CompTIA A+ 1002 (Core 2) Prep

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

By default, which type of script file will a script written with Windows 10 PowerShell ISE be saved as? a) .bat b) .ps1 c) .sh d) .py

.ps1

Which device should not be plugged into a UPS? a) A monitor b) A laser printer c) A scanner d) A modem

A laser printer

Which of the following is the MOST secure wireless security protocol. A. AES B . WPA C . WPA2 D . WEP

AES

You are using the Performance Monitor on a Windows 7 Professional workstation and make note of the following counters: Memory: Pages/sec 80; Processor: %utilization 90; Physical disk: % disk time 85. Which of the following solutions would overcome the bottleneck indicated by these results? a) Add a SCSI hard disk drive. b) Upgrade to a faster processor. c) Add a second CPU d) Add RAM

Add RAM

How can disk management be accessed in Windows 10? a) Main Panel b) Device Manager c) Administrative Tools d) My Computer

Administrative Tools

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room. A. Air filters B . Privacy screens C . Vacuums D . ESD mats

Air filters

Which of the following would a technician use to store memory chips from a laptop safely after an upgrade. A. Mylar bags B . Cardboard boxes C . Antistatic containers D . Paper envelopes

Antistatic containers

What is modified when changing the system startup boot sequence? a) CMD.EXE b) BOOTMGR c) BOOT.INI d) BIOS/CMOS

BIOS/CMOS

Which file is needed to start up Windows 8? a) NTLDR b) BOOT.INI c) BOOTMGR d) NTBOOTDD.SYS

BOOTMGR

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware. A. Backout plan B . Contingency plan C . Alternative plan D . Backup plan

Backup plan

The Windows PXE allows a properly configured and supported Windows PC to: a) Bypass startup screens and boot directly to repair mode b) Boot from the network c) Start in the RE without intervention d) Launch AIK

Boot from the network

You have been asked to load an image of Windows on 10 computers that just came in. How would this BEST be accomplished? a) Use the retail media on the server. b) Boot to PXE and load image from distribution point. c) Load the image to an SSD card and use on each machine. d) Make 10 copies of the image to DVD and load image from there.

Boot to PXE and load image from distribution point.

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access. A. BranchCache B . Swap partition C . Domain access D . Proxy server

BranchCache

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT. A. Change the browser's home page B . Check the Windows host file C . Update the default web browser D . Restore Windows to a previous date

Check the Windows host file

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT. A. Reboot into safe mode B . Check the boot order C . Format the drive D . Perform Windows Recovery E . Run the chkdsk command

Check the boot order

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT. A. Check the contents of the hosts file B . Do a System Restore to a date before the infection C . Rerun the antivirus scan with higher sensitivity D . Rebuild the OS on the machine

Check the contents of the hosts file

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST. A. Check to ensure the printer selected is the default printer B . Check the status of the print server queue C . Cancel all documents and print them again D . Check that the printer is not offline print mode

Check the status of the print server queue

Which operating system will be installed on your new Chromebook by default? a) macOS b) Google OS c) Chrome OS d) Windows 10

Chrome OS

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray: There are 1033 infected files on this computer. Click here to disinfect. The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user. A. Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti malware scan. B . Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications. C . Back up the user's files. Restore the system to the original system image designated by corporate IT policies. Restore the user's files. D . Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.

Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti malware scan.

You have one physical drive partitioned into two partitions C: and D:. You add a second drive and create a primary DOS partition. What will the drive letter of the new partition be? a) C: b) D: c) E: d) F:

D:

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack. A. Implementing strong passwords B . Changing default credentials C . Disabling AutoRun D . Removing Guest account E . Encrypting data

Disabling AutoRun

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task. A. Drill B . Hammer C . Low level format D . Degaussing

Degaussing

You are working on a PC that you suspect has malware on it. Which System Restore option would you choose? a) Restore from the latest restore point b) Restore from the oldest restore point c) Disable System Restore d) Any of these

Disable System Restore

A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability. (Select two.) A. Disable guest account B . Remove admin permissions C . Modify AutoRun settings D . Change default credentials E . Run OS security updates F . Install a software firewall

