comptia a+ core 2

Ace your homework & exams now with Quizwiz!

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed?

%systemdrive%\Program Files (x86)

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this

*"Click" Satrtup

Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

*"Type" Trusted Untrusted

You are an information security specialist in charge of developing and implementing security measures for your company. You are currently working with the company's IT system administrator to make sure that all policies and procedures meet city, state, and industry regulations. You have noted that employees often allow coworkers into restricted areas who may not have authorized access. In addition, employees often work from home using company laptops that are often unsecure and frequently contain sensitive company data on the local hard drive. SOLUTION: You update the Acceptable Use Policy (AUP) to clearly state that only authorized employees can access restricted areas with a proper key fob (no tailgating), along with any penalties for non-compliance. To address the laptop security issue, you work with the IT system administrator to update the network diagram and inform employees of the changes to help secure their laptops. Does this solution provide a reasonable approach for addressing the security area and work-from-home issues?

*"Type" No

You recently installed a Windows 11 system. During the installation process, you elected to sign in to the system with a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.

*"click" Account

System Restore is currently disabled for all volumes on a Windows 11 system. You need to enable System Protection for the C: volume. Click the option you would select to do this.

*"click" Configure

System Restore has been enabled for all volumes on a Windows system. Recently, a new network driver was installed on the system. However, the driver code contained bugs, and now your network board no longer functions. You are unable to access the internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed. Click the option you would use to do this.

*"click" System Restore

You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from your office. Click the Control Panel option you would use to accomplish this task.

*"click" System and Security

What is the most commonly used file extension for a shell script?

.sh

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select three.)

191.168.2.15 168.16.5.1 129.0.0.1

What is the minimum amount of free space recommended for updating a 64-bit machine?

20 GB (You should have at least 16 GB of free space to update your 32-bit machine, or 20 GB of free space to update your 64-bit machine.)

As with other programming languages, improper structure, syntax, or systems testing can cause scripts to negatively impact a machine. Which of the following are common problems that can be introduced into a system or network with a script? (Select two.)

Accidentally changed system settings Unintentional introduction of malware

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information?

Active Directory (Active Directory (AD) is the centralized database that is included with the Windows Server operating system. Active Directory is used to store information about a network, such as user accounts, computers, printers, and security policies.)

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

Administrators (The user should be a member of the Administrators group. No other group can add new device drivers or install new applications.)

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The D:\ drive grants the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

Allow Full Control for both. (Users will have Allow Full Control for both files. Moving or copying files to a different NTFS partition removes any existing NTFS permissions so that only inherited permissions apply.)

Which of the following are common uses for scripting? (Select three.)

Automated backups System updates Network drive remapping

You are in the process of preparing to install Windows 11 Professional on your Windows 10 laptop. You have already verified that your laptop hardware is compatible with a Windows 11 installation. Which of the following pre-installation steps should you perform next?

Back up existing data. (After verifying that your system is compatible with a Windows 11 installation, you should back up all data from your laptop that you do not want to lose.)

Which part of the change management process specifies how you will return affected systems to their original state if your implementation fails?

Backout plan (A backout plan specifies how you'll return affected systems to their original state if your implementation fails.)

Which of the following is true of online software activation? (Select three.)

Before running a newly installed application, the user must activate their license online on the software vendor's website. With personal software licenses, the limit is usually one to three online activations. Persistent activation may require the license to be continuously re-activated online at a preconfigured interval.

You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption?

BitLocker To Go (BitLocker To Go provides drive encryption for removable data drives, including USB flash drives. You can use BitLocker To Go to encrypt the data on a flash drive.)

Which of the following is true of the Windows BitLocker program?

BitLocker is designed to protect files against offline access only.

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?

Boot the computer from the Windows installation disc and run Startup Repair

You have decided to install a new Ethernet network adapter in your Windows 11 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST method in this scenario to get Windows to load properly?

Boot to Safe Mode and uninstall the network driver. (When a computer starts in Safe Mode, only the bare minimum background services that are very important to boot and run Windows are initialized. From this mode, you can then find the driver that is causing problems and uninstall it.)

Which of the following forms of shell scripting is most commonly used?

Bourne shell (Although there are several languages that fall under the term "shell scripting", the most commonly used form of shell scripting is the Bourne shell.)

Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds. Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker. Which of the following electrical terms BEST describes the condition you are most likely experiencing?

Brownout (The dimming or flickering is most likely caused by a drop in the voltage to the lab due to the large number of computer being run at the same time)

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is MOST likely to improve the VoIP performance?

Change QoS settings to give VoIP traffic more priority. (Poor VoIP performance is likely due to insufficient bandwidth to support both video streaming and VoIP calls. Changing the router's QoS settings to give a higher priority to VoIP traffic will most likely improve VoIP performance.)

You have a computer with a 64-bit dual-core processor that runs the 64-bit version of Windows 10 Professional edition. You would like to upgrade to the 64-bit version of Windows 11 Home. You want to perform the upgrade with the least amount of effort possible. Which of the following installation methods do you need to perform?

Clean installation (Even though you are upgrading from Windows 10 to Windows 11, in some cases, you have to complete a clean (custom) installation even if you have an existing Windows operating system. For example, while you can upgrade from Windows 11 Home to Windows 11 Professional, you can't upgrade from Windows 10 Professional to Windows 11 Home.)

You are working on a Mac computer that has an issue with a non-responsive application. You need to stop the application using the Force Quit feature. Which of the following keyboard shortcuts can you use to access the Force Quit feature?

Command + Option + Esc

Which of the following attacks is designed to bombard a target with more data than it can handle?

Denial-of-service (A denial-of-service attack is designed to bombard the target with more data than it can handle, causing it to shut down.)

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows?

Disable and then enable devices and services one by one.

Which of the following Mac features is used to launch apps, switch between running apps, access the Trash, and access specific folders?

Dock (The Dock is the main taskbar in macOS. The Dock is used to launch apps, switch between running apps, access the Trash, and access specific folders.)

What is the last step in the Windows post-installation process?

Document the system.

You've just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue?

Download and install the latest driver from the manufacturer's website

Which of the following tasks does Windows Storage Spaces eliminate the need for? (Select two.)

Drive repartitioning Volume resizing

You have just completed a successful installation of Windows 11 on your hard drive using a disc that you purchased from a local retail outlet. What is the next task that you should complete?

Edit the BIOS/UEFI settings to boot from the hard drive first. (After completing a successful installation of Windows 11 from a disc, you need to edit the BIOS/UEFI settings to boot from the hard drive first. This prevents the system from accidentally booting from the installation media.)

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate content while browsing the web. Which of the following actions would help accomplish this goal?

Enable content filtering. (Parental controls or content filters restrict or block specific web traffic based on keyword, URL, or time of day.)

Drag each Group Policy setting on the left to the appropriate description of how the setting is enforced on the right.

Enabled causes the policy to be enforced. Not Configured has no value and does not change the current setting for this policy. Disabled prevents the policy from being enforced.

Which of the following is a software license that allows 100 or more activations?

Enterprise license (An enterprise license (also known as a volume license or a corporate use license) is designed to allow a large volume of activations for a lower cost per activation than purchasing personal use licenses.)

You have been troubleshooting services on your system. Where is the best place to check to make sure that they are now running properly?

Event Viewer (The best place to check to make sure that services are running properly is Event Viewer. If services are not working properly, you can find error codes in Event Viewer that you can use to further troubleshoot the problem.)

A user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. What is the BEST way to respond to this situation?

Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.

You have added two new hard disks to a Windows computer. The disks are configured as basic disks. As such, which of the following could you configure on these disks? (Select two.)

Extended partitions with logical drives Primary partitions

As the system engineer for a large financial institution, you have decided to implement a backup system on all the Windows 11 laptops used by the financial consultants to ensure that critical customer data is securely stored. Your requirements for the backup system include: Only customer data files created by the financial consultants need to be backed up. Data backed up to a flash drive. Backed up files must be uncompressed. Include contact lists and desktop preferences. Which of the following backup solutions BEST meets your requirements?

File History (File History meets all the requirements for the backup system you need, including only backing up personal data files, the ability to save the data to a flash drive, no compression involved, and the ability to back up profile files, such as contacts and desktop preferences.)

You have decided to use the Apple Remote Disc feature to share CDs and DVDs among employees on your company headquarters office network. Which of the following DVDs can you share with the employees using Remote Disc?

