A+, Core 2, Practice Test 1 Flashcards
A technician has been tasked with removing malware from a desktop computer. Arrange these malware removal tasks in the correct order to successfully remove the malware.
Identify malware symptoms
Quarantine infected systems
Disable System Restore
Remediate
Schedule scans and run updates
Enable System Restore
Educate the end user
A technician has recently removed malware from a Windows computer, but the technician is concerned that some of the system files may have been modified. From the command line, analyze and repair any damaged operating system files.
The sfc (System File Checker) utility will scan the integrity of all protected system files and replace any files that may be corrupted.
Match the technology with the description. Some descriptions will not have a match.
A user needs to access a file located on the \gate-room server. The file is located in a share called ship-diagnostics. Use the command line to connect to this share using drive g:.
The Windows net use command is used to map a network share to a drive letter. The syntax is:
net use drive: \<servername>\<sharename></sharename></servername>
For example, if you want to map a network drive to drive letter Z and connect to a shared folder named “SharedFolder” on a computer named “Server1” with the username “user1” and password “password123”, the command would be:
net use Z: \Server1\SharedFolder /user:user1 password123
***Remember to replace “Server1”, “SharedFolder”, “user1”, and “password123” with your actual server name, shared folder name, username, and password.
Match the commands to the description. Some descriptions will not have a match.
The motherboard of a server in the corporate data center has started smoking, and flames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this fire?
❍ A. Water-based extinguisher
❍ B. Foam-based extinguisher
❍ C. Disconnect the power
❍ D. Carbon dioxide extinguisher
The Answer: D. Carbon dioxide extinguisher
For an electrical fire, it’s best to use carbon dioxide, FM-200, or other dry chemicals to extinguish any flames.
The incorrect answers:
A. Water-based extinguisher
Water and electricity don’t go well together, and that applies just as strongly if a fire is involved.
B. Foam-based extinguisher
Foam-based extinguishers have a similar effect as a water extinguisher, and you shouldn’t use them with electrical equipment.
C. Disconnect the power
Although it’s important to disconnect the power source, the more important task will be to put out the fire. Removing the power source would not extinguish an electrical fire once it has started.
A user on the headquarters network has opened a help desk ticket about their Windows desktop. When starting their computer, the login process proceeds normally
but the Windows desktop takes fifteen minutes to appear. Yesterday, the desktop would appear in just a few seconds. Which of the following would be the MOST likely reason for this issue?
❍ A. Slow profile load
❍ B. Incorrect boot device order
❍ C. Faulty RAM
❍ D. Incorrect username and password
The Answer: A. Slow profile load
A roaming user profile is commonly used on enterprise Windows networks to allow a user’s desktop to follow them to any computer. When a user logs in, their profile is downloaded to the local computer. If there is any network latency to the domain controller, the login process could be significantly slower.
The incorrect answers:
B. Incorrect boot device order
A BIOS setting of an incorrect boot device order would cause the computer to boot a completely different operating system or no operating system at all. This would not be associated with a slow login process.
C. Faulty RAM
Faulty RAM would cause the system to fail or crash. Bad RAM would not commonly cause a login process to perform slowly.
D. Incorrect username and password
Incorrect login credentials would present an error message instead of slowing down the login process.
A Linux administrator needs to modify the configuration text file for a service. Which of the following utilities would provide this functionality?
❍ A. nano ❍ B. chmod ❍ C. df
❍ D. sudo
The Answer: A. nano
The nano utility is a full-screen text editor that can be used from the command line of a Linux device.
The incorrect answers:
B. chmod
The chmod (Change Mode) utility is used to modify the read, write, or execution permissions of an object in the Linux file system.
C. df
The df (Disk Free) utility provides a view of available filesystems and the free disk space in each filesystem.
D. sudo
The sudo command allows a Linux user to execute a command as the superuser or as any other user on the system. The sudo command on its own does not provide any backup or imaging functionality.
A network administrator has configured all of their wireless access points with WPA3 security. Which of the following technologies would be associated with this configuration?
❍ A. RC4
❍ B.TACACS
❍ C.TKIP
❍ D. GCMP
The Answer: D. GCMP
WPA3 (Wi-Fi Protected Access version 3) uses GCMP (Galois/Counter Mode Protocol) to provide encryption of all wireless data.
The incorrect answers:
A. RC4
The first version of WPA used RC4 (Rivest Cipher 4) to encrypt wireless traffic.
B. TACACS
TACACS (Terminal Access Controller Access-Control System) is an authentication protocol used to control access to network resources. TACACS is not part of the WPA2 protocol.
C. TKIP
TKIP (Temporal Key Integrity Protocol) is the underlying security protocol used in the initial WPA encryption standard.
A network administrator has configured all of their wireless access points with WPA3 security. Which of the following technologies would be associated with this configuration?
❍ A. RC4
❍ B.TACACS
❍ C.TKIP
❍ D. GCMP
The Answer: D. GCMP
WPA3 (Wi-Fi Protected Access version 3) uses GCMP (Galois/Counter Mode Protocol) to provide encryption of all wireless data.
