C.4 CompTIA A+ 220-1002 (Core 2) Certification Practice Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer. Which of the following is the MOST professional way to handle the situation?

Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.

Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds. Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker. Which of the following electrical terms BEST describes the condition you are most likely experiencing?

Brownout

Which of the following is the MOST likely symptom of a dirty drum or roller in a laser printer?

Lines or splotches repeated at regular intervals on the print job.

Of the following choices, which action could be most physically harmful to you?

Looking into the end of a fiber optic cable.

You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use? (Select TWO.)

Mobile device management software that performs full device encryption. Mobile device management software that performs remote wipes.

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO).

Changing the hosts file of a user's computer Exploiting DHCP servers to deliver the IP address of poisoned DNS servers

You want to configure your computer so that a password is required before the operating system will load. What should you do?

Configure a user password in the BIOS/UEFI.

A user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. What is the BEST way to respond to this situation?

Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?

Incorrect default gateway

There are two main types of firewalls that you should be familiar with. Which of the following describes a feature of a network-based firewall?

Inspects traffic as it flows between network

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

3389

One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. Which of the following actions would MOST likely cix this problem?

Assume the battery is failing and replace it.

Which of the following are likely symptoms of malware infection? (Select TWO).

Renamed system files Changed file permissions

For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality. Which of the following is the BEST step the user can take to fix this problem?

Reset to factory default

The chain of custody is used for what purposes?

Retaining evidence integrity by identifying people coming into contact with evidence

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. Which of the following BEST describes the type of attack which as occurred in this scenario?

Spoofing

A VPN is used primary for what purpose?

Support secured communications over an untrusted network

Which of the following devices help protect equipment from temporary, above-normal voltages?

Surge protector

As you troubleshoot a problem during a customer appointment, you discover the problem is directly related to the customer's actions. Which of the following is the BEST way to address the situation?

Tactfully explain the problem without accusing or judging the customer.

What is the purpose of an MSDS?

To document how to safely handle and dispose of hazardous materials.

Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?

ipconfig /release

Which of the following are safe methods of lifting heavy objects? (Select TWO.)

Bend your knees with your back straight. Lift with your legs.

Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it. When you try to delete the files, you can't because they are in use. Which of the following actions would be BEST to try first?

Boot into Safe Mode and try removing the malware.

Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent Rodney from using the TV until you can install an updated driver. What should you do?

Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager.

You have decided to install a new Ethernet network adapter in your Windows 10 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST tool to get Windows to load properly?

Boot to Safe Mode and uninstall the network driver.

You replaced the print cartridge on an inkjet printer. What should you do next?

Calibrate the printer.

A technician is tasked with configuring a user's personal tablet to connect to the corporate network. Which of the following should be performed before configuring access?

Check the tablet for unauthorized root access.

You have just installed a new video card in your friend Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver. Which of the following would be the BEST administrative tool to fix Mark's computer?

Computer Management

Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen. Which of the following is the BEST option to prevent this from happening?

Configure the device to remote wipe as soon as it reported lost.

A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take? (Select TWO).

Contact the customer and apologize. Give a realistic timeframe for your arrival.

You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed. Which of the following utilities will you MOST likely use to solve the problem?

Disk Management

A customer who uses a Windows computer recently purchased an inkjet printer from your store. She is now calling to complain that the colors in the photos she printed on her new printer don't match the colors in the original photos created by the photo shop. Which of the following actions will MOST likely resolve the issue? (Select TWO).

Download and install the latest printer drivers. Use the Color Management tab of the printer driver to calibrate the driver's color settings.

You are installing Windows 10 on a drive that was previously used for Windows 8.1. This drive has one primary partition. While installing Windows, you want to ensure that the old files are deleted and any bad sectors are located and marked as bad. To achieve your desired goal, which of the following is the BEST option to run?

Full format

You have four volumes on a basic hard disk. Which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors?

Healthy (Logical Drive)

A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?

Her group membership does not allow her to install new software.

You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update is complete?

If you disconnect during the update, the operating system could become corrupted.

