Comptia A+ 1102 Section 2 Flashcards

1
Q

What Microsoft Windows tool provides a more robust means of configuring hundreds of networked Windows computer settings, and is a much more efficient way of implementing settings across a domain than manually configuring each networked client?

A

Group Policy Editor (gpedit.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When typed at the command prompt in a Microsoft Windows client, what is the purpose of the ipconfig command?

A

Troubleshoot the network adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personal computer (PC) objects are drives, typically referred to by letters such as A, C, D, X, and sometimes names. They can be a physical disk, a partition on a disk, or a removable disc. While the C: drive is usually the primary drive (where the Windows installation resides), what drive navigation input would get a user to a file named “audit” on a floppy disk drive of a typical PC?

A

A:\ Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When typed at the command prompt in a Microsoft Windows client, what is the purpose of the cd command?

A

Moves to a different directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command is a Windows utility that can allow administrators to view shared resources and configure them on a Windows network?

A

net use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

From a Windows 10 command prompt, what command would display a network adapter’s configuration and aid in troubleshooting the network adapter?

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system administrator will need to configure the local users and groups on a stand-alone computer (PC). What default console provides an administrator the ability to schedule tasks and configure disks, services, devices, and local users and groups?

A

Computer Management (compmgmt.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An organization has tasked a system administrator to procure a workstation with the same capabilities or more already in use by the engineering department for a Windows-based computer-aided drafting (CAD) program. What built-in Windows tool provides a comprehensive inventory that the administrator could utilize to ensure a comparable or better workstation that the organization can purchase?

A

System Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What remotely accessible database stores operating system, device, and software application configuration information in a Microsoft Windows environment and allows manual edits to the Windows configuration?

A

The Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Registry Editor (regedit.exe) provide the administrator in a Microsoft Windows environment?

A

It provides remote management of a client operating system and its devices, software, and applications configuration information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IT manager is setting up an image for dispatching airplanes at a major airport. They are trying to lock down the image to run only the dispatch service. One of the layers of security is to block unneeded service ports from communicating, such as email. Where should the manager start?

A

Windows Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?

A

System Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?

A

dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security analyst conducts an incident response investigation against suspected malware on a userbox. The analyst suspects a certain variant of malware known to beacon out to a command and control server. What command will help them investigate this?

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?

A

The share was created on a Windows Desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following extensions combines a scripting language with hundreds of prebuilt modules called cmdlets that can access and change most components and features of Windows and Active Directory components and features?

A

.ps1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company has hundreds of employees who use the same software on their computers, so they offer a company product key to access the software. What is this product?

A

Corporate-use license

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An administrator wants to listen to music through headphones to help with productivity during work. However, the administrator is having issues connecting the headphones via Bluetooth. Where should they go first to look?

A

Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An intern for a Windows server team is watching a server administrator verify the authenticity and integrity of an installer. Where did the administrator most likely get it from?

A

Internet Download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A user is conscientious about security after hearing about breaches in the news. The user wants to see if they are up to date on patches for their Apple computer. Where should the user go to check?

A

App Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What technique is used on hard drives that reset them to factory condition and the hard drives only contain the information necessary to interact with a file system?

A

Low-level formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?

A

MSRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A penetration tester targeted top-level executives during a test by sending out phishing emails. They received their first shell when the first executive opened the attachment in the phishing email. Once the penetration tester connects to the executive’s computer, what command will tell them the location of where their shell landed?

A

pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A security administrator for Linux systems in their demilitarized zone wants to ensure only some administrators can perform certain commands. Which of the following is best used to lock down certain commands?

A

sudo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A server administrator has not used the command line in quite some time and is trying to remember what will help them with commands and how to use them. Which of the following should the administrator use?

A

/?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

While browsing the internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?

A

Unwanted notifications start popping up in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An administrator in charge of user endpoint images wants to slipstream and use image deployment. Which boot method would best support this?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What uses domain names of components loading on the web page against a vast blacklist?

A

Ad blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A user likes to watch Netflix on their phone while on the treadmill. The user turns the phone sideways for better viewing, but this time, the picture did not orient to landscape as it always has. Which of the following could cause this issue?

A

Rotation lock is enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

According to CompTIA’s seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?

A
  1. Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An IT manager is setting up an image for dispatching airplanes at a major airport. They are trying to lock down the image to run only the dispatch service. One of the layers of security is to block unneeded service ports from communicating, such as email. Where should the manager start?

A

Windows Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A software engineer uses the “data protection” option for the apps on their mobile device. This option is subject to the second round of encoding using a key derived from and protected by the user’s credentials. What is this method?

