A+ Flashcards
Order these technologies from lowest throughput to highest:
A. SATA revision 3.0 B. Satellite Networking C. USB 3.0 D. One stream of 802.11ac E. 1000BASE-T
lowest to highest
B. Satellite networking: 50 Mbit/s D. One stream of 802.11ac: 866.7 Mbit/s E. 1000BASE-T 1Gbit/s C. USB 3.0 5 Gbit/s A. SATA revision 3.0 6 Gbit/s
Each time a computer starts, it shows a date and time error. Which of the following would be the most likely reason for this issue.
A. Certificate error B. Incorrect time zone setting C. Bluetooth not connected D. Bad motherboard battery E. Network disconnected
D. Bad motherboard battery
A smartphone has been configured to retrieve email messages over tcp/110. which of the following would most likely be using this configuration?
A. SMTP B. POP3 C. outlook.com D. S/MIME E. IMAP4
B. POP3
Which of the following would be there best way to create a wire map of an ethernet cable?
A. Multimeter B. Loopback plug C. Punch-down tool D. WiFI analyzer E. Crimper
A. Multimeter
- checks ac voltage
- dc voltage
- continuity
- one probe on a cable on one side, and the other end on the other side. If it makes a noise, those wires are connected
- can easily create a wire map with how the wire goes all the way through
- pin to pin connections
A system admin has connected an external USB drive to a computer to transfer some documents. When booting the computer, the system tries to boot from the external drive and gives an error message. Which of the following would be the BEST way to prevent the USB drive from booting?
A. Modify the BIOS to boot from the internal hard drive
B. Modify the boot order in Windows Disk management
C. Rebuild the MBR on the external hard drive
D. Disable the external drive in Device Manager
A. Modify the BIOS to boot from the internal hard drive
The boot order is managed in the system BIOS, and one way to avoid the computer from attempting to boot from an external storage device is to move the internal driver to have a higher boot priority.
What type of storage would include both a spinning drive and memory
A. SSD B. EEPROM C. NVMe D. Blu-ray E. SSHD
E. SSHD
Which of the following is used to manage a virtual machine platform and guest operating systems?
A. UEFI BIOS B. Hypervisor C. Resource Pooling D. SaaS E. Emulator
B. Hypervisor
- virtual machine manager
- manages the virtual platform and guest operating systems
- may require a cpu that supports virtualization
- hardware management
- cpu
- networking
- security
A system administrator is configuring an IoT device using a direct wireless connection to the device. Which of the following would describe this connection?
A. 802.1X B. Bonjour C. Centronics D. TIA 568B E. Ad hoc
E. Ad hoc
- when you do not have an access point you need to communicate directly to the device
- IoT
- no keyboard input on a garage door opener
List the protocol (tcp or udp) and the port number:
A. Automatically assign an IP address (two ports)
B. Retrieve an email to a mobile phone using POP3
C. Resolve the IPD address of www.professormesser.com
D. Manage the console of a remote device (insecurely)
E. Control the mouse on a remote Windows computer
A. DHCP UDP/67 and UDP/68 B. TCP/110 POP3 C. UDP/53 (DNS) D. Telnet TCP/23 E. TCP 3389 (RDP)
A user is not able to send emails from their mobile phone. Which of the following would be the MOST likely problem?
A. IMAP4 B. SMB C. SMTP D. POP3 E. AFP
C. SMTP
- Simple mail transfer protocol
- Send mail from a device to a mail server
- or between mail servers
- you usually must send from a local or trusted device
- Authentication usually required
- may be different credentials than the incoming mail
- port numbers
- SMTP (no authentication, relatively unused): tcp/25
- SMTP with authentication: tcp/587
A hospital uses a wireless network using 2.4 GHz with a maximum throughput of 54 Mbit/s. Which standard is the hospital using?
