A+ Core 2 Flashcards
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?
A. Install to a network drive
B. Install to a USB drive
C. Install to a DVD-RW
D. Install to a security internal_HDD
A. Install to a network drive
A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?
A. Rootkit
B. Keylogger
C. Trojan
D. Ransomware
A. Rootkit
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
A. Guest network
B. TKIP
C. Default login
D. Outdated firmware
E. WPS
F. WEP
C. Default login
F. WEP
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?
A. Open license
B. Personal license
C. Corporate license
D. Enterprise license
A. Open license
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)
A. UPS
B. Server rack
C. PoE phone
D. Desktop printer
E. Modem
F. Patch panel
A. UPS
B. Server rack
An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO)
A. Close applications when tasks are completed.
B. Increase the time to dim the screen automatically
C. Increase the frequency for syncing corporate email
D. Set the smartphone display to maximum brightness
E. Connect to the office WiFi network automatically
F. Disable 802 11ac and use mobile data exclusively
A. Close applications when tasks are completed.
D. Set the smartphone display to maximum brightness
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?
A. Activate real-time protection on both antivirus software programs
B. Uninstall one antivirus software program and install a different one
C. Run OS updates
D. Enable the quarantine feature on both antivirus software programs
E. Remove the user-installed antivirus software
E. Remove the user-installed antivirus software
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.
Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
A. Full device encryption
B. Account lock
C. Multifactor authentication
D. Strong password requirements
C. Multifactor authentication
A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?
A. Enable System Restore and create a restore point so no data is lost
B. Educate the user about how to avoid malware in the future
C. Update the antivirus software and run a full system scan
D. Move the infected system to a lab with no network connectivity
D. Move the infected system to a lab with no network connectivity
A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
A. sudo
B. chmod
C. grep
D. pwd
A. sudo
A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue?
A. PSU alarm
B. Humidity alarm
C. Temperature alarm
D. Motion alarm
C. Temperature alarm
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.
Which of the following should the technician have covered previously as part of the original repair?
A. End-user education
B. Pre-installation environment cleaning
C. Disabling of System Restore
D. Infected system quarantine
A. End-user education
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
A. Time Machine
B. Snapshot
C. System Restore
D. Boot Camp
A. Time Machine
Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar.
She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?
A. There is unauthenticated wireless connectivity
B. She has exceeded the data allowance
C. The phone is only 3G capable
D. It is an unrooted phone
E. The SIM card was not activated
F. A data plan was not purchased
A. There is unauthenticated wireless connectivity
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
A. Access control lists
B. Multifactor authentication
C. Organizational unit
D. Trusted software sources
E. Data loss prevention
F. Pre-shared key
B. Multifactor authentication
D. Trusted software sources
Which of the following BEST describes the Guest account on a Windows system?
A. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system.
B. This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software.
C. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones
D. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.
B. This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software.
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
A. 2GB
B. 4GB
C. 8GB
D. 16GB
B. 4GB
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
A. SSO
B. Permission propagation
C. Inheritance
D. MFA
A. SSO
Joe, an end user, has been prompted to provide his username and password to access the payroll system.
Which of the following authentication methods is being requested?
A. Single-factor
B. Multifactor
C. RADIUS
D. TACACS
A. Single-factor
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)
A. Remove applications from startup
B. Defragment the hard drive
C. Install additional RAM
D. Install a faster hard drive
E. End the processes in Task Manager
F. Run the Disk Cleanup utility
A. Remove applications from startup
B. Defragment the hard drive
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed?
A. NTLDR not found
B. No boot device available
C. Operating system not found
D. BIOS ROM checksum error
B. No boot device available
A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?
A. Reset the device’s network settings
B. Check the data usage statistics on the device
C. Verify the SSID with which the device is associated
D. Run any pending application or OS updates
C. Verify the SSID with which the device is associated
Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.
Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)
A. Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop
B. Verify Ann’s laptop has the correct browser settings
C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website
D. Attempt to log on to another vendor’s website from Ann’s laptop
E. Ask Ann about the notification and review the installed programs
F. Reinstall the browser, reboot the laptop, and check the vendor’s website again
C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website
E. Ask Ann about the notification and review the installed programs
Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe’s slow data speeds?
