CompTIA A+ 2

Ace your homework & exams now with Quizwiz!

A co-worker is creating a file containing a script. You look over their shoulder and see "#!\bin\bash" as the first line in the file. Based on this, what type of file extension should this script use?

.sh

Which of the following file types are commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language?

.vbs

What is the minimum amount of memory required to install Windows 10 (x86) on a device?

1 GB

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz single-core processor

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations . Which of the following IP addresses is a Class A address ?

10.5.34.15

A 64-bit (x64) WIndows 10 Home edition provides support for up to:

128 GB of Ram

Which of the port numbers listed below are reserved for NetBIOS services?

137, 138 and 139

An SNMP Agent receives requests on UDP port:

138

Which of the following TCP ports is used by the Internet Message Access Protocol (IMAP)?

143

An SNMP management station receives SNMP notifications from Agents on UDP port:

162

Dion Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C Address?

192.168.3.5

What is the physical memory limit for the 64-bit (x64) Windows 10 Pro edition?

2 TB

Which of the TCP ports listed below is used by Telnet?

23

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

25

Which of the following backup rotation schemes uses a three-tiered approach to ensure at least one monthly full backup is conducted?

3-2-1 Backup

What is the minimum amount of storage space required to install Windows 10 (x64) on a device?

32 GB

Which of the following is the physical memory limit for all 32-bit (x86) edition of Windows 10?

4GB

The server administrators have asked you to open the default port on the firewall for a new DNS server. Which of the following ports should you set to ALLOW in the ACL?

53

Which file system type is used by default when installing macOS on a modern workstation?

APFS

A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of "deny any" to the end of the ACL to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URL's, such as DionTraining.com. Which of the following should the administrator do to correct this issue?

Add a rule to the ACL to allow traffic on ports 80 and 53

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating system not found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?

Ask another Tier 2 technician to answer the call since it will take too long to solve.

Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room's contents?

Badge Reader & Biometric Lock

What type of structure is "IF THEN ELSE" in scripting

Branch

Which of the following BEST describes how a DHCP reservation works

By matching a MAC address to an IP address within the DHCP scope

Which of the Windows command-line commands listed below changes the drive from C: to D:?

C:\>D:

Which of the following file system formatting types should be used with older recordable optical discs?

CDFS

Which of the following components presents the largest risk of electrical shock to a technician?

CRT Monitor

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?

Check the status of the print server queue

A user is having an issue with a specific application on their Android device. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?

Clear the local application cache.

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

True

Which of the following ports is used by HTTPS?

UDP port 53

Which of the following ports is assigned to the Domain Name System (DNS)?

UDP port 68

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?

UPnP (Universal Plug n Play)

Examples of USB ports that can be found on mobile devices include:

USB-C, MICRO-USB and Mini-USB

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT?

Update the anti-malware, Disconnect the laptop from the network, Disable system restore in Windows

Which of the answers listed below describe the function of a laptop's inverter?

Used for supplying voltage to backlights in older LCD panels and Converts DC power into AC power

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?

VNC - virtual network computing

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of 34-bit initialization vector?

WEP

Which of the following types of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?

WEP

Which type of expansion card enables communication in 802.11 networks?

WLAN

Which of the following answers refers to a laptop's Bluetooth module?

WPAN

A type of expansion card that enables communication over cellular network is referred to as:

WWAN

Jason is building an inexpensive workstation for one of the employees at Dion Training. The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation?

Windows 10 Pro and Enterprise

Which of the 64-bit (x64) Windows 10 editions provide(s) support for up to 6 TB of physical memory?

Windows 10 Pro for Workstations and Windows Enterprise

Which edition(s) of Microsoft Windows 10 include(s) the BitLocker Drive Encryption feature?

Windows 10 Pro, Pro for Workstations, and Enterprise

An operating system installation type that preserves system settings, personal files, and applications from the older OS version is referred to as an in-place upgrade. Microsoft Windows versions that can be upgraded to Windows 10 via this method include:

Windows 7 and Windows 8.1

What are the characteristic features of an OLED display?

Works without backlight, Lower light output in comparison to LCDs and better contrast ratio and color representation in comparison to LCDs

This command is used for handling packages in Unix

apt-get

This command reads each file parameter in sequence and writes to standard output

cat

Which Linux command is used to print the full contents of a file to the screen at once?

cat

Which of the answers listed below refer to Windows command-line commands used for directory traversal?

cd and chdir

Which of the following Command Prompt utilities in MS Windows allows to verify the file system integrity and fix logical file system errors?

chkdsk

This Linux command will change access permissions

chmod

Use this Linux command to change the owner of a file

chown

This linux command is used to copy files and directories

cp

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory?

dir and dir*.*

Which of the following Windows 10 system utilities would be used to test the functionality of the DirectX subsystem for video and sound-related problems?

dxdiag

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?

