A+ Core 2

Ace your homework & exams now with Quizwiz!

Which of the following types of mobile device screen locks uses bio-metrics to securely unlock the device?

FaceID, TouchID

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?

Install an anti-virus or anti-malware solution that uses heuristic analysis

Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?

SAE (Simultaneous Authentication of Equals)

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?

bootrec /fixboot

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use?

.ps1

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

1 GB

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz single-core processor

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address?

10.5.34.15

Which file system type is used by default when installing macOS on a modern workstation?

APFS (Apple File System)

A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of "deny any any" to the end of the ACL (Access Control Log) to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?

Add a rule to the ACL to allow traffic on ports 80 (HTTP) and 53 (DNS)

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active

Will, an IT technician, has been tasked with investigating a recent Windows upgrade and make a recommendation as to whether the company should upgrade its workstations. He notices that the upgrade will not work with a drawing program that is key to the Drafting Department. He asks the Drafting Department if they would consider using a different drawing program. Which upgrade consideration is represented by his conversation with the Drafting Department?

Backup files and user preferences

Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room's contents?

Biometric lock, Badge reader

Which of the following BEST describes how a DHCP reservation works?

By matching a MAC address to an IP address within the DHCP scope

Your organization has recently suffered a data breach due to a server being exploited. As a part of the remediation efforts, the company wants to ensure that the default administrator password on each of the 1250 workstations on the network is changed. What is the easiest way to perform this password change requirement?

Deploy a new group policy

Which of the following types of backups only copies data modified since the last full backup?

Differential

Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it?

ESD strap

Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's memory properly?

Enterprise

Which of the following types of software CANNOT be updated via the Windows Update program?

Firmware updates

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?

Increase the Wi-Fi signal being transmitted by their WAP

Which of the following data types would be used to store the number 21?

Integers

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

Loop

What type of structure is a "Do While" in scripting?

Loop

An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?

Mark each email as spam or junk

Which type of antivirus scan provides the best protection for a typical home user?

On-access scans

You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?

PHI (Protected Health Info)

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?

Plan

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?

Power surge

When using an MBR (Master Boot Record), which of the following types of partitions can only have up to four partitions?

Primary

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

Proximity cards

You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?

Remove any jewelry you are wearing

The video editor at Dion Training is having issues with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system files with a new copy of the same version. The technician has been told to ensure the user's data and applications are not modified or deleted during the upgrade or installation. Which types of upgrades or installations should the technician use?

Repair installation

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

SOP (Standard Operating Procedure)

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet?

SSH (Secure Shell)

Jason's company issued him an old 2018 laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company's internal servers, email, or share drive files. The Windows 10 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company's headquarters, the company will provide him with a new laptop due to the broken screen. Until then, he is working out of his hotel room during a 45-day business trip and needs to continue using this laptop. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

Sell him an external 15" tablet/monitor to connect to the laptop as a workaround

Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?

Sleep

Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason cannot access the network shares in his home network?

The laptop must join the network as private

You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which of the following settings should be configured on the workstation to achieve this?

Under Internet Options, configure the proxy server address as 10.0.0.15

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

Update the anti-malware software, Disconnect the laptop from the network, Disable System Restore in Windows

Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take?

Verify that disabling one service has not affected others

Which of the following types of encryption is considered the most secure to utilize in a SOHO network?

WPA3

Jason is building an inexpensive workstation for one of the employees at Dion Training. The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation?

Windows 10 Enterprise, and Windows 10 Pro

Which command-line tool on a Windows system is used to display the resulting set of policy settings that were enforced on a computer for a specified user when they logged on?

gpresult

What umask (user file-creation mode mask) should be set for a directory to have 700 as its octal permissions?

rwx------

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?

tracert


Related study sets

Substance Abuse, Eating Disorders, Impulse Control Disorders-NCLEX 3000

View Set

Life In Sea Bio 324 Chapter 9 Quiz

View Set

Unit 12 conduction in liquids and gases

View Set

Advantages and Disadvantage for Flexible Benefit plans

View Set

MGMT 365 - Chapter 5 - Tamela Ferguson

View Set

RHCH 43 ,44 Liver, Pancreas, portal HTN, peritonitis

View Set

MN/WK2&3/PEDS SUCCESS CH4 ANTEPARTUM/EX1

View Set

Government Health Insurance Programs

View Set