Comptia a+ 1102 deep practice questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following file extensions is used by a software in the Linux/Unix environment?

.sh

You want to protect mobile device users on your network from potentially leaked files or data. Which of the following should you do to help reduce this risk? (Choose two.)

Disable network autoconnect. Enable device encryption.

(On a MacBook Pro running macOS, what is the name of the bar of icons that runs along the bottom of the screen, allowing you to open apps?

Dock

You are troubleshooting a Windows 11 workstation that could have malware on it. To follow the best practices for malware removal, what is the first step you should take?

Investigate and verify malware symptoms.

You want to transfer files from your computer to a remote server. To do this, you want to connect to a shared directory on the server and copy the files. Which command-line utility will allow you to do this?

Net

One of your technicians needs to use the Task Manager utility What are ways they can open Task Manager? (Choose two.)

Press CtrI+Alt+Delete and then click Task Manager Press Ctrl+Shift+Esc.

You have just installed a second and third hard drive into a Windows Pro workstation. Each drive is 500 GB. The user wants to combine the two drives into one 1 TB volume. What should you create from those two drives to accomplish this and give the user a disk read and write performance boost?

Striped volume

You need to manually configure the IP address for a server, so you go to Network and Sharing Center, click Change Adapter Settings, then right-click the connection, choose Properties, and select IPV6. Which of the following pieces of information is not needed to configure IPv6?

Subnet mask

You have replaced a failed hard drive and need to prepare the new drive for data storage. Which utility will you use first?

chdsk

You are writing a script in Microsoft PowerShell to automate some processes that you perform daily. What file extension will the script file have?

.ps1

Which security mechanism specifies permissions for users and groups as well as the type of activities the users or groups can perform?

ACL

Your company works with confidential government files. It is illegal for employees to copy any files to flash drives. Where do you specify this as well as the penalties for not complying with the rule?

AUP

If you check the Read-only or Hidden box on the graphic, what feature of the folder is being changed?

Attributes

You use your smartphone for email and extensive Internet browsing. You want to add an additional level of security to always verify your identity online when accessing various accounts. Which type of app do you need?

Authenticator app

/A small business has two servers in their telecommunications room. They've come seeking your advice because the area has frequent power outages and they have lost important data on their servers as a result. What will you recommend for them to protect against this issue?

Battery backup

You are going to move a desktop computer from one office location to another. It's on the floor, underneath the desk. Which of the following are good personal safety procedures to follow? (Choose two.)

Bend at the knees and lift with your legs. Tie back any loose jewelry, long hair, or neckties.

Which feature of Windows Pro or higher editions is designed to encrypt storage volumes, must be activated by an administrator, and can encrypt operating system startup files?

Bitlocker

You're setting up a Windows 11 Pro machine and want to encrypt the entire hard drive, including startup files. Which technology best meets your needs?

Bitlocker

An iPhone user reports that his phone will not connect to his wireless headset for handsfree phone calls. His headset is powered on and has worked previously. His iPhone screen is shown here. What is most likely the problem?

Bluetooth is turned off

A user tells you that they received a BSOD error on a Windows 10 computer. No changes have been made to this computer recently. What is the best way to restart Windows to see whether you can isolate the issue?

Boot normally and see whether the error happens again.

A Windows computer user reports that their computer just completely locked up. On the screen is a message saying that the person pictured has participated in an illegal activity. The webcam turned on by itself, and the computer user was pictured. The message also says they can resolve the charges against them by paying a $500 fine. They are understandably shaken by the incident. What should you do next?

Boot to a bootable media from your anti-malware provider and run a remediation.

You just installed a new sound card in a Windows workstation. Now, the computer has crashed and given you a blue screen of death. You turn the computer off. What should you try to resolve the issue?

Boot to safe mode and uninstall the sound card driver

On your MacBook Pro, you use the Safari browser to surf the Internet. Yesterday a friend borrowed your laptop. Today, when you try to browse the web, no matter what site URL you type into the address bar, you are sent to a different website. What is most likely happening to your computer?

Browser redirection

As the network administrator, you have set account lockout policies so that an account is locked out after five unsuccessful login attempts. What type of security threat will this deter?

Brute force attack

Pro for Workstations

Brute-force Dictionary attack

Which process is designed to enable changes that benefit an organization with as little disruption as possible to the IT services for an efficient function of that organization?

