A+ COMPTIA Final Exam Study Guide
Which tool will allow the users to diagnose why Windows Update keeps failing? A) Microsoft Defender Security B) Safe mode C) Windows Recovery Environment D) Windows Update Troubleshooter
D) Windows Update Troubleshooter
Which statement will load a PowerShell variable xvar with a value of 2? A) $xvar = 2 B) xvar = 2; C) set /a xvar = 2 D) xvar = 2
A) $xvar = 2
A new app developed for the Android platform has which extension? A) .apk B) .ipa C) .exe D) .sdk
A) .apk
Which extension is used with the Bash scripting language? A) .sh B) .vbs C) .py D) .bat
A) .sh
What is the minimum amount of free hard drive space required for the installation of the 64-bit Windows 10 operating system? A) 32 GB B) 60 GB C) 1.5 GB D) 15 GB
A) 32 GB
Which of the following are elements of a good workplace safety plan?Each correct answer represents a complete solution. Choose all that apply. A) A safety and health training program B) Retribution for employees who report violations C) An independent third-party auditor of the safety plan D) Periodic workplace inspections
A) A safety and health training program D) Periodic workplace inspections
Which of the following is the most common shell used with Linux? A) Bash B) Terminal C) Tcl/Tk D) SSH
A) Bash
What is the minimum required processor speed for the 64-bit installation of Windows 10? A) 3.3 GHz B) 1.0 GHz C) 2.3 GHz D) 2.2 GHz
B) 1.0 GHz
What is the maximum number of concurrent connections that can be made to a Windows workstation? A) 15 connections B) 20 connections C) 25 connections D) 10 connections
B) 20 connections
Which class of fire extinguisher is recommended for use in a wood and paper fire? A) B B) A C) D D) C
B) A
Which scripting language itself interprets commands for scripting, similar to the Windows DOS shell? A) Windows batch script B) Bash C) PowerShell D) JavaScript
B) Bash
In Windows, which of the following is the filesystem of choice for compact disk media? A) FAT32 B) CDFS C) NTFS D) EFS
B) CDFS
In general, how often should antivirus definitions be updated? A) Monthly B) Daily C) Antivirus definitions do not need to be updated. D) Weekly
B) Daily
Which of the following utilities will rearrange the files on the user's hard disk to occupy contiguous chunks of space? A) Windows Backup B) Disk Defragmenter C) Windows File Explorer D) Scandisk
B) Disk Defragmenter
Which backup media is the fastest recovery and backup method? A) Disk-to-flash B) Disk-to-disk C) Disk-to-tape D) Disk-to-cloud
B) Disk-to-disk
Which type of attack denies authorized users access to network resources? A) Worm B) DoS C) Social engineering D) Trojans
B) DoS
Which type of add-on will extend the functionality of the web browser in a way it wasn't originally designed? A) Pop-up blocker B) Extensions C) Plug-in D) Ad blocker
B) Extensions
Which of the following are OSHA requirements for a safe work environment that must be followed by employees?Each correct answer represents a complete solution. Choose two. A) Attend safety training. B) Follow all employer-implemented health and safety rules. C) Immediately report all accidents to OSHA. D) Use protective gear and equipment.
B) Follow all employer-implemented health and safety rules. D) Use protective gear and equipment.
You want to follow the rules of good security administration as set by CompTIA and vendors. To do so, which account should be disabled on most Windows operating systems for security reasons? A) User one B) Guest C) Print Operators D) Power Users
B) Guest
Which of the following Registry hives contains information about the computer's hardware? A) HKEY_CURRENT_MACHINE B) HKEY_LOCAL_MACHINE C) HKEY_MACHINE D) HKEY_RESOURCES
B) HKEY_LOCAL_MACHINE
You just had an outage of Internet connectivity. Which document should you complete so that stakeholders understand the reason for the outage? A) Change management documentation B) Incident documentation C) Acceptable use policy D) Knowledge base article
B) Incident documentation
A customer tells you that a technician from your company spent three hours on the phone making personal calls. What should you do with this information? A) Nothing. B) Inform your manager. C) Talk to the technician personally. D) Ask the customer to prove it.
B) Inform your manager.
You need to enforce profile security requirements on mobile devices. Which of these should you use to achieve this goal? A) BYOD B) MDM C) AUP D) NDA
B) MDM
One of your coworkers just spilled a chemical solvent in a warehouse, and you have been asked to help clean it up. Which of the following must contain information about a chemical solvent's emergency cleanup procedures? A) Product label B) MSDS C) OSHA D) Cathode ray tube
B) MSDS
Which type of device can detect weapons on a person entering a facility? A) Motion sensor B) Magnetometer C) Biometrics D) Badge reader
B) Magnetometer
Which of the following programs should be considered antimalware? A) VirusTotal B) Microsoft Defender Security C) Mobile device management D) Windows Action Center
B) Microsoft Defender Security
Which operating system feature offers the ability for a single application to have multiple requests into the processor at one time? A) Multiuser mode B) Multithreading C) Preemption D) Dystopia
B) Multithreading
Which scripting language is used with Microsoft Azure and Microsoft 365? A) JavaScript B) PowerShell C) Bash D) Windows batch script
B) PowerShell
Which of the following partitions is specifically the partition from which the operating system boots? A) Extended B) Primary C) Logical D) Dynamic
B) Primary
Which type of attack involves passing a database query with a web request? A) Evil twin B) SQL injection C) Tailgating D) Insider threat
B) SQL injection
To turn off a Windows 10/11 operating system gracefully, you should do which of the following? A) Run the turnoff command at a command prompt. B) Select Start, then the Power icon, and then choose Shut down. C) Press Ctrl+Alt+Del. D) Turn off the switch and unplug the machine.