A. 802.11a B. 802.11b C. 802.11g D. 802.11n E. 802.11ac
C. 802.11g
- an “upgrade to 802.11b
- june 2003
- operates in the 2.4 GHz range
- 54 megabits per second (Mbit/s)
- same as 802.11a (but a little bit less throughput)
- backwards compatible with 802.11b
- same frequency conflict problems as 802.11b
A user has powered on their computer and received the message “Operating system not found.” A check of the system shows that the hard drive cables are properly connected. Which of the following would be the NEXT best troubleshooting step?
A. Boot to safe mode
B. Replace the boot drive
C. Restore from a known good backup
D. Check for removable drives
D. Check for removable drives
-If a USB storage device is connected to a computer and the BIOS is checking USB devices before the primary storage drive, the “operating system not found” error could appear with some USB devices. To avoid this error, the boot order in the BIOS can be changed, or the USB device can be disconnected during the boot process and reconnected after the operating system has started.
Which of these technologies is used by ECC to identify errors?
A. Striping B. Multi-channel C. DDR D. Mirroring E. Parity
E. Parity
- even parity
- the parity bit makes an even number
- see parity in notes for graphic chart with numbers
Which of these cloud models provides only CPU, storage, memory, and network access?
D. IaaS
- infrastructure as a service
- sometimes called hardware as a service (HaaS)
- outsource your equipment
- you’re still responsible for the management
- and security
- your data is out there, but more within your control
- Web server providers
A drive in RAID 1 array has failed. Which of the following would return the array to a fully operational state?
A. Replace all drives and restore from backup
B. Replace the bad drive and resync
C. Replace all drives and resync
D. Replace the bad drive and restore from backup
B. replace the bad drive and resync
A phone has received a tower update over the existing cellar network connection. Which of the following would BEST describe this update?
A. PRL B. IMEI C. iOS D. IMSI E. PRI
A. PRL
- phone updates
- preferred roaming list
- CDMA networks (i.e., Verizon, sprint)
- allows your phone to connect to the right tower
- can be updated over the air (OTA)
A company is using pre-built modules on a cloud service provider to create a customer inventory application. Which of the following would BEST describe this implementation?
A. IaaS B. Peer-to-peer C. SaaS D. Hybrid E. PaaS
E. PaaS
- platform as a service
- no servers, no software, no maintenance team, no HVAC
- someone else handles the platform, you handle the development
- you don’t have direct control of the data, people, or infrastructure
- trained security professionals are watching your stuff
- put the building blocks together
- develop your app from what’s available on the platform
- salesforce.com
A user is authenticating to a VPN concentrator. Which of the following ports would be MOST likely be used?
A. tcp/389 B. tcp/548 C. tcp/22 D. tcp/3389 E. udp/161
A. tcp/389
- LDAP (lightweight directory access protocol)
- store and retrieve information in a network directory
- commonly used in Microsoft active directory
A system admin is configuring an IoT device using a direct wireless connection the device. Which of the following would describe this connection?
A. 802.1x B. Bonjour C. Centronics D. TIA 568B E. Ad hoc
E. Ad hoc
- wireless device sharing
- ad hoc mode
- no access point
- direct link between wireless devices
When a user starts their computer, the screen remains blank and the computers beeps twice. Which of these would be the most likely cause of this issue?
A. The boot device is not connected
B. The memory is faulty
C. The operating system has become corrupted
D. The PC is infected with malware
B. The memory is faulty
-The POST (power on self test) is the initial hardware check that occurs during the startup process. If a major hardware component is faulty, the computer will beep and a message will be displayed on the screen. If the issue is related to a critical component, the computer will not be able to display a message on the screen and instead will beep a certain number of times as a code to specify the error
A cloud application is designed to add and remove resources as the load changes. Which of the following would describe this characteristic?
A. Fault tolerant B. Rapid elasticity C. Metered D. community E. Resource pooling
B. Rapid elasticity
- scale up and scale down as needed
- seamless to everyone
A user is sending a job to the printer, but the printer is not responding to any print requests. Which of the following would be the first step when troubleshooting this issue?
A. Update the printer driver B. Perform a test print from the printer C. Change the printer configuration from PostScript to PCL D. Replace the fuser E. Upgrade the printer firmware
B. Perform a test print from the printer
A system admin has upgraded a system by replacing a single memory module with two separate modules. Which of the following would describe this upgrade?
