CompTIA A+ 1102 Flashcards
An Administrator uses a method that assigns permissions and rights to a collection of user accounts. What is it called?
- ACL
- MFA
- Least Privileges
- Security Group
Security group, a security group is. a collection of user accounts, as it is more efficient to assign permissions to a group that to assign them individually to each user.
The Instagram app on android phone will not launch. Which of the following options will fix the problem?
- Force Stop
- Software Update
- AirDrop
- Swiping
Force stop, if the app fails to launch, first user force stop to quit it and try launching again. In android, open settings > Apps. Tap an app then select force stop. In IOS, either swipe up of double tap the physical home button, then swipe the app up off the screen
A technician is cleaning off a computer and notices that dust forming over the fan blades and ventilation slots. What can the technician use to perform dust cleanup (select all that apply)
- PC vacuum cleaner
- Natural bristle brush
- Domestic vacuum
- Compressed air blaster
PC vacuum cleaner, natural bristle brush, and compressed air blaster
A client administration sets up a new system for the GUID partition table (GPT) partitioning. What dependency will the administrator need to set?
- MBR
- BIOS
- TPM 2.0
- UFEI
When the disk user GPT partitioning, the system firmware mist be set to use the UEFI boot method
The system restore tool in Windows is used to roll back configuration changes to an earlier date or restore point. One option for creating restore points is to use the task scheduler. What other actions will create a restore point? (Select all that apply)
- Deleting a file
- Rebooting
- Updating an application
- Installing a program
Whenever an app or program is installed, a restore point is created
What type of data breach can be associated with a specific person or use an anonymized of de-identified data set for analysis and research?
- Open source license
- PII
- Healthcare data
- Personnel government issued information
Healthcare data refers to medical and insurance records plus associated hospital and laboratory test results
What is this called when antivirus software scans a file before allowing or preventing it from opening?
- Smart scanning
- Quick scanning
- On access scanning
- Scheduled scanning
On access scanning is when the antivirus software intercepts an OS call to open a file and scans the file before allowing or preventing it from being opened. Most security software is now configured to scan on access
What is also known as a potential unwanted app and should be removed from the computer?
- Potentially Unwanted Application (PUA)
- Anti-virus software
- Productivity Tools
- Operating system update
Potentially Unwanted Application (PUA), an untrusted source is when an installer cannot be verified from a digital signature or has been a security risk and is likely to expose the user to unwanted adverts
A helpdesk operator looks at build number for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the are the build numbers based on? (Select all that apply)
- Year
- 32 bit vs 64 bit
- Time of the year
- Windows version
The number in 16 in build 1607 corresponds to the year 2016 of release
Many mobile apps collect information data. Rogue apps could use the location data for criminal purposes, such as burglary. However many legitimate apps also track a mobile user’s location. Why would a legitimate app have interest in a user’s location?
- Targeted advertising
- Redirection
- Geotagging
- Clicks
Legitimate apps are interested in tracking a user’s location for targeted advertising. For example, FB tracks the location of its user for that very reason
While browsing the internet, a user receives a pop-up that states. “We have detected a trojan virus. Click OK to begin the repairs process. Out of fright, the user clicks OK. Given the following choices, what is most likely the outcome of the user’s response?
- UAC will need to be reenabled
- Unwanted notifications start popping up in Windows
- Nothing happens because Windows BL blocks the trojan virus
- User starts experiencing drive by downloads
Malware targets the browser so clicking on a website pop up is likely to deliver some type of infection, such as adware, which will deliver unwanted notifications
While conducting an online search for cleaning services, a homeowner clicks on the link for one of the results. When the website loads, the page says “Warning: Potential Security Risk Ahead.” What would chase this message to appear? (select all that apply)
- The cleaning service is out of business
- The certificate is issued by an untrusted CA
- The certificate is expired
- Malware is trying to redirect the browser to a spoofed page
The certificate is issued by an untrusted CA, the certificate is expired, and Malware is trying to redirect the browser to a spoofed page
A video game development company is purchasing upgraded laptops to develop cutting edge graphics for a new story they have been marketing. They want to be able to integrate persistent RAM. What type of OS should they use for support?
