A+ Study Questions Flashcards

1
Q

What allows a user to download from a vendor’s website and select the correct path for their device’s make and model?

A

Firmware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?

A

Gaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A threat actor uses a technique that instills statements through an unfiltered user response. What is this technique?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An endpoint machine administrator configures specific Apple computers designated for users with disability. Where should the administrator look to configure these settings?

A

Accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?

A

Port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician uses a method where each server is configured with a public / private encryption key pair and identified by a host key fingerprint. What is this method?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What group has complete privilege control over a system?

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company uses a method that restricts its employees from messing with their computer settings. What is this method called?

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?

A

Electrical fire safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What technique is used on hard drives that reset them to factory condition and the hard drives only contain the information necessary to interact with a file system?

A

Low-level formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity, however. What type of program is this?

A

Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Many mobile apps collect location data. Rogue apps could use location data for criminal purposes, such as burglary. However, many legitimate apps also track a mobile user’s location. Why would a legitimate app have interest in a user’s location?

A

Targeted advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user experience issues searching their local computer for files. What is a common issue that the user should check?

A

Indexing options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A pet store owner receives an email from their bank account with a special financing offer. The owner clicks on the attachment, but it does not open. Later that day, when the owner returns to their computer, it is running very slowly and will not connect to the internet. By the time the IT consultant arrives, the computer has locked up. Which of the following is the best action for the IT consultant given the existing conditions?

A

Run an antivirus scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following extensions combines a scripting language with hundreds of prebuilt modules called cmdlets that can access and change most components and features of Windows and Active Directory components and features?

A

.ps1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

While browsing the internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?

A

Unwanted notifications start popping up in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user notices that their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposals is this?

A

Battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What technique is often used to exhibit fake antivirus and security warnings or other malicious advertising?

A

Pop-ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An IT professional helps fix their friend’s computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?

A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity. What type of program is this?

A

Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A server administrator tests connectivity between two statically assigned servers in a forest with different domains. What should they check first in this case?

A

DNS settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A technician is implementing a Linux shell script that each statement comprising the actions that the script will perform is then typically added on separate lines. Which of the following is this?

A

.sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A user experiences issues searching their local computer for files. What is a common issue that the user should check?

A

Indexing options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A Windows client administrator plans to upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?

A

User training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What method gets a system back up and running before the recommended amount of time elapses?

A

Rollback plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A server administrator notices a file server starting to run low on space. The administrator wants to create extra space before all space is used up and even worse issues arise. What should the administrator use?

A

cleaningr.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A client administrator for a video game development company wants to upgrade machines to support five primary partitions. the developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?

A

GPT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A systems administrator wants to create a scheduled task throughout the environment, which does a basic health check at night when users are not working. Which command should the administrator use in their scheduled task?

A

chkdsk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A video game development company is purchasing upgraded laptops to develop cutting-edge graphics for a new story they have been marketing. They want to be able to integrate persistent system RAM. What type of operating system should they use for support?

A

Pro for Workstations

30
Q

A company’s IT support specialist is ready to start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?

A

Antivirus scan

31
Q

A client administrator sets up a new system for GUID partition table (GPT) partitioning. What dependency will the administrator need to set?

A

UEFI

32
Q

A local jewelry maker sets up a booth at a craft fair. When the first customer makes a purchase, the vendor’s contactless card reader will not recognize the customer’s wallet app. Which of the following could solve the problem?

A

Hold the mobile device closer to the reader and wait

33
Q

A software company hires a new app developer. The corporate network denies access when the developer tries to connect their phone. Why would the network deny access from the developer’s mobile phone?

A

Developer mode

34
Q

A manager for a Linux server team recently purchased new software which will help to streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to mitigate?

A

Support

35
Q

A user disables some of the laptops’ services, thinking it would speed up performance. After restarting the laptop, “One or more services failed to start” appears. When the IT specialist opens the Services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did not work?

A

The user disabled a dependent service.

36
Q

The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?

A

Force Stop

37
Q

A helpdesk professional assists a user with issues booting up their Mac computer. The user reports that there is no drive to boot from. Where will the computer boot from?

A

Web

38
Q

A technician uses a method where each server is configured with a public / private encryption key pair and identified by a host key fingerprint. What is this method?

A

SSH

39
Q

According to CompTIA’s seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?

A
  1. Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.
40
Q

A vulnerability manager is brainstorming different ways to enhance security for their cell phone devices. The company only uses Apple, and so one of the ideas the manager comes up with is to look for anomalistic files that do not belong with Apple for signs of possible malware which did not profile the device and instead just blasted malware out, hoping the operating system would be right. Which of the following would be anomalistic?

