Comptia A+ Core 2 Practice Exam A

Ace your homework & exams now with Quizwiz!

A system administrator has created a shared folder on a server to store operating system images. Technicians will access the shared folder to download the latest images when performing large-scale system installations. Which of the following will be the MOST likely method of accessing this data? ❍ A. Map the shared folder to an available drive letter ❍ B. Download the shared folder through a proxy ❍ C. Link the images to a cloud storage service ❍ D. Access the folder using a remote access client

Map the shared folder to an available drive letter

Sam, a user on the research and development team, reports that her computer displays the message "Missing operating system" during boot. A technician runs hardware diagnostics and finds that the RAM, CPU, storage drive, and power supply all pass the tests. The technician then finds that a connected USB flash drive was causing the issue. Which of the following would prevent this issue from occurring in the future? ❍ A. Update the BCD ❍ B. Install the latest OS patches ❍ C. Run SFC ❍ D. Modify the BIOS boot order

Modify the BIOS boot order

A financial management company would like to ensure that mobile users are configured with the highest level of wireless encryption while working in the office. They would also like to include an additional user verification step during the login process. Which of the following would provide this functionality? (Choose TWO) ❍ A. RADIUS ❍ B. WPS ❍ C. Multi-factor authentication ❍ D.TKIP ❍ E.TACACS ❍ F. RC4 ❍ G. WPA2

Multi-factor authentication and WPA2

A system administrator has been asked to install a new application on a server, but the application is 64-bit and the server operating system is 32-bit. Which of the following describes the issue associated with this installation? ❍ A. File permissions ❍ B. OS compatibility ❍ C. Installation method ❍ D. Available drive space

OS compatibility

A system administrator has booted a computer using PXE. Which of the following would be the MOST likely reason for this task? ❍ A. Monthly OS patch install ❍ B. OS installation from a network drive ❍ C. Boot to Safe Mode ❍ D. Control the computer remotely

OS installation from a network drive

Match the technology with the description: Any credit card numbers stored locally must be encrypted

PCI DSS (Payment Card Industry Data Security Standard)

Match the technology with the description: All blood test results are stored on laboratory file servers

PHI (Protected Health Information)

Match the technology with the description: A database includes all client first names, last names, and home addresses

PII (Personally Identifiable Information)

Which of the following technologies would be the best choice to boot computers in a training room over the network? ❍ A. MBR ❍ B. NTFS ❍ C. Dual boot ❍ D. PXE

PXE (Preboot eXecution Environment)

A help desk technician has been called to a training room that uses Android tablets as presentation devices. An application used for the training program will not start on any of the tablets. When the application is selected, the splash screen appears for a moment and then completely disappears with no error message. Which of the following would be the best NEXT troubleshooting step? ❍ A. Install all operating system updates ❍ B. Uninstall the application ❍ C. Power cycle the tablets ❍ D. Roll back to the previous application version

Power cycle the tablets

A technician is dismantling a test lab for a recently completed project, and the lab manager would like to use the existing computers on a new project. However, the security administrator would like to ensure that none of the data from the previous project is accessible on the existing hard drives. Which of the following would be the best way to accomplish this? ❍ A. Quick format ❍ B. Deguass the drives ❍ C. Regular format ❍ D. Reinstall the operating system

Regular format

A user has delivered a broken laptop to the help desk, and he's visibly upset and quite vocal about the problem he's having. He's also asking for a very specific repair that doesn't appear to have any relationship to his issue. What's the best way to handle this situation? ❍ A. Repeat your understanding of the issue to the customer and provide an estimate and follow-up time ❍ B. Refuse the repair until the customer calms down ❍ C. Inform the customer of his mistake with the proposed repair ❍ D. Refuse to make any commitments until the computer is examined

Repeat your understanding of the issue to the customer and provide an estimate and follow-up time