Financial application documentation (You can only share data CDs and DVDs (financial application documentation) through Remote Disc)

You want to use a cloud backup service on your Android smartphone to be able to recover important personal files. Which of the following backup services can you use?

Google Sync (Android devices use the Google Sync cloud service to sync and backup mail, contacts, calendars, and files across all android devices.)

Which of the following password manager features converts a password into a jumbled string of symbols and letters before storing it in the account?

Hashing (Hashing generates a string of values that jumbles a password into symbols and letters.)

You are an IT professional that works with home users. One of your customers works from home and uses multiple Windows computers as well as an Apple Mac computer. Your customer wants to be able to switch between his computers without changing the keyboard and monitor currently in use. Which of the following devices would BEST facilitate sharing his monitor and other input devices with all of his computers?

KVM switch (A KVM (keyboard, video, and mouse) switch allows multiple computers to use a single keyboard, mouse, and monitor. KVM switches have multiple input groups. Each group accepts keyboard, video, and mouse connections from one computer.)

You manage a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administrative tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor (The Local Group Policy Editor is the administrative tool you can use to enable local computer behavior policies and the tasks that users are allowed to perform. The policy that turns off the Windows Store application is found under Computer Configuration settings)

Susan has left the company and has been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?

Make Manuel the file owner.

You are troubleshooting a malware infection. You have run multiple anti-malware scans, but remnants of the malware remain on the system. Which of the following is your NEXT step?

Manually remove any files or Registry keys (Even after running anti-malware scans, remnants of the malware may remain. Do research to determine if specific files, Registry keys, or settings need to be manually taken care of)

Which of the following vendors offers the largest variety of editions for its operating system?

Microsoft Windows

Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies. Which of the following is this an example of?

Mobile device management (MDM software is used by administrators to secure mobile devices and to enforce enterprise policies on the devices)

Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day, Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she was helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he receives a call from the same customer, who is still having support issues. However, when Pablo attempts to open Mary's file, he is denied access. Which of the following is the BEST solution to allow Pablo to open the file?

Modify the document permissions.

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request?

Network share (By creating a network share for Jane's folder that contains her documents, you can grant the managers the ability to see and read these documents. All other employees will not have access if the rights are granted appropriately.)

You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written?

Ntbtlog.txt

After a malware infection has been fully remediated, you should re-enable System Restore and run a full system backup. Which of the following is the BEST place to save this backup?

On an external drive (After your computer has been cleared of a malware infection, perform a full system backup and save it to an external drive.)

You are an IT administrator for your company. You have been tasked with installing 300 copies of Windows 11. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances?

PXE (PXE (pre-boot execution) will allow you to quickly install the required 300 computers from one location)

Which of the following is the Not enough USB controller resources warning most often a result of?

Plugging into a 3.0 USB port.

Which of the following devices are MOST susceptible to problems associated with ESD? (Select two.)

Processor Memory

Which of the following should you do immediately after a malware infection is confirmed?

Quarantine the infected system.

Which tool can you use to display hardware utilization statistics that tell you about your computer's operation?

Resource Monitor (Resource Monitor displays statistics that tell you about the operation of your computer. Statistics include memory and CPU use, disk access, and network utilization.)

Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run Task Manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can you use from Task Manager to stop the application from running?

Right-click > End task

You have just completed installing an application from the Microsoft Store on your Windows 11 workstation. Which of the following can you use to access and manage your newly-installed application? (Select two.)

Right-click Start and select Apps & Features. Right-click the Start menu's application tile.

While browsing the internet, a pop-up browser window comes up, warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST next actions to take? (Select two.)

Run a full system scan using the anti-malware software installed on your system. Update the virus definitions for your locally installed anti-malware software

You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database. Which of the following attacks was your client MOST likely the victim of?

SQL injection (Your client is most likely the victim of an SQL injection attack. SQL is the most common database language and is used by most websites. All sorts of sensitive data, such as user credentials, are stored in these databases.)

Occasionally, Rachel works from another Mac in her office rather than her own. She needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to do this?

Screen Sharing

You are troubleshooting a computer that runs Windows 11. The operating system has halted, and a black screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue?

Search for the error in Microsoft's knowledge base or by using an internet search engine.

Jason is a sales rep with an computer company that sells customized laptops to the public. He is opening a ticket to help resolve a customer issue with a malfunctioning laptop, which was purchased by an important customer who is relying on the laptop to complete a critical project. Which of the following items in the ticket can Jason use to help the support team immediately determine the time sensitivity of resolving this issue?