Change management

Your company purchases a custom database software package from an outside vendor. You install the client software on a Windows workstation, and it crashes when you try to open it. You remove the software and reinstall it, but again it crashes when you open it. What should you do next?

Contact the vendor to see whether an update or patch is available

You have been asked to dispose of several old magnetic hard drives. What are you doing if you use a large magnet to clear the data off a hard drive?

Degaussing

A network connection doesn't seem to be working as it should. You've verified that the cables are good from end to end. Where can you quickly look in the OS to see if there is a problem with the onboard NIC driver?

Device manager

Your Windows workstation is having intermittent video issues. The manufacturer's website suggests you install the latest driver. Which utility should you use to check the driver version installed on your computer?

Device manager

You have instructed users on your network to not use common words for their passwords. What type of attack are you trying to prevent?

Dictionary attack

Your Windows system is running sluggishly. When you look at the hard drive, you notice that there is very little space available. Which tool should you run to attempt to free some space on the hard drive?

Disk cleanup

You have 20 Windows 11 workstations on your network. You want to create bootable media that will allow you to fix Windows boot issues. Where can you create this media?

Download and use Microsoft's media creation tool

You have some older drives that you intend to donate to a nonprofit organization. You want to set all data on the drive to be nothing but Os. What should you use to accomplish this?

Drive wiping software

A user called the help desk because their mouse is moving across the screen and windows are opening and closing. They believe it's not malware because they said they didn't do anything; they just opened an email with a strange subject. Which of the following will be most important to prevent malware on this computer going forward?

Educate users regarding threats.

(Occasionally when visiting websites using Google Chrome, you receive a pop-up window in front of your browser. Generally, it's an advertisement trying to sell you something. Which of the following actions will stop this from happening?

Enable Chrome's pop-up blocker.

Which of the following would not be included in change management documentation?

End-user acceptance

A coworker is having problems with the Bluetooth connection between a device and their laptop. Which of the following can you do to check connectivity between the laptop and the device? (Choose two.)

Ensure that Bluetooth is turned on in Settings. Ensure that Airplane mode is off. D. Go to a command prompt or terminal and type

A user is trying to use Google Chrome on their Windows computer, but they receive the error message "Unable to access the network." If they use Microsoft Edge, they are able to access websites with no problem. What do you need to do?

Ensure that Google Chrome is a permitted program in Windows Defender Firewall.

A user has called the help desk, and you've entered their ticket. The problem they describe is beyond your training. What do you do?

Escalate the problem to the next level

You have installed a second hard drive in a Windows workstation. In Disk Management, what type of partition can you create that will allow you to create an unlimited number of logical partitions in it?

GPT

You need to configure Internet connections on a Windows workstation. Which tabs of the Internet Options utility in Control Panel would you use to set the home page and enable the pop-up blocker?

General, Security

Your company makes a full backup every Sunday. Monday through Friday they create differential backups. They keep the weekly backup for a month, the daily backups are overwritten each week, and they make a backup once a month that is kept for a year. What is this backup scheme called?

Grandfather-father-son (GFS)

You want to use BitLocker to encrypt the company president's laptop drive, but when you go into Control Panel to find it, it isn't there. What Windows 10 edition does this computer have?

Home

Your friend has a new Windows 11 computer, and they're getting way too many notifications while they're trying to work. What will you tell them?

I can help you fix that. It's easy.

A salesperson in your company travels regularly to foreign countries, through different time zones. They have asked you if there is a way to set their Windows 10 PC so that it will always show the time and date for their location. How can this be done?

In Windows Settings, choose Time & Language, then choose Date & time, and select Set time automatically and Set time zone automatically.

One of your Windows 10 users has limited eyesight and has asked you to enable voice activation for as many applications as possible. Where can this be done?

In Windows Settings, under Privacy, Voice Activation

When your friend launches their new favorite game, they often get low memory warnings. Which two of the following can you do to prevent this problem from happening in the future? (Choose two.)

Increase virtual memory Increase physical memory

You're installing a new video card in a computer. It was an expensive card and you want to ensure that it isn't damaged by ESD. Until you are ready to place the card in the slot, what is the safest place for the card?

Inside it's anti static bag

An iPad user reports that when they are in a certain part of the building, their wireless connection intermittently drops. What are the two most likely causes of this? (Choose two.)