A system administrator has installed a new video driver on a laptop computer, but the icons and text on the screen are larger than the previous driver version. Which of the following should be modified to resolve this problem? ❍ A. Resolution ❍ B. Color depth ❍ C. Refresh rate ❍ D. Video memory

Resolution

A user in the accounting department has received this error message: "The print spooler service is not running."The user contacts the help desk and opens a ticket for assistance. The help desk technician performs some testing and identifies the issue. Which of these would be the best NEXT step? ❍ A. Reinstall all printer drivers ❍ B. Restart the spooler service ❍ C. Reboot the computer ❍ D. Power cycle the printer

Restart the spooler service

Sam, a user in the accounting department, has opened a help desk ticket due to problems accessing the website of the company's payroll service provider. The help desk technician finds that other users in the accounting department are able to successfully access the website. While testing other website connections on Sam's computer, the technician finds that many pop-up windows are displayed. Which of the following would be the BEST way for the technician to resolve this issue? ❍ A. Uninstall the browser and reinstall with a different version ❍ B. Restore the workstation from a known good backup ❍ C. Start in Safe Mode and connect to the payroll website ❍ D. Modify the browser's proxy settings

Restore the workstation from a known good backup

A desktop administrator has determined that an employee in the corporate office has been using their computer to share copyrighted materials to others on the Internet. Which of the following should be the best NEXT step? ❍ A. Create a firewall rule to block Internet access to this computer ❍ B. Create a hash for each file that was shared ❍ C. Compile a list of licenses for each set of copyrighted materials ❍ D. Retrieve and securely store the computer

Retrieve and securely store the computer

A security technician has identified malware that is running as part of the OS kernel. Traditional anti-malware scans were not able to identify any problems on the computer. Which of the following would be the BEST description of this malware? ❍ A. Rootkit ❍ B. Worm ❍ C. Botnet ❍ D. Crypto-malware

Rootkit

A user has placed a smartphone on their desk, and they occasionally hear the sound of a camera shutter when the phone is not being used. Which of the following should a technician follow to BEST resolve this issue? ❍ A. Put the phone into airplane mode ❍ B. Connect to the corporate network using a VPN connection ❍ C. Run an anti-malware scan on the smartphone ❍ D. Remove any paired Bluetooth devices

Run an anti-malware scan on the smartphone

A network administrator needs to manage a switch and firewall at a remote location. Which of the following would be the BEST choice for this requirement? ❍ A. RDP ❍ B.Telnet ❍ C. SSH ❍ D. VNC

SSH (Secure Shell)

Daniel, a user in the finance department, has purchased a new Android smartphone and has installed a number of productivity apps. After a day of use, Daniel finds that the battery is draining rapidly, even when the phone is not being used. Which of the following tasks should Daniel perform after completing a factory reset? ❍ A. Disable Bluetooth ❍ B. Check app sharing permissions ❍ C. Run a speed test on the cellular connection ❍ D. Scan each app before installation

Scan each app before installation

An employee has modified the NTFS permissions on a local file share to provide read access to Everyone. However, users connecting from a different computer do not have access to the file. Which of the following is the reason for this issue? ❍ A. The NTFS permissions were not synchronized ❍ B. Share permissions restrict access from remote devices ❍ C. The user is an Administrator ❍ D. Remote users are connecting with Guest accounts

Share permissions restrict access from remote devices

A healthcare company has replaced some of their desktop computers with laptops and will be disposing of the older computers. The security administrator would like to guarantee that none of the existing data on the hard drives could be recovered once the systems are sent to the recycling center. Which of the following methods would meet this requirement? ❍ A. Quick format ❍ B. Reinstall the OS ❍ C. Remove all user folders ❍ D. Shred the drives

Shred the drives

A user in the accounting department has recently installed a new app on their Android tablet. The app was not downloaded from the central app store, but instead was downloaded directly from a website as an .apk file. Which of the following would describe this installation process? ❍ A. Cloud service ❍ B. Sideloading ❍ C. Biometrics ❍ D. Encrypted