A. Multi-channel B. RAID 1 C. Multi-core D. ECC E. Hyper-threading
A. Multi-channel
- Memory module = RAM stick
- single channel to dual-channel upgrade
Sort these technologies from lowest throughput to highest:
A. One stream of 802.11n B. SATA revision 2.0 C. Thunderbolt v3 D. 100BASE-T E. USB 3.0
D. 100BASE-T: 100 Mbps/sec A. One stream of 802.11n: 150Mbps/sec B. SATA revision 2.0: 3 Gbps/sec E. USB 3.0: 5 Gbps/sec C. Thunderbolt v3: 40 Gbps/sec
Which of the following would be MOST likely used in a warehouse for tracking and locating pallets of inventory?
A. Bluetooth B. 802.11 C. RFID D. Zigbee E. NFC
C. RFID
- It’s everywhere
- access badges
- inventory/assembly line tracking
- pet/animal identification
- anything that needs to be tracked
Which of the following customer computer systems would require the MOST amount of memory?
A. Thin client B. Graphics editing C. Network attached storage D. Thick client E. Virtualization workstation
E. Virtualization workstation
- MAX RAM!!!
- Every OS needs its own memory
- it adds up quickly
- Max CPU cores
- constant processing
- need an efficient CPU
- most virtualization apps
- most virtualization app can use multiple cores
The printer in the accounting department has stopped all printing processes. The print queue shows that there are seven jobs in the queue that are waiting to be printed. Which of the following would be the BEST next troubleshooting step?
A. Send a test job to the printer and move it to the top of the queue
B. Restart the printer’s spooler
C. Install an updated version of the printer driver
D. Delete everything in the queue and resend the print jobs
B. Restart the printer’s spooler
-the print spooler is the software responsible for storing print jobs and sending them to the printer. If the printer spooler has failed or has stopped, then none of the print jobs will be sent to the printer
A company is using pre-built modules on a cloud service provider to create a custom inventory application. Which of the following would BEST describe this implementation?
A. IaaS B. peer-to-peer C. SaaS D. Hybrid E. PaaS
E. PaaS
•No servers, no software, no maintenance team, no HVAC
•someone else handles the platform, you handle the development
•you don’t have direct control of the data, people, or infrastructure
•Put the build blocks together
•develop your app from what’s available on the platform
A user has just received a new laptop, but the display appears fuzzy and not as sharp as an external LCD monitor. Which of the following would be the most like cause of this issue?
A. Incorrect resolution B. Bad inverter C. Incorrect BIOS configuration D. fast startup is enabled E. Bad video cable
A. Incorrect resolution
- flickering, color patterns incorrect
- you can almost work with this
- check the cable pins
- especially if missing a color
- Distorted image and geometry
- check the OS refresh rate and resolution settings
- need to match the display specs
- native res is important on LCD displays
Four business associates are connecting to the internet using the wireless connection of a single mobile phone. Which of the following would describe this connection type?
A. Tethering B. Lightning C. USB hub D. Hotspot E. Thunderbolt
D. Hotspot
- turn your phone into a WiFi hotspot
- your own personal wireless router
- extend the cell data network to all of your devices
- dependent on phone type and provider
A user’s application makes changes to a router configuration while the application is active. Which of the following describes this functionality?
A. P2P B. NAT C. UPnP D. MAC filtering E. WPA2
C. UPnP
•Allows network devices to automatically configure and find other network devices
• zero configuration
•Applications on the internal network can open inbound ports using UPnP
•No approval needed
•Used for many peer-to-peer (P2P) applications
A network outage has taken the DHCP server offline. Which of the following could be assigned to local devices?