Interference with the wireless signal Weak signal strength from the wireless access point

A user has a computer that suddenly started running very sluggishly. Upon inquiry, you find that they went to some websites yesterday that they don't normally visit, so you decide to follow the best practice procedures for malware removal. What is the first step?

Investigate and verify malware symptoms.

A user wants to have Full Control over their C: drive and all the contents of it, because they have one program that defaults to saving files in a folder there. Why will you not give them this access? (Choose two.)

It is a security risk

While working on a Windows 11 workstation, a user receives a flashing pop-up message saying that their computer has been infected with a virus and they need to download a virus scanner now to fix it. What will most likely happen when they click the button to download the recommended virus scanner?

It will download a virus to their computer

You're configuring a remote connection and need a protocol or process to ensure that both parties to a transaction are who they say they are and to encrypt their user information as it passes from one to the other. Which of the following will you use?

Kerberos

Which of the following is not done/created before the change board approves a change?

Kickoff meeting

One of your technicians just touched a plastic bottle containing chemicals you are not familiar with. Their hand starts to feel like it's burning. Where can you find information on how to properly wash the technician's hands without making the problem worse, and how to dispose of the chemical?

MSDS

Your friend in another state is having a problem with their Windows 11 Home edition computer and wants your help. What could you do to provide the quickest possible help?

MSRA

You have assigned the Finance group Modify permissions on the D: MonthlyReports folder. You then create a folder named D: \MonthlyReports\January. What level of permissions does the Finance group have to the folder D: MonthlyReports\January?

Modify, because the folder inherits permissions from its parent folder

Which of the following would not constitute an invalid, and quite possibly illegal, use of software?

Modifying open source software

What items can be used to facilitate onboarding (new hires) and offboarding (people leaving) of employees to ensure that new employees have everything they need to do their job and exiting employees aren't able to damage systems or take company information with them? (Choose two.)

New-user setup checklist End-user termination checklist

You are working with a customer that has a small workgroup (peer-to-peer) network with Windows 10 PCs. The employee computers have a program that requires using the X: drive. Several computer users need to be able to access this drive, which is actually a shared folder located on the manager's PC. What can you do to make this drive available for other computers to access as drive X:? (Choose two.)

On each client computer, open File Explorer, click This PC, then click Map network drive. Choose drive letter X, then navigate to the shared resource. On the manager's PC, ensure that each user who will connect to the manager's PC has a user account

Your iPhone has been stolen. To ensure that the thief does not have access to your data, what should you do?

Perform a remote wipe

You just purchased a new computer that has four CPUs. What edition of Windows will you need, at a minimum, to take advantage of the computer's processing capability?

Pro for Workstations

Which of the following Windows editions support ReFS (Resilient File System)? (Choose two.)

Pro for Workstations Enterprise

What part of asset management includes processes such as a request for information (RFI), a request for proposal (RFP), and identifying the business need?

Procurement life cycle

You are newly hired at the help desk of your company. Which one of the following are types of information that need not be included on each ticket in a ticketing system?

Procurement life cycle

A user reports that his Windows 10 Start menu looks wrong. You know the environment relies on roaming profiles. What is a reliable solution to the user's problem?

Rebuild the Windows user profile.

Your company has a policy prohibiting illegal content on work computers. You have identified and verified illegal content on a user's workstation. What is the next step you should take?

Report the incident through proper channels.

What is used to initiate the change management process?

Request form

You are working on a Windows workstation that is operating very slowly. You want to quickly check system CPU and RAM usage to see whether anything appears amiss. Which two utilities can you use to do this? (Choose two.)

Resource monitor Performance monitor

An app on your Android-based device won't open. What will you try first?

Restart the device

Your Windows system doesn't appear to be stable. It's slow to respond when you want it to open a file. You just installed a new software application yesterday. What should you do to fix this problem?

Restore from a recent system restore point

What feature of change management examines all the possible positive and negative events that may impact a project, then identifies a response plan if the event occurs and assigns a score to the possible event?

Risk analysis/risk level

Which type of security threat gains administrative-level access for an attacker to perform another attack, and then hides its presence from system management tools?

Rootkit

A technician is troubleshooting a computer that occasionally will not read data from the hard drive. What should they try first?

Run chkdsk at a command prompt

A technician is troubleshooting a Windows 10 computer that is acting strangely, and they suspect that it's infected with a virus. They have followed the best practices for malware removal and remediated the computer. What should they do next?

