rest the BIOS password?
environment variables
Which of the following is used to communicate data and preferences to child processes within a script or batch file?
VNC
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?
GPO (Group Policy Object)
Which of the following security controls provides Windows system administrators with an efficient way to deploy system configuration settings across many devices?
Asset ID
Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?
Device Manager
Which of the following should you use to fix an issue with a graphics card's drivers in Windows 10?
Notepad
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
Spoofing
Which of the following types of attacks are usually used as part of an on-path attack?
Differential
Which of the following types of backups only copies data modified since the last full backup?
On-access scans
Which type of antivirus scan provides the best protection for a typical home user?
1- Battery backup 2- Line Conditioner
You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions?
Remove any jewelry you are wearing
You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?
SFC
A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files?
Display Settings
A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of their location settings, which are summarized below: * Storage (49 GB Used, 15 GB Free, 64 GB Total) * Mail Client (Corporate account set to push, Personal account set to pull hourly) * Display (Auto brightness, Lock after 30 minutes, Night mode disabled) * Calls (33 minutes used during last 24 hours) * Data (52 MB used during last 24 hours) * Location (All apps set to "allow while using") Based on the information provided, what should be changed to resolve this client's problem?
Offer the customer the option to replace his phone
A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won't turn on. He excitedly tells you that he needs the smartphone working again "right now" and cannot wait. What should you do?
Update the anti-malware solution
A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection?
chmod 544 file name
A file currently has permissions of 755. Which of the following commands would change file permission to r-xr--r--?
Remove, quarantine, or erase the infected files
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?
Manually update the antivirus on the workstation and set it to perform on-access scans
A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer's file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?
constant
A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script?
loop
A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?
disable a user's account
A system administrator has noticed that an employee's account has been attempting to log in to multiple workstations and servers across the network. This employee does not have access to these systems, and the login attempts are unsuccessful. Which of the following actions should the administrator do to this employee's account in Active Directory?
Setup
A user contacts the service desk after they just finished attempting to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?
Ask another Tier 2 technician to answer the call since it will take too long to solve
A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?
Folder Options
A user's personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile file but cannot find it in their profile directory. Which of the following options do you need to configure to see this file?
Increase the pageful size
A user's workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem?
rollback plan
A web server has a planned firmware upgrade for Saturday evening. During the upgrade, the power to the building is lost, and the firmware upgrade fails. Which of the following plans should be implemented to revert to the most recent working version of the firmware on the webserver?
rainbow table
An attacker is using a precomputed table of values to attempt to crack your Windows password. What type of password attack is this?
Security Groups
An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?
Signal Strength or power level
Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified?
1- MDM 2- BYOD
Due to a global pandemic, your company decides to implement a telework policy for its employees. Unfortunately, the company doesn't have enough time to issue laptops and smartphones to each employee. The Chief Information Officer (CIO) has decided to allow employees to use their laptops and smartphones when conducting their work from home. Which of the following policies and technology should be implemented to provide security guidance to employees on the use of these devices? (Select TWO)
The technician should ask open-ended questions to properly identify the issue by narrowing down the possible symptoms or causes
Janice called the help desk to report that her computer will not boot up. The technician begins troubleshooting the issue, but after 20 minutes, the computer is still not booting up. Janice is getting frustrated with the technician, and she tells the technician that she feels that they are wasting her time since the issue isn't resolved yet. How should the technician respond to Janice's frustration?
RADIUS
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?
File Permission Change
Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, an error of "Access denied" is received. What security issue is MOST likely occurring?
su
Which of the following commands is used on a Linux system to switch to another user's account?
character
Which of the following data types would be used to store the user's middle initial?
RADIUS
The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration?
Distributed DoS
The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company's web servers. Which of the following is the MOST likely cause of the issue?
Leaked personal files/data
The paparazzi have found copies of pictures of a celebrity's new baby online. The celebrity states they were never publicly released but were uploaded to their cloud provider's automated photo backup. Which of the following threats was the celebrity MOST likely a victim of?
CDFS (Compact Disc File System)
Which of the following file system formatting types should be used with older recordable optical discs?
shutdown
Which of the following commands is used on a Linux system to safely turn off a server?
Shutdown the workstation
What does the command "shutdown /s" do on a Windows workstation?
2 GB
What is the minimum amount of RAM needed to install Windows 8.1 on a 64-bit system?
20 GB
What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?
worm
What type of malicious application does not require user intervention or another application to act as a host to replicate?
Loop
What type of structure is "For Next" in scripting?
branch
What type of structure is "IF THEN ELSE" in scripting?
MAC filtering
What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card's hardware address?
1- Uncheck any unapproved applications from the Startup tab in the Task Manager 2- reset the web browser to the default settings and configuration
When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first?
Defragment the hard drive
Whenever you reboot your domain controller, you notice it takes a very long time to boot up. As the server is booting, you hear noises that sound like a steady series of clicks coming from the hard drive. Which of the following is the BEST action to help speed up the boot time of the server?
iwconfig
Which command would be used to display the IP address and subnet mask for the wireless network connection on a macOS or Linux system?
HFS+
Which file system type is commonly used for the operating system partition on a macOS system?
shutdown +11
Which of the following Linux command-line options would shut down a Linux server 11 minutes from now?
dxdiag
Which of the following Windows 10 system utilities would be used to test the functionality of the DirectX subsystem for video and sound-related problems?
DD
Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?
sudo
Which of the following commands is used on a Linux system to run a program with another user's permissions?
Secure the area
You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST?
Update the smartphone's OS
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?
Reinstall the email app
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?
chkdsk
You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation?
perimeter network
You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?
PHI
You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?
Surge Suppressor
You just installed a flat panel television in a conference room in your office building. The facilities manager is concerned that a lightning strike could damage it. The company is not worried about the threat of power outages because the conference room is only used a few times per week. Which of the following should be installed to BEST mitigate the facilities manager's concerns without spending too much money?
Check which apps are using the most battery life
Your Android device's battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?
BSOD
Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it?
1- Enable a screen lock 2-Enable BitLocker 3-Enable a UEFI password
Your company failed a recent security audit. The IT Directory has issued a new policy dictating that all workstations must be locked when not in use for more than 2 minutes. A password must be entered before booting up the operating system, and that the hard drive is fully encrypted. You have been asked to configure the corporate workstations to enforce these new security measures. Which THREE of the following should you configure FIRST?
25
Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?
Power Surge
Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?
1- Badge Reader 2- Biometric Lock
Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room's contents?
Botnet
Your company's Security Operations Center (SOC) is currently detecting an ongoing DDoS attack against your network's file server. A cybersecurity analyst has identified forty internal workstations on the network conducting the attack against your network's file server. The cybersecurity analyst believes these internal workstations are infected with malware and places them into a quarantined network area. The analyst then submits a service desk ticket to have the workstations scanned and cleaned of the infection. What type of malware was the workstation likely a victim of based on the scenario provided?