A. Joe’s data transmission is over the limit
B. The phone needs to be rebooted from overuse
C. The use of GPS interferes with data speeds
D. There is unintended Bluetooth pairing
A. Joe’s data transmission is over the limit
A user who is running Windows 10 logs Into a machine and notices that shared drives are missing, the “My Documents* folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?
A. Remove the registry entry and rename the local account folder.
B. Delete or rename the local user folder.
C. Run DISM and re-add the local power user account.
D. Remove the user account In Credential Manager and restart the PC.
D. Remove the user account In Credential Manager and restart the PC.
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with
limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.
When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?
A. grupdate
B. diskpart
C. gpresult
D. net use
A. grupdate
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joe’s phone and sees the following:
Which of the following is the MOST likely cause of the problem?
A. Joe should be using WEP security on his hotspot for faster throughput
B. Someone else is using Joe’s hotspot due to weak password
C. Joe’s hotspot gave him an invalid IP address
D. Joe is likely in a poor signal area and should try another area
B. Someone else is using Joe’s hotspot due to weak password
Which of the following should be enacted to reduce a company’s liability and exposure to a potential lawsuit?
A. Acceptable use policy
B. Incident documentation policy
C. Password compliance policy
D. Change control policy
C. Password compliance policy
A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?
A. The Internet security options have changed
B. The operating system updates have changed
C. The network directory permissions have changed
D. The user account permissions have changed
C. The network directory permissions have changed
A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the “My Documents” folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?
A. Remove the registry entry and rename the local account folder
B. Delete or rename the local user folder
C. Run DISM and re-add the local power user account
D. Remove the user account in Credential Manager and restart the PC
C. Run DISM and re-add the local power user account
A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?
A. Drill
B. Hammer
C. Low-level format
D. Degaussing
D. Degaussing
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP. Which of the following would be the NEXT appropriate act?
A. Promptly notify the administrator’s immediate supervisor
B. Rename the folder on the server, and notify the information security officer
C. Move the folder to another location on the server, and notify the local authorities
D. Ask the owner to move the files from the server to a local computer
A. Promptly notify the administrator’s immediate supervisor
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?
A. Remove the guest account from the administrators group
B. Disable single sign-on
C. Issue a default strong password for all users
D. Require authentication on wake-up
D. Require authentication on wake-up
A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)
A. Reset the user’s browser to default settings
B. Delete the user’s cached images, temporary files, and cookies
C. Reboot the user’s computer and install a secondary antivirus
D. Convince the user to use a different web browser that is currently unaffected
E. Download the update to the user’s web browser of choice
F. Remove any unapproved applications from the user’s startup items
A. Reset the user’s browser to default settings
F. Remove any unapproved applications from the user’s startup items
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.
Which of the following protocols and authentication methods should the technician implement? (Select two.)
A. WPA
B. WPA2
C. WEP
D. TKIP
E. RADIUS
F. Multifactor
G. TACACS
H. SSO
B. WPA2
F. Multifactor
Question #:36
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?
A. Check to ensure the printer selected is the default printer
B. Check the status of the print server queue
C. Cancel all documents and print them again
D. Check that the printer is not offline print mode
B. Check the status of the print server queue
Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?
A. Contact his supervisor so the supervisor can make schedule changes.
B. Move the appoints to the next business day.
C. Reach out to a colleague to assist in completing the jobs.
D. Continue to work on the current call, and get to the others as soon as possible.
B. Move the appoints to the next business day.
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network Which of the following best practices could have prevented the attack?
A. Implementing strong passwords
B. Changing default credentials
C. Disabling AutoRun
D. Removing Guest account
E. Encrypting data
D. Removing Guest account
Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?
A. Files disappearing
B. File permission changes
C. Application crash
D. Too many start items
A. Files disappearing
A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?
A. Image deployment
B. Multiboot configuration
C. In-place upgrade
D. System repair
A. Image deployment
A customer is presuming manager to get things done on time. Which of the following has the project failed to do this case?
A. Follow up with the customer after project completion
B. Mention a positive attitude during the project
C. Disclose project expenses on social media
D. Communicate with the customer clearly
A. Follow up with the customer after project completion
A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?
