A+ Study Questions Flashcards
What allows a user to download from a vendor’s website and select the correct path for their device’s make and model?
Firmware updates
A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?
Gaming
A threat actor uses a technique that instills statements through an unfiltered user response. What is this technique?
SQL injection
An endpoint machine administrator configures specific Apple computers designated for users with disability. Where should the administrator look to configure these settings?
Accessibility
A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?
Port forwarding
A technician uses a method where each server is configured with a public / private encryption key pair and identified by a host key fingerprint. What is this method?
SSH
What group has complete privilege control over a system?
Administrator
A company uses a method that restricts its employees from messing with their computer settings. What is this method called?
BIOS
A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?
Electrical fire safety
What technique is used on hard drives that reset them to factory condition and the hard drives only contain the information necessary to interact with a file system?
Low-level formatting
A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity, however. What type of program is this?
Terminal
Many mobile apps collect location data. Rogue apps could use location data for criminal purposes, such as burglary. However, many legitimate apps also track a mobile user’s location. Why would a legitimate app have interest in a user’s location?
Targeted advertising
A user experience issues searching their local computer for files. What is a common issue that the user should check?
Indexing options
A pet store owner receives an email from their bank account with a special financing offer. The owner clicks on the attachment, but it does not open. Later that day, when the owner returns to their computer, it is running very slowly and will not connect to the internet. By the time the IT consultant arrives, the computer has locked up. Which of the following is the best action for the IT consultant given the existing conditions?
Run an antivirus scan
Which of the following extensions combines a scripting language with hundreds of prebuilt modules called cmdlets that can access and change most components and features of Windows and Active Directory components and features?
.ps1
While browsing the internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?
Unwanted notifications start popping up in Windows.
A user notices that their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposals is this?
Battery
What technique is often used to exhibit fake antivirus and security warnings or other malicious advertising?
Pop-ups
An IT professional helps fix their friend’s computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?
RDP
A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity. What type of program is this?
Terminal
A server administrator tests connectivity between two statically assigned servers in a forest with different domains. What should they check first in this case?
DNS settings
A technician is implementing a Linux shell script that each statement comprising the actions that the script will perform is then typically added on separate lines. Which of the following is this?
.sh
A user experiences issues searching their local computer for files. What is a common issue that the user should check?
Indexing options
A Windows client administrator plans to upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?
User training
What method gets a system back up and running before the recommended amount of time elapses?
Rollback plan
A server administrator notices a file server starting to run low on space. The administrator wants to create extra space before all space is used up and even worse issues arise. What should the administrator use?
cleaningr.exe
A client administrator for a video game development company wants to upgrade machines to support five primary partitions. the developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?
GPT
A systems administrator wants to create a scheduled task throughout the environment, which does a basic health check at night when users are not working. Which command should the administrator use in their scheduled task?
chkdsk
A video game development company is purchasing upgraded laptops to develop cutting-edge graphics for a new story they have been marketing. They want to be able to integrate persistent system RAM. What type of operating system should they use for support?
Pro for Workstations
A company’s IT support specialist is ready to start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?
Antivirus scan
A client administrator sets up a new system for GUID partition table (GPT) partitioning. What dependency will the administrator need to set?
UEFI
A local jewelry maker sets up a booth at a craft fair. When the first customer makes a purchase, the vendor’s contactless card reader will not recognize the customer’s wallet app. Which of the following could solve the problem?
Hold the mobile device closer to the reader and wait
A software company hires a new app developer. The corporate network denies access when the developer tries to connect their phone. Why would the network deny access from the developer’s mobile phone?
Developer mode
A manager for a Linux server team recently purchased new software which will help to streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to mitigate?
Support
A user disables some of the laptops’ services, thinking it would speed up performance. After restarting the laptop, “One or more services failed to start” appears. When the IT specialist opens the Services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did not work?
The user disabled a dependent service.
The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?
Force Stop
A helpdesk professional assists a user with issues booting up their Mac computer. The user reports that there is no drive to boot from. Where will the computer boot from?
Web
A technician uses a method where each server is configured with a public / private encryption key pair and identified by a host key fingerprint. What is this method?
SSH
According to CompTIA’s seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?
- Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.
A vulnerability manager is brainstorming different ways to enhance security for their cell phone devices. The company only uses Apple, and so one of the ideas the manager comes up with is to look for anomalistic files that do not belong with Apple for signs of possible malware which did not profile the device and instead just blasted malware out, hoping the operating system would be right. Which of the following would be anomalistic?