Sideloading

A user on the headquarters network has opened a help desk ticket about their Windows desktop. When starting their computer, the login process proceeds normally but the Windows desktop takes fifteen minutes to appear. Yesterday, the desktop would appear in just a few seconds. Which of the following would be the MOST likely reason for this issue? ❍ A. Slow profile load ❍ B. Incorrect boot device order ❍ C. Faulty RAM ❍ D. Incorrect username and password

Slow profile load

After booting, a laptop computer is showing a black screen instead of the normal Windows login prompt. The logs from the update server show drivers on the laptop were automatically updated overnight. Which of the following would be the BEST way to resolve this issue? ❍ A. Reinstall the operating system ❍ B. Update the BCD ❍ C. Start in VGA mode and roll back the driver ❍ D. Upgrade the BIOS

Start in VGA mode and roll back the driver

A system administrator is creating a series of shared folders that should not be visible when users browse the network for available shared resources. What symbol should be added to the end of a share name to provide this functionality? ❍ A..(period) ❍ B. $ (dollar sign) ❍ C. ! (exclamation mark / bang) ❍ D. # (hash sign / number sign)

$ (dollar sign)

In which of the following file types would a system administrator expect to see the command, "cd c:\source"? ❍ A. .sh ❍ B. .vbs ❍ C. .py ❍ D. .bat

.bat

What is the maximum amount of RAM supported by a 32-bit version of an operating system? ❍ A. 4 GB ❍ B. 8 GB ❍ C. 16 GB ❍ D. 192 GB

4 GB

The motherboard of a server in the corporate data center has started smoking, and flames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this fire? ❍ A. An extinguisher with water ❍ B. A foam-based extinguisher ❍ C. Disconnect the power ❍ D. A carbon dioxide extinguisher

A carbon dioxide extinguisher

A network administrator has configured all of their wireless access points with WPA2 security. Which of the following technologies would be associated with this configuration? ❍ A. RC4 ❍ B.TACACS ❍ C.TKIP ❍ D. AES

AES (Advanced Encryption Standard)

A Windows 10 user is installing a new application that also installs a service. Which of the following permissions will be required for this installation? ❍ A. Guest ❍ B. Power User ❍ C. Administrator ❍ D. Standard user

Administrator

A technician is setting up some new computers on an industrial manufacturing floor that cuts wood boards for cabinets. Which of the following would be the MOST important for this setup process? ❍ A. ESD mat ❍ B. UPS ❍ C. Anti-static bag ❍ D. Air filter mask

Air filter mask

A user has reported that all Google search results in their Internet browser are displaying a non-Google website. This redirection occurs each time a Google search is attempted. Which of the following would be the BEST way to prevent this issue in the future? ❍ A. Windows Firewall ❍ B. MAC filtering ❍ C. Port security ❍ D. Certificate-based authentication ❍ E. Anti-malware utility

Anti-malware utility

A desktop administrator is upgrading the video adapter in a CAD/CAM workstation. Which of the following should the administrator use during this process? ❍ A. Tone generator ❍ B. Anti-static strap ❍ C. Safety goggles ❍ D. Toner vacuum

Anti-static strap

A help desk director would like to identify and track computer systems that have been returned for service or moved from one location to another. Which of the following would be the BEST solution for these requirements? ❍ A. Cable labels ❍ B. Asset tags ❍ C. Topology diagrams ❍ D. Login names

Asset tags

A system administrator is upgrading an email service in the corporate data center. During the upgrade, an error message appears and the upgrade fails. Subsequent attempts to perform the upgrade also fail. Which of the following processes should the system administrator follow to return the email server to its previous state? ❍ A. Backout plan ❍ B. Disaster recovery plan ❍ C. Incident response plan ❍ D. Power plan

Backout plan

Which of these Windows features provides full disk encryption for all data on a storage drive? ❍ A. Domain Services ❍ B. EFS ❍ C. BranchCache ❍ D. BitLocker