A. 169.254.77.250 B. 192.168.101.88 C. 10.54.177.68 D. 172.16.120.121 E. 127.0.0.120
A. 169.254.77.250 - look for 169 if you’re offline
Automatic private ip addressing (APIPA)
•a link-local address
•no forwarding by routers
•IETF has reserved 169.254.0.0 through 169.254.255.255
•first and last 256 addresses are reserved
•functional block of 169.254.1.0 through 169.254.254.255
•Automatically assigned
•Uses ARP to confirm the address isn’t currently in use
A network connection in a conference room was installed years ago, and there’s no documentation for the cable run. Connecting a device to the cable results in a successful Ethernet connection, so the other end of the cable should terminate somewhere in the wiring closet. Which of these tool would be the BEST choice to find the other end of the network connection?
A. Cable tester
B. Tone generator
C. Multimeter
D. Crimper
B . Tone generator
• A tone generator is used to produce an analog tone on the cable, and an inductive probe is used to “listen” for the tone on the other end of the cable.
Which of the following BEST describes the software that manages virtual machines?
A. BIOS B. SaaS C. VDI D.Cache E. Hypervisor
E. Hypervisor •Virtual machine manager •manages the virtual platform and guest operating systems •May require a CPU that supports virtualization •can improve performance •Hardware management •cpu •networking •security
A network admin is installing a RAID 10 array. What is the minimum number of drives required to build this array? A. 2 B. 3 C. 4 D. 8 E. 10
C. 4
A user would like to send and recieve Gmail messages from their mail client instead of a browser. Which of the following would provide this functionality?
A. IMAP B. SNMP C. HTTPS D. RDP E. LDAP
A. IMAP
Which of the following might be used to provide connectivity to an iOS device? Pick TWO.
A. USB-C B. Thunderbolt C. USB Micro-B D. Lightning E. USB type B
A. USB-C
D. Lightning
Match these network protocols to their function (not all functions will be used)
- FTP
- Telnet
- DNS
- SMB
A. Print to a shared windows printer
B. Determine the IP address of profesormesser.com
C. Authenticate a login to a VPN concentrator
D. Transfer mail between two organizations
E. View the terminal of a remote device
F. Encrypt all communication in a browser
G. Transfer a file from Windows to Linux
- G
- E
- B
- A
extra credit C. LDAP
D. SMTP
F. HTTPS
A network administrator has configured a RAID array with two drives that contain identification information. Which of the following describes this RAID type.
A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 10 E. RAID 11
B. RAID 1 •File blocks are duplicated between two or more physical drives -great for redundancy -every file is duplicated -required disk space is doubled
An accounting department processes the company payroll by logging into a third party website and adding the employee work hours. Which if the following would BEST describe this system?
A. PaaS B. HaaS C. SaaS D. DaaS E. IaaS
C. SaaS
•On-demand software
•no local installation
•Why manage your own email distribution, or payroll?
During normal operations, the fans in a computer become progressively louder before the system abruptly powers off. Which of the following would be the most likely cause of this issue?
A. Bad capacitor B. Faulty RAM C. Overheating D. Faulty SSD E. Network congestion
C. Overheating
A user has requested a port replicator for their laptop. Which of the following would be the MOST likely reason for this request?
A. Connect to a wireless printer B. Enable cloud file sync C. Add USB interfaces D. Improve network throughput E. Increase total RAM
C. Add USB interfaces
•similar to docking station
•does not commonly have an expansion card
Which of the following would be the best choice for a video editing workstation? A. SSD B. High-end cooling C. Gigabit NIC D. TV tuner E. RAID array
A. SSD
A client computer is not able to properly resolve an IP address. Which of the following tools would be the BEST for troubleshooting this issue?
A. nslookup
b. netstat
c. traceroute
d. ping
A. nslookup
Match the function to the windows utility. Some utilities will not have a match.
- Locate an app error message from two days ago
- Identify high CPU utilization across a 24 hour period
- Disable the print spooler
- Validate a RAM module upgrade
A. Memory diagnostics B. Print management C. Event viewer D. Local users and groups E. Services F. Performance monitor G. Device manager
- C
- F
- E
- A
Which of the following would be considered a method of certificate-based authentication?
