1002 Flashcards
A user is complaining that every time they reboot their Windows 8.1 computer, a music application loads up. Which of the following commands would you use to disable the program from starting up each time Windows reboots?
- Services.msc
- Task Manager
- MSCONFIG
- Event Viewer
- MSCONFIG
Which low power mode is used with laptops to save power, but it takes longer to turn back on and resume where the user left off?
- Sleep
- Hibernate
- Balanced
- Power saver
- Hibernate
You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s servers must have a daily backup conducted on them. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when they are needed for restoration. Which of the following should you recommend?
- Create an additional copy of the backups in an off-site datacenter
- Setup scripts to automatically reattempt any failed backup jobs
- Frequently restore the server from backup files to test them
- Attempt to restore a test server from one of the backup files to verify them
- Attempt to restore a test server from one of the backup files to verify them
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro?
- Terminal
- Mission Control
- Image recovery
- Boot camp
- Boot camp
Which command on a macOS or Linux system is used to change the permissions of a file?
- chmod
- sudo
- chown
- pwd
- chmod
You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented?
- Smart card
- key fob
- Biometric reader
- Cable lock
- Smart card
Which version should you use when installing a Linux operating system and are concerned with end-of-life support?
- LTS release
- Rolling release
- Developer release
- Beta release
- LTS release
long term support
Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of “connected clients” and see that “Bob’s Laptop” is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the WPA2 password?
- Disabled WPS
- Enable WPA
- Disable SSID broadcast
- Disable WPA2
- Disabled WPS
A new corporate policy dictates that all access to network resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access the employee records and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?
- Permission creep
- Least privilege
- Directory permissions
- Blacklists
- Least privilege
Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?
- WPA2
- WEP
- WPS
- RADIUS
- RADIUS
A computer is infected with a piece of malware that has infected the Windows kernel in an effort to hide itself. Which type of malware MOST likely infected this computer?
- Ransomware
- Trojan
- Rootkit
- Botnet
- Rootkit
Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to “click here” to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?
- Phishing
- Spear phishing
- Whaling
- Brute force
- Phishing
You have been asked to recycle 20 of your company’s old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center?
- Standard formatting of the HDD’s
- Drill/hammer the HDD platters
- Low-level formatting of the HDDs
- Degaussing of the HDDs
- Low-level formatting of the HDDs
Samuel’s computer is taking a very long time to boot up and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?
- Replace the hard drive with a SSD
- Defragment the hard drive
- Install additional RAM
- Remove unnecessary applications from startup
- Terminate processes in the task manager
- Perform a disk cleanup
- Defragment the hard drive
- Remove unnecessary applications from startup
One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to start up?
- Reboot into Safe Mode and see if the service starts
- Run chkdsk on the system
- Restore from backup
- Update the operating system
- Reboot into Safe Mode and see if the service starts
Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process?
- Reboot the system into Safe Mode
- Disable unnecessary programs from automatically starting up
- Reinstall Windows
- Rebuild your Windows profile
- Disable unnecessary programs from automatically starting up
Whenever you reboot your domain controller, you notice it takes a very long time to boot up. As the server is booting, you hear noises that sound like a steady series of clicks coming from the hard drive. Which of the following is the BEST action to help speed up the boot time of the server?
- Defragment the hard drive
- Terminate processes in the Task Manager
- Perform a disk cleanup
- Remove unnecessary applications from startup
- Defragment the hard drive
When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are extremely poor and numerous pop-ups are created by the browser. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first?
- Delete the web browsers cache, temporary files and cookies
- Reset the web browser to the default settings and configuration
- Tell Jonathan to switch to a different web browser
- Uncheck any unapproved applications from startup tab in MSCONFIG
- Reboot Jonathans computer and install a second antivirus program
- Update Jonathans web browser to the latest version
- Reset the web browser to the default settings and configuration
- Uncheck any unapproved applications from startup tab in MSCONFIG
A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system’s web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several antivirus and antimalware programs and determined it is now cleaned of all of the malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated antivirus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?
- Perform a System Restore to an earlier date before the infection
- Install a secondary antimalware solution on the system
- Verify the hosts file has not been maliciously modified
- Reformat the system and reinstall the OS
- Verify the hosts file has not been maliciously modified
The seven steps of the malware removal procedures are : (see answer)
1) Identify and research malware symptoms
2) Quarantine the infected systems
3) Disable System Restore (in Windows)
4) Remediate the infected systems, update the anti-malware software, scan the system, and use removal techniques (safe mode, pre-installation environment)
5) Schedule scans and run updates
6) Enable System Restore and create a restore point (in Windows)
7) Educate the end user
A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses WiFi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?
- Upgrade to a new smartphone
- Increase the Wifi signal being transmitted by their WAP
- Turn off Wi-Fi and rely on their cellular data plan
- Enable MAC filtering on their WAP
- Increase the Wifi signal being transmitted by their WAP
A web server has a planned firmware upgrade for Saturday evening. During the upgrade, the power to the building is lost and the firmware upgrade fails. Which of the following plans should be implemented to revert back to the most recent working version of the firmware on the webserver?
- Backout plan
- Contingency plan
- Alternative plan
- Backup plan
- Backout plan
You are concerned that your servers could be damaged during a blackout or brownout. Which TWO devices have protection against blackouts and brownouts?
- Battery backup
- Surge suppressor
- Grounding the server rack
- Line conditioner
- Battery backup
- Line conditioner
You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal?
- SOW
- MSDS
- MITM
- MOU
- MSDS
Material Safety Data Sheet
Which of the following is considered a form of regulated data?
- PII
- AUP
- DMCA
- DRM
- PII
The four forms of regulated data covered by the CompTIA A+ (220-1002) exam are PII (Personally Identifiable Information), PCI (Payment Card Industry), GDPR (General Data Protection Regulation), and PHI (Protected Health Information)