B) Select Start, then the Power icon, and then choose Shut down.
Which command will allow the users to check a volume for corruption? A) sfc B) chkdsk C) format D) diskpart
B) chkdsk
What must be done before a Bash script can be executed? A) A .sh extension must be added to the end of the script. B) chmod permissions must be set. C) The execute attribute must be set. D) chown permissions must be set.
B) chmod permissions must be set.
Which of the following commands can be used to change the owner of a file to a new owner in Linux? A) chmod B) chown C) pwd D) cd
B) chown
Which type of loop has a defined beginning and end and steps from beginning to end? A) while B) for C) do-while
B) for
Within a Linux terminal, you want to see all the files on your system in long format (using the -l option), including any hidden files (which requires the -a option). Which command should you use? A) ls -s; ls -a B) ls -la C) ls -a\ls -l D) ls -a | ls -l
B) ls -la
Which extension is used with the JavaScript scripting language? A) .bat B) .py C) .js D) .sh
C) .js
Which extension is used with the Python scripting language? A) .js B) .bat C) .py D) .sh
C) .py
Which line would be used to comment on JavaScript code? A) REM comment B) 'comment C) //comment D) # comment
C) //comment
Which bootrec option can be used in Windows to again construct the boot configuration file? A) /FIXMBR B) /SCANOS C) /REBUILDBCD D) /FIXBOOT
C) /REBUILDBCD
What is the first step in malware removal? A) Educate the end user. B) Remediate the infected system. C) Identify and verify the malware symptoms. D) Quarantine the infected system.
C) Identify and verify the malware symptoms.
You arrive at the site of a failed server to find the vice president (customer) nervously pacing and worrying about lost data. What should you do? A) Downplay the situation and tell him that customers lose data every day. B) Keep your head down and keep looking at manuals to let him know that you are serious. C) Inform him that you've dealt with similar situations and will let him know what needs to be done as soon as possible. D) Offer a joke to lighten things up.
C) Inform him that you've dealt with similar situations and will let him know what needs to be done as soon as possible.
Which scripting language is used within web pages to allow for interactive content? A) Bash B) Windows batch script C) JavaScript D) PowerShell
C) JavaScript
Which of these is an example of an authentication method in which you have something? A) Place B) Password C) Key fob D) Fingerprint
C) Key fob
What kind of mobile app is being used when the owner's phone displays a message on the screen and emits an extremely loud tone? A) Failed login restriction B) Remote wipe C) Locator D) Antivirus
C) Locator
You used the winver.exe utility, and it reported Windows 10 Version 1703 (OS Build 15063.145). What is the current date of the last update? A) 63rd day of 2015 B) 145th day of 2015 C) March of 2017 D) The version needs to be looked up at Microsoft.com.
C) March of 2017
Which extension is used with the Windows batch scripting language? A) .js B) .sh C) .py D) .bat
D) .bat
What is the minimum required memory for the 64-bit installation of Windows 10? A) 4 GB B) 512 MB C) 1 GB D) 2 GB
D) 2 GB
End users are abusing the email system by selling personal items. Which policy would provide the end user the proper use of the email system for business purposes? A) Password policy B) MDM C) Incident management D) AUP
D) AUP
How do you increase the size of the taskbar? A) By left-clicking the mouse and double-clicking the taskbar B) By right-clicking the mouse and dragging the taskbar C) By highlighting the taskbar and double-clicking in the center D) By moving the mouse pointer to the top of the taskbar, pausing until the pointer turns into a double-headed arrow, and then clicking and dragging
D) By moving the mouse pointer to the top of the taskbar, pausing until the pointer turns into a double-headed arrow, and then clicking and dragging
Which installation type should the user choose if they want a clean installation of Windows? A) Upgrade B) Repair C) Refresh D) Custom
D) Custom
What is one consequence of an overheated mobile device? A) Inaccurate touchscreen response B) Inability to decrypt emails C) Higher RAM usage D) Degraded battery life
D) Degraded battery life
You need to encrypt a single file on a Windows desktop. Which technology should you use? A) BitLocker B) Microsoft Defender C) BitLocker to Go D) EFS
D) EFS
Which Startup Setting option allows the user to boot with basic drivers? A) Disable Driver Signature Enforcement B) Enable Low-Resolution Video C) Enable Debugging D) Enable Safe Boot
D) Enable Safe Boot
You need to protect your users from potentially being phished via email. Which of the following should you use to protect them? A) Secure DNS B) The principle of least privilege C) Antivirus software D) End-user education
D) End-user education
You notice that the reliability of the operating system has diminished in Reliability Monitor. Where can you find more details on why applications are failing? A) Windows Recovery environment B) Degausser device C) Device Manager applet D) Event Viewer log
D) Event Viewer log
You have a number of files with a .des extension, and you want to search each file's metadata. Which applet is used in this scenario? A) File Explorer Options B) Internet Options C) Ease of Access Center D) Indexing Options
D) Indexing Options
Which of the following is a macOS feature for password management? A) Dock B) Gestures C) Spotlight D) Keychain
D) Keychain
Which Active Directory component maps printers and drives during login? A) MMC B) Home folders C) OU D) Login script
D) Login script
Which tool is used for screen sharing? A) RDP B) Telnet C) SSH D) MSRA
D) MSRA
By default, when setting up an Android device, what is the relevance to the Google account required? A) The device requires an email setup. B) The device requires registration. C) The account is used for desktop backups. D) The account is used for cloud synchronizations.
