CompTIA A+ 220-1002 (Core 2)

Ace your homework & exams now with Quizwiz!

You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings?

Changing the default administrative password

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in that folder and (2 without affecting the abilities of any other users?

Edit the properties for the file; assign Rachel the Deny Full Control permission.

Which tool lets you view and directly edit the registry?

Regedit

You are the PC technician for a company. You received the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well. When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day. What is the BEST way for you to respond?

Set an appointment to train the employee on how to complete common email tasks.

How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the Advanced Startup Options menu.

In which of the following situations would driver rollback be the BEST tool to use?

You recently installed a new video driver, and now the system behaves erratically.

You replaced the print cartridge on an inkjet printer. What should you do next?

calibrate the printer

Nathan, a long-time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his cursor turns into a pinwheel and he can't do anything. Which of the following would be the BEST first step for troubleshooting this issue?

determine if the problem is caused by hardware or software

Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file?

directory permissions

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate while browsing the web. Which of the following actions would help accomplish this goal?

enable content filtering

Which of the following are common tools used to physically clean the inside of a computer? (Select TWO.)

natural bristle brush, compressed air

What command lets you see a list of valid command parameters for the net use command?

net use /?

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?

scheduled backups

Which of the following functions are performed by the TPM?

A Trusted Platform Module (TPM) is a hardware cryptoprocessor that resides on the motherboard that stores and generates cryptographic keys. Using these keys, the TPM can generate a hash value based on the components installed in the system. The hash value can be used to verify that system components have not been modified when the system boots.

A public library has purchased a new laptop computer to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should be used to physically secure the laptop?

A cable lock

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

Access to shared resources are controlled separately on each computer in the peer-to-peer model (a Windows peer-to-peer network is called a workgroup).

Which tool would you use to configure the paging file location and size on a Windows system?

Advanced Settings in control panel

Alice has received several calls from her friends informing her that they are receiving strange emails containing content that seems odd coming from her. Which of the following MOST likely happened on Alice's computer?

Alice's email was hijacked

One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. Which of the following actions would MOST likely cix this problem?

Assume the battery is failing and replace it.

You have a friend who is offering to sell the monitor and video card from his gaming system along with several PC games. The games have fast-moving graphics, and you want to be able to play them on your own home system. The monitor he is selling is an LCD TN with a 144-Hz refresh rate. The video card he is selling supports a max refresh rate of 144 Hz. You're sure you want to buy the games, but you have a couple of other choices when it comes to the monitor and the video card. The monitor in your current system has a 60 Hz refresh rate. The video card has a max refresh rate of 75 Hz. This configuration has always worked fine for watching videos. You're also looking at new 60-Hz LCD IPS monitors and several high-end video cards with max refresh rates of up to 240 Hz. Which of the following will MOST likely allow you to play the games on your home system with the best gaming experience possible?

Buy your friend's games, monitor, and video card. Swap out both your video card and monitor.

One of your customers is still using an old dot matrix printer. While printing, the customer noticed that the text was light or faint. A new print head was installed, but the documents are still faint. Which of the following should you do to troubleshoot the MOST likely cause?

Check the gap between the printer head and the paper.

You have just installed a new video card in Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver. Which of the following would be the BEST administrative tool to fix Mark's computer?

Computer Management

You have just installed anti-malware software on all computers on your company's network. Which of the following additional actions would be BEST to take to help protect systems from malicious software? (Select TWO).

Configure the software to automatically update its definition files. Train users to scan removable storage devices before copying files.

Which of the following methods can be used to connect a printer to a network? (Select TWO.)

Connect your printer to an external print server device that is connected to the network. Plug an Ethernet cable into the network port in the printer.

Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that MIGHT cause a CPU to fail prematurely?

Electrostatic Discharge

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver.

If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing?

If the printer is Ethernet capable, it can be connected to the network through a wireless router.