BitLocker

An internal audit has found that a server in the DMZ has been participating in DDoS attacks against external devices. What type of malware would be MOST likely found on this server? ❍ A. Worm ❍ B. Rootkit ❍ C. Keylogger ❍ D. Spyware ❍ E. Botnet

Botnet

Which of the following would be unnecessary if a rainbow table is used? ❍ A. Spoofing ❍ B. Social engineering ❍ C. Brute force attack ❍ D. DDoS

Brute force attack

A student would like to prevent the theft of their laptop while studying at the library. Which of the following security methods would be the BEST choice to protect this laptop? ❍ A. Biometrics ❍ B. Locking cabinet ❍ C. USB token ❍ D. Cable lock

Cable lock

While using a laptop during presentations, a company vice president has found that her system randomly locks up. While the problem is occurring, the screen continues to display the last presentation slide but none of the mouse or keyboard buttons will work. To regain control, the vice president must power down and reboot her computer. Which of the following would be the BEST option for troubleshooting this issue? ❍ A. Examine the Task Manager ❍ B. Install an anti-malware utility ❍ C. Run the presentation software in Safe Mode ❍ D. Check the Event Viewer

Check the Event Viewer

A user in the shipping department has opened a help desk ticket for problems found when browsing to certain Internet sites. The user also has slow access to other sites and difficulty sending and receiving emails from the local email server. A technician performs some basic troubleshooting and finds that CPU utilization is low, memory usage is minimal, and half of network pings return a response. Which of the following would be the best NEXT troubleshooting step? ❍ A. Remove all startup applications and reboot the computer ❍ B. Restart in Safe Mode and repeat the tests ❍ C. Check the statistics on the user's switch port ❍ D. Scan with an anti-malware utility

Check the statistics on the user's switch port

A system administrator is upgrading four workstations from Windows 8.1 to Windows 10. All of the user files and applications are stored on the server, and no documents or settings need to be retained between versions. Which of these installation methods would be the BEST way to provide this upgrade? ❍ A. Factory reset ❍ B. Repair installation ❍ C. Clean install ❍ D. Multiboot

Clean install

An office power system occasionally experiences minor voltage spikes during the business day. Which of the following would be the BEST way to address this power issue? ❍ A. Power down when not actively working ❍ B. Confirm that the building has an electrical ground ❍ C. Connect a surge suppressor to each system ❍ D. Maintain an inventory of replacement power supplies

Connect a surge suppressor to each system

A technician has been assigned a support ticket that urgently requests a laptop repair, but there are already many open support tickets ahead of this request. The technician doesn't recognize the name associated with the ticket. Which of these choices would be the best path to take? ❍ A. Place the ticket into the queue as first-come, first-served ❍ B. Prioritize the support tickets by device type ❍C.Triage the queue and prioritize the tickets in order of repair complexity ❍ D. Contact the end-user and determine the urgency of the repair

Contact the end-user and determine the urgency of the repair

A network consulting firm is creating a proposal to upgrade the Internet firewalls for a large corporation. The proposal includes a description of the project and the network topology changes that would be required to support the upgrade. The proposal also describes the risks involved in the process of making this upgrade. Which of the following should be covered NEXT in the proposal? ❍ A. End-user approvals ❍ B. Backout plan ❍ C. Change control application ❍ D. Detailed upgrade plan

Detailed upgrade plan

A technician has been tasked with removing malware on a training room laptop. After updating the anti-virus software and removing the malware, the technician creates a backup of the system. After the training class ends, the technician is notified that the malware has returned. Which of the following steps was missed and caused the system to be infected again? ❍ A. Boot to a pre-installation environment ❍ B. Identify malware symptoms ❍ C. Disable System Restore before removal ❍ D. Update to the latest BIOS version

Disable System Restore before removal

A workstation on a manufacturing floor is taking much longer than normal to boot. Which of the following would be the BEST way to troubleshoot this issue? ❍ A. Replace the CPU ❍ B. Disable the startup applications ❍ C. Upgrade the RAM ❍ D. Install the latest OS patches

