CompTIA