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe

You are a PC technician for a company. An employee needs you to install some software on his computer over his lunch break. When you log on to the computer, you notice the employee's desktop has so many shortcuts and files that you can hardly see the desktop background. Which of the following actions should you take?

Install the software and leave the employee's computer exactly how you found it.

While researching a fix to a system file issue, you find that using the ATTRIB command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BEST describes the function of this command?

It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll.

Why are plasma displays smaller than 32 inches not typically sold?

It would be too cost prohibitive to manufacture plasma screens under 32 inches.

Which of the following is the MOST likely symptom of a dirty drum or roller in a laser printer?

Lines or splotches repeated at regular intervals on the print job.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable file history

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

On a Linux distribution that uses RPM for package management, entering yum install httpd at the command line will install the Apache HTTP Server package and all its dependencies. yum automatically locates and downloads RPM packages for you by searching one or more repositories on the internet. It can install a software package and all of its dependencies at the same time.

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small African nation. The user was offered a 25 percent share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account. What type of attack occurred?

Phishing

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 7 to Windows 10 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 7 operating system?

Restore her system using the recovery partition.

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue?

Run an antimalware scan

What is name of the utility that is (1 similar to Telnet and (2 used to establish a secure remote server management session?

SSH

You need to boot a Windows 10 system into Safe Mode. Which steps will accomplish this task? (Select TWO. Each choice is a complete solution.)

Select Start > Settings > Update & Security > Recovery > Advanced startup > Restart Now. Run the msconfig.exe utility and specify the boot mode

Marcus was attempting to tweak the way his Windows 10 workstation boots when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. He boots the system from the Windows installation disc and accesses the Recovery Environment. What should he do next?

Select Troubleshoot > Advanced Options > Startup Repair

Your computer has a quad-core processor that supports multithreading installed. Given that the system is running Windows, how can you verify whether multithreading has been enabled?

Task Manager can display CPU utilization graphs for eight processors.

You would like to run an application on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task Scheduler

An employee calls you to demand more RAM for her computer to complete her work tasks. However, you know that her department doesn't have a budget for new equipment. Your supervisor is the only one that has authority to allocate department funds. Which of the following is the BEST way to respond?

Tell the employee that her department doesn't currently have a budget for equipment upgrades, but that you will let your supervisor know about the request so it can be properly determined if new RAM can be acquired.

Which of the following tools allow remote server management? (Select TWO.)

Telnet, SSH

Sound isn't coming from the internal speaker on a tablet device, even after a user checks its volume settings and makes sure it not muted. Which of the following is MOST likely reason?

The audio output is being directed to a Bluetooth speaker.

A user calls her organization's help desk to request help connecting to a network server. The Help Desk technician visits her desk to resolve the issue. Once there, the technician uses the user's telephone to call his girlfriend. Even though the technician solves the problem, the call lasts the entire time the technician is at the user's desk. Which of the following mistakes did the technician make?

The technician should not have used the user's telephone for a personal call.

T/F By default, Windows automatically creates an administrative share for every volume.

True

Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she had a good cell signal in the past. Her phone battery is fully charged. Which of the following actions would BEST address this issue?

Uninstall the new app and scan for malware.

Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of these messages?

Unintended Wi-Fi connections

To connect to an administrative share, you must use the __________ path

Universal Naming Convention (UNC)

A user installs a new graphics application on her Windows system. During the installation process, the application prompts the user to load a custom video driver that has been optimized for the application. She does so and then completes the installation. Several days later, the user reports that her display doesn't seem to be working properly under some conditions. To fix the problem, you need to reload the old video driver. Which of the following actions are the BEST choices? (Select TWO).

Use Device Manager to roll back the video driver. Revert the system to a restore point prior to installing the video driver.

You have just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. Which of the following steps will BEST protect the wireless network? (Select TWO. Each option is a complete solution.)

Use the WAP's configuration utility to reduce the radio signal strength, Configure the WAP to filter out unauthorized MAC addresses.