- Pro
- Home
- Enterprise
- Pro for workstations
Windows pro for workstations has many of the same features as pro bit supports more maximum RAM and advanced hardware technologies, such as persistent system RAM
The IT department determines that the phone belonging to the company’s vice president suffers a compromise and that the personal and corporate data contained on the phone has leaked. Which of the following should the IT team do next?
- Run an antivirus scan
- Wipe the phone
- Quarantine all devices that could be connected to the leak
- Reboot the phone
If any personal or corporate data is leaked from a mobile device, each device that could have been a source for the files must be quarantined and investigated as a possible source of the breach
A company’s IT support specialist is ready to start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?
- Verify DNS configuration
- Anti virus scan
- Re enable system restore
- Create a fresh restore point
Before removing a computer system from quarantine, the final step is to run another antivirus scan to make sure the system is clean.
Which of the following extensions combined scripting language with hundreds of prebuilt modules called cmdlets that can access and change most of the components and features of Windows and AD components and features
- .psl
- .sh
- .js
- .py
.psl is the Powershell script file. Microsoft provides the Windows Powershell integrated scripting environment for rapid development
What is a type of employee device that must meet the profiles that the company requires, and the employee will have to agree on the installation of corporate apps and to some level of oversight and auditing?
- COPE
- COBO
- BYOD
- CYOD
BYOD is a mobile device owned by the employee. The mobile is usually the most popular with employees but poses the most difficulties fir security and network managers
A technician using a tool with a secure erase function that performs zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware’s automatic garbage collectors then perform the actual erase of each block over time. What is this tool?
- Erasing/wiping
- Shredding
- Standard formatting
- Low level formatting
A low level formatting tool resets a disk to its factory condition. Most of these tools will incorporate some sanitize function
What uses domain names of components loading on the web page against a vast blacklist?
- Browser sign-in
- Private browsing mode
- Clearing browsing data
- Adblocker
Ad blockers use more sophisticated techniques to prevent displaying anything that does not seem to be part of the sites main content or functionality
A user is attempting to gain confidential information by talking to the receptionist. What kind of attack is this, and what can prevent it?
Social engineering, this can be prevented with user education
An SSID similar the the company managed SSID is being broadcast as an open wireless network. What kind of attack is this and how can it be prevented?
Evil twin, it can be prevented by implementing 803.1X authentication
An internet faced web application is numbered with requests and is rendered unusable. What kind of attack is this and how can it be prevented?
DDOS, it can be prevented by implementing traffic analysis
A malicious email is sent to all employees in an attempt to gain information about their system. What kind of attack is this and how can it be prevented?
This is a phishing attack and it can be prevented by implementing message filtering
A Windows security log shows numerous login attempt with passwords containing basketball lingo. What king of attack is this and how can it be prevented?
Dictionary attack, this can be prevented by implementing an account lockout tool
Medical Facility: On arriving at work receptionist stated that the computer was already on and logged in despite the door being locked. Someone may have accessed the computer remotely. As a result, patient data records are at risk. What is the regulated data type of standard to comply with? PHI, PII, NIST, or EULA Which data is at risk?
- Anonymized data
- Billing address
- Data of Birth
- Prescribed medicines
- SSN
PHI, or protected health information. The patient’s billing address, date of birth, prescribed medications, and social security number are data at risk
Retail company: The systems admin for an online retail business has tasked a tech with performing specific updates on several systems. These updates are unique due to employees who process purchasing transactions. What regulated data type of standard to comply to? PII, PHI, PCI DSS, NIST, or EULA. What data is at risk?