A. CAC B. Token generator C. Fingerprint D. GPS coordinates E. PIN
A. CAC
-common access card
An application has stopped working after a recent update. Which of the following would be the best FIRST step to resolve this issue?
A. Reinstall windows B. Recover from a known good backup C. Run SFC D. Run an application repair E. Disable all startup services
D. Run an application repair
- application issues
- problems with app files or configurations
Which of these would be the BEST way to protect a user's credit card info? A. PCI DSS B. GDPR C. PHI encryption D. Hashing
A. PCI DSS
- payment card industry data security standard (PCI DSS)
- standard for protecting credit cards
- 6 control objectives
Which of the following will launch windows 10 safe mode during boot?
A. Restart from Task Manager B. Hold shift while clicking restart C. Press F1 while booting D. Update the BIOS boot order E. Rename the Windows profile
B. Hold shift while restarting
From the command line, determine the PID for winlogin.exe
> tasklistPID
A technician has replaced the batteries in a UPS. Which of the following would be the BEST source of disposal information?
A. EULA B. SDS C. MDF D. NDA E. BIOS
B. SDS
-(MSDS) Material Safety Data sheets
A system admin needs to update the drivers in a windows image file. Which of the following would be the BEST choice for this task?
A. nslookup B. sfc C. dism D. gpupdate E. robocopy
C. dism
•deployment Image Servicing and Management
-Manage Windows imaging format (WIM) files
Disable a group of Active Directory Accounts
A. PowerShell B. Javascript C. VB Scripting D. Python E. Shell Script
A. PowerShell
Modify a web page based on the client device
A. Python B. Shell Script C. JavaScript D. VB scripting E. PowerShell
C. Javascript
Modify Formulas in a group of spreadsheets
A. VB scripting B. Python C. JavaScript D. PowerShell E. Shell script
A. VB scripting
add a new security policy to a firewall
A. Javascript B. Python C. Shell script D. Powershell E. VB Scripting
B. Python
Perform a periodic backup of a Linux web server
A. JavaScript B. Shell script C. PowerShell D. Python E. VB scripting
B. Shell script
Which of these UE regulations allows users to control their personal data?
A. HIPAA B. GDPR C. DRM D. PCI DSS E. EULA
B. GDPR
•EU regulation
•data protection and privacy for individuals in the EU
A desktop tech needs to confirm the version and edition of a Windows 10 desktop. Which of the following control panel applets would be the BEST choice for this task?
A. User Accounts B. System C. Device manager D. Performance settings E. Programs and features
B. System
•Computer information
•including version and edition
A user has modified their MAC address to gain access to a wireless network. Which of the following would BEST describe this attack type/
A. Social engineering B. Spoofing C. Zero-day D. Brute force E. Denial of service
B. Spoofing
A system admin suspects that malware may be installed on a user’s workstation. Which of the following would be the BEST next step in the malware removal process?
A. Disable System restore B. Educate the end user C. Boot into Safe Mode D. Quarantine the infected system E. Update the anti-malware signatures
D. Quarantine the infected system
George, a sales manager, has recently replaced a broken mobile phone with a newer version. After receiving the new phone, he restored all of his apps and data from a recent backup. However, when he attempts to download any new email messages he receives a message, “Unable to decrypt email”. Which of the following steps should a tech follow to resolve this issue?
A. Install the latest operating system patches
B. Delete the email app and reinstall
C. Restart the phone
D. Install the user’s private keys
D. Install the user’s private keys
•A user’s private keys are used to decrypt any messages that have been encrypted with the corresponding public keys. Install these private keys onto the mobile device will allow the user to view their encrypted email messages
Which of the following remote access technologies would be considered least secure? A. RDP B. SSH C. Telnet D. IPsec E. VNC
C. Telnet
•SSH is what you should be using instead
A windows 10 workstation contains a share name ending in a dollar sign. Which of the following would best describe this share?