D) The account is used for cloud synchronizations.
A mobile device is running out of RAM. What could be the most likely problem? A) The device is in DND mode. B) The digitizer is not functioning properly. C) The device is not charged to capacity. D) The device has background applications open.
D) The device has background applications open.
You are temporarily filling in on phone support when a caller tells you that they are sick and tired of being bounced from one hold queue to another. They want their problem fixed, and they want it fixed now. What should you do? A) Transfer them to another technician who handles phone calls more often. B) Inform them up front that you are only filling in temporarily and won't be of much help. C) Suggest that they call back at another time when you are not there. D) Try to solve their problem without putting them on hold or transferring them elsewhere.
D) Try to solve their problem without putting them on hold or transferring them elsewhere.
You want to upgrade from Windows Vista Home Basic edition to Windows 10. What are your options? A) Upgrade to Windows 10 Home. B) Upgrade to Windows 7 Pro. C) Upgrade to Windows 10 Enterprise. D) Upgrade first to Windows 7 Home Basic.
D) Upgrade first to Windows 7 Home Basic.
Which tool is used to create an operating system image for deployment? A) MAP toolkit B) USMT C) sysprep D) WDS
D) WDS
Which wireless encryption protocol provides AES encryption? A) WPA B) WEP C) TKIP D) WPA2
D) WPA2
In Windows, which utility is responsible for finding, downloading, and installing Windows patches? A) Device Installer B) Microsoft Management Console C) Device Manager D) Windows Update
D) Windows Update
You are purchasing an inkjet printer cartridge for home use that you know has an MSDS. Which of the following will help you in obtaining the MSDS for this product? A) You are not legally allowed to have an MSDS for this product. B) It's contained in the packaging of the printer cartridge. C) The store is required to give you one at the time of purchase. D) You should visit the printer cartridge manufacturer's website.
D) You should visit the printer cartridge manufacturer's website.
Which of the following utilities can be used in Linux to download patches for installation on a workstation? A) patch B) update C) terminal D) apt
D) apt
You are currently in a Linux terminal session and in the /home/testuser/documents/mail directory. Which command will take you to /home/testuser/documents? A) cd . B) cd ∼ C) cd . . . D) cd ..
D) cd ..
Which command will start the Event Viewer snap-in? A) eventviewer.exe B) devmgmt.msc C) lusrmgr.msc D) eventvwr.msc
D) eventvwr.msc
Which Linux utility can be used to check and repair disks? A) dumgr B) du C) chkdsk D) fsck
D) fsck
Which utility can be used to schedule a remote shutdown? A) netstat B) taskmgr C) kill D) shutdown
D) shutdown
You have a very small network in a home-based office, and you want to limit network access to only those hosts that you physically own. What should you utilize to make this possible? A) Static IP addresses B) Disabled DNS C) Default subnet mask D) Empty default gateway
A) Static IP addresses
Which key combination can the users use to bring up the Spotlight utility from within an app? A) Option+Tab B) Command+spacebar C) Alt+Home D) Control+Shift
B) Command+spacebar
Which of these is not an environment variable? A) System B) String C) Program D) User
B) String
Which command is used to measure packet loss as a packet travels to a destination address? A) nslookup B) pathping C) tracert D) ping
B) pathping
Which of the following replaces MBR in 64-bit versions of the Windows operating system? A) GRUB B) LILO C) NFS D) GPT
D) GPT
You recently removed four AA alkaline batteries from a remote-control device. What is the recommended way to dispose of these batteries? A) Flush them down the toilet. B) Throw them in the trash. C) Incinerate them. D) Take them to a recycling center.
D) Take them to a recycling center.
Internal users suspect there have been repeated attempts to infect their systems, as reported to them by pop-up messages from their antivirus software. According to the messages, the virus seems to be the same in every case. What is the most likely culprit? A) A server is acting as a carrier for a virus. B) A DoS attack is underway. C) Your antivirus software has malfunctioned. D) A password attack is being carried out.