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the installation types would make the BEST use of your time installing and configuring these laptops?

Image deployment

A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: They use an 802.11a wireless network. The wireless network SSID is set to BWLAN. The wireless network is not broadcasting the network SSID. The wireless network uses WPA2 with AES security. Omnidirectional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security?

Implement directional access points.

You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 10 on this system?

Install Windows the same way you would a system that uses a standard hard disk drive.

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority. Which of the following is the BEST course of action in this situation?

Install a WorkGroup to allow each device to control what is shared and with whom.

List the steps you need to follow to add more disk space to a Storage Space in Windows 10. Drag the correct steps from the left to the correct step number on the right. Not all steps on the left will be used.

Install a new storage device to the system. Add free space on a new storage device to a storage pool. Allocate space from the storage pool to an existing storage space.

You have a computer with a dual-core 64-bit processor that uses the x86-x64 instruction set. You want to install the 32-bit application on the computer. Which of the following BEST describes the action you should perform?

Install the application normally.

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following BEST describes what happened to the file?

It has been moved to a folder on your computer.

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small African nation. The user was offered a 25 percent share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account. What type of attack occurred?

Phishing

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?

Quarantine Vivian's computer.

While running a full system scan using your anti-malware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer. Which of the following is the BEST next step?

Quarantine the files.

A user is unable to read their computer files. A pop-up explains that the files have been encrypted and gives instructions on how to purchase a decryption key. Which of the following BEST describes this malware?

Ransomware

Your company has decided to hire a full-time video editor. You have been asked to find a system with the level of display quality needed by someone who will be working with video all day. Which of the following video related specifications will have the greatest impact on display quality? (Select TWO).

Refresh rate Resolution

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware has infected the system. Based on your suspicions, which of the following actions would you MOST likely take to correct the problem? (Select TWO).

Revert the system to a restore point created before the malware infection occurred. Use an anti-malware scanner to scan for and remove the infection.

A user installs a new graphics application on her Windows system. During the installation process, the application prompts the user to load a custom video driver that has been optimized for the application. She does so and then completes the installation. Several days later, the user reports that her display doesn't seem to be working properly under some conditions. To fix the problem, you need to reload the old video driver. Which of the following actions are the BEST choices? (Select TWO).

Revert the system to a restore point prior to installing the video driver. Use Device Manager to roll back the video driver.

After using your computer for a few months, you have decided it is best to install anti-malware software. After the software has been installed, you want to ensure that there are no existing files on your system that are infected. Which of the following is the BEST next step? (Select TWO).

Run a full scan Download the latest definition files.

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. When the file is copied, which of the following is true?

The R attribute is retained on the file.

Your system volume is running out of disk space. You need to extend the system volume to give it more space. Which of the following conditions MUST be met to extend the system volume? (Select TWO).

The system volume must formatted with NTFS. The disk must have contiguous free space on the same disk.

A user calls her organization's help desk to request help connecting to a network server. The Help Desk technician visits her desk to resolve the issue. Once there, the technician uses the user's telephone to call his girlfriend. Even though the technician solves the problem, the call lasts the entire time the technician is at the user's desk. Which of the following mistakes did the technician make?

The technician should not have used the user's telephone for a personal call.

A Help Desk technician receives a call from a user who is unable to download new messages from the company's email server. The technician tells the user to open a command prompt, ping the email server, and check the SMTP and POP3 server IP addresses. Which of the following mistakes did the technician make?

The technician used jargon that the user probably didn't understand.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. Which of the following is the MOST likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor.

You work for a large company that has over 1000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore, your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?

They can be thrown in the trash.

Which of the following paper types should not be used in inkjet printers?

Very glossy paper

Which of the following is another name for the paging file?