The incorrect answers:
A. RC4
The first version of WPA used RC4 (Rivest Cipher 4) to encrypt wireless traffic.
B. TACACS
TACACS (Terminal Access Controller Access-Control System) is an authentication protocol used to control access to network resources. TACACS is not part of the WPA2 protocol.
C. TKIP
TKIP (Temporal Key Integrity Protocol) is the underlying security protocol used in the initial WPA encryption standard.
A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST?
❍ A. Remove the existing memory modules
❍ B. Wear an air filter mask
❍ C. Disconnect all power sources
❍ D. Connect an ESD strap
The Answer: C. Disconnect all power sources
The first step when working inside of a computer or printer is to remove all power sources.
The incorrect answers:
A. Remove the existing memory modules
Prior to removing the existing modules, the power source would need to be disconnected and an ESD (Electrostatic Discharge) strap attached to the computer case.
B. Wear an air filter mask
A filtered mask would not commonly be required for replacing memory modules. If the environment is very dusty or dirty, then a filtered mask may be necessary.
D. Connect an ESD strap
An ESD strap would allow the technician to minimize the potential of an electrostatic discharge. However, disconnecting the power source takes a higher priority.
A system administrator is configuring a server to use eight bootable partitions on a single SSD. Which of the following partition styles would be the BEST choice for this configuration?
❍ A. MBR ❍ B. NTFS ❍ C. diskpart ❍ D.GPT
The Answer: D. GPT
The GPT (GUID Partition Table) partition style allows for up to 128 separate bootable partitions.
The incorrect answers:
A. MBR
The MBR (Master Boot Record) partition style provides a maximum of four bootable primary partitions per drive.
B. NTFS
NTFS (NT File System) is a file system designed for Windows computers. Although a system may store files using NTFS, the partition style containing the NTFS file system would determine the maximum number of supported partitions.
C. diskpart
The diskpart utility is a command line option for managing partition styles and bootable configurations. Although diskpart can be used to configure a partition style, the diskpart utility itself is not a partition.
A user working from home is not able to print to a laser printer at the corporate office. Which of the following would be the MOST likely reason for this issue?
❍ A. WPA3 settings
❍ B. Outdated anti-virus signatures
❍ C. Disconnected VPN
❍ D. MDM configuration
The Answer: C. Disconnected VPN
Remote users will commonly connect to the corporate office over a VPN (Virtual Private Network). This VPN is an encrypted tunnel and all traffic between the locations is protected from anyone monitoring the connection. If the VPN link is not active, then the remote user will be unable to use any resources at the corporate office.
The incorrect answers:
A. WPA3 settings
WPA3 (Wi-Fi Protected Access 3) is a standard for wireless encryption and security. WPA3 would not be involved in a printing problem across a VPN to a corporate office.
B. Outdated anti-virus signatures
Anti-virus signatures would not commonly restrict the printing process, and the age of the signatures would only affect the ability of the anti-virus software to block known viruses.
D. MDM configuration
An MDM (Mobile Device Manager) is used to manage mobile tablets and phones. MDM configurations would not commonly have an impact on home users connecting to a corporate printer.
An employee has modified the NTFS permissions on
a local file share to provide read access to Everyone. However, users connecting from a different computer do not have access to the file. Which of the following is the reason for this issue?
❍ A. The NTFS permissions were not synchronized
❍ B. Share permissions restrict access from
remote devices
❍ C. The user is an Administrator
❍ D. Remote users are connecting with Guest accounts
The Answer: B. Share permissions restrict access from remote devices NTFS (NT File System) permissions are used to control access from both local users and users over the network. For users connected over the network, the Windows share permissions are also used to determine access. If access is available locally but not across the network, then it’s likely that the share permissions include additional access restrictions.
The incorrect answers:
A. The NTFS permissions were not synchronized
NTFS does not require any permissions to be synchronized or copied between systems.
C. The user is an Administrator
A Windows Administrator would not commonly be restricted from accessing local files, but this issue is not related to the local NTFS permissions. Since the access problems are for users across the network, the share permissions would most likely be the issue.
D. Remote users are connecting with Guest accounts
All remote access is managed through Windows share permissions. These share permissions, combined with the NTFS permissions, determine the rights that remote users will have to the resources.
A network administrator needs to manage a switch and firewall in the local data center. Which of the following would be the BEST choice for this requirement?
❍ A. RDP ❍ B.VPN ❍ C. SSH ❍ D. VNC
The Answer: C. SSH
SSH (Secure Shell) provides encrypted console communication, and it’s commonly used to manage devices across the network. If an administrator is managing a server, switch, router, or firewall, they’re probably using SSH.
The incorrect answers:
A. RDP
Microsoft RDP (Remote Desktop Protocol) is commonly used to share the desktop of a Windows computer. Most switches and firewalls are not Windows devices, so RDP would not be the best choice for this connection.
B. VPN
A VPN (Virtual Private Network) is required when connecting to a remote site over an encrypted tunnel. In this example, the technician is connecting to devices in a local data center.
D. VNC
VNC (Virtual Network Computing) is a screen sharing technology common to many non-Windows operating systems. If a technician is sharing the screen of a macOS or Linux desktop, they may be using VNC.