A+ Part 5

Ace your homework & exams now with Quizwiz!

An organization executes a project to replace all of its servers. A change that is requested by management goes through a risk analysis exercise before moving to approval. What attributes are associated with qualitative approaches? (Select all that apply.)

Previous experience Opinions

A Windows user runs the Performance Monitor tool to check disk activity. What counter is the best option the user can evaluate to understand how busy the disk is at any given time?

% disk time

A Windows 7 computer user requires help from the IT department. A technician instructs the user to create an invitation file. What type of Windows help session does the user create?

Microsoft Remote Assistance

An iOS user struggles with wirelessly connecting a set of headphones to a phone. What does the user check on the phone while troubleshooting? (Select all that apply.)

Bluetooth connection Pairing mode

An IPv6 address is made up of bits that identify the network and host of a system. How many bits long is an IPv6 address in total, and how many bits identify the host portion? (Select all that apply.)

128 64

A systems administrator configures a hardware firewall to allow remote desktop connections to various Windows computers. This involves port forwarding. Which port will the administrator need to change so that each system uses a unique port?

3389

A user looks to implement Virtual Network Computing (VNC) access to a Windows computer while traveling. Which port does the user open on a hardware firewall to allow access?

5900

A user upgrades the memory in a Windows corporate workstation from 4 GB to 8 GB. After the upgrade, the user notices that only 4 GB is recognized by the system. What does the user conclude the problem to be?

A 32-bit version of Windows

A user opens a help desk ticket after seeing that a company video, embedded within a particular internal webpage, is not displaying as it should. What does a support technician conclude to be the most likely issue?

A plugin

A user experiences difficulty paying a retailer with a touchless near-field supported phone. What does the user check while troubleshooting?

Airplane mode

A recent software installation on a Windows desktop fails. Which internal log file does a technician review to see what may have gone wrong?

Application

An engineer configures numerous firewall rules on a system. If no specific rule or permission explicitly grants access and is automatically denied by default, what security function is in place?

Implicit deny

An iOS smart device user notices that AirDrop is not working properly as files are not being received. What should the user check while troubleshooting? (Select all that apply.)

Bluetooth Wi-Fi

A problematic Windows system with multiple operating systems installed does not boot properly. A support technician tries to diagnose by outlining the boot process. The technician determines that the system uses an Extensible Firmware Interface (EFI) system partition. Which file does the technician inspect for problems related to a specific operating system boot problem?

BOOTMGFW

A computer user looks to map a network drive using the most basic scripting language possible. Which language does the user implement for a Windows system?

Batch script

A company looks to dispose of old computers and related equipment. Which items require special care? (Select all that apply.)

Batteries Toner Motherboard

A computer security team investigates a high-level computer breach at a large company. While investigating one of the computers in question, the team found that computer equipment was improperly secured, causing the equipment to be passed around during the investigation with no tracking. What are the primary concerns for the team from this discovery? (Select all that apply.)

Chain of custody Data integrity

A user would like to install an updated Windows operating system (OS) on a computer. There are no files that need to be saved. What options does the user have to accomplish this? (Select all that apply.)

Clean install In-place upgrade

A technician would like to set every Windows computer at an organization to have a company logo as a desktop wallpaper. What does the technician determine as the best method for deploying the setting?

Domain group policy

A user suspects that a USB drive on their system has been tampered with. The user accidentally dropped the USB drive, breaking the chip inside it. What does the user compromise?

Data integrity

A new help desk technician receives a support call from a user. What initial information does the technician ask the user to provide? (Select all that apply.)

Description of the issue Contact details

A company has several offices within the United States. Engineers look to configure Microsoft DirectAccess virtual private networking technology for remote connections. Engineers instruct IT to deploy which operating system to Windows desktops?

Enterprise

A data analyst is creating new disaster recovery and prevention method guidelines after exposure to a recent data breach. What factors should be considered when developing a disaster recovery plan? (Select all that apply.)

Identify scenarios for natural and man-made disasters. Identify tasks, resources, and responsibilities for responding to a disaster.

A Windows user runs the Defragment and Optimize Drives tool (dfrgui.exe) on a solid state drive (SSD). What action will the tool take on the drive? (Select all that apply.)