A

Device Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?

A

Access work or school

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An administrator uses a backup rotations scheme that labels the backup tapes in generations. What is this called?

A

GFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A technician helps a customer with a ticket request and needs to record that the customer has accepted that the ticket can be closed. Which of the following fields reflect this part of the ticket life cycle?

A

Problem resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?

A

Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A pet store owner receives an email from their bank with a special financing offer. The owner clicks on the attachment, but it does not open. Later that day, when the owner returns to their computer, it is running very slowly and will not connect to the internet. By the time the IT consultant arrives, the computer has locked up. Which of the following is the best action for the IT consultant given the existing conditions?

A

Run an antivirus scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A security engineer runs a long tail analysis to determine the frequency of services and processes communicating to the internet. After baselining a large amount of normal traffic such as updates, they encounter a suspicious communication frequency every five minutes from a particular box. They have done a thorough job investigating running processes, memory analysis, and file integrity checks but find nothing. What else could the engineer check for persistence mechanisms that could send the communications?

A

taskschd.msc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A network administrator troubleshoots domain name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A vulnerability and risk manager reviews older systems that can only receive critical patches. What are these systems classified as?

A

Extended support

42
Q

When making major adjustments to a project, a security technician will have to assess the business and technical merits as well as the risks of the adjustment plan. What documentation will need to be submitted?

A

Change board approval

43
Q

A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?

A

Gaming

44
Q

A company’s IT support specialist is ready to start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?

A

Antivirus scan

45
Q

A user downloads a dating app from the Apple store and then gets requests for permission to access their camera; which of the following is the most likely cause of the permission requests?

A

Spoofed app

46
Q

A developer, working at Microsoft, is helping to develop the latest and greatest user interface for Windows. The developer is assigned to the team that works on the user interface’s top level. What will the developer be working on?

A

Desktop

47
Q

A researcher calls the help desk complaining of slow computer performance. When the technician arrives and probes for clues, the researcher explains that they frequently run multiple programs simultaneously and have a significant number of browser tabs open to aid with their research. Which of the following solutions should speed up the computer’s performance?

A

Add RAM

48
Q

A user wants to connect to multiple systems after a single login at only one of the devices. What is this called?

A

SSO

49
Q

Rooting is typically an action related to Android, while jailbreaking is associated with iOS. They are both trying to do the same thing. What is that?

A

Gain unrestricted access

50
Q

Which of the following uses the file-copy tool as Windows using “robocopy”?

A

Automated backups

51
Q

What can use a trusted platform module chip in the computer to tie the use of a fixed disk to a particular motherboard?

A

BitLocker

52
Q

A user experiences issues searching their local computer for files. What is a common issue that the user should check?

A

Indexing options

53
Q

An administrator uses a method that uses simultaneous authentication of equals (SAE) instead of the 4-way handshake. What is this method?

A

WPA3

54
Q

An administrator uses a backup rotations scheme that labels the backup tapes in generations. What is this called?

A

GFS

55
Q

A company’s IT support specialist is ready to start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?

A

Antivirus scan

56
Q

A Linux server administrator meets with their Windows server administrator counterparts. A certain grouping of Linux and Windows servers is designated to run services that share files. What will the administrators need to enable sharing between the disparate systems?

A

samba

57
Q

A teenager hears from friends about a legitimate website to download games to their Samsung Galaxy phone that is not in the Google Play store. The teenager goes to the site and downloads some games. What best describes the teenager’s behavior?

A

APK sideloading

58
Q

Before an IT team can submit an application for change, it must include a document that includes an analysis of risks associated with performing the change and risks that might be incurred through not performing the requested change. What type of document is this?

A

Purpose of the change

59
Q

A security administrator moves their proxy from on-premise to the cloud and wants to establish a client tunnel to the cloud proxy tunnel for web traffic. This way, the users are protected even while out in public and not connected to the domain. What should the administrator set up?

A

VPN

60
Q

A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to optimize the machines to be powerful enough to run applications. The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?

A

Privileged time

61
Q

A Windows client administrator plans to upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?

A

User training

62
Q

An administrator reviews a series of instructions that the workstation follows every time a user logs on. What is this called?

A

Login Script

63
Q

What tool will distinguish client accounts and provide support for recording and reporting billable support activity?

A

RMM

64
Q

A user downloads a dating app from the Apple store and then gets requests for permission to access their camera; which of the following is the most likely cause of the permission requests?

A

Spoofed App

65
Q

Which of the following uses a security shield icon for tasks that are protected under them?