A) A server is acting as a carrier for a virus.
Which command will allow the copying of all data to include NTFS permissions? A) robocopy B) chkdsk C) copy D) xcopy
A) robocopy
Your office has recently added 20 new workstations, and your manager has put you in charge of configuring them. The users need to have Microsoft Office installed. What should you do to install Microsoft Office properly on these computers? A) Agree with the open source license agreement during installation. B) Use the personal license key from an existing system to install Office on the new computers. C) Follow normal installation procedures; nothing else needs to be done. D) Ensure that the company has the proper licenses to install 20 additional copies.
D) Ensure that the company has the proper licenses to install 20 additional copies.
In Windows, a quick way to access Help is to press which keyboard key? A) Alt B) F12 C) The Windows key on the keyboard D) F1
D) F1
Which type of resources do you configure in Device Manager? A) Files and folders B) Applications C) Memory D) Hardware
D) Hardware
Which of the following filesystems is a proprietary filesystem created by Apple that offers SSD support? A) APFS B) ext4 C) HFS D) exFAT
A) APFS
When installing Windows, you can control telemetry data. Which step will help the user to configure this setting during setup? A) Privacy settings B) Account creation C) Disk partitioning D) Cortana options
A) Privacy settings
Which of the following are OSHA requirements for a safe work environment that must be followed by employers?Each correct answer represents a complete solution. Choose two. A) Providing properly maintained tools and equipment B) Attending yearly OSHA safe work environment seminars C) Displaying an OSHA poster in a prominent location D) Having an OSHA employee stationed within 5 miles of the facility
A) Providing properly maintained tools and equipment C) Displaying an OSHA poster in a prominent location
What does the -p option with mkdir do? A) None of these B) Creates subfolders as well as folders C) Prompts the user before creating subfolders D) Prompts the user before creating files
B) Creates subfolders as well as folders
Which Control Panel applet would you use to join the operating system to a domain? A) Internet Options B) Programs and Features C) System D) User Accounts
C) System
Which event log should be checked if the user suspect that the computer has rebooted unexpectedly? A) Boot B) Security C) System D) Application
C) System
On which network protocol and port does SSH operate? A) TCP port 443 B) TCP port 3389 C) TCP port 22 D) TCP port 23
C) TCP port 22
As part of your training program, you're trying to convince users to make backups on a regular basis. Which Apple app can be used to make backups of various types on a regular basis? A) Time Machine B) Keychain C) VSS D) Finder
A) Time Machine
You're working late one night and notice that the hard drive on your new computer is very active even though you aren't doing anything on the computer and it isn't connected to the Internet. What is the most likely suspect? A) Your system is under a DoS attack. B) A virus is spreading in your system. C) A spear phishing attack is being performed. D) TCP/IP hijacking is being attempted.
B) A virus is spreading in your system.
What is the minimum amount of memory required for a 32-bit installation of Windows 10? A) 256 MB B) 512 MB C) 1 GB D) 128 MB
C) 1 GB
Which statement will load the JavaScript mvar variable with a value of 8? A) $mvar = 8 B) mvar = 8 C) mvar = 8; D) set /a mvar=8
C) mvar = 8;
Which command is used to identify ports in use by applications and the operating system? A) pathping B) nslookup C) netstat D) ipconfig
C) netstat
What is normally performed when an employee is offboarded? A) Their user account is deleted. B) Their user account password is reset. C) Their user account is created. D) Their user account is unlocked.
A) Their user account is deleted.
In the interest of a safe work environment, which of the following should you report?Each correct answer represents a complete solution. Choose two. A) An accident B) A near-accident C) Spills on the floor inside a building D) Rain forecasted for a workday
A) An accident C) Spills on the floor inside a building
Which statement about scripting languages is true? A) They are interpreted. B) They have good memory management. C) They require a compiler. D) They are strongly typed.
A) They are interpreted.
A customer is trying to explain a problem with their system. Unfortunately, the customer has such a thick accent that you are unable to understand. What should you do? A) Apologize and find another user or manager who can help you translate. B) Ask that another technician be sent in your place. C) Call your supervisor. D) Just start working on the system and look for obvious errors.
A) Apologize and find another user or manager who can help you translate.
You're in the process of securing the IT infrastructure by adding fingerprint scanners to your existing authentication methods. This type of security is an example of which of the following? A) Biometrics B) Softening C) Access control D) Physical barriers
A) Biometrics
When replacing a hard drive, you discover prohibited material on a user's laptop. What should you do first?Each correct answer represents a complete solution. Choose two. A) Confiscate and preserve the prohibited material. B) Destroy the prohibited material. C) Report the prohibited material through the proper channels. D) Confront the user about the material.
A) Confiscate and preserve the prohibited material. C) Report the prohibited material through the proper channels.