Disable guest account, Modify AutoRun settings

A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy. A. Delete the user accounts B . Disable the user accounts C . Restrict the user accounts D . Reset the user accounts

Disable the user accounts

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST. A. Disconnect the PC from the network B . Perform an antivirus scan C . Run a backup and restore D . Educate the end user

Disconnect the PC from the network

A user's mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Which of the following should be changed to resolve this issue. A. Privacy - Maps B . Display - Brightness C . Storage - Photos D . Mail - Work

Display - Brightness

Which choice is a policy that covers how long data should be retained and how it should be disposed of? a) Data retention policy b) Disposal and destruction policy c) Storage and retention policy d) PII policy

Disposal and destruction policy

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan. A. Inform management regarding the anticipated amount of downtime B . Document a backout plan to roll back changes to the router C . Configure a redundant data path to eliminate downtime D . Make the downtime window larger than actually anticipated

Document a backout plan to roll back changes to the router

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used. A. Degauss B . Drive wipe C . Standard format D . Low level format

Drive wipe

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process. A. Driver detection B . Metro interface C . Account control D . PXE installation

Driver detection

Which of the following can provide some protection for your network from outside invaders? (Choose all that apply) a) Firewalls b) Class 3 modems c) Class 2 modems d) Packet-Filtering Routers e) Hidden Files f) Proxy Servers

Firewalls, Packet-Filtering Routers, Proxy Servers

Which technique allows the path of local folders, such as Pictures or Documents, to appear as a network location while also being cached locally? a) OUs b) Groups c) Home folders d) Folder redirection

Folder redirection

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter "J" assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive. A. GPT B . Dynamic C . Basic D . Extended

GPT

You have a customer that has installed an updated device driver for their sound card and now it is not functioning properly. How can you roll back the driver? a) Go to Device manager and click Roll Back Driver. b) Go to Device Manager, click on the Device and Roll Back Driver. c) Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver. d) Restart the computer in Last known good configuration Mode.

Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver.

A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user. A. Guest B . Power User C . Administrator D . Standard User

Guest

Which type of security token is the least vulnerable to malware? a) Hardware token b) Software token c) Badge reader d) None of these

Hardware token

A customer calls and states that they are suddenly receiving emails from unknown parties that are automated replies of delivery failures or vacation messages. What do you suspect? a) Misconfigured email program b) Malware c) Spam d) Hijacked email

Hijacked email

When upgrading a system from Windows 7 Home Premium Edition (SP1) to Windows 10, which Windows 10 Edition is recommended? a) Home b) Home Premium c) Professional d) Any edition that the hardware supports

Home

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed. A. Unattended installation B . Remote installation C . Repair installation D . Image deployment installation

Image deployment installation

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue. A. See if Joe's email address has been blacklisted B . Change the password on Joe's email account C . Update the antivirus and perform a full scan on the PC D . Isolate Joe's computer from the network

Isolate Joe's computer from the network

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs. A. Standard formatting B . HD drilling C . Low level formatting D . HD partitioning

Low level formatting

A technician is installing Windows 7 64 bit OS on a VM but keeps getting errors. The specifications for the malware are: #Two 1GHz CPUs #2GB of memory #15GB hard drive #800x600 screen resolution Which of the following should the technician do to resolve the problem. A. Increase the number of CPUs B . Increase the amount of memory C . Increase the amount of hard drive space D . Increase the screen resolution

Increase the amount of hard drive space

Which of the following is a reason to use WEP over WPA. A. Device compatibility B . Increased security C . TACACS D . Multifactor authentication

Increased security

A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT. A. Run the scan again to ensure all malware has been removed B . Quarantine the infected workstation from the network C . Install all of the latest Windows Updates to patch the system D . Educate the user on safe browsing practices

Install all of the latest Windows Updates to patch the system

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take. A. Update antivirus definitions B . Install anti malware software C . Enable the pop up blocker D . Reboot the PC

Install anti malware software

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe's slow data speeds. A. Joe's data transmission is over the limit B . The phone needs to be rebooted from overuse C . The use of GPS interferes with data speeds D . There is unintended Bluetooth pairing