Disable the startup applications

A security administrator has received an alert that a user's workstation in the shipping department has attempted to communicate to a command and control server for a well-known botnet. The logs on the workstation show that the user manually installed a new Internet browser the previous day. Which of the following would be the BEST next step for troubleshooting this issue? ❍ A. Uninstall the new browser ❍ B. Backup the user's documents ❍ C. Roll back to a previous restore point ❍ D. Disable the user's account

Disable the user's account

A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST? ❍ A. Remove the existing memory modules ❍ B. Wear an air filter mask ❍ C. Disconnect all power sources ❍ D. Connect an ESD strap

Disconnect all power sources

A computer on a manufacturing floor has been identified as a malware- infected system. Which of the following should be the best NEXT step to resolve this issue? ❍ A. Disconnect the network cable ❍ B. Perform a malware scan ❍ C. Disable System Restore ❍ D. Download the latest anti-malware signatures

Disconnect the network cable

A user working from home is not able to print to a laser printer at the corporate office. Which of the following would be the MOST likely reason for this issue? ❍ A. DLP policy ❍ B. Outdated anti-virus signatures ❍ C. Disconnected VPN ❍ D. MDM configuration

Disconnected VPN

A system administrator is adding an additional drive to a server and extending the size of an existing volume. Which of the following utilities would provide a graphical summary of the existing storage configuration? ❍ A. Disk Management ❍ B. Performance Monitor ❍ C. Event Viewer ❍ D. Task Scheduler ❍ E. Device Manager

Disk Management

Match the commands to the description: List the volume names on a storage drive

Diskpart (Disk Partitioning)

Match the technology with the description: Software can be used on one computer and one copy can be stored for backup purposes.

EULA (End User Licensing Agreement)

A user has opened a help desk ticket for application slowdowns and unwanted pop-up windows. A technician updates the anti-virus software, scans, and removes the malware. The technician then schedules future scans and creates a new restore point. Which of the following should be the NEXT step in the removal process? ❍ A. Disable System Restore ❍ B. Update the anti-virus signatures ❍ C. Quarantine the system ❍ D. Educate the end user

Educate the end user

A user has opened a help desk ticket regarding the battery life on their mobile phone. The battery in the phone held a charge for most of the day prior to connecting to the corporate network. The battery now only lasts about half a day and the back of the phone is warmer than usual. The phone is configured as follows: Storage: 116.2 GB of 256 GB used Display and Brightness: Automatic Wi-Fi: Enabled Auto-lock: Disabled VPN: Not connected Low Power Mode: Disabled Battery Maximum Capacity: 100% Which of the following changes would have the BEST impact on battery performance? ❍ A. Enable auto-lock ❍ B. Connect to the VPN ❍ C. Increase available storage space ❍ D. Disable Wi-Fi

Enable auto-lock

A system administrator is installing a new server into the metal racks in a data center. During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST? ❍ A. Equipment grounding ❍ B. Lighted exit signs ❍ C. Cable management ❍ D. Waste disposal regulations

Equipment grounding

A user in the marketing department is using an application that randomly shuts down during normal use. When the problem occurs, the application suddenly disappears and no error messages are shown on the screen. Which of the following would provide the system administrator with additional information regarding this issue? ❍ A. System Configuration ❍ B. Event Viewer ❍ C. Device Manager ❍ D. Local Security Policy ❍ E. SFC

Event Viewer

Daniel, a user, is attempting to start an application on his laptop computer. Each time the application shows the starting graphic, it suddenly disappears and the application icon disappears from the taskbar. A technician would like to get more information about each previous occurrence of the application crash. Which of these choices would provide these details? ❍ A. Event Viewer ❍ B. Task Manager ❍ C. Startup Repair ❍ D. Safe Mode

Event Viewer

Match the technology with the description: The software includes source code and can be distributed at no cost