.apk
A user wants to share their printer with other teams, but not all teams use the same operating system. What can the user do to configure functionality with other teams?
Additional drivers
A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?
Electrical fire safety
Before an IT team can submit an application for change, it must include a document that includes an analysis of risks associated with performing the change and risks that might be incurred through not performing the requested change. What type of document is this?
Purpose of the change
When a project team is constructing a change request document, a part that needs to be included is the number of devices, users, or customers that will be affected by the change. What is this part of the document?
Scope of the change
Which of the following backup procedures state that users should have three copies of their data across two media types, with one copy held off-line and off-site?
3-2-1 backup rule
Over the day, a user’s computer becomes slow. Then pop-ups start to appear randomly. Later on, the pop-ups become more frequent, and the user notices that internet searchers are using Google when their default search provider is in Firefox. Once the computer starts crashing repeatedly, the user calls for help. Considering all of these data points, what is the best diagnosis of the problem?
Adware or spyware infection
An analyst is a method that calculates a product of the likelihood and impact of the potential threat category. What is this method?
Risk levels
A helpdesk technician is helping a user experiencing printer problems. After several troubleshooting steps, the technician thinks the user may have installed the wrong driver. Where can they go to install a different one?
Device Manager
An administrator reviews a series of instructions that the workstation follows every time a user logs on. What is this called?
Login script
An IT specialist found a damaging package on a client’s computer disguised as something else. What did the specialist find?
Trojan
A technician runs an isolated test that allows them to run the program without impacting the system. What is this called?
sandbox
A threat actor poses as a hiring manager for a company and asks a user for their personal credentials and to log in to a spoofed website that looks genuine. When the user confirms log-in with the spoofed website, their information is obtained. Which of the following is this attack?
Phishing
A user uses a scripting language based on Microsoft’s Visual Basic programming language. Which of the following extensions is used?
.vbs
Which of the following devices come in the form of adapters, trailing sockets, or filter plugs, with the protection circuitry built into the unit.
Surge suppressor
Which is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?
Data-at-rest encryption
Worried about a crash, a user creates a complete backup of the system configuration and data files on their computer. Identify what the user has created.
An image
A technician is tasked to figure out why a user’s Gmail app will not update on their mobile phone. The technician knows several reasons that would cause this to occur. Which of the following would be one of the reasons for this problem?
Storage
A user receives a Windows dialog box pop-up that states 163 viruses were detected by antivirus software. When the user clicks on the pop-up, it states that to get rid of the viruses the user needs to purchase the software’s full version. What type of antivirus does the user have in this scenario?
Rogue
A user implements a technique that requires an input of 4- or 6- digits to gain access to their device. What is this technique?
PIN
A security administrator moves their proxy from on-premise to the cloud and wants to establish a client tunnel to the cloud proxy tunnel for web traffic. This way, the users are protected even while out in public and not connected to the domain. What should the administrator set up?
VPN
What uses a 4-way handshake to allow a station to associate with an access point, authenticate its credential, and exchange a key to use for data encryption?
WPA2
A technician must remove all corporate accounts and files from an employee’s device but leave personal applications, accounts, and settings, and files untouched. What is this called?
Enterprise wipe
Which of the following can prevent, detect, and remove software threats that consist of ransomware, Trojans, spyware, and rootkits?
Anti-malware
A user performs a technique that allows them to connect their PlayStation to their network. What is this technique?
UPnP
An administrator is backup chaining a database with the type of backup that utilizes a moderate time and storage requirement. What type of backup is this?
Full with differential
A security administrator is in charge of multiple locations in various countries. The administrator wants to set Coordinated Universal Time (UTC) on a test box to ensure logging is standardized. In Windows, where can the administrator set this?
Time and Language
A curious IT administrator notices issues with certain applications invoking the kernel. Which operating system would allow the administrator to change the underlying operating system?
Android
A network administrator troubleshoots domain name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?
nslookup
A user wants to connect to multiple systems after a single login at only one of the devices? What is this called?
SSO
Management provides employees with written policies and procedures to help them fulfill their tasks. Which of the following procedures requires employees to enroll and identify themselves using secure credentials?
New-user setup checklist
An installer is implemented using .EXE file. What is this technique performing?
Installation of applications