exFAT

A Linux search tool that finds files based on user criteria

find

Which of the following commands is used on a Linux system to search for lines that match a pattern within a file

grep

Which of the following command-line commands displays the name of the current computer a user is connected to?

hostname

What is the name of a Windows Command Prompt utility that can be used to display TCP/IP configuration settings?

ipconfig

Which of the answers listed below refer to Windows command-line commands used to create a directory or subdirectory?

md and mkdir

This Linux command is used to move files/directories or to rename files/directories

mv

A friendly text editor in Linux

nano

Which command-line command in Windows lists a computer's connections to shared resources?

net use

Which of the network command-line tools listed below enables obtaining an FQDN-to-IP address mapping?

nslookup

Which command would a Linux user need to enter to change their password?

passwd

Dion Consulting Group has been hired by a small real estate office to build its network. The office has 4 computers running Windows 10 Professional edition configured in a workgroup to access a shared file server. Which of the following types of network models is being used by this real estate office?

peer-to-peer

A command-line utility used for checking the reachability of a remote network host is called:

ping

This Linux command writes the full pathname to the current working directory

pwd

What permissions would be represented by the octal 517?

r-x--xrwx

Which of the following Windows Command Prompt commands can be used to delete a directory?

rd and rmdir

Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?

resmon.exe

This Linux command is used to remove object files or directories

rm

While troubleshooting the reason that the File explorer is crashing on a windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?

sfc

Which of the following Linux command-line options would shut down a linux server 11 minutes from now?

shutdown+11

This Linux command means substitute user or super user

su / sudo

A network command-line utility in MS Windows that tracks and displays the route taken by IP packets on their way to another host is known as:

tracert

Which of the following commands is used on a Linux system to edit a text file on a server?

vi

What type of malicious application does not require user intervention or another application to act as a host to replicate?

worm

This command line interpreter is used to install, update and remove software in Unix

yum

LDAP is an example of:

Directory access protocol

Netstat is a command-line utility used for:

Displaying active TCP/IP connections and network protocol statistics

The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company's web servers. Which of the following is the MOST likely cause of the issue?

Distributed DoS

Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it?

ESD Strap

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine, removed the infection from the system, update the system's software, and closed the trouble ticket. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation?

Educate the end-user about how to avoid malware in the future

IPS, TN, VA, and OLED are all implementations of the LCD display technology.

False

Which of the following CANNOT be updated via the Windows Update program?

Firmware updates

Which laptop feature allows to overcome standard keyboard size restrictions?

Fn Key

Which of the following allows users to save their current session to disk before powering down their Windows10 Laptop?

Hibernate

What are the characteristic features of In-Plane Switching (IPS)?

High Color Quality, Wide Viewing Angles and Slow response times

Which of the following statements refer to the characteristic features of magnetic drives?

High capacity, low device cost and low performance

Barbara received a phone call from a colleague asking why she sent him an email with lewd and unusual content. Barbara doesn't remember sending the email to the colleague. What is Barbara MOST likely the victim of?

Hijacked e-mail

Which edition of Windows 10 by default does not include the Remote Desktop Server component?

Home

Which Editions of Windows 10 include the Remote Desktop Client component?

Home, Pro, Pro for Workstations and Enterprise

TCP port 80 is assigned to:

Hypertext Transfer Protocol (HTTP)

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?

Increase the Wi-Fi signal being transmitted by their WAP

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect the other workstations on the network using the credentials it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent them from occurring again. Which of the following would BEST prevent this from reoccurring?

Install an anti-virus or anti-malware solution that uses heuristic analysis

The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?

Install and deploy thin clients without an operating system for each user

Another technician tells you that they are PXE booting a computer. What is the technician MOST likely doing with the computer?

Installing an image to the computer over the network

Which of the following hardware components would be the most difficult to replace on a laptop computer?

Integrated GPU

This Linux command can be used to list computer files and directories

Is

TCP port 389 is the default network port for:

LDAP

You are setting up the Remote Desktop Services on a Windows 2019 server. To increase the security of the server, which of the following actions should you take?

Logically place the Windows 2019 server into the Network's screened subnet

What type of structure is "For Next" in scripting?

Loop

Which of the following answers describe the Twisted Nematic (TN) technology?

Low viewing angles, fast response times and low color quality

Which of the following facilitates the enforcement of mobile device policies and procedures?

MDM

Which type of software enables a centralized administration of mobile devices?

MDM

A technology implemented in modern laptops that enables data transfer and authentication features between the laptop and another portable device at a very close range is known as:

NFC

A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of:

NFC

Which file system type is used to mount remote storage devices on a Linux system?

NFS

Which of the answers listed below refers to the location of a laptop's Wi-Fi antenna?

Near the top, inside the display case

Which of the following answers refers to an API that enables communication between hosts on a LAN?

NetBIOS

Which of the following answers refer to IMAP4?

