CompTIA A+ 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which file system type is used by default when installing macOS on a modern workstation?

APFS

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?

Ask another Tier 2 technician to answer the call since it will take too long to solve.

Which of the following BEST describes how a DHCP reservation works

By matching a MAC address to an IP address within the DHCP scope

Netstat is a command-line utility used for:

Displaying active TCP/IP connections and network protocol statistics

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?

Increase the Wi-Fi signal being transmitted by their WAP

What type of structure is "For Next" in scripting?

Loop

TCP port 25 is used by:

SMTP

A type of protocol used in network management systems for monitoring network-attached devices is called:

SNMP

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

SSH

What does the command "shutdown /s" do on a Windows workstation?

Shutdown the workstation

Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state

Sleep

Post Office Protocol v3 (POP3) uses:

TCP port 110

Which port enables the FTP's Data Connection for sending file data?

TCP port 20

The FTP's Control Connection for administering a session is established through:

TCP port 21

SSH protocol runs on:

TCP port 22

Which of the following ports is assigned to the Domain Name System (DNS)?

UDP port 68

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of 34-bit initialization vector?

WEP

Which of the following types of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?

WEP

Which Linux command is used to print the full contents of a file to the screen at once?

cat

Which of the answers listed below refer to Windows command-line commands used for directory traversal?

cd and chdir

Which of the following Command Prompt utilities in MS Windows allows to verify the file system integrity and fix logical file system errors?

chkdsk

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?

exFAT

Which of the answers listed below refer to Windows command-line commands used to create a directory or subdirectory?

md and mkdir

Which command-line command in Windows lists a computer's connections to shared resources?

net use

What permissions would be represented by the octal 517?

r-x--xrwx

Which of the following Windows Command Prompt commands can be used to delete a directory?

rd and rmdir

A co-worker is creating a file containing a script. You look over their shoulder and see "#!\bin\bash" as the first line in the file. Based on this, what type of file extension should this script use?

.sh

Which of the following file types are commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language?

.vbs

What is the minimum amount of memory required to install Windows 10 (x86) on a device?

1 GB

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz single-core processor

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations . Which of the following IP addresses is a Class A address ?

10.5.34.15

A 64-bit (x64) WIndows 10 Home edition provides support for up to:

128 GB of Ram

Which of the port numbers listed below are reserved for NetBIOS services?

137, 138 and 139

Dion Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C Address?

192.168.3.5

What is the physical memory limit for the 64-bit (x64) Windows 10 Pro edition?

2 TB

Which of the TCP ports listed below is used by Telnet?

23

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

25

Which of the following backup rotation schemes uses a three-tiered approach to ensure at least one monthly full backup is conducted?

3-2-1 Backup

Which of the following is the physical memory limit for all 32-bit (x86) edition of Windows 10?

4GB

The server administrators have asked you to open the default port on the firewall for a new DNS server. Which of the following ports should you set to ALLOW in the ACL?

53

A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of "deny any" to the end of the ACL to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URL's, such as DionTraining.com. Which of the following should the administrator do to correct this issue?

Add a rule to the ACL to allow traffic on ports 80 and 53

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating system not found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active

Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room's contents?

Badge Reader & Biometric Lock

What type of structure is "IF THEN ELSE" in scripting

Branch

Which of the Windows command-line commands listed below changes the drive from C: to D:?

C:\>D:

Which of the following file system formatting types should be used with older recordable optical discs?

CDFS

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?

Check the status of the print server queue

A user is having an issue with a specific application on their Android device. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?

Clear the local application cache.

LDAP is an example of:

Directory access protocol

Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it?

ESD Strap

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine, removed the infection from the system, update the system's software, and closed the trouble ticket. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation?

Educate the end-user about how to avoid malware in the future

Which of the following CANNOT be updated via the Windows Update program?

Firmware updates

Which edition of Windows 10 by default does not include the Remote Desktop Server component?

Home

Which Editions of Windows 10 include the Remote Desktop Client component?

Home, Pro, Pro for Workstations and Enterprise

TCP port 80 is assigned to:

Hypertext Transfer Protocol (HTTP)

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect the other workstations on the network using the credentials it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent them from occurring again. Which of the following would BEST prevent this from reoccurring?

Install an anti-virus or anti-malware solution that uses heuristic analysis

Another technician tells you that they are PXE booting a computer. What is the technician MOST likely doing with the computer?

Installing an image to the computer over the network

Which of the following facilitates the enforcement of mobile device policies and procedures?

MDM

Which type of software enables a centralized administration of mobile devices?

MDM

Which file system type is used to mount remote storage devices on a Linux system?

NFS

Which of the following answers refers to an API that enables communication between hosts on a LAN?