Identifying blocks that are deletable Tagging blocks as writable

A user modifies a Windows 10 computer's ease of access settings. Which settings group configures Keyboard usability?

Interaction

A user enables privacy settings on a Windows 10 computer. Which settings pertain to app permissions? (Select all that apply.)

Location service Camera and microphone

A user wishes to enable multiple desktops within macOS for different work environments. What feature makes this possible?

Mission Control

A user looks to reconfigure an IP address for a network adapter. Which Control Panel applet is the most direct?

Network Connections

A user boots and installs a legacy Windows operating system on a computer. The user notices that after installation, the system requires many drivers and updates to bring it to a healthy and up-to-date state. The user finds that it is not possible to add updates to which installation media type?

Non-Writeable Optical Disk

What might a security engineer suggest as a solution to deter lunchtime attacks?

Policies

An attacker uses a script to create fileless malware that requires no compilation. What scripting environment does the attacker utilize?

PowerShell

A security engineer suggests the use of proximity technology to track the movement of portable equipment. What solution does the engineer recommend?

Radio frequency

A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration?

Recovery partition

A user experiences a blue screen of death (BSoD) while using a Windows desktop computer. Upon initial inspection, no debris is observed in the tower. What does a support technician determine to be a good first troubleshooting step?

Remove any newly installed hardware.

A user with a problematic Windows system tries to use a previously created system image. How does the user access the image? (Select all that apply.)

Repair disk Advanced boot

A user inspects and learns about the electrical components on the inside of a computer. What is measured in ohms?

Resistance

A tech has an Android tablet that no longer receives updates due to its age. Learning that a custom firmware with new features is available, what does the tech require to install the image?

Root access

A user installs an app on a smart device. The device's official app store does not list the app, as it is a proprietary app for an organization. What type of installation does the user complete?

Sideload

A tech firm deploys wireless installations at client sites. As the firm uses Wi-Fi Protected Access (WPA) version 3, which security technology does the deployment utilize? (Select all that apply.)

Simultaneous Authentication of Equals mechanism AES Galois Counter Mode Protocol mode

An IT administrator creates a repository for standard operating procedures (SOPs). What documents does the administrator upload to the repository? (Select all that apply.)

Software installation instructions New-user setup checklist Server decommissioning checklist

Windows allows for several types of installable software. Which type may be transferred between computers when a user utilizes a Microsoft account?

Store apps

A company tightens system security in several ways. One approach implements on-access scanning of files for malware. Shortly after implementation, users complain to the help desk. What is the complaint?

Systems are slow.

An engineer surveys risks tied to environmental impacts for a service computer stored in a server closet. What does the engineer focus on? (Select all that apply.)

Temperature Humidity Ventilation

A user with tech knowledge and some access permissions browses the network to identify any available shares on all servers. While browsing, the user found a share known to contain payroll information. However, the user is unable to access the information within the share. Assuming that the user is not authorized to access the payroll information, what is the most likely reason why the user cannot view the information within the share?

The user does not have permissions to access the share.

A technician receives a company laptop from an employee who states they are unable to authenticate from one Windows system to another in a domain but fails with no error message and has verified the username and password are correct. What does the technician determine the issue to be?

Time drift

A network engineer implements a proxy at a small company. The configuration does not require settings on every client machine. What type of proxy does the engineer deploy? (Select all that apply.)

Transparent Intercepting

Which root-level file allows for the automatic execution of commands in a legacy version of Windows?

autorun.inf

A technician troubleshoots a Windows system by using the command prompt. If the technician is currently in the directory named C:\Backup and wishes to enter the directory C:\Backup\02102022, what command does the technician use?

cd 02102022

A Windows user is not able to resolve server names on a local network. After updating the system's hosts file, which command does the user issue?

ipconfig /flushdns

A user would like to delete a mapped drive labeled as "X" on a Windows system. Which command will the user issue at the command prompt?

net use X: /delete

A user interacts with a Linux distribution that has no desktop graphical user interface (GUI). As the user types, which stream handles the interaction?

stdin


Related study sets

Microeconomics Final MC Questions + Terms

View Set

Series 7: Options (Equity/Stock Options)

View Set

Chapter 27: Romanticism, Realism, Photography: Europe and America

View Set

U11 L4: Art and Culture in Medieval Europe

View Set