Joe's data transmission is over the limit

A new company policy states that all end user access to network resources will be controlled based on the users' roles and responsibilities within the organization. Which of the following security concepts has the company just enabled. A. Certificates B . Least privilege C . Directory permissions D . Blacklists

Least privilege

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business. (Select two.) A. Default SSID B . MAC filtering C . NAT D . QoS E . Signal strength F . Encryption

MAC filtering, Signal strength

Which of the following would you choose to track inventory that are on pallets in your company's warehouse? a) QR codes b) Barcodes c) RFID tags d) All of these

RFID tags

Which devices are loaded during safe mode? a) Mouse, CD-ROM, keyboard b) Mouse, SVGA, keyboard c) Mouse, VGA, keyboard d) Mouse, keyboard, speakers

Mouse, VGA, keyboard

Which of the following provide the MOST security for PCs and mobile devices. (Choose two.) A. Access control lists B . Multifactor authentication C . Organizational unit D . Trusted software sources E . Data loss prevention F . Pre shared key

Multifactor authentication, Trusted software sources

When formatting a large capacity drive what situation would cause it to format at a lower capacity when you set it up in an operating system? a) Operating system overhead. b) The new drive is not IDE compatible. c) The ram does not support the larger capacity hard drives. d) The disk is full.

Operating system overhead.

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need. A. PHI certification B . PCI compliance C . POTS implementation D . PII filtering

PCI compliance

Which of the following is considered government regulated data. A. PII B . End user license agreement C . Digital Millennium Copyright Act D . DRM

PII

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade. A. SSD B . Optical drive C . Flash drive D . PXE

PXE

What should be the first step when configuring a hard drive into a system? a) Format b) Install OS c) Configure DMA d) Partition

Partition

All of the following fall into one security classification: Lock Doors, Shredding documents, Biometrics, RSA tokens, Retinal. a) Digital security b) Strong passwords c) User Education d) Physical Security

Physical Security

Which of the following built in accounts was removed in Windows 10. A. Power User B . Administrator C . Guest D . Standard User

Power User

A small business has an open wireless network so vendors can connect to the network without logging in.The business owners are concerned that a nearby company is connecting and using the wirelessconnection without permission. If the small business requires that the network remain open, which of thefollowing configuration settings should be changed to address these concerns. A. Default SSID B . MAC filtering C . Power levels D . Content filtering E . Firewall

Power levels

A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT. A. Preserve data integrity B . Identify violations of acceptable use C . Collect evidence of illegal activity D . Report through proper channels

Preserve data integrity

In Windows 8, what should be done if a 32-bit Windows based program stops responding? a) Click on Start, Shutdown and select ~Shutdown the computer~. b) Press CTRL-ALT-DEL and select Shutdown. c) Press CTRL-ALT-DEL and select End Task. d) Press CTRL-ALT-DEL, select the program that is not responding and press EndTask.

Press CTRL-ALT-DEL, select the program that is not responding and press EndTask.

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used. A. Biometric device B . Common access card C . Cable lock D . Privacy screen E . Mantrap

Privacy screen

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP. Which of the following would be the NEXT appropriate act. A. Promptly notify the administrator's immediate supervisor B . Rename the folder on the server, and notify the information security officer C . Move the folder to another location on the server, and notify the local authorities D . Ask the owner to move the files from the server to a local computer

Promptly notify the administrator's immediate supervisor

Which of the following BEST describes the purpose of an ESD mat. A. Protects against accidental static discharge B . Protects against dust/dirt contamination C . Protects against accidental scratches D . Protects against accidental water damage

Protects against accidental static discharge

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT. A. Provide documentation of the repair to the customer B . Allow the customer to voice concerns and post the story to social media later C . Inform the customer the job is done and return to the office D . Defend each step and why it was necessary

Provide documentation of the repair to the customer

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop up notifications. Which of the following are the MOST likely causes of these issues. (Choose two.) A. System files have been deleted B . Proxy settings are configured improperly C . The OS has been updated recently D . There are disabled services on the vendor website E . Program file permissions have changed recently F . There is a rogue anti malware program

Proxy settings are configured improperly, There is a rogue anti malware program

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources. A. WPA2 B . AES C . MAC filtering D . RADIUS E . WPS

