CYBR3.CompTIA A+ Practice Exam 2 (220-1102 Core 2) (61)
What is used to block private customer information across a network?
DLP
DLP
Data Loss Prevention security technology to ID and block the transfer of materials through a network
Which of the following Windows Share permissions has the priority when assigning access on a mapped drive? ❍ A. Allow ❍ B. Full control ❍ C. List folder contents ❍ D. Deny
Deny most restrictive setting has priority over others (ex: if share is configured deny access, it will take priority over allow)
Which technology can support 4TB and partition free space into single partition?
GPT
Which Windows installation has max partition size of 2TB?
MBR
Domain (Windows)
A collection of computers and network devices that share resources Designed for larger organizations that need centralized management
System utility
A program that performs a very specific task, usually related to managing system resources. includes a remote tab for remote assistance and remote desktop
Access control vestibule
A secure entry system with two gateways, only one of which is open at any one time.
A system administrator has installed a SOHO network of five Windows computers. The administrator would like to provide a method of sharing documents and spreadsheets between all of the office computers. Which of the following would be the BEST way to provide this functionality? ❍ A. Domain ❍ B. Proxy server ❍ C. Workgroup ❍ D. Remote Desktop
Workgroup
A desktop administrator is troubleshooting an older computer that has been slowing down as more applications and files are stored on the hard drive. Which of the following commands would be the BEST choice for increasing the performance of this computer? ❍ A. defrag ❍ B. format ❍ C. sfc ❍ D. xcopy ❍ E. winver
defrag
Which Windows command moves the file fragments so they are continuous, improving overall read and write times?
defrag
Windows utility to view the version number of a device driver
device manager
Windows utility to add a partition to a volume
disk management
Windows command to compare files on a Windows workstation
.bat
Windows command to add animation to a website login screen
.js
Windows command to disable an active directory account
.ps1 (powershell)
Windows command to retrieve statistics from a network device
.py
Which of the following script extensions would commonly be used inside of a Microsoft Office application? ❍ A. .vbs ❍ B. .py ❍ C. .bat ❍ D. .js
.vbs
Windows command to import data into an excel spreadsheet
.vbs
A desktop administrator is moving an SSD from one laptop to another. Which of the following should be used to protect the SSD during the move? ❍ A. Padded envelope ❍ B. Anti-static bag ❍ C. Box with foam filler ❍ D. Cloth wrap
Anti-static bag
A local coffee shop has a public wireless network for customers and a private wireless network for company devices. The shop owner wants to be sure that customers can never connect to the company network. Which of the following should be configured on this network? ❍ A. Install a new access point for company devices ❍ B. Configure WPA3 on the company network ❍ C. Require static IP addresses on the customer network ❍ D. Assign MAC filters to the company network ❍ E. Use a firewall between the customer and corporate network
Configure WPA3 on the company network Would require password to connect and prevent customer from connecting
A network administrator has a report showing a single user with numerous visits to a website. This website is known to violate the company's AUP. Which of the following should the administrator do NEXT? ❍ A. Create a firewall filter to block the website ❍ B. Scan all computers with the latest anti-malware signatures ❍ C. Contact the company's security officer ❍ D. Change the user's password
Contact the company's security office violation of AUP --> legal issue
A manufacturing company performs a third-party audit of their accounting records each year. The auditors use laptops provided by the company to access internal resources. When the audit is complete, the auditors should be prevented from logging on until the following audit process begins. Which of the following would be the BEST way to accomplish this? ❍ A. Uninstall the audit software ❍ B. Disable the user accounts between audits ❍ C. Remove the auditor accounts from all Windows groups ❍ D. Require two-factor authentication for the auditor accounts
Disable the user accounts between audits --> can't login
Which of the following features would be found in Windows 10 Pro but not in Windows 10 Home? ❍ A. 32-bit and 64-bit versions ❍ B. Domain access ❍ C. RDP client ❍ D. Windows Workgroup
Domain access
A medical research company is using laptop computers when visiting testing centers. The IT security team is concerned about a data breach if a laptop is lost or stolen. Which of the following would be the BEST way to manage this issue? ❍ A. BIOS password ❍ B. Authenticator application ❍ C. Full disk encryption ❍ D. Biometric authentication ❍ E. Cable lock
Full disk encryption
A technician has been asked to power down and store a server that has been exploited by an external attacker. The legal department will be performing tests and gathering information from this server. Which of the following would be MOST important to ensure the integrity of the server data? ❍ A. Report the server location to the proper channels ❍ B. Compile all support tickets associated with the server ❍ C. Maintain a chain of custody ❍ D. Take photos of the server in the storage room
Maintain a chain of custody
Windows utility to view the long term CPU utilization of a server
Performance monitor
A system administrator needs to configure a laptop to support inbound Remote Desktop services for the help desk team. Which of these Control Panel features provides access to these settings? ❍ A. Internet Options ❍ B. Devices and Printers ❍ C. Network and Sharing Center ❍ D. System
System
Windows utility to schedule a batch file to run at 3am
Task scheduler
A user receives a browser security alert on his laptop when visiting any website that uses HTTPS. If he uses his smartphone, he does not receive any error messages. Which of the following would BEST describe this situation? ❍ A. The date and time on the laptop is incorrect ❍ B. The smartphone is not updated with the latest OS version ❍ C. The laptop has an incorrect subnet mask ❍ D. The laptop does not have the latest anti-virus signatures
The date and time on the laptop is incorrect
Key fob
a hand-held remote control device for locking and unlocking doors
Which editions of windows can use RDP?