- Account number
- Anonymized data
- CV2 number
- De identified data
- Shipping address
PCI DSS, account number, cv2 number, de-identified data, and shipping address
Commercial Bank: A support tech at the bank receives a customer call. The customer reports an unusual email from the bank. The email says the bank locked one of the user’s account. It requests government issued id to unlock the account. What regulated data type of standard is needed to comply to? PHI, EULA, PII or NIST? Which data is effected by this?
- Anonymized data
- Date of birth
- Email address
- Home address
- Last 4 SSN
PII, the data that is at risk is date of birth, email address, and last 4 of ssn
Online tutoring service: A support tech receives a call where the customer tried and failed to download a service update from a third party source. The service requires that you download updates only from their approved source list so that it’s genuine. What regulated data type or standard foes this comply with? NIST, PCI DSS, EMMA, EULA, PHI. What data is at risk?
- CA
- Catcha Verification
- De identified data
- SLA
- Software license
CA, captcha verification, SLA, & software license
What type of encryption does WPA2 use?
- WPA3
- AES
- TKIP
- MFA
AES & TKIP. AES is the standard encryption used by WPA2 and the strongest encryption standard to use by WiFi. TKIP tries to mitigate the various attacks against WEP developed by producing a new 128 bit encryption key for every packet sent on the network
An administrator in charge of user endpoint images wants to slipstream and use image deployment. Which boot method would best support this?
- Internal hard drive
- Network
- Optical
- Internet
Network boot setup means connecting to a shared folder containing installation files, which could be slipstreamed or use image deployment
A user finds that their iPhone 5 starts to run slowly, and a reboot does not solve the slow performance. Which of the following issues could be causing the problem? (Select all that apply)
- Low Battery Charge
- Too many apps open
- Mesh network
- OS update
Low battery charge and too many apps open
A technician is working with a customer who is being unreasonable. Which of the following skills should the technician use?
- Do not take complaints personally
- Hang up
- Identify early that the customer is angry
- Be judgmental
Do not take complaints personally, hang up, identify early that the customer is angry
A server admin notices a file server starting to run low on space. The admin wants to create extra space before all space is used up and even more issues arise. What should the admin use?
- cleanmgr.exe
- devmgmt.msc
- dfrgui.exe
- Disk queue length
The disk cleanup utility (cleanmgr.exe) regains disk capacity by deleting unwanted files, which can help to free up diskspace when running low.
An admin for Apple endpoints has heard about roaming profiles on Windows where user can sync certain settings from different devices. Which of the following offers a similar functionality?
- iCloud Keychain
- Keychain
- Spotlight
- Gestures
The keychain feature is also available as an iCloud keychain, making the same passwords securely available across all macOS and IOS devices.
A teenager hears from friends about a legitimate website to download games to their Samsung Galaxy phone that is not in the Google Play store. The teenager goes to the site and downloads some games. What best describes the teenager’s behavior?
APK Sideloading. APK is the file format for Android apps. APK side loading refers to downloading apps from a source other than Google’s play store.
A user is buying software for their PC. Which of the following would the user be purchasing for individual use?
- Personal license
- Corporate use license
- DRM
- Data Retention requirements
A personal license allows the product to be used by a single person at a time, though it might permit installation on multiple person devices.
A manager for a large corporation os in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to optimize the machines to be powerful enough to run applications. The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?
- Privileged time
- Disk queue length
- Pages/sec
- User time
If privileged time is much higher than user time, the CPU is likely underpowered making it to where it can barely run Windows core processes efficiently.
Windows Commands
? - Allows you to substitute for a single unspecified character in a command.
* - Is a wildcard character that can be used to indicate a string of characters
w/ - When used with the dir command, can be used to list files using a wide format with no details
/o :n - When used with the dir command, can be used to list files in order of name
A curious user looks through their local logs and sees errors in region copy-protection mechanisms. What type of device is generating these logs?
- External drive
- SSD
- Optical Media
- USB
Optical media. Consumer DVDs and Blu-ray feature digital rights management (DRM) and region coding copy-protection mechanisms
Functions of the ADUC/User Properties interface objects.