A. Check the contents of the hosts file
B. Do a System Restore to a date before the infection
C. Rerun the antivirus scan with higher sensitivity
A. Check the contents of the hosts file
Which of the following BEST describes the purpose of an ESD mat?
A. Protects against accidental static discharge
B. Protects against dust/dirt contamination
C. Protects against accidental scratches
D. Protects against accidental water damage
A. Protects against accidental static discharge
Which of the following devices provides protection against brownouts?
A. battery backup
B. surge suppressor
C. rack grounding
D. line conditioner
A. battery backup
Which of the following is a community supported, open source OS used for both services and workstations?
A. IOS
B. Windows 10
C. Linux
D. OS X
C. Linux
A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?
A. Air filters
B. Privacy screens
C. Vacuums
D. ESD mats
A. Air filters
An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?
A. Create a risk analysis report for review
B. Submit a change order for approval
C. Insist the worker accepts the standard desktop
D. Document the request and place the order
B. Submit a change order for approval
A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system Which of the following did the technician forget to do to prevent reinfection?
A. Connect to the network and update the OS with the latest security patches
B. Scan and dean the USB device used to transfer data from the equipment
C. Disable System Restore and remove all restore points from the system
D. Update the local antivirus and set it to scan automatically every evening
D. Update the local antivirus and set it to scan automatically every evening
Which of the following is the MOST secure wireless security protocol?
A. AES
B. WPA
C. WPA2
D. WEP
A. AES
A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?
A. ping
B. nslooking
C. net use
D. ipconfig
B. nslooking
A technician is called to troubleshoot a user’s Windows workstation that fails to boot. The user reports that, after updating the workstation’s graphics driver to a beta version, the machine gives a “Stop” error on every boot Which of the following should the technician complete to resolve the issue?
A. Boot the workstation in safe mode and disable the graphics driver system tray menu
B. Boot the workstation in safe mode with networking and install the latest stable graphics driver.
C. Boot the workstation in safe mode and disable Windows driver signing requirements
D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings
A. Boot the workstation in safe mode and disable the graphics driver system tray menu
Which of the following is the maximum RAM limit of a Windows 32-bit version?
A. no limit
B. 4GB
C. 8GB
D. 32GB
B. 4GB
After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)
A. Screen locks
B. Screensaver passwords
C. UEFI passwords
D. Login time restrictions
E. Strong passwords
F. Multifactor authentication
G. BitLocker
H. Credential Manager
I. Smart card
J. Biometric authentication
A. Screen locks
B. Screensaver passwords
G. BitLocker
A user reports that a cell phone application is loading slowly and not functioning properly Which of the following should a technician do FIRST to remedy this issue?
A. Remove and reinstall the application.
B. Hard reset the cell phone.
C. Reconnect the wireless network connection
D. Close all running applications
B. Hard reset the cell phone.
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk perform to fix the issue?
A. Remote into Ann’s system and restart the wireless adapter
B. Ask Ann to open a browser and watch for a redirect page
C. Advice Ann to pug an Ethernet cable into her laptop
D. Direct Ann to run an antivirus program on her laptop
B. Ask Ann to open a browser and watch for a redirect page
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have
protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user’s request? (Select TWO)
A. MAC filtering
B. Default SSID
C. Ratio power levels
D. Content filtering
E. Physical security
B. Default SSID
E. Physical security
Which of the following is considered government-regulated data?
A. PII
B. End-user license agreement
C. Digital Millennium Copyright Act
D. DRM
A. PII
With which of the following types is a man-in-the-middle attack associated?
A. Brute force
B. Spoofing
C. DDoS
D. Zero-day
B. Spoofing
A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?
A. RDP
B. SSH
C. TFTP
D. HTTP
B. SSH
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
A. WPA2
B. AES
C. MAC filtering
D. RADIUS
E. WPS
D. RADIUS
Corporate management is concerned about the security of the company’s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
A. Use full device encryption
B. Enable a pattern lock
C. Implement remote wipe features
D. Use device lockout policies
E. Require complex administrator passwords
F. Disable unknown application installations
A. Use full device encryption
C. Implement remote wipe features
A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?
A. Component Services
B. System Configuration
C. Security Policy
D. Local Users and Groups
D. Local Users and Groups