You need to upgrade a server and want to make a backup of the data before you begin. Which backup method should you choose so that your normal backups are not affected? A) Copy B) Incremental C) Differential D) Full
A) Copy
What should be periodically done with mechanical hard drives to speed up performance when launching and saving files? A) Defragment B) Trim C) Free up space D) Empty Recycle Bin
A) Defragment
What is the recommended use policy on magnetic-tipped screwdrivers inside computers? A) Do not use them. B) It's okay to use them but keep them away from the processor. C) It's okay to use them but keep them away from the RAM. D) It's okay to use them, but only if they're of the powered variety.
A) Do not use them.
Which part of the operating system is specifically written to instruct the operating system to communicate with a piece of hardware? A) Driver B) Source code C) Application D) Kernel
A) Driver
Which edition of Windows 10 will not allow for Insider Program branch releases? A) Enterprise LTSC B) Education C) Pro D) Home
A) Enterprise LTSC
Which of the following allows you to navigate file/folder structures in Windows? A) File Explorer B) Start menu C) GNOME D) KDE
A) File Explorer
Which partitioning type is required when you have UEFI firmware? A) GPT B) MBR C) POST D) Boot Sector
A) GPT
Which of the following installation methods would be the best to use if the user wanted to install a program on a virtual machine? A) ISO B) ZIP files C) Optical disk D) USB
A) ISO
You are currently troubleshooting a network issue. Which type of diagram allows you to view the flow of information from a high-level overview? A) Logical diagram B) Knowledge diagram C) Symbol diagram D) Physical diagram
A) Logical diagram
Which of the following is located on the rightmost portion of the taskbar? A) Notification area B) Shutdown options C) Start menu D) Quick Launch
A) Notification area
At the end of the day, you finish a job only to find that the user you were doing it for had to leave. What should you do?Each correct answer represents a complete solution. Choose two. A) Notify the user's manager and your own manager that you have finished. B) Leave a note for the user detailing what was done and how to contact you. C) Clean up and leave no evidence that you were there. D) Put the system back to its original state.
A) Notify the user's manager and your own manager that you have finished. B) Leave a note for the user detailing what was done and how to contact you.
You've discovered that credentials to a specific application have been stolen. The application is accessed from only one computer on the network. Which type of attack is this most likely to be? A) On-path attack B) Smurf C) Denial-of-service D) Zero-day
A) On-path attack
Which of the following are usually contained on an MSDS?Each correct answer represents a complete solution. Choose two. A) Personal protection instructions B) Salinity levels C) Freezing point D) Handling and storage instructions
A) Personal protection instructions D) Handling and storage instructions
Which Microsoft remote protocol allows for local drives to be presented to the remote system? A) RDP B) SSH C) Telnet D) VCN
A) RDP
You are executing the primary plan in the change management documentation and realize that you cannot proceed. Which section details the original configuration? A) Rollback B) Plan for change C) Purpose D) Risk analysis
A) Rollback
Which of the following details how many systems the proposed change will affect? A) Scope of change B) Risk analysis C) Change board D) Plan for change
A) Scope of change
Which type of power protection is used between the electricity coming into the premises and the power meter to protect from surges in electricity? A) Service entrance surge protection B) Uninterruptable power supply C) Surge protector strip D) Generator
A) Service entrance surge protection
Which of the following is a program that runs on top of the OS and allows the user to issue commands through a set of menus or some other graphical interface? A) Shell B) Taskbar C) Source D) Desktop
A) Shell
Which of the following was a major change with the introduction of Windows 8? A) Start screen B) System tray C) Sidebar D) Gadgets
A) Start screen
Which term refers to copying data between a mobile device and a computer system to mirror such things as contacts, programs, pictures, and music? A) Synchronization B) Pairing C) Remote wipe D) Calibration
A) Synchronization
Which MMC snap-in allows the users to start a program based on a condition? A) Task Scheduler B) Disk Management C) Group Policy Editor D) Programs and Features
A) Task Scheduler
Which restriction will be imposed on Windows users until they activate the operating system? A) They won't be able to change the wallpaper. B) They won't be able to browse the Internet. C) They won't be able to launch applications. D) They won't be able to run Windows Updates.
A) They won't be able to change the wallpaper.
The vice president of your company calls a meeting with the IT department after a recent trip to competitors' sites. She reports that many of the companies she visited granted access to the operating system or applications after an employee presented a rotating numerical key. Of the following, which technology relies on a rotating numerical key of users for authentication? A) Tokens B) Smartcard C) Biometrics D) Geofencing
A) Tokens
Your work environment has been unusually dry lately, and several components have been damaged by ESD (electrostatic discharge). Your team has been asked to be extra careful about ESD damage. Which of the following measures can be implemented to reduce the risk of ESD?Each correct answer represents a complete solution. Choose two. A) Use an antistatic wrist strap. B) Use an antistatic bag. C) Spray disinfectant spray. D) Shuffle your feet.
A) Use an antistatic wrist strap. B) Use an antistatic bag.