NetBIOS

Which of the following answers refer to IMAP4?

Offers improved functionality in comparison to POP3 and Serves the same function as POP3

Which type of antivirus scan provides the best protection for a typical home user?

On-access scans

What kind of attack is an example of IP spoofing?

On-path attack

You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through the database. Which of the following types of data should this be classified?

PHI

A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:

PRL

Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?

Provide end-user awareness training for office staff

What are the characteristics of SMB/CIFS?

Provides shared access to files, directories and devices, and is mainly used by computers running Microsoft Windows

Telnet:

Provides username & password authentication and Enables remote login and command execution

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?

Purpose

You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?

Remove any jewelry you are wearing

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?

Remove, quarantine, or erase the infected files.

The video editor at your company is having trouble with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system with a new copy of the same version. The tech has been told to ensure the user's data and apps are not modified or deleted during the installation or upgrade. Which type of upgrades or installations should the technician use?

Repair installation

You recently built a new gaming PC for a customer . The system has an octa - core 64 bit processor , 32 GB of DDR4 RAM , 1 TB SSD , a PCI x16 video card with 8 GB of RAM , and Windows 10 Pro ( x86 ) installed . When you turn on the system , you notice that Windows only recognizes 3.5 GB of RAM . Which component should be upgraded to correct this issue ?

Replace the OS with WIndows 10 Pro (x64) edition

A MacOS user is browsing the internet in Google Chrome when they see a notification that says, "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing?

Rogue anti-virus

You are a member of a project team contracted to install twenty new wireless access points (WEPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the scope of work and change request before its approval?

Rollback Plan

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

SOP

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet?

SSH

An administrator arrives at work and is told the network users are unable to access the shared drive on a Window's server. The admin. logs into the server and sees that some Windows updates were automatically installed last night successfully, but now the network connection shows "limited" with no availability. What rollback action should the technician perform?

Server's NIC Drivers

Which of the following control panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive phone calls?

Sounds

Which of the following types of attacks are usually used as a part of an on-path attack?

Spoofing

Which of the following types of backups generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?

Synthetic

You are troubleshooting a user's workstation that is operating extremely slowly. You open the task manager and see only Microsoft Word is running, but the CPU and network utilization is consistently running between 95-100%. Which of the following is MOST likely causing this?

The computer has become a zombie

Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?

The data speeds are insufficient with only one bar of signal

Sarah is installing Windows 10 ( 64 - bit ) in a virtual machine . The installation is continually failing and producing an error . She has configured the virtual machine with a dual - core 950 MHz processor , 4 GB of memory , a 64 GB hard drive , and a 1280 x 720 screen resolution . Which item in the virtual machine should be increased to fix the installation issue experienced ?

The processor is insufficient

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

True

Examples of USB ports that can be found on mobile devices include:

USB-C, MICRO-USB and Mini-USB

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT?

Update the anti-malware, Disconnect the laptop from the network, Disable system restore in Windows

Which of the 64-bit (x64) Windows 10 editions provide(s) support for up to 6 TB of physical memory?

Windows 10 Pro for Workstations and Windows Enterprise

Which edition(s) of Microsoft Windows 10 include(s) the BitLocker Drive Encryption feature?

Windows 10 Pro, Pro for Workstations, and Enterprise

An operating system installation type that preserves system settings, personal files, and applications from the older OS version is referred to as an in-place upgrade. Microsoft Windows versions that can be upgraded to Windows 10 via this method include:

Windows 7 and Windows 8.1

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory?

dir and dir*.*

Which of the following commands is used on a Linux system to search for lines that match a pattern within a file

grep

Which of the following command-line commands displays the name of the current computer a user is connected to?

hostname

What is the name of a Windows Command Prompt utility that can be used to display TCP/IP configuration settings?

ipconfig

Which of the network command-line tools listed below enables obtaining an FQDN-to-IP address mapping?

nslookup

A command-line utility used for checking the reachability of a remote network host is called:

ping

Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?

resmon.exe

While troubleshooting the reason that the File explorer is crashing on a windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?

sfc

A network command-line utility in MS Windows that tracks and displays the route taken by IP packets on their way to another host is known as:

tracert


Set pelajaran terkait

Chemistry Section 1.3: Review Questions

View Set

RIM_07_Privacy and Security in RIM (Class)

View Set

Personal and Family Finance- Chapter 3

View Set

MAN 3303 Midterm Review (Ch. 1 - 3)

View Set

Nursing Management: Patients With Complications From Heart Disease

View Set

Immune and Hematologic Disorders

View Set

CH 01 Sociology in Practice DVD, Chapter 1: Race in the Twenty-First Century, Soc 2 Chapter 6: Crime and Punishment, Race and Culture Chapter 4

View Set