CompTIA A+ (220-1002) 2nd Round
RADIUS
Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?
WPS enabled + Default admin credentials
Your company's wireless network was recently compromised by an attacker who utilized a brute force attack against the network's PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur?
Incremental
Which of the following types of backup requires the LEAST time to complete a backup?
Full
Which of the following types of backup would require the MOST time to complete?
Firmware updates
Which of the following types of software cannot be updated via the Windows Update program?
Proximity cards
Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?
Variable
A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary place holder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed?
Virus
A co-worker just sent you a macro-enabled Microsoft Word document. After you opened the file, your computer began to delete the photos stored in your c:\photos directory. What type of malware did you MOST likely receive?
Patch management
A company has had several virus infections over the past few months. The cause was vulnerabilities in the software applications in use. What should an administrator implement to prevent future outbreaks?
MAC filtering
A company owns four kiosks that are near a shopping center. The owner is concerned about someone accessing the Internet via the kiosk's wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk?
Boot Camp
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro?
Surge protector
A flat panel television was just installed in a conference room in your office building. The facilities manager is concerned that it could be damaged during a lightning strike. The conference room is only used a few times a week, so the company is not concerned about the threat of power outages. Which of the following should be installed to BEST mitigate the facilities manager's concerns without spending too much money?
Remove, quarantine, or erase the infected files
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?
Quarantine the infected system
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have directly observed symptoms that indicate the system is infected with malware. Which of the following actions should you perform NEXT?
Schedule scans and run updates
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT?
WAP placement
A technician is troubleshooting a newly-installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST during troubleshooting?
Security log
A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation?
Clear the local application cache
A user is having an issue with a specific application on their Android devices. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?
Folder options
A user's personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile file but cannot find it in their profile directory. Which of the following options do you need to configure to see this file?
End-user acceptance
After installation or change has been implemented, which of the following is necessary before closing the change request?
set type=ns
An attacker uses the nslookup interactive mode to locate information on a Domain Name Service (DNS). What command should they type to request the appropriate records for only name servers?
Mark each e-mail as spam or junk
An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?
The network file share's permission has been modified
Edward has just returned to his office after a two-week vacation. When he logs into his email client to access his company email, he notices that he cannot see the shared Customer Service inbox folder in his email client. He contacts the help desk, and they verify that his account is still connected to the domain controller and that it can still send and receive emails successfully. What is the MOST likely happened during Edward's vacation that caused the missing inbox folders in the email client?
When humidity is low
In which conditions is ESD the highest threat?
Power spikes
Your company is concerned about the possibility of power fluctuations that may occur and cause a large increase in the input power to their server room. What condition is this known as?
chmod
Which of the following commands is used on a Linux system to change a file's permissions or directory on a system?
cp
Which of the following commands is used on a Linux system to copy a file from one directory to another directory?
Defrag the hard drive + Clean up startup applications
Samuel's computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?
mv
Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?
sudo
Which of the following commands is used on a Linux system to run a program with another user's permissions?
TKIP
Which of the following encryption types was used by WPA (not WPA2) to better secure wireless networks than WEP?
UDF
Which of the following file system formatting types should be used with a DVD?
VNC
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?
Thumbprint and password
Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA?
Telnet
Which of the following remote access tools is a command-line terminal emulation program operating on port 23?
Device Manager
Which of the following should you use to configure a network adapter's duplex setting manually in Windows 10?
Verify that disabling one service has not affected others
Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take?
ESD strap
Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it?
Spear phising
Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?
RADIUS
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?
Reboot the workstation
What does the command "shutdown /r" do on a Windows workstation?
Shutdown the workstation
What does the command "shutdown /s" do on a Windows workstation?
2GB
What is the minimum amount of RAM needed to install Windows 8.1 on a 64-bit system?
rw-r--r--
What is the symbolic representation of the octal numeric permission 644?
Server rack + UPS
Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer's recommendations?
iwconfig
Which command would be used to display the IP address and subnet mask for the wireless network connection on a Linux system?
Hibernate
Which low power mode is used with laptops to save power, but it takes longer to turn back on and resume where the user left off?
Apple ID
Which of the following MacOS features allows the user to create a user account that is used to sign-in to the App Store, iCloud, and iTunes?
Sleep
Which of the following allows a user to save their current session to memory and put the computer into a minimal power state?
Network topology diagrams
You are installing a new firewall for Dion Training's corporate network. Which of the following documents should you update FIRST?
Identify the issue
You are the first help desk technician on the scene of a potential data breach. What is the FIRST thing you need to do as part of the incident response?
Disconnect from network + Disable System Restore + Update anti-malware software
You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)
Disk Management
You are troubleshooting a workstation and want to check if any S.M.A.R.T. errors are being reported. Which of the following tools should you use to troubleshoot this workstation?
net use
You are trying to open your company's internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?
Update the smartphone's OS
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?
Reinstall the email app
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?
tracert
You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage occurs. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?
Users are trying to access their shares previously mapped drive letters
You are working as a technician for a small company and recently moved some files from one server to another to free up some storage capacity on the existing server. Now, multiple users have begun reporting that they cannot access some of their previous shares on the file server. If a user attempts to open one of the shares, they get an "Access Denied" error. You have verified that all users are located in the correct security groups, and their access permissions are correct. Still, the users cannot access the network shares. Which of the following is MOST likely causing the issue with the users accessing the network shares?
Incident database
You are working at the service desk when you receive a call from an upset user because their workstation cannot receive any emails. Which of the following should you use to document this phone call?
bootrec /rebuildbcd
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the EFI/BIOS of the system. Which of the following commands should you use to add the Windows installation to the bootmgr?
bootrec /fixboot
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the EFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?
bootrec /fixmbr
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the EFI/BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?
Drill/hammer the HDD platters
You have been asked to dispose of 5 old laptops. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data is not easily recovered and is disposed of at the lowest cost possible?
Maintain the chain of custody
You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee's laptop according to your company's procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police?
Resolution
You have just installed a second monitor for a salesperson's workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure?
Scope
You have submitted an RFC to install a security patch on some of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe which servers will receive the patch during this maintenance window?
Verify the digital certificate is installed on the device
Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do?