Which partition contains the recovery utility in the event of a problem? A) WinRE B) BCD C) System D) ESP
A) WinRE
Which of the following is different from a virus in that it can reproduce itself, is self-contained, and doesn't need a host application to be transported? A) Worm B) Trojan C) Phish D) Smurf
A) Worm
Which of the following filesystems is a proprietary filesystem created by Microsoft for use with large flash drives? A) exFAT B) GPT C) NFS D) ext3
A) exFAT
Which tool allows the user to report a remote computer's inventory of hardware? A) msinfo32.exe B) regedit.exe C) dxdiag.exe D) msconfig.exe
A) msinfo32.exe
You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your email system error log reports a large number of unsuccessful attempts to log in. It's apparent that the email server is being targeted. Which type of attack is most likely occurring? A) TCP/IP hijacking B) Brute-force C) Backdoor D) Worm
B) Brute-force
You promised a customer that you would be out to service their problem before the end of the day but have been tied up at another site. As it now becomes apparent that you will not be able to make it, what should you do? A) Email the customer to let them know that you will be late. B) Call the customer and inform them about the situation. C) Wait until after hours and then leave a message that you were there. D) Arrive first thing in the morning.
B) Call the customer and inform them about the situation.
The Windows File Explorer program can be used to do which of the following?Each correct answer represents a complete solution. Choose two. A) Browse the Internet B) Copy and move files C) Change file attributes D) Create backup jobs
B) Copy and move files C) Change file attributes
Which of these is a password manager? A) Google Chrome B) Credential Manager C) Edge D) Active Directory
B) Credential Manager
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim? A) Worm B) DDoS C) DoS D) Rootkits
B) DDoS
Which power mode will write the contents of the RAM to the disk? A) Standby B) Hibernate C) Suspend D) Sleep
B) Hibernate
What level are scripting languages considered? A) Low B) High C) Mid D) Intermediate
B) High
Which of the following has the goal of allowing a username/password combination to be entered once and then allowing claims to be used for consecutive logins? A) Kerberos B) Single sign-on C) Multifactor authentication D) Tokens
B) Single sign-on
Your help desk has informed you that they received an urgent call from the vice president last night requesting his login ID and password. When you talk with the VP today, he says he never made that call. What type of attack is this? A) Replay B) Social engineering C) Trojan horse D) Spoofing
B) Social engineering
A junior administrator comes to you in a panic. After looking at the log files, he has become convinced that an attacker is attempting to use a legitimate IP address to disrupt access elsewhere on the network. Which type of attack is this? A) Social engineering B) Spoofing C) Password D) Worm
B) Spoofing
A user is in the Sales group. The Sales group has no permissions at the share level. The files on NTFS are secured with the Modify permission for the Sales group. What permissions will the user have? A) The user will have no access when logged in locally to the computer. B) The user will have the Modify permission when logged in locally to the computer. C) The user will have the Modify permission when connecting from the network. D) The user will have read-only permissions when connecting to the network.
B) The user will have the Modify permission when logged in locally to the computer.
One of the users you support has a Windows 10/11 laptop that will not boot up. The user just installed brand-new drivers for a graphics card. They need to access a tax application and their data files. What should you try first? A) Manually reinstall Windows 10. B) Use System Restore. C) Use Reset This PC. D) Reimage the laptop.
B) Use System Restore.
Your office is moving from one floor of a building to another, and you are part of the moving crew. When moving computer equipment, which of the following are good procedures to follow?Each correct answer represents a complete solution. Choose two. A) Carry CRT monitors with the glass face away from your body. B) Use a cart for heavy objects. C) Ensure that there are no safety hazards in your path. D) Lift by bending over at the waist.
B) Use a cart for heavy objects. C) Ensure that there are no safety hazards in your path.
Which of the following Linux commands/utilities can be used to edit a file? A) rm B) nano C) ps D) ls
B) nano
Which of the following Linux commands will show the users a list of running processes? A) cat B) ps C) su D) ls
B) ps
Which Linux command can be used to let the user run a single command as another user? A) su B) sudo C) ifconfig D) passwd
B) sudo
Which of the following components are only used to restore Windows from a suspended state? A) msconfig.exe B) winresume.exe C) winload.exe D) ntoskrnl.exe
B) winresume.exe
Why would the operating system write out large amounts of RAM to the page file? A) Because the CPU is running high on utilization B) Because the page file is faster than conventional RAM C) Because the amount of physical RAM is low D) Because this process is normally used by the operating system
C) Because the amount of physical RAM is low
In addition to right-clicking the desktop, how else can you access the Display Properties settings? A) By pressing Ctrl+Alt+Esc B) By clicking the System icon under Control Panel C) By clicking the Settings gear in the Start menu D) By pressing Ctrl+Alt+Tab
C) By clicking the Settings gear in the Start menu
What is the maximum allowable length for the name of a file in Windows? A) 32 characters B) 64 characters C) 255 characters D) 8 characters
C) 255 characters
What is the approximate minimum level of static charge for humans to feel a shock? A) 300,000 volts B) 30,000 volts C) 3,000 volts D) 300 volts
C) 3,000 volts
A user on the phone does not seem to be able to explain their problem to you without using profanity. That profanity is making you unable to understand their problem. What should you do? A) Hang up. B) Show them that you know just as many expletives as they do. C) Ask the user to refrain from offensive language. D) Overlook the profanity.