MytestForest.local- specifies the domain/forest
Domain controllers- is an OU
Users- an organizational unit that contains user objects and security groups
Member of- views/modifies group membership
Home Folder: Connect- configures the mapping of a private drive to a network share
Profile- configures the roaming profile within the User profile area
General- the user properties does not display the user’s password settings
Advanced malware infection may require manual removal. Which of the following tools assists in manual malware removal? (Select all that apply)
- cleanmgr
- regedit
- WinPE
- msconfig
The regedit is a tool for marking direct edits to the registry database, such as manually removing registry items. The msconfig can be used to perform a safe boot to prevent any infected code from running at startup. The WinPE can be used to run commands from a clean command environment after booting the computer with a recovery disc.
A user experiences significant system instability on their computer. It frequently shuts down, freezes, reboots, and powers off with no accompanying error messages. Which of the following problems would cause this instability? (Select all that apply)
- Too many connected devices
- Misconfigured firewall
- Overheating
- Failing CPU
Excessive heat can damage computer circuitry and induce shutdowns, freezing and reboots. A common cause of overheating is fans clogged with dust.
Issue: Powering on the workstation results in a message on-screen stating. “No OS found”. What’s the troubleshooting steps to fix it?
Enter bootrec /fixboot at the command prompt to repair the boot, then hold START+CTRL+SHIFT+B
Issue: Screen keeps turning black and workstation must be restarted. How would you troubleshoot this issue?
Enter bootrec /rebuildbcd to attempt repair of the boot sector. Press key sequence START+CTRL+SHIFT+B, you’ll also need to run chkdsk, run src, update graphics adapter driver, rollback graphics adapter driver
A user is conscientious about security after hearing about breaches in the news. The user wants to see if they are up to date on patches for their Apple computer. Where should the user go to check?
- Printers and scanners
- Displays
- System Preferences
- App Store
App store, it checks daily for new updates/patches and releases of installed apps in macOS. If a new version is available, a notification will be shown against the App Store icon in the dock.
A telltale sign of a malware infection is when changes occur to system files. Which of the following is like the result of malware-induced changes to the system files? (Select all that apply)
- Known good files with expired certificates
- Files that are missing or renamed
- Additional files with names similar to authentic system files, such as scvhose.docx or ta5kmagr.xlxx
- Files with date stamps and file sizes that are different from known good versions
- Files that are missing or renamed
- Files with date stamps and file sizes that are different from known good versions
After starting the computer and signing in, a user notices the desktop takes a long time to load. Evaluate the following Windows OS problems to determine the one that best diagnoses what could be causing the slowness.
- Time drift
- Corrupted user profile
- Invalid boot disk
- Corrupted registry
When a computer starts normally, and a user logs in normally, the desktop is slow to load; a corrupted user file is likely the culprit.
A computer administrator sets up a client workstation to join a centrally managed network. What options should the admin configure to do this?
- Update and security
- Sign in options
- Access work or school
- Apps
Access work or school under the account settings app joins the computer to a centrally managed domain network
A technician implements a type of authentication method used on Windows machines that once users are authenticated, they are trusted by the system. What is this method?
- RADIUS
- TKIP
- Kerberos
- TACACS+
Kerberos allows a user account to authenticate to a domain controller over a trusted local cabled segment. Kerberos facilitates a SSO
A Linux server administrator notices a service they not do recognize, although the environment is quite big. They looks at the help file for the ash process, but the documentation seems poor. It does seem to indicate that it provides interactivity, however. What type of program is this?
- Terminal
- Antivirus
- Backup
- Updates
Terminal. The shell provides a command environment by which a user can operate the OS and applications. Many shell programs are available with Linus, notably Bash, zsh, and ksh.
A security admin for Linux systems in their dmz wants to ensure only some admins can perform certain commands. Which of the following is best used to lock down certain commands?
