CompTIA A+ 1102 Flashcards
An Administrator uses a method that assigns permissions and rights to a collection of user accounts. What is it called?
- ACL
- MFA
- Least Privileges
- Security Group
Security group, a security group is. a collection of user accounts, as it is more efficient to assign permissions to a group that to assign them individually to each user.
The Instagram app on android phone will not launch. Which of the following options will fix the problem?
- Force Stop
- Software Update
- AirDrop
- Swiping
Force stop, if the app fails to launch, first user force stop to quit it and try launching again. In android, open settings > Apps. Tap an app then select force stop. In IOS, either swipe up of double tap the physical home button, then swipe the app up off the screen
A technician is cleaning off a computer and notices that dust forming over the fan blades and ventilation slots. What can the technician use to perform dust cleanup (select all that apply)
- PC vacuum cleaner
- Natural bristle brush
- Domestic vacuum
- Compressed air blaster
PC vacuum cleaner, natural bristle brush, and compressed air blaster
A client administration sets up a new system for the GUID partition table (GPT) partitioning. What dependency will the administrator need to set?
- MBR
- BIOS
- TPM 2.0
- UFEI
When the disk user GPT partitioning, the system firmware mist be set to use the UEFI boot method
The system restore tool in Windows is used to roll back configuration changes to an earlier date or restore point. One option for creating restore points is to use the task scheduler. What other actions will create a restore point? (Select all that apply)
- Deleting a file
- Rebooting
- Updating an application
- Installing a program
Whenever an app or program is installed, a restore point is created
What type of data breach can be associated with a specific person or use an anonymized of de-identified data set for analysis and research?
- Open source license
- PII
- Healthcare data
- Personnel government issued information
Healthcare data refers to medical and insurance records plus associated hospital and laboratory test results
What is this called when antivirus software scans a file before allowing or preventing it from opening?
- Smart scanning
- Quick scanning
- On access scanning
- Scheduled scanning
On access scanning is when the antivirus software intercepts an OS call to open a file and scans the file before allowing or preventing it from being opened. Most security software is now configured to scan on access
What is also known as a potential unwanted app and should be removed from the computer?
- Potentially Unwanted Application (PUA)
- Anti-virus software
- Productivity Tools
- Operating system update
Potentially Unwanted Application (PUA), an untrusted source is when an installer cannot be verified from a digital signature or has been a security risk and is likely to expose the user to unwanted adverts
A helpdesk operator looks at build number for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the are the build numbers based on? (Select all that apply)
- Year
- 32 bit vs 64 bit
- Time of the year
- Windows version
The number in 16 in build 1607 corresponds to the year 2016 of release
Many mobile apps collect information data. Rogue apps could use the location data for criminal purposes, such as burglary. However many legitimate apps also track a mobile user’s location. Why would a legitimate app have interest in a user’s location?
- Targeted advertising
- Redirection
- Geotagging
- Clicks
Legitimate apps are interested in tracking a user’s location for targeted advertising. For example, FB tracks the location of its user for that very reason
While browsing the internet, a user receives a pop-up that states. “We have detected a trojan virus. Click OK to begin the repairs process. Out of fright, the user clicks OK. Given the following choices, what is most likely the outcome of the user’s response?
- UAC will need to be reenabled
- Unwanted notifications start popping up in Windows
- Nothing happens because Windows BL blocks the trojan virus
- User starts experiencing drive by downloads
Malware targets the browser so clicking on a website pop up is likely to deliver some type of infection, such as adware, which will deliver unwanted notifications
While conducting an online search for cleaning services, a homeowner clicks on the link for one of the results. When the website loads, the page says “Warning: Potential Security Risk Ahead.” What would chase this message to appear? (select all that apply)
- The cleaning service is out of business
- The certificate is issued by an untrusted CA
- The certificate is expired
- Malware is trying to redirect the browser to a spoofed page
The certificate is issued by an untrusted CA, the certificate is expired, and Malware is trying to redirect the browser to a spoofed page
A video game development company is purchasing upgraded laptops to develop cutting edge graphics for a new story they have been marketing. They want to be able to integrate persistent RAM. What type of OS should they use for support?
- Pro
- Home
- Enterprise
- Pro for workstations
Windows pro for workstations has many of the same features as pro bit supports more maximum RAM and advanced hardware technologies, such as persistent system RAM
The IT department determines that the phone belonging to the company’s vice president suffers a compromise and that the personal and corporate data contained on the phone has leaked. Which of the following should the IT team do next?
- Run an antivirus scan
- Wipe the phone
- Quarantine all devices that could be connected to the leak
- Reboot the phone
If any personal or corporate data is leaked from a mobile device, each device that could have been a source for the files must be quarantined and investigated as a possible source of the breach
A company’s IT support specialist is ready to start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?
- Verify DNS configuration
- Anti virus scan
- Re enable system restore
- Create a fresh restore point
Before removing a computer system from quarantine, the final step is to run another antivirus scan to make sure the system is clean.
Which of the following extensions combined scripting language with hundreds of prebuilt modules called cmdlets that can access and change most of the components and features of Windows and AD components and features
- .psl
- .sh
- .js
- .py
.psl is the Powershell script file. Microsoft provides the Windows Powershell integrated scripting environment for rapid development
What is a type of employee device that must meet the profiles that the company requires, and the employee will have to agree on the installation of corporate apps and to some level of oversight and auditing?
- COPE
- COBO
- BYOD
- CYOD
BYOD is a mobile device owned by the employee. The mobile is usually the most popular with employees but poses the most difficulties fir security and network managers
A technician using a tool with a secure erase function that performs zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware’s automatic garbage collectors then perform the actual erase of each block over time. What is this tool?
- Erasing/wiping
- Shredding
- Standard formatting
- Low level formatting
A low level formatting tool resets a disk to its factory condition. Most of these tools will incorporate some sanitize function
What uses domain names of components loading on the web page against a vast blacklist?
- Browser sign-in
- Private browsing mode
- Clearing browsing data
- Adblocker
Ad blockers use more sophisticated techniques to prevent displaying anything that does not seem to be part of the sites main content or functionality
A user is attempting to gain confidential information by talking to the receptionist. What kind of attack is this, and what can prevent it?
Social engineering, this can be prevented with user education
An SSID similar the the company managed SSID is being broadcast as an open wireless network. What kind of attack is this and how can it be prevented?
Evil twin, it can be prevented by implementing 803.1X authentication
An internet faced web application is numbered with requests and is rendered unusable. What kind of attack is this and how can it be prevented?
DDOS, it can be prevented by implementing traffic analysis
A malicious email is sent to all employees in an attempt to gain information about their system. What kind of attack is this and how can it be prevented?
This is a phishing attack and it can be prevented by implementing message filtering
A Windows security log shows numerous login attempt with passwords containing basketball lingo. What king of attack is this and how can it be prevented?
Dictionary attack, this can be prevented by implementing an account lockout tool