C) Ask the user to refrain from offensive language.
Which policy would you create to define the minimum specification if an employee wanted to use their own device for email? A) MDM B) AUP C) BYOD D) NDA
C) BYOD
You have dropped a screw into a tight location of a computer. How should you grab it? A) By using a magnetic-tipped screwdriver B) By shaking the computer until it falls out C) By using a three‐claw retriever D) By using a magnetic grabber
C) By using a three‐claw retriever
What is the name of the area at the bottom of a macOS screen where, by default, a bar of crucial icons appears? A) Mission Control B) Taskbar C) Dock D) Footer
C) Dock
Which partition style allows up to 2,000 volumes to be partitioned on a physical disk? A) GPT B) Basic Disk C) Dynamic Disk D) MBR
C) Dynamic Disk
Where is the Boot Configuration Data stored on a Windows installation utilizing EFI? A) Secure Boot partition B) C:\WINDOWS C) EFI System Partition D) WinRE partition
C) EFI System Partition
Which of the following can the user do to help eliminate security problems? A) Prevent booting into safe mode. B) Optimize drives. C) Establish security policies and procedures. D) Prevent booting into Windows Recovery Environment.
C) Establish security policies and procedures.
In Windows, a quick way to access Help is to press which keyboard key? A) F12 B) The Windows key on the keyboard C) F1 D) Alt
C) F1
You need to secure your mobile device's lock screen with the highest level of protection. Which of the following lock should you use? A) Passcode B) Face C) Fingerprint D) Swipe
C) Fingerprint
Which type of variable will allow decimal math? A) Boolean B) String C) Floating-point D) Integer
C) Floating-point
You have a failed CRT monitor that you must dispose of safely. Which of the following is used to discharge voltage properly from the unplugged computer monitor? A) Antistatic wrist strap B) Power cord C) High-voltage probe D) Screwdriver
C) High-voltage probe
Which of the following types of batteries are not considered environmental hazards? A) Button cell B) NiCd C) NiMH D) Alkaline
C) NiMH
You need to investigate how to protect credit card data on your network. Which information should you research? A) PHI B) PII C) PCI DSS D) GDPR
C) PCI DSS
You want to upgrade from a 32-bit Windows 7 Professional to a 64-bit version of Windows 10. What are your options? A) Perform installation of Windows 10 Pro 32-bit, and then update to 64-bit. B) Upgrade directly to Windows 10 Pro 64-bit. C) Perform a clean installation of Windows 10 Pro 64-bit. D) Upgrade to Windows 8.1 64-bit, and then upgrade to Windows 10 64-bit.
C) Perform a clean installation of Windows 10 Pro 64-bit.
Which of the following are common types of screwdrivers?Each correct answer represents a complete solution. Choose two. A) Helix B) Circular C) Phillips D) Torx
C) Phillips D) Torx
You recently finished repairing a network connection, and in the process, you traced several network connections. Which type of documentation should you create so that another technician does not need to repeat the task of tracing connections? A) Knowledge base article B) Change management document C) Physical diagram D) Logical diagram
C) Physical diagram
Which scripting language has its own preinstalled ISE? A) Bash B) VBScript C) PowerShell D) Python
C) PowerShell
If the permissions for a file are rwxrw-r--, what permissions apply for a user who is a member of the group to which the owner belongs? A) No access B) Read, write, and execute C) Read and write D) Read only
C) Read and write
In Windows, a deleted file can be retrieved using which of the following? This task contains the radio buttons and checkboxes for options. A) Settings app B) Control Panel C) Recycle Bin D) My Computer
C) Recycle Bin
Which regulation is enforced by SEC to regulate financial records and sensitive financial information? A) HIPAA B) GLBA C) SOX D) FERPA
C) SOX
What is the risk of using the auto-reconnect feature on a mobile device? A) You may exceed your cellular data plan's limits. B) The device will reconnect to any SSID. C) The device could be exploited by an evil twin attack. D) The device's battery life could be shortened.
C) The device could be exploited by an evil twin attack.
As a best practice, after a set period of inactivity on a Windows workstation, what should happen? A) The system should shut down. B) The user shouldn't be logged out of the system. C) The password-enabled screensaver should automatically start. D) The system should restart.
C) The password-enabled screensaver should automatically start.
What will be the effect on the permission of the folder when moved to the same partition? A) The permissions will be configured as the root folder for the drive letter. B) The permissions will be inherited from the new parent folder. C) The permissions will be the same as they were before the move. D) The permissions will be blank until configured.
C) The permissions will be the same as they were before the move.
You have been trying to troubleshoot a user's system all day when it suddenly becomes clear that the data is irretrievably lost. When you inform the customer, they become so angry that they shove you against a wall. What should you do? A) Shove the user back, only a little harder than they shoved you. B) Yell for everyone in the area to come quickly. C) Try to calm the user down. D) Shove the user back, only a little easier than they shoved you.
C) Try to calm the user down.