FOSS (Free and Open Source)

Rodney, a desktop technician, is cleaning the outside of computers used on a manufacturing assembly line. The assembly line creates sawdust and wood chips, so most of the computers are protected with enclosed computer cases. Which of the following would be the MOST important item for Rodney to include during this cleaning process? ❍ A. Surge suppressors ❍ B. Temperature sensors ❍ C. Face masks ❍ D. ESD mats

Face masks

Match the technology with the description: European Union citizens can request to have all personal data removed

GDPR (General Data Protection Regulation)

Which of the following governmental policies manages the use of personal data? ❍ A. PCI DSS ❍ B. EULA ❍ C. GDPR ❍ D. FOSS

GDPR (General Data Protection Regulation)

A system administrator would like to require a specific password complexity for all Active Directory users. Which of the following would be the BEST way to complete this requirement? ❍ A. Login script ❍ B. Folder redirection ❍ C. Port security ❍ D. Group Policy

Group Policy

A technician is troubleshooting a computer infected with a virus. The user thought they were opening a spreadsheet, but the file was actually a virus executable. Which of the following Windows options were MOST likely associated with this issue? ❍ A. Always show icons, never thumbnails ❍ B. Display the full path in the title bar ❍ C. Always show menus ❍ D. Hide extensions for known file types

Hide extensions for known file types

Jack, a user, has opened a help desk ticket relating to email messages he's receiving. The messages appear to be replies to a message that Jack did not send. Most of the messages contain information about third-party product promotions and sales information. Which of the following is the MOST likely cause of these messages? ❍ A. Man-in-the-middle ❍ B. Corrupted email database ❍ C. Adware ❍ D. Hijacked email

Hijacked email

A technician has been tasked with removing malware from a desktop computer. What order should these malware removal tasks be to successfully remove the malware?

Identify malware symptoms Quarantine infected systems Disable System Restore Remediate Schedule scans and run updates Enable System Restore Educate the end user

A desktop administrator is installing a 64-bit version of Windows 10 Pro on a workstation, but the installation will not start. The workstation configuration is: 1 GHz CPU 2 GB of RAM 15 GB of free storage space 1280 x 720 video resolution Which of the following would allow this installation to proceed? ❍ A. Increase free storage space to 20 GB ❍ B. Decrease resolution to 800 x 600 ❍ C. Upgrade to a faster processor ❍ D. Increase RAM to 4 GB

Increase free storage space to 20 GB

A technician has been called to resolve an issue with a networked laser printer that is not printing. When the technician arrives on-site, they find the printer will require a hardware replacement. All hardware is managed by a third-party and will take a week before the printer is operational again. Which of the following would be the technician's best NEXT step? ❍ A. Work on the next ticket in the queue ❍ B. Add a follow-up event for one week later ❍ C. Inform the user of the repair status ❍ D. Order a printer maintenance kit

Inform the user of the repair status

A user has noticed that their system has been running very slowly over the last few days. They have also noticed files stored on their computer randomly disappear after the files are saved. The user has rebooted the computer, but the same problems continue to occur. Which of the following should the user perform to resolve these issues? ❍ A. Boot to Safe Mode ❍ B. Release and renew the network connection ❍ C. Install anti-malware software ❍ D. Upgrade the system RAM

Install anti-malware software

A business partner in a different country needs to access an internal company server during the very early morning hours. The internal firewall will limit the partner's access to this single server. Which of these would be the MOST important security task to perform on this server? ❍ A. Install the latest OS patches ❍ B. Remove the server from the Active Directory domain ❍ C. Use only 64-bit applications ❍ D. Run a weekly anti-virus scan

Install the latest OS patches

George, a sales manager, has recently replaced a broken mobile phone with a newer version. After receiving the new phone, he restored all of his apps and data from a recent backup. However, when he attempts to download any new email messages he receives a message, "Unable to decrypt email." Which of the following steps should a technician follow to resolve this issue? ❍ A. Install the latest operating system patches ❍ B. Delete the email app and reinstall ❍ C. Restart the phone ❍ D. Install the user's private keys