Severity level (One of the most important ticket categories is the severity level. This helps the support team determine the time sensitivity of resolving an issue.)

You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partition. The existing disk has no unpartitioned space available, but it has about 300 GB of free space. Which of the following disk management operations will BEST prepare your hard disk for dual boot in this scenario?

Shrink the primary partition. (You can decrease the space used by primary partitions and logical drives by shrinking them into adjacent, contiguous space on the same disk.)

Which of the following is an example of personal, government-issued information?

Social security number

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages that are sent to a wide range of victims?

Spamming (Spamming is a type of malicious activity in which numerous unwanted and unsolicited email messages are sent to a wide range of victims. Spam itself may or may not be malicious in nature.)

You have just installed the latest Windows updates on your Windows 11 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed Windows updates. Because your computer won't start, you have booted your computer into the Advanced Options section of the Windows 11 recovery environment (see image below). While troubleshooting this issue, which of the advanced options would be the BEST to try first?

Startup Repair

You have configured your Windows systems to automatically back up user data every night at midnight. You also perform a system image backup once per month. What else should you do to ensure that you are protected from data loss? (Select two.)

Store a copy of all backups offsite. Regularly test restoration procedures.

What is a VPN's primary purpose?

Support secure communications over an untrusted network.

Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue?

System Restore (The most common cause of the system hanging after the Windows splash screen is displayed is a bad driver or corrupt registry settings. If you cannot boot to Safe Mode, boot into the Recovery Environment and use System Restore.)

You want to perform a Windows update on your Windows 11 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following Control Panel utilities is BEST to enable and use prior to the update?

System protection

You have installed a legacy device on your system, but the system does not recognize the device. Which of the following BEST describes why the device was not discovered?

The device does not support plug and play.

Which of the following BEST describes authorization?

The resources that a user can access.

Which of the following is one way that developers and organizations who produce open-source software can generate revenue from the software?

Training contracts (Open-source software must allow its source code to be freely available to anyone without licensing fees or agreements, but developers can offer training contracts to teach users how to use the software and generate revenue from the training contracts.)

You have been asked to install Windows 11 on 30 different computers for a new branch office that your company is setting up. The computers have been purchased from different companies and have different hardware. Which installation method should you use to reduce the installation time and effort that you need to spend?

Unattended (To simplify and speed up installation, perform an unattended installation. The unattended answer file contains responses to common setup questions)

Your Windows 11 system keeps automatically restarting after a critical system error occurs, giving you little or no time to read the contents of the error message. How can you keep your Windows 11 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the Advanced Startup Options menu

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options provides the most secure access?

WPA2 and AES

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort?

WPS (Wi-Fi Protected Setup (WPS) allows you to connect a device to the wireless network simply by pushing the button on the wireless access point.)

Which of the following Windows Update features allows you to register to receive pre-release builds of the operating system?

Windows Insider Program (The Windows Insider Program is a software-testing program. Users who run valid instances of Windows can register to receive pre-release builds of the operating system. You select the level of participation as a Windows Update feature.)

While using a Windows 11 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true? (Select two.)

You must reinstall any applications that were installed after the restore point was taken. Your user files were not affected when the system was reverted to the restore point.

In which of the following situations would driver rollback be the BEST option to use?

You recently installed a new video driver, and now the system behaves erratically.

Which command would you use to change the current directory to the immediate parent directory?

cd ..

Which of the following utilities checks the disk for bad clusters?

chkdsk (Use chkdsk (or scandisk) to check a disk for bad clusters)

Which commands can you use to create a new directory? (Select two.)

mkdir md


Related study sets

Abnormal Psychology Final Exam Part 1

View Set

ISY 251 - Chapter 2: Security Policies and Standards

View Set

TopHat Circulation & Short-Term Blood Pressure Regulation Questions

View Set

CHAPTER 6 DEP 3305 MCGRAW HILL CONNECT

View Set

The Writing Process: Revising, Editing and Proofreading and Essay types

View Set

Chem 103- Prefixes, Conversion and sig figs

View Set

RNSG1126 Module 2 Pre-Module Quiz

View Set

CompTIA A+ Core 1 Practice Test part 2

View Set