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away. What is the MOST likely problem?

a corona wire is dirty

Bob calls and complains that he has suddenly started getting a lot of unwanted email. Which of the following is the BEST type of software to install to help solve Bob's problem?

anti-spam

Employees currently access a data center using RFID badges. The company is concerned that an unauthorized person could gain access using a lost or stolen badge. Which of the following could be implemented to increase the physical security?

biometric locks

You have just received a call from one of your customers. He informs you that after turning his computer on, he received the following error: Error loading operating system BOOTMGR is missing Press Ctrl+Alt+Del to restart Every time he restarts his computer, the same error is shown. Which of the following tools is BEST for fixing this issue?

bootrec

Joe has been issued a company-owned tablet. He finds that the performance decreases after a few hours of use. After he power-cycles the tablet, performance returns, but the tablet begins to slow again after an hour of use. Which of the following is the BEST action to troubleshoot the problem?

check the number of apps that are running

You work for a company that offers their services through the internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial of service attack. As a first responder, which of the following is the next BEST step to perform?

contain the issue

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

default domain policy

You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to run to accomplish this task?

gpupdate

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?

hotfix

You have recently had an issue where a user's Windows computer was infected with a virus. After removing the virus from the computer, which of the following is the NEXT step you should take?

install all OS updates

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's accounting department. She received a single Windows 10 installation disc with the licenses. Which of the following would be the BEST installation methods to use? (Select TWO).

install one system and image it to the other systems, use a network installation

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following BEST describes what happened to the file?

it has been moved to a folder on your computer

An employee working from home accesses the company network using a VPN connection. When connecting, the employee is prompted for a PIN that changes at predetermined intervals. Which of the following will the employee MOST likely use to obtain the PIN?

key fob

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).

lock screen authentication, keep OS up to date

You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an in-place upgrade. Which of the following is the BEST next step?

make sure all installed apps run correctly

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy-backing to gain access to your building. The individual in question did not have a security badge. Which of the following would you MOST likely implement to keep this from happening in the future?

mantraps

To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened? (Select TWO.)

metal area on the computer case, anti-static mat

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

modify the NTFS permissions on the folder

Which of the following components requires special disposal procedures to comply with environmental guidelines?

notebook battery

You have booted your Windows workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?

ntbtlog.txt

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

principle of least privilege

Some software on Rachel's computer is telling her that her computer is at risk and that she needs to purchase an upgrade for the software before the risk can be removed. Confused, Rachel calls you (the IT specialist) for advice. After meeting with Rachel, you discover that the pop-up warnings only began after she installed a plug-in for her internet browser. Which of the following is the MOST likely cause of these warning messages?

rogue antivirus

You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partition. The existing disk has no unpartitioned space available, but it has about 300 GB of free space. Which of the following disk management operations will BEST prepare your hard disk for dual boot?

shrink the primary partition

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence?

shutting down the system

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. Which of the following BEST describes the type of attack which as occurred in this scenario?

spoofing

Which of the following topologies connects each network device to a central hub?

star

You have just installed the latest Windows updates on your Windows 10 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed Windows updates. Since your computer won't start, you have booted your computer into the Advanced Options section of the Windows 10 recovery environment (see image). While troubleshooting this issue, which of the advanced options would be the BEST to try first?

startup repair

A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address?

static IP address

Which category do apps fall into if they have been signed with a certificate?

trusted

What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

untrusted

What is the best countermeasure against social engineering?

user awareness training

You have installed anti-malware software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. Which of the following should you add to your security measures to help prevent this from happening again?

user awareness training

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of?

users


Related study sets

Start Exam 2 WBC Malignancies- Quiz 6

View Set

Module 5, p. 56 Verb-Noun Combinations by Teeters

View Set

Finance 2000 chapter 6 Chapter questions

View Set

Chapter 10 Interest Groups notes

View Set

Old Testament The History of Israel

View Set