all
devices and printers utility
allows for addition/removal of devices and printer
Windows utility to update a trusted root certificate
certificate manager
Which command to scan and repair any logical file system errors
chkdsk /f
A desktop administrator has just removed malware from a user's desktop computer and has configured the system to automatically update antivirus signatures and perform a scan each night. Which of the following should be the NEXT step in the removal process? A. Enable System Protection B. Educate the end-user C. Quarantine the computer D. Boot to Safe Mode
enable system protection before malware removed, system protection was disabled to delete infected restore points. now it must be reenabled
Which windows 10 editions supports 6TB of RAM
enterprise
Windows utility to view the logs associated with an application
even viewer
What can bypass many normal startup options, and prevents access to BIOS configuration?
faststartup
Windows utility to make a configuration change across all systems
group policy editor
Why is date and time important when encryption is involved?
if data is different between devices, the encryption process may fail or the certificate may appear to be expired
internet properties utility
includes configuration options for the browser and settings for the proxies
A system administrator is installing a new video editing application on a user's workstation from an installation USB flash drive. However, the installation process fails due to lack of available drive space. Which of the following would be the BEST way to complete the installation process? ❍ A. Use a share drive for the installation source ❍ B. Install the application to a network share
install application on a network share
A help desk technician has been tasked with rebuilding an email server that recently crashed. Which of the following would be the BEST source for this information? ❍ A. Compliance report ❍ B. Acceptable use policies ❍ C. Network topology map ❍ D. Knowledge base
knowledge base
What contains information about processes, procedures, and documentation for resolving technical issues?
knowledge base
A system administrator has inadvertently installed a Trojan horse that has deleted a number of files across many Windows file shares. The Trojan also had access to user documents and login credentials and transmitted numerous documents to an off-site file storage system. Which of the following would limit the scope of future exploits? ❍ A. Require multi-factor authentication ❍ B. Disable all guest accounts ❍ C. Modify the default permissions ❍ D. Configure full disk encryption
modify default permissions prevents malicious software from having admin access when exploited
Are antivirus signatures related to browser encryption?
no
Does BitLocker allow user to encrypt single file or group of files?
no
Would changing the installation media from a USB to a share drive provide additional free space on the destination storage drive?
no
Does full disk encryption stop trojan horse from accessing data, if it has admin permissions?
no once user logged in, data can be accessed normally
A user on the marketing team is experiencing slower load times and ongoing sluggishness with applications on their laptop. A technician examines the Windows Update logs and finds the monthly updates are failing. Which of the following should be the best NEXT step for resolving this issue?
perform an anti-malware scan
Which windows 10 editions include BitLocker
pro enterprise
Which windows 10 editions include RDS
pro enterprise
Which windows 10 editions include domain access
pro enterprise
network and sharing center utility
provides access to the network and file sharing
Linux command to move log files on a server
sh
A company has just performed annual laser printer maintenance, and has accumulated hundreds of used toner cartridges. What is the BEST way to dispose of the old cartridges - take a hazardous waste facility - return to manufacturer
take to a hazardous waste facility
An organization has distributed new laptops to all of their home-office employees. Although the users at home can successfully connect through the Internet to resources at the corporate office, there have been complaints that printers and shared drives at home are not accessible. Which of the following would explain this issue? ❍ A. Incorrect login credentials ❍ B. Port security is turned on ❍ C. The corporate VPN is enabled ❍ D. Blocked by DLP
the corporate VPN is enabled
Performance monitor
tracks and stores long term information on many different system resources, including CPU, memory, network performance, and more
A technician would like to modify a configuration in a user's UEFI BIOS, but the system will not provide a BIOS configuration hotkey after shutting down and powering on the computer. Which of the following would be the BEST way to address this issue? ❍ A. Change the File Explorer Options ❍ B. Modify the Indexing Options ❍ C. Turn off Fast Startup ❍ D. Start the computer in Safe Mode ❍ E. Modify the Ease of Access settings
turn off fast startup
Does EFS allow user to encrypt individual files?
yes