Offers improved functionality in comparison to POP3 and Serves the same function as POP3

Which type of antivirus scan provides the best protection for a typical home user?

On-access scans

What kind of attack is an example of IP spoofing?

On-path attack

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel's Wi-Fi network. Michael's laptop appears to be connected to the hotel's wireless network, but his email client cannot download any new messages and states, "Network Offline." Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve this issue?

Open a web browser, enter google.com and see if a redirect page is displayed.

You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through the database. Which of the following types of data should this be classified?

PHI

A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:

PRL

You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?

Perimeter Network

Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?

Provide end-user awareness training for office staff

What are the characteristics of SMB/CIFS?

Provides shared access to files, directories and devices, and is mainly used by computers running Microsoft Windows

Telnet:

Provides username & password authentication and Enables remote login and command execution

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

Proximity cards

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?

Purpose

A recently hired security employee at a bank was asked to perform daily scans of the bank's intranet to look for unauthorized devices. The new employee decides to create a script that scans the network for unauthorized devices every morning at 2:00 am. Which programming language would work best to create this script?

Python

A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Quarantine the machine and report it as infected to your company's Cybersecurity department for investigation.

Which of the answers listed below describe the features of Solid-State Drives (SSDs)?

Relatively high device cost, lower capacity in comparison to magnetic drives, and high performance

You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?

Remove any jewelry you are wearing

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?

Remove, quarantine, or erase the infected files.

The video editor at your company is having trouble with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system with a new copy of the same version. The tech has been told to ensure the user's data and apps are not modified or deleted during the installation or upgrade. Which type of upgrades or installations should the technician use?

Repair installation

You recently built a new gaming PC for a customer . The system has an octa - core 64 bit processor , 32 GB of DDR4 RAM , 1 TB SSD , a PCI x16 video card with 8 GB of RAM , and Windows 10 Pro ( x86 ) installed . When you turn on the system , you notice that Windows only recognizes 3.5 GB of RAM . Which component should be upgraded to correct this issue ?

Replace the OS with WIndows 10 Pro (x64) edition

A MacOS user is browsing the internet in Google Chrome when they see a notification that says, "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing?

Rogue anti-virus

You are a member of a project team contracted to install twenty new wireless access points (WEPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the scope of work and change request before its approval?

Rollback Plan

TCP port 25 is used by:

SMTP

A type of protocol used in network management systems for monitoring network-attached devices is called:

SNMP

What is the most common memory module form factor type used in

SODIMM

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

SOP

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

SSH

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet?

SSH

An administrator arrives at work and is told the network users are unable to access the shared drive on a Window's server. The admin. logs into the server and sees that some Windows updates were automatically installed last night successfully, but now the network connection shows "limited" with no availability. What rollback action should the technician perform?

Server's NIC Drivers

What does the command "shutdown /s" do on a Windows workstation?

Shutdown the workstation

Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state

Sleep

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be?

Social Engineering

Which of the following control panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive phone calls?

Sounds

Which of the following types of attacks are usually used as a part of an on-path attack?

Spoofing

Which of the following types of backups generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?

Synthetic

Post Office Protocol v3 (POP3) uses:

TCP port 110

Which port enables the FTP's Data Connection for sending file data?

TCP port 20

The FTP's Control Connection for administering a session is established through:

TCP port 21

SSH protocol runs on:

TCP port 22

You are troubleshooting a user's workstation that is operating extremely slowly. You open the task manager and see only Microsoft Word is running, but the CPU and network utilization is consistently running between 95-100%. Which of the following is MOST likely causing this?

The computer has become a zombie

Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?

The data speeds are insufficient with only one bar of signal

Sarah is installing Windows 10 ( 64 - bit ) in a virtual machine . The installation is continually failing and producing an error . She has configured the virtual machine with a dual - core 950 MHz processor , 4 GB of memory , a 64 GB hard drive , and a 1280 x 720 screen resolution . Which item in the virtual machine should be increased to fix the installation issue experienced ?

The processor is insufficient

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?

Tracert


Related study sets

Ethics round 3 - Mill, Rawls, Sunstein, Friedman, Goodpastor

View Set

Investments An Introduction, 11thE, Mayo, Ch 7, Questions

View Set

Field Underwriting Procedures Quiz

View Set

HIST 306: Malleus Maleficarum (Chp9-12)

View Set

Theory Exam 2 (Bowel Elimination), (urinary Elimination), (Skin Integrity and wound care)

View Set

Health Care Quality Improvement Final AL-367

View Set

Astronomy Ch03.7: Process of Science Task: Earth-Centered vs. Sun-Centered Models

View Set

MILITARY COURTESY AND DISCIPLINE (1ST QUARTERLY EXAMINATIONS)

View Set

HLTH110 : Chapter 2 Self-Paced Study Review Questions & Answers

View Set