A. Publicly writable B. Available on the local device C. Contains encrypted files D. administratively hidden E. A shared printer
D. Administratively hidden
•Hidden shares (i.e., C$) created during install
-local shares are created by users
Match the Linux utility to the description
A. Change the login credentials for a specific user
B. Create a disk image of a Linux partition
C. View the process ID for an application
D. Install a specific utility
- apt-get
- sudo
- vi
- chmod
- ps
- passwd
- dd
A. passwd
B. dd
C. ps
D. apt-get
What Linux utility would you use to change the login credentials for a specific user?
passwd
Which Linux utility would you use in order to create a disk image of a linux partition?
dd
Which Linux utility would you use in order to view the process ID for an app?
ps
Which Linux utility would you use in order to to install a specific utility?
apt-get
A help desk tech needs to view and modify info on a linux desktop. Which of these would be the best way to provide this functionality?
A. RDP B. Telnet C. PowerShell D. VNC E. SSH
D. VNC (virtual network computing)
- remote frame buffer (RFB) protocol
- linux version of RDP
Where are CA certificates stored on a macOS system?
A. iCloud B. Spotlight C. Mission Control D. Finder E. Keychain
E. Keychain •Passwords, notes, certificates •Integrated into the OS •Passwords and Secure Notes are encrypted with 3DES •Login password is the key
A network admin would like to require authentication to the Active Directory database before a user can connect to the wireless network. Which of these technologies would be the BEST choice for this requirement?
A. 802.1X B. TKIP C. AES D. WPA2 E. CCMP
A. 802.1X
A windows app has crashed, but the user did not make a note of the error message. Which of these would provide additional information about the crash?
A. Task manager B. Defender C. Event viewer D. BOOTREC E. Device manager
C. Event viewer
A windows admin would like to test the audio output on a user’s laptop. Which of the following would be the BEST way to perform this test?
A. mstsc B. dxdiag C. msinfo32 D. regedit E. services.msc
B. dxdiag
- DirectX diagnostic tool
- Multimedia API
- 3d graphics, audio, input options
Match the windows utility to the description
A. Repair logical file system errors
B. Modify Windows Imaging Format files
C. Push policy settings to a computer or user
D. Duplicate files across servers
- sfc
- format
- gpupdate
- dism
- shutdown
- chkdsk
- robocopy
A. chkdsk: even checks all parts of spinning drive to make sure all sectors are good
B. dism: functions that can help you add/remove/modify/manage image files
C. gpupdate: global policy updates; managed with this and other gp utilities
D. robocopy:
Which of the following is the last step in the malware removal process
A. Enable System Restore B. Download signature and engine updates C. Educate the end user D. Quarantine infected systems E. Scan and remove malware
C. Educate the end user
Which of the following scripting languages would be the BEST choice for managing Windows 10 workstations on an active directory domain?
A. VBScript B. Python C. Shell scripts D. Javascript E. PowerShell
E. PowerShell
A windows system admin would like to create a report showing the available drive space on a computer sampled every 15 minutes for two days. Which of the following would be the BEST way to provide this report?
A. Performance Monitor B. Disk management C. Task Manager D. Services E. Reliability monitor
A. Performance monitor
•Gather long-term stats
•control panel / admin tools
Which of the following would be the BEST way to prevent unauthorized logins to a tablet computer?
A. Full device encryption B. Frequent Patching C. Biometrics D. Run an anti-virus app E. Enable cloud-based backups
C. Biometrics
Put these malware removal best practices in order:
A. Quarantine infected systems B. Schedule scans and run updates C. Educate the end user D. Disable system restore E. Identify malware symptoms F. Remediate G. Enable system restore
E. Identify malware symptoms A. Quarantine infected systems D. Disable system restore F. Remediate B. Schedule scans and run updates G. Enable system restore C. Educate the end user
After that, nuke it all and start fresh with a known good backup
Which of the following would be the BEST way to manage a group of one hundred Windows 19 computers?
A. Workgroups B. RDP C. Safe mode D. Active directory E. SSH
D. Active directory
- Windows networks can be centrally managed
- Active directory domain services (AD DS)
- create and delete accounts
- add and remove users to/from domain
- reset passwords and unlock accounts