- chmod
- sudo
- rm
- chown
The sudo command allows any account listed in the /etc/sudoers file user to run specified commands with supers privilege level
A forensic investigator is told that a server’s processor that does not normally run high has been over-utilized lately, and they suspect possible malware. The investigator wants to start by investigating processes. Which command can they use to start the investigation? Select all that apply)
- grep
- ps
- man
- top
The ps command invokes the process table, a record that summarizes the currently running processes on a system. The top command lists all processes running on a Linux system like ps. It acts as a process management tool by enabling users to prioritize, sort, or terminate processes interactively.
A user receives an unsolicited call from a microsoft support technician during a normal workday. The technician says the antivirus software on the user’s computer alerted microsoft of a new malware infection. The technician needs to remote into the user’s computer to fix the problem. What is the technician trying to do?
- Address the problem faster with a call rather than a pop-up notification alert
- Proactively respond tp a virus alert
- Address the problem faster with a call rather than an email
- Circumvent security software
Circumvent security software. Microsoft does not directly support user and would never randomly contact a user. This scenario is a scam to try to steal a user’s credentials
A user notices their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposal is this?
- Battery
- Device
- Fuse
- Toner
Battery
A user is on a website using an HTTPS URL; the browser displays the information about the certificate in the address bar. What does the certificate validate
- Secure connection
- Untrusted source
- Browser sign in
- Pop-up blocker
A secure connection validates the host’s identity running a site and encrypts communication to protect against snooping
What ensures that old data is destroyed by writing to each location on a hard disk drive?
- Erasing/wiping
- Standard formatting
- Low-level formatting
- Incinerating
Erasing/wiping software ensures that old dara is removed using zeroes or random patterns, leasing the disk in a “clean” state ready to be passed to the new owner. This overwriting method is suitable for all but the most confidential data
An administrator users a method that uses SAE instead of the 4 way handshake. What is this method?
- WPA3
- TKIP
- MFA
- AES
WPA3 uses passphrase based group authenticationn of stations in private mode, it changes the method by which this secret is used to agree with session keys. The SAE protocol replaces the 4 way handshake.
A user disables some of the laptops’ services, thinking it would speed up performance. After restarting the laptop, “one or more services failed to start” appears. When the IT specialist opens the services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did. to work?
The user disabled a dependent service.
A server administrator wants to run the latest technologies. What technology should the admin start using which will replace NTFS?
- APFS
- REFS
- EXT3
- EXFAT
REFS is being developed to replace NTFS. ReFS is only available for Pro for Workstations and Enterprise editions and cannot currently be used for boot volume
A software company hires a new app developer. The corporate network denies access when the developer tries to connect their phone. Why would the network deny access from the developer’s mobile phone?
- Sluggish response time
- Developer mode
- High network traffic
- App spoofing
The developer’s phone is in developer mode.
A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded?
- Windows 7 Pro to Windows 10 Home
- Windows 7 Home to Windows 10 Enterprise
- Windows Home to Windows 10 Pro
- Windows 7 Home Premium to Windows 10 Pro
User s cannot upgrade from a Home to an Enterprise edition. If users considers an in-place upgrade, they must check that the current OS version is supported as an upgrade path to the intended version
A user just installed a new app on their workstation, but the app has issues even starting up. The user has been working on the machine regularly up to this point with any prior issues. Which of the following is most likely the issue?
- DNS
- Firewall
- Personalization
- Proxy
Firewall
- rw-rw-r– 1 root root Coupon_text.txt
True or False: This text file gives read and write permissions to the “other” users.
False
chmod 755 Managed_list.pdf
True or false: After typing in this command, the PDF gives the owner rex permissions.
True
sudo chown root:root hr_updates.txt
True or False: After typing in this command, the root account is the new owner of the file.
True
What does the swapon command do in Linux?
Its used to activate a partition as a swap space.
What does the fdisk command do in Linux?
Creates and manages partitions on a hard disk.
What does the dd command do in Linux?
Has multiple uses, including the ability to clone a disk.