Install the user's private keys

A help desk technician has been given a network diagram that shows switch interfaces grouped by VLAN. Which of the following would BEST describe this documentation? ❍ A. Logical diagram ❍ B. Knowledge base ❍ C. Inventory management ❍ D. Operational procedures

Logical diagram

A network administrator is configuring a wireless network at a small office. The administrator would like to allow wireless access for all computers but exclude a single kiosk in the lobby. Which of the following configuration settings would meet this requirement? ❍ A. SSID suppression ❍ B. Content filtering ❍ C. Static IP addressing ❍ D.WPS ❍ E.MACfiltering

MAC (Media Access Control)

A security guard has reported that a person was seen passing through a secure door without using a door badge. The intruder slipped through the door by closely following the person in front of them. Which of these would best describe these actions? ❍ A. Dumpster diving ❍ B. Brute force ❍ C. Phishing ❍ D.Tailgating

Tailgating

Jack, a user, is having problems with the 802.11 wireless connection on his iOS phone. Although there are names appearing in the network list, his phone does not show any connectivity to a wireless network. Jack has confirmed that airplane mode is not enabled, Bluetooth is on, and VPN is not enabled. Which of the following is the MOST likely reason for this lack of wireless connectivity? ❍ A. The phone does not include a data plan ❍ B. The wireless network is not active ❍ C. The Bluetooth connection is conflicting with the Wi-Fi ❍ D. The Wi-Fi password is incorrect ❍ E. The wireless radio is disabled

The Wi-Fi password is incorrect

A user in the sales department has opened a help desk ticket to reporta dim display on their tablet. When they use the tablet in the office, the screen brightness is normal. In meetings with customers, the display appears much dimmer. Which of these would be the MOST likely reason for this difference? ❍ A. The tablet display is faulty ❍ B. The tablet is brighter when connected to power ❍ C. The tablet backlight is on a timer ❍ D. Indoor LED lighting is causing the display to dim

The tablet is brighter when connected to power

A user purchased a copy of home tax software and has installed it on their company computer. This morning, the user logs in and finds that the tax software has been automatically removed from the system. Which of the following would be the MOST likely reason for this result? ❍ A. The company per-seat licenses are all in use ❍ B. The software uses a FOSS license ❍ C. The user has installed a personal license ❍ D. The software is subject to the GDPR

The user has installed a personal license

The hard drive in a macOS desktop has failed and none of the data on the drive was recoverable. A new storage drive has now been installed. Which of the following should be used to restore the data on the computer? ❍ A. Backup and Restore ❍ B. Boot Camp ❍ C. Time Machine ❍ D. Disk Utility

Time Machine

A data center manager requires each server to maintain at least fifteen minutes of uptime during a power failure. Which of these would be the BEST choice for this requirement? ❍ A. Cloud-based storage ❍ B. UPS ❍ C. Redundant power supplies ❍ D. Surge suppressor

UPS (Uninterruptible Power Supply)

Which of these OS installation types uses an XML file that answers all of the questions normally provided during the installation? ❍ A. Unattended ❍ B. Image ❍ C. PXE ❍ D. Clean

Unattended

A user has received a pop up message on their computer that states applications on their computer are infected with a virus. A technician has determined that the pop up message is a hoax that needs to be removed from the computer. The technician has disabled System Restore to remove all previous restore points. Which of the following tasks would be the best NEXT step? ❍ A. Update the anti-virus signatures ❍ B. Educate the end-user ❍ C. Schedule anti-virus scans for midnight each day ❍ D. Boot the system with a pre-installation environment

Update the anti-virus signatures

A financial corporation is deploying tablets to their salespeople in the field. The company would like to ensure that the data on the tablets would remain private if the devices were ever stolen or lost. Which of the following would be the BEST way to meet this requirement? ❍ A. Use full device encryption ❍ B. Require multi-factor authentication ❍ C. Install a locator application ❍ D. Use a firewall app