Schedule scans and run updates

You read corporate email on your smartphone and do not want others to access the phone if you leave it somewhere. What is the first layer of security that you should implement to keep others from using your phone?

Screen lock

What type of software includes programs like batch files, Visual Basic, PowerShell, and so on, and is used for activities like basic automation, remapping network drives, automating backups, gathering information/data, and restarting machines based on triggers?

Scripting programs

Your company has recently installed a server with HR information on it. The server, as with most systems, possesses input/output (I/O) ports and disk bays and is connected via network cable to the local client network. However, since the data center was full, the new server is temporarily placed in the printer room. What should be a primary concern of the responsible administrator?

Security considerations of each access method

You need to add a new user on a Windows desktop computer. Where can you go to do this? (Choose two.)

Settings > Accounts Control Panel > User Accounts

A friend is having trouble with the network connection on their Windows 10 computer, so you open Network & Internet in the Settings app. Which of the following is not an option there?

Share a printer

Software was installed on a laptop without the user's knowledge. The software has been tracking the user's keystrokes and has transmitted the user's credit card information to an attacker What type of threat is this?

Spyware

You want to ensure that employees aren't installing whatever software packages that they want to because of licensing concerns and possible impacts to your network. What document will you use to identify and explain what the procedures are for custom installation of software packages?

Standard operating procedures document

Which of the following is not important to keep track of as part of your inventory management system, and to ensure compliance with local, regional, national, or perhaps international regulations?

Technical jargon used by your company

A user reports that a Word document they need will not open. Other documents open as they should. They have not made a backup of this file. Which of the following statements is true?

The file is probably corrupted, and its contents are lost

A user reports that their profile is very slow to load, then they get an error message that says, "unable to load profile." What should you suspect?

The profile is corrupted

An employee wants to bring their Windows device to use at work. At work they will need to log into a domain. Which reason below will prohibit the employee from using their device on the domain?

Their device OS is Windows Home

A computer user wants to encrypt a few files on an NTFS volume on their Windows Pro workstation. They do not have administrative rights to the computer. Which of the following statements is correct?

They can use EFS

A new user has joined your company as a network administrator. Which of the following statements is most correct regarding their network access?

They should have two user accounts: one with user-level permissions and one with administrator-level permissions.

Which type of malware is designed to look like a different program and, when installed, creates a back door for an attacker to access the target system?

Trojan

You need to know which files have been modified in a folder. Which of the following is not a way to see when files have been modified?

Type archive at command prompt

Which of the following is not a type of information, recorded in a ticketing system, that needs to have very clear, concise, written communication?

Valid licenses

Which of these third-party tools allows multiple users in diverse locations to see one another, possibly share a screen, and discuss information with one another as if they were in the same room?

Videoconferencing software

You want to create a new policy to encrypt all company drives using BitLocker. Which operating system will need to be upgraded?

Windows 11 home

You are setting up a network for a very small company. They have a total of 10 computers running a mix of Windows 10 Home and Windows 10 Pro computers, and they have a network-attached printer. What will you use to allow them to share files and their printer?

Workgroup

You are at a Windows command prompt. The folder you are in has hundreds of files, so when you view a folder listing, you want it to only show one page of files at a time. Which command should you use to do this?

dir /p

Your client has computers using macOS and other computers that are Windows-based. They want to have a shared drive configured so that both operating systems can access it. The files are very large, some of them exceeding 4 GB. What filesystem should you use to format the shared drive?

exFAT

You are at a Windows computer with the Command Prompt open. You believe that a user is improperly accessing files on a shared folder named docs. On the Windows computer, the D: \userfiles folder is shared as docs. Which command will immediately stop the sharing of this folder?

net share docs /delete

A Windows workstation is not booting properly, and you believe it's a problem with system files. Which utility can scan and repair corrupt Windows system files?

sfc

A technician is working on a Windows 10 workstation that seems to be unstable. They want to ensure that system files have not been altered. Which command should they use to scan and fix corrupted system files?

sfc /scannow


Set pelajaran terkait

Chapter 9 The housing decision: Factors and Finances

View Set

Ch. 3: Introduction to the Fourth Amendment

View Set

Perfect Competition Market Structure

View Set

MGT 321 - Organizational Behavior

View Set