CompTIA A+ 220-1001 & 1002 Flashcards
A virus on a computer running Microsoft Windows 7 has altered the master boot record (MBR) and the computer will no longer boot. Before you can review the virus, you must FIRST repair the MBR so the computer will be able to BOOT
What utilities should you use to repair the MBR
Startup Repair
Bootrec.see
A customer is concerned that personal data has been leaked from their mobile phone. They suspect this exposure has been hindering their device for a significant amount of time.
After completing a full malware scan, the system did not return any positive findings relating to or identifying any malware found as a result of the malware hidden within the systems files installed somewhere on the system.
Moving forward the client is requesting to secure any Data Leaks as soon as possible
Perform a Hard ReSet
Users complain that they cannot connect with any Internet websites. They can connect with a web server deployed in the local perimeter network
Technicians verify the problem by attempting to ping a known good site by URL, and the attempt files. They get the same result from multiple network client computers.
What should technicians attempt next ?
Ping an Internet site by Ip Address
Customer bring in a PC for a repair, the customer complains about problems trying to print. Customer also brings in an external hard disk with 2 backups, one made 2 weeks ago, while the other immediately before the computer was brought into the shop for repair (today/that day)
You remove the virus. Determine the printer device has been overwritten and you suspect other alternate device drivers have also been overwritten as well. In order to repair the system as quickly as possible with minimum data loss
SFC
An androids smartphones screen responds inaccurately to touch
Power off and back on
A user of a computer running OS X wants the Safari browser on all his devices to remember his usernames and password! With credit card numbers as well how should they enable this /these features on ALL their DEVICES
Enable iCloud Keychain
Time Machine is a backup App
When you attach an external drive and indicate that it should be used as a backup,OS X performs a full backup and then backs up changes files hourly. You can also use Time Machine with network drives
Time Machine
Your antivirus program identifies an infected files on a computer running Windows 8.1 but cannot remove it because it is already in use
You need to remove the infected file how do you proceed
Boot in Safe Mode and run the virus scan again
Enterprise network has several locations spread across multiple different countries. Company reviews it’s disaster prevention policy and determines that it is advisable to update its backup policies, specifically backup storage locations
Company compares options for Local vs. Cloud Based Backup Solutions.
The storage solution can scale rapidly in response to changing requirements
Backup files are readily available form nearly any location
You need to write a batch file that can be scheduled for execution or run on an as-needed-basis. The batch file needs to backup a computer running Microsoft Windows Server 2012 R2 and the perform prevent disk maintenance, which command do you use to backup computer
Wbadmin
Maximum number of physical RAM supported by 32-bit installation of Windows 7 Pro
4 GB
Windows 7 Starter is limited to no more than
2 GB
Limit for 64 bit versions of Windows varies by edition. It is limited to _____ for Windows 7 Home Basic, _____ for Windows 7 Home Premium, and _______for Windows 7 Pro, Enterprise, and Ultimate
8GB
16GB
192GB
What is a role of a software token on a computer and network security
As part of two factor authentication system
Authentication is based on
What you know - Such as __________
What you have -Such as _____________
What you are - Such as __________________
Password
Security Token
Fingerprint
Setting up a Laptop running Windows 8.1 used primarily for on the road type business. Customer should have ability to store username and password info to make it easier to long onto company platform and to technical references sites. Both use KERBEROS Authentication. Customer needs to know where to enter information
Windows CardSpace
Credential Manager
Tech wants to copy the contents of a fixed hard disk to a removable hard disk for backup
Which command can copy all files, directories, and subdirectory’s to another disk all at once .
XCopy
Chrome OS is optimized for use of web applications
True/False
True
Developed as a supplement to the A droid operating system rather than replacement. More recently the trend is to merge features of both into Android
Chrome OS
SSH
Secured Shell provides. Command prompt connected to a remote device, Public key authentication is used for sever authentication, and all traffic with the remote device encrypted, so it provide a secure connection
Provides remote command shell, but it does NOT support a secure connection . All communication is in plain text
Telnet
What is CMD
CMD is used to open local command prompt on a computer running Windows, not a remote command prompt, and does not run on Linux
What is RDP
Remote Desktop Protocol
Is not used to provide a command prompt. Developed by Microsoft to support remote desktop and input capabilities with computers configured to allow remote desktop connections
Hitch operating systems are OPEN SOURCE
Linux and Android
After running malware scan, scan returns ZERO RESULTS, however customer wants data leak to end now, what do you do next
Perform a Hard Reset
Usually runs in the background and tries to avoid being noticed or detected. Gathers information about users activity on the computer, usually focusing on their internet activity, and may even send user info to a third party or make your computer a target if unsolicited marketing
Spyware
Attempt to make one thing look like an another. For example a hacker might configure a computer with a computer name and an IP Address that is valid on users network in an attempt to gain entry to network.
Spoofing
aka Bot, a computer that a hacker has taken control of and at some level and can use the computer for his own purposes. For example a hacker might attempt to infect several computers and then use them in a coordinated attack against a website or a company’s network
Zombie Attack
Which version of Windows did not include the back up and restore utility
Windows 8.1
Due to which of the following message conveyed a loss of occur on a system
Accidental deletion
Virus attack
Which of the following can be an outcome of a malware attack
Application crash
System slow down
System lock up
Which of the following can be including a set of security standards in organization
Specific operating system and updates
A set of security policies
A specific set of applications

Which type of ransom ware generates pop-ups and demands ransom from the user but doesn’t actually pose a real race to their data
Scareware