A

UAC

66
Q

A technician implements a type of authentication method used on Windows machines that once users are authenticated, they are trusted by the system. What is this method?

A

Kerberos

67
Q

An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?

A

System solution

68
Q

A technician uses filesystem-level encryption on some files that need to be encrypted on their device. What is this called?

A

EFS

69
Q

A server administrator receives a report that the company’s external-facing web server is unresponsive. Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to restart the website?

A

services.msc

70
Q

The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?

A

Force stop

71
Q

A security engineer researches how to make backup and antivirus apps available to their iOS mobile devices. Where should the apps be pushed?

A

Business Manager

72
Q

An IT professional helps to fix their friend’s computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?

A

RDP

73
Q

While browsing the internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?

A

Unwanted notifications start popping up in Windows.

74
Q

Which of the following should generate an alert when the account is disabled or altered?

A

Change default administrator account.

75
Q

A Windows administrator wants to learn how to use Linux by installing the Linux subsystem for Windows. What should their version of Windows have on the New Technology File System (NTFS) to support case-sensitive naming and hard links required by Linux?

A

POSIX

76
Q

A manager for a Linux server team recently purchased new software which will help to streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to mitigate?

A

Support

77
Q

An attacker uses a set of tools designed to gain control of a computer and can create a backdoor with system-level privileges without the user noticing. What is this called?

A

Rootkit

78
Q

Over the day, a user’s computer becomes slow. Then pop-ups start to appear randomly. Later on, the pop-ups become more frequent, and the user notices that internet searchers are using Google when their default search provider is in Firefox. Once the computer starts crashing repeatedly, the user calls for help. Considering all of these data points, what is the best diagnosis of the problem?

A

Adware or spyware infection.

79
Q

According to CompTIA’s seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?

A
  1. Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.
80
Q

A technician uses a method where each server is configured with a public/private encryption key pair and identified by a host key fingerprint. What is this method?

A

SSH

81
Q

An administrator assists the human resources department in testing access to their new cloud-based training site. Unfortunately, the site cannot be accessed due to the organizational security policy. Which of the following should the administrator use to assist them?

A

certmgr.msc

82
Q

A user experiences issues searching their local computer for files. What is a common issue that the user should check?

A

Indexing options

83
Q

What will block third-party cookies and enable strict tracking protection?

A

Private browsing mode

84
Q

A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to optimize the machines to be powerful enough to run applications. The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?

A

Privileged time

85
Q

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?

A

MSRA

86
Q

Which of the following uses a security shield icon for tasks that are protected under them?

A

UAC

87
Q

A Windows client administrator plans to upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?

A

User training

88
Q

An IT professional helps to fix their friend’s computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?

A

RDP

89
Q

A manager for a Linux server team recently purchased new software which will help to streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to mitigate?

A

Support

90
Q

A software company hires a new app developer. The corporate network denies access when the developer tries to connect their phone. Why would the network deny access from the developer’s mobile phone?

A

Developer mode

91
Q

A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?

A

Frequency

92
Q

A technician is using a tool with a secure erase function that performs a zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware’s automatic garbage collectors then perform the actual erase of each block over time. What is this tool?

A

Low-level formatting

93
Q

An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?

A

System Settings

94
Q

An administrator automates the creation of folders during a Windows install process. Which command should they use in their script?

A

md

95
Q

A server administrator sets up jobs that will copy over files on various servers. They want it to detect if the file was transferred successfully and, if not, resend the file. Which command is optimal for server administrators to perform this task?

A

robocopy

96
Q

The IT department determines that the phone belonging to the company’s vice president suffers a compromise and that the personal and corporate data contained on the phone has leaked. Which of the following should the IT team do next?

A

Quarantine all devices that could be connected to the leak.

97
Q

A server administrator notices a file server starting to run low on space. The administrator wants to create extra space before all space is used up and even worse issues arise. What should the administrator use?

A

cleanmgr.exe

98
Q

A helpdesk technician is helping a user experiencing printer problems. After several troubleshooting steps, the technician thinks the user may have installed the wrong driver. Where can they go to install a different one?

A

Device Manager

99
Q

A threat actor uses a technique that allows devices to connect to an open authentication and then redirect the user’s browser to a fake captive portal that encourages the user to enter their network password. What is this technique?

A

Evil twin

100
Q

A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to trigger a faster response time. What describes what attribute of the ticket the analyst set?

A

Security levels

101
Q

An administrator is backup chaining a database with the type of backup that utilizes a moderate time and storage requirement. What type of backup is this?

A

Full with differential