If a program doesn't have a shortcut on the desktop or in the All Apps submenu, you can start it by which of the following methods? A) Typing cmd in the search box followed by the program name B) Using the shutdown command C) Typing the program name in the search box D) Using the run command and typing in the name of the program
C) Typing the program name in the search box
Which section in the Settings app lets the users configure backups? A) Devices B) System C) Update and Security D) Apps
C) Update and Security
Which tool will allow you to troubleshoot a slow-loading profile? A) Windows Recovery Environment B) Windows Preinstallation Environment C) User Profiles on the Advanced tab of the System Properties dialog box D) Regedit
C) User Profiles on the Advanced tab of the System Properties dialog box
Which type of connection is configured in the Cellular screen in the Settings app? A) Wired B) VPN C) WWAN D) Wireless
C) WWAN
What type of backup is kept on-site at the computer center for immediate recovery purposes? A) Cloud copies B) Physical copies C) Working copies D) Journal copies
C) Working copies
Which of the following can the user type in the Start menu in Windows to open a command prompt? Each correct answer represents a complete solution. Choose two. A) open B) run C) cmd D) command
C) cmd D) command
Which of the following Linux commands/utilities can be used to edit an Ethernet connection's configuration settings? A) dd B) apt-get C) ip D) pwd
C) ip
Your boss needs you to present to upper management the need for a firewall for the network. What will be the thesis of your presentation? A) The scanning of all packets for viruses B) The prevention of password attacks C) The hardening of physical security D) The isolation of one network from another
D) The isolation of one network from another
You are trying to delete a file on the local filesystem, but the operating system will not let you. What could be the problem? A) The file attributes are set to System. B) The NTFS Modify permission is applied to the file. C) The share permissions are not set to Full Control. D) The file attributes are set to Read-only.
D) The file attributes are set to Read-only.
You need to configure an iSCSI connection. Where will you find iSCSI settings? A) Device Manager snap-in B) Storage Spaces applet C) Disk Management snap-in D) Administrative Tools
D) Administrative Tools
Which component of physical security addresses outer-level access control? A) Access control vestibule B) Multifactor authentication C) Strong passwords D) Fences
D) Fences
Your iPad has an application that will not stop running. What feature/tool can you use to stop it? A) kill B) Close Quit C) Task Manager D) Force Quit
D) Force Quit
Which Windows Update branch will install features as they are released to the general public? A) Semi-Annual Channel B) Insider Program C) Long-Term Servicing Channel D) General Availability
D) General Availability
What is the name of the pass that detects hardware and installs drivers? A) WinPE B) Specialization C) OOBE D) Generalize
D) Generalize
A reflective attack attempts to use a broadcast ping on a network. The return address of the ping may be that of a valid system in your network. Which protocol does the reflective attack use to conduct the attack? A) UDP B) IP C) TCP D) ICMP
D) ICMP
Which of the following allows the users to see all running programs in macOS? A) Finder B) Force Quit C) Keychain D) Mission Control
D) Mission Control
A user is in both the Sales group and the Marketing group. The Sales group has full permission at the share level, and the Marketing group has read-only permissions. The files on NTFS are secured with the Modify permission for the Sales group and the Read & Execute permission for the Marketing group. Which permissions will the user have? A) Read-only B) Read & Execute C) Full D) Modify
D) Modify
What is the name of the pass that configures and creates the user environment during the setup process? A) Generalization B) WinPE C) Specialization D) OOBE
D) OOBE
What can you do if a program is not responding to any commands and appears to be locked up? A) Open the System Control Panel applet and choose Performance to see what process is causing the problem. B) Add more memory. C) Press Ctrl+Alt+Delete to reboot the computer. D) Open Task Manager, select the appropriate task and then click End Task.
D) Open Task Manager, select the appropriate task and then click End Task.
Which of the following are used to prevent pop-unders from appearing? A) Phishing sites B) Antivirus software C) Antimalware utilities D) Pop-up blockers
D) Pop-up blockers
Which tool can be used to diagnose why Windows 10/11 is slow and sluggish? A) Safe mode B) Device Manager C) Reliability Monitor D) Resource Monitor
D) Resource Monitor
Which of the following tools allows users to manually fix maliciously modified system files? A) regedit B) UAC C) bootrec D) SFC
D) SFC
Which of the following is not a benefit of implementing asset tags for inventory management? A) Tracking of the equipment B) Providing ownership of the equipment C) Identifying assets D) Scheduling the depreciation of the equipment
D) Scheduling the depreciation of the equipment
Which section of the change management documentation contains whom the change will affect? A) User acceptance B) Plan for change C) Business processes D) Scope of change
D) Scope of change
The interpreter in Linux between the operating system and the user is known as the _______. A) GUI B) Login C) Translator D) Shell
D) Shell
As part of your training program, you're trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced technological methods. Some attacks, you explain, take advantage of human shortcomings to gain access that should otherwise be denied. Which of the following will describe this type of attack? A) Biometrics B) Perimeter security C) IDS D) Social engineering
D) Social engineering