A

.apk

41
Q

A user wants to share their printer with other teams, but not all teams use the same operating system. What can the user do to configure functionality with other teams?

A

Additional drivers

42
Q

A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?

A

Electrical fire safety

43
Q

Before an IT team can submit an application for change, it must include a document that includes an analysis of risks associated with performing the change and risks that might be incurred through not performing the requested change. What type of document is this?

A

Purpose of the change

44
Q

When a project team is constructing a change request document, a part that needs to be included is the number of devices, users, or customers that will be affected by the change. What is this part of the document?

A

Scope of the change

45
Q

Which of the following backup procedures state that users should have three copies of their data across two media types, with one copy held off-line and off-site?

A

3-2-1 backup rule

46
Q

Over the day, a user’s computer becomes slow. Then pop-ups start to appear randomly. Later on, the pop-ups become more frequent, and the user notices that internet searchers are using Google when their default search provider is in Firefox. Once the computer starts crashing repeatedly, the user calls for help. Considering all of these data points, what is the best diagnosis of the problem?

A

Adware or spyware infection

47
Q

An analyst is a method that calculates a product of the likelihood and impact of the potential threat category. What is this method?

A

Risk levels

48
Q

A helpdesk technician is helping a user experiencing printer problems. After several troubleshooting steps, the technician thinks the user may have installed the wrong driver. Where can they go to install a different one?

A

Device Manager

49
Q

An administrator reviews a series of instructions that the workstation follows every time a user logs on. What is this called?

A

Login script

50
Q

An IT specialist found a damaging package on a client’s computer disguised as something else. What did the specialist find?

A

Trojan

51
Q

A technician runs an isolated test that allows them to run the program without impacting the system. What is this called?

A

sandbox

52
Q

A threat actor poses as a hiring manager for a company and asks a user for their personal credentials and to log in to a spoofed website that looks genuine. When the user confirms log-in with the spoofed website, their information is obtained. Which of the following is this attack?

A

Phishing

53
Q

A user uses a scripting language based on Microsoft’s Visual Basic programming language. Which of the following extensions is used?

A

.vbs

54
Q

Which of the following devices come in the form of adapters, trailing sockets, or filter plugs, with the protection circuitry built into the unit.

A

Surge suppressor

55
Q

Which is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?

A

Data-at-rest encryption

56
Q

Worried about a crash, a user creates a complete backup of the system configuration and data files on their computer. Identify what the user has created.

A

An image

57
Q

A technician is tasked to figure out why a user’s Gmail app will not update on their mobile phone. The technician knows several reasons that would cause this to occur. Which of the following would be one of the reasons for this problem?

A

Storage

58
Q

A user receives a Windows dialog box pop-up that states 163 viruses were detected by antivirus software. When the user clicks on the pop-up, it states that to get rid of the viruses the user needs to purchase the software’s full version. What type of antivirus does the user have in this scenario?

A

Rogue

59
Q

A user implements a technique that requires an input of 4- or 6- digits to gain access to their device. What is this technique?

A

PIN

60
Q

A security administrator moves their proxy from on-premise to the cloud and wants to establish a client tunnel to the cloud proxy tunnel for web traffic. This way, the users are protected even while out in public and not connected to the domain. What should the administrator set up?

A

VPN

61
Q

What uses a 4-way handshake to allow a station to associate with an access point, authenticate its credential, and exchange a key to use for data encryption?

A

WPA2

62
Q

A technician must remove all corporate accounts and files from an employee’s device but leave personal applications, accounts, and settings, and files untouched. What is this called?

A

Enterprise wipe

63
Q

Which of the following can prevent, detect, and remove software threats that consist of ransomware, Trojans, spyware, and rootkits?

A

Anti-malware

64
Q

A user performs a technique that allows them to connect their PlayStation to their network. What is this technique?

A

UPnP

65
Q

An administrator is backup chaining a database with the type of backup that utilizes a moderate time and storage requirement. What type of backup is this?

A

Full with differential

66
Q

A security administrator is in charge of multiple locations in various countries. The administrator wants to set Coordinated Universal Time (UTC) on a test box to ensure logging is standardized. In Windows, where can the administrator set this?

A

Time and Language

67
Q

A curious IT administrator notices issues with certain applications invoking the kernel. Which operating system would allow the administrator to change the underlying operating system?

A

Android

68
Q

A network administrator troubleshoots domain name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?

A

nslookup

69
Q

A user wants to connect to multiple systems after a single login at only one of the devices? What is this called?

A

SSO

70
Q

Management provides employees with written policies and procedures to help them fulfill their tasks. Which of the following procedures requires employees to enroll and identify themselves using secure credentials?

A

New-user setup checklist

71
Q

An installer is implemented using .EXE file. What is this technique performing?

A

Installation of applications