RADIUS

You are responsible for managing remote users. Their connections must adhere to the AAA management model. Which service would you choose? a) RADIUS b) PPP c) Dialup-Call back d) TACACS+

RADIUS

A user's computer is displaying a black screen. The technician restarts the computer, but the OS still doesnot load. The technician discovers the OS was patched the previous evening.Which of the following should the technician attempt NEXT. A. Reboot into safe mode and roll back the updates B . Repair the Windows Registry C . Configure boot options in the BIOS D . Disable Windows services and applications

Reboot into safe mode and roll back the updates

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network. (Select two.) A. Reduce the transmit power B . Reduce the channel availably C . Disable the DHCP server D . Enable QoS management E . Disable the SSID broadcast F . Implement WPA encryption

Reduce the transmit power, Disable the SSID broadcast

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer. A. Unattended installation B . Refresh upgrade C . Clean installation D . In place upgrade

Refresh upgrade

You have lost your iPhone. Fortunately, you have enabled the Find My iPhone feature. You log on to your account, access the map, but do not see the device. Fearing a breach of your privacy, which would best protect the data? a) Send message b) Remote lock c) Remote wipe d) Remote access

Remote wipe

A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop ups. Which of the following should a technician do to resolve these issues. (Choose two.) A. Reset the user's browser to default settings B . Delete the user's cached images, temporary files, and cookies C . Reboot the user's computer and install a secondary antivirus D . Convince the user to use a different web browser that is currently unaffected E . Download the update to the user's web browser of choice F . Remove any unapproved applications from the user's startup items

Reset the user's browser to default settings, Remove any unapproved applications from the user's startup items

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue. A. Resolution B . Refresh rate C . Extended monitor D . Color depth

Resolution

The ALT+TAB keystroke produces which result in Windows 10? a) Switches between open programs. b) Closes the open program. c) Opens the closed program. d) Opens the Start Menu.

Switches between open programs.

You have a PC that will not run Windows Defender. Defender is disabled and the Action Center reports that another antivirus program is running. There are no other antivirus programs installed. What is the cause? a) Ransomware b) Rogue antivirus c) Invalid certificate d) All of these

Rogue antivirus

A way to find out if a device has been rooted is to download and run the Root Checker Basic app. What type of condition and device does Root Checker Basic report on? a) Jailbroken iOS device b) Rooted Android device c) Rooted iOS device d) Rooted Windows Phone device e) Jailbroken Android device

Rooted Android device

A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have. A. Rootkit B . Keylogger C . Trojan D . Ransomware

Rootkit

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the "My Documents" folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue. A. Remove the registry entry and rename the local account folder B . Delete or rename the local user folder C . Run DISM and re add the local power user account D . Remove the user account in Credential Manager and restart the PC

Run DISM and re add the local power user account

When configuring email you must enter: (Choose all that apply) a) Password b) SMTP c) DNS d) POP3 e) Account Name f) ISP

SMTP, POP3, Account Name

A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router. A. RDP B . SSH C . TFTP D . HTTP

SSH

A Windows 7 Professional computer is having boot problems. You investigate and decide that the problem may be related to a process being initiated by Internet Explorer. Which one of the following Advanced Options would you choose to correct the problem? a) Safe Mode with Networking. b) Safe Mode with Command Prompt. c) Safe Mode. d) Enable Boot Logging.

Safe Mode with Networking.

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements. (Choose three.) A. Screen locks B . Screensaver passwords C . UEFI passwords D . Login time restrictions E . Strong passwords F . Multifactor authentication G . BitLocker H . Credential Manager I. Smart card J. Biometric authentication

Screen locks, Screensaver passwords, BitLocker

You have an area near the pool and bar at your home that you want to configure for wireless access with no security. The area is remote and secluded enough that you have no security concerns. You have a router in place. How should you configure it? a) No SSID b) No password c) Set encryption to Open d) Set MAC filter to allow all

Set encryption to Open

Which of the following technologies is used by malicious employees to obtain user passwords. A. Main in the middle B . Phishing C . Tailgating D . Shoulder surfing

Shoulder surfing

Joe, an end user, has been prompted to provide his username and password to access the payroll system.Which of the following authentication methods is being requested. A. Single factor B . Multifactor C . RADIUS D . TACACS