Use full device encryption

A system administrator is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC process. Which of the following options would provide access to these settings? ❍ A. Device Manager ❍ B. System Information ❍ C. Event Viewer ❍ D. User Accounts

User Accounts

A technician is installing a new wireless network in a small remote office. Which of the following should the technician choose to provide the highest level of security on the network? ❍ A. WPA2 ❍ B. MAC filtering ❍ C. Static IP addressing ❍ D. SSID suppression

WPA2 (Wi-Fi Protected Access 2)

An administrator is upgrading a Windows 8.1 Enterprise x64 computer to Windows 10. The user would like to maintain all applications and files during the upgrade process. Which of the following upgrade options would meet this requirement? ❍ A. Windows 10 Enterprise x86 ❍ B. Windows 10 Pro x64 ❍ C. Windows 10 Enterprise x64 ❍ D. Windows 10 Pro x86

Windows 10 Enterprise x64

Match the commands to the description: Change to a different working directory

cd (Change Directory)

A system administrator needs to view a set of application log files contained in a folder named "logs." Which of the following commands should be used to make this the current active directory? ❍ A. cd logs ❍ B. mv logs ❍ C. dir logs ❍ D. md logs

cd logs

Match the commands to the description: Repair logical file system errors

chkdsk (Check Disk)

A Linux administrator needs to create a system image of a laptop used by the help desk for network troubleshooting. Which of the following utilities would provide this functionality? ❍ A. dd ❍ B. sudo ❍ C. ifconfig ❍ D. apt-get

dd

Match the commands to the description: List the contents of a Windows directory

dir (directory list)

Match the commands to the description: Make changes to a WIM image

dism (Deployment Image Servicing and Management tool)

An organization has been tasked with increasing the minimum password length. A systems administrator has created a policy to require all passwords to be at least ten characters long for all users. When testing this policy in the lab, a laptop computer allowed the creation of eight- character passwords. Which of the following commands should be used to apply this new policy on the laptop? ❍ A. net use ❍ B. gpupdate ❍ C. sfc ❍ D. tasklist

gpupdate (Group Policy Update)

A user has installed multiple applications over the last week. During the startup process, the computer now takes over fifteen minutes to display the Windows desktop. Which of the following utilities would help the system administrator troubleshoot this issue? ❍ A. defrag ❍ B. dism ❍ C. msconfig ❍ D. robocopy

msconfig

A user needs to access a file located on the \\gate-room server. The file is located in a share called ship-diagnostics. How would one use the command line to connect to this share using drive g:?

net use drive: \\<servername>\<sharename>

A malware infection has recently been removed from a computer. When starting the operating system, Windows shows errors during the startup process indicating some core operating system files are missing. Which of the following should be used to restore these missing files? ❍ A. gpupdate ❍ B. dism ❍ C. sfc ❍ D. diskpart

sfc (System File Checker)

A technician has recently removed malware from a Windows computer, but the technician is concerned that some of the system files may have been modified. From the command line how would one analyze and repair any damaged operating system files?

sfc (System File Checker)

A Linux administrator has been asked to upgrade the web server software on a device. Which of the following would provide the administrator with the appropriate rights and permissions for this upgrade? ❍ A. chmod ❍ B. apt-get ❍ C.ifconfig ❍ D. sudo

sudo (superuser do)

Match the commands to the description: Terminate a process by PID

taskkill


Related study sets

Chapter 7: Creating and Communicating a Vision

View Set

(PrepU) Chapter 46: Antianginal Agents

View Set

PHIL 302 Epistemology, Moon, Mid-term Exam

View Set

PATHO Module 5 Chapter 28: Disorders of Cardiac Conduction and Rhythm

View Set

Introduction to Applie Behavior Analysis

View Set

History 8 - Comprehensive Exam #5 - June 16, 2022, 9:40 AM

View Set