Virtual memory

You are troubleshooting a Windows 10 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indicating the operating system couldn't be found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you do the following: Boot the system from the Windows 10 installation DVD. Access the Recovery Environment. Open a Command window. Enter the command you can run at the command prompt to address this issue.

bootrec /fixmbr

You need to view detailed IP configuration information on Windows workstation. In addition to the IP address, subnet mask, and default gateway configuration, you need to see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with. What command would you enter at the command line to see this detailed information?

ipconfig /all

When you see the address of the DNS server, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. What command can you enter at the command line to update the DNS server information right away?

ipconfig /flushdns

Which commands can you use to create a new directory? (Select TWO).

mkdir md

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use

A user is having problems connecting to other computers using hostnames. Which of the following commands will BEST help you troubleshoot this problem?

nslookup

You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files

Which tool would you use to configure the paging file location and size on a Windows system?

Advanced System Settings in Control Panel

You are an IT technician for your company. A coworker calls your department and asks for help fixing his malfunctioning internal Blu-ray drive, which he installed himself. When you arrive, you unplug and then open the employee's computer. As you begin to examine his computer, the employee begins to describe the steps he has taken to install and troubleshoot the issue on his own. You examine all of the connectors and discover that the employee forgot to connect the Blu-ray drive's power cable. Your initial thought is, "How stupid can this guy be?" but you restrain from making any comments. At that moment, another coworker calls your cell phone. The ringing of the phone distracts your thoughts, and while the owner of the computer is still explaining the troubleshooting steps already completed, you quickly connect the power to the device and close the computer. A quick test determines that the device is now working. Which of the following professionalism principles is the technician failing to follow? (Select TWO).

Actively listening Avoiding being judgmental

A technician suspects that data is being leaked from a tablet. Which of the following is the BEST tool to troubleshoot this issue?

App scanner

On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details

Which ACPI power state allows a system to start where it left off, but all other components are turned off?

Sleeping

You work for a store that sells and repairs computers. Due to the room's layout, while repairing computers, you must walk from one side of the carpeted room to the other frequently. Which of the following would BEST protect you from static electricity buildup?

ESD wrist strap

Which of the following are true of libraries? (Select TWO.)

Each library can contain multiple folders from different file system locations. A single folder can be added to multiple libraries.

Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that MIGHT cause a CPU to fail prematurely?

Electrostatic discharge (ESD)

Which of the following are common tools used to physically clean the inside of a computer? (Select TWO.)

Natural bristle brush Compressed air

You need to back up user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: Use Backup and Restore to backup user data. Run the backup automatically every night at 11:00 p.m. Store the backups in the C:\Backups folder. Include a system image in each backup. Will this configuration work?

No. Backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?

Scheduled backups

A technician finds that after restoring the operating system on a mobile device, the touch screen operates unpredictably. This happens in both the default orientation or when the screen is rotated. Which of the following would BEST correct the problem?

Screen calibration

While organizing a storage cabinet, a technician discovers a box of hard drives that are incompatible with current hardware and may contain sensitive data. Which of the following is the BEST method for disposing of these drives?

Shredding

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to BEST prevent extracting data from the discs?

Shredding

Travis, a long-haul truck driver, reports that when driving on remote highways, his smartphone battery drains faster than normal, and his phone calls often cut out. Which of the following is the MOST likely reason for the fast battery drain?

Signal drop or weak signal

An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her. Which of the following BEST describes the type of attack that just occurred?

Tailgating

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?

Task Scheduler

After Joe, a user, installs a new game app on his mobile phone, downloads and webpage loads become slower than usual. Which of the following actions would BEST address this issue?

Uninstall the new app and scan for malware.

As the IT technician for your company, you have discovered that the anti-malware software being used is not detecting and removing a virus. Which of the following would MOST likely correct this issue?

Updating your malware definitions.

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?

Use cable locks to chain the laptops to the desks.

What is the best countermeasure against social engineering?

User awareness training

You have installed anti-malware software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. Which of the following should you add to your security measures to help prevent this from happening again?

User awareness training

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?

VPN concentrator


Set pelajaran terkait

Chapter 6 Bones and Bone Structure

View Set

Chapter 18: Caring for Clients with Cancer Prep -U

View Set

Lecture 4: The Integumentary System

View Set

3.4.3Test (CST): Poetry English I Sem 1

View Set