Single Factor

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT. A. Create a risk analysis report for review B . Submit a change order for approval C . Insist the worker accepts the standard desktop D . Document the request and place the order

Submit a change order for approval

A junior Linux system administrator needs to update system software. Which of the following shellcommands would allow the administrator to gain the necessary permissions to update the software. A. sudo B . chmod C . grep D . pwd

Sudo

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook. A. Installation method B . System requirements C . OS compatibility D . File permissions

System requirements

Which of the following will: (1) help prevent malware from installing itself; and (2) protect the Windows configuration and other settings? a) The UAC box b) Shared permissions c) Workgroup security with user accounts and passwords d) Advanced encryption technologies

The UAC box

Why is Shared Key authentication considered a security risk? a) The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key. b) The keys are shared through broadcast with all network nodes. c) A hacker can see the keys with a sniffer. d) The WEP keys used on all computers are the same.

The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key.

A user's corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue. A. The Internet security options have changed B . The operating system updates have changed C . The network directory permissions have changed D . The user account permissions have changed

The network directory permissions have changed

Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When shegets a message indicating the page cannot be displayed. She notices there is a ". " in the radio icon in thetoolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses thecell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann isexperiencing. A. There is unauthenticated wireless connectivity B . She has exceeded the data allowance C . The phone is only 3G capable D . It is an unrooted phone E . The SIM card was not activated F . A data plan was not purchased

There is unauthenticated wireless connectivity

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue. A. Files disappearing B . File permission changes C . Application crash D . Too many startup items

Too many startup items

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly. A. Unattended installation B . Remote network installation C . In place upgrade D . Clean installation

Unattended installation

A user reports malware activity on an isolated workstation used for testing. It is running an end of life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection. A. Connect to the network and update the OS with the latest security patches B . Scan and clean the USB device used to transfer data from the equipment C . Disable System restore and remove all restore points from the system D . Update the local antivirus and set it to scan automatically every evening

Update the local antivirus and set it to scan automatically every evening

A computer becomes infected with malware, which manages to steal all credentials stored on the P A. Use an antivirus product capable of performing heuristic analysis B . Use a host based intrusion detection system on each computer C . The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal. Disallow the password caching of accounts in the administrators group D . Install a UTM in between PC endpoints to monitor for suspicious traffic E . Log all failed login attempts to the PCs and report them to a central server

Use an antivirus product capable of performing heuristic analysis

Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario. (Choose two.) A. Use full device encryption B . Enable a pattern lock C . Implement remote wipe features D . Use device lockout policies E . Require complex administrator passwords F . Disable unknown application installations

Use full device encryption, Implement remote wipe features

A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT. A. Reset the device's network settings B . Check the data usage statistics on the device C . Verify the SSID with which the device is associated D . Run any pending application or OS updates

Verify the SSID with which the device is associated

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO

WPA2, Multifactor

A user complains that they can't launch Hyper-V from home. The user cannot even find the program settings. However, the user can access the Internet. In order to help this user, which question would you ask first? a) Can you access the company website? b) Can you ping the server? c) Which Edition of Windows is installed? d) What error message is being displayed?

Which Edition of Windows is installed?

Which of the following devices provides protection against brownouts. A. battery backup B . surge suppressor C . rack grounding D . line conditioner

battery backup

A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user's workstation. A. chkdsk B . netstat C . gpupdate D . diskpart

gpupdate

A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use. A. network installation B . clean install C . in place upgrade D . image deployment

in place upgrade

Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link. This email is BEST described as: A. phishing. B . zombie. C . whaling. D . spoofing.

spoofing


Set pelajaran terkait

Exam 3 - Chapter 9: Creating and Maintaining High-Performance Organizations

View Set

Mental Health test #3 Chapter 12 Abuse and Violence, Abuse and violence prepU, Ch 12: Prep-U, Chapter 12 Abuse and Violence Questions

View Set

Chapter 34 Pediatric Emergencies

View Set

ICORE Operations: Inventory Management - The Newsvendor Model (SINGLE period inventory model)

View Set

Immunology Practice Questions_MCQ

View Set