A+ Study Questions Flashcards
What allows a user to download from a vendor’s website and select the correct path for their device’s make and model?
Firmware updates
A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?
Gaming
A threat actor uses a technique that instills statements through an unfiltered user response. What is this technique?
SQL injection
An endpoint machine administrator configures specific Apple computers designated for users with disability. Where should the administrator look to configure these settings?
Accessibility
A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?
Port forwarding
A technician uses a method where each server is configured with a public / private encryption key pair and identified by a host key fingerprint. What is this method?
SSH
What group has complete privilege control over a system?
Administrator
A company uses a method that restricts its employees from messing with their computer settings. What is this method called?
BIOS
A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?
Electrical fire safety
What technique is used on hard drives that reset them to factory condition and the hard drives only contain the information necessary to interact with a file system?
Low-level formatting
A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity, however. What type of program is this?
Terminal
Many mobile apps collect location data. Rogue apps could use location data for criminal purposes, such as burglary. However, many legitimate apps also track a mobile user’s location. Why would a legitimate app have interest in a user’s location?
Targeted advertising
A user experience issues searching their local computer for files. What is a common issue that the user should check?
Indexing options
A pet store owner receives an email from their bank account with a special financing offer. The owner clicks on the attachment, but it does not open. Later that day, when the owner returns to their computer, it is running very slowly and will not connect to the internet. By the time the IT consultant arrives, the computer has locked up. Which of the following is the best action for the IT consultant given the existing conditions?
Run an antivirus scan
Which of the following extensions combines a scripting language with hundreds of prebuilt modules called cmdlets that can access and change most components and features of Windows and Active Directory components and features?
.ps1
While browsing the internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?
Unwanted notifications start popping up in Windows.
A user notices that their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposals is this?
Battery
What technique is often used to exhibit fake antivirus and security warnings or other malicious advertising?
Pop-ups
An IT professional helps fix their friend’s computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?
RDP
A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity. What type of program is this?
Terminal
A server administrator tests connectivity between two statically assigned servers in a forest with different domains. What should they check first in this case?
DNS settings
A technician is implementing a Linux shell script that each statement comprising the actions that the script will perform is then typically added on separate lines. Which of the following is this?
.sh
A user experiences issues searching their local computer for files. What is a common issue that the user should check?
Indexing options
A Windows client administrator plans to upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?
User training
What method gets a system back up and running before the recommended amount of time elapses?
Rollback plan
A server administrator notices a file server starting to run low on space. The administrator wants to create extra space before all space is used up and even worse issues arise. What should the administrator use?
cleaningr.exe
A client administrator for a video game development company wants to upgrade machines to support five primary partitions. the developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?
GPT
A systems administrator wants to create a scheduled task throughout the environment, which does a basic health check at night when users are not working. Which command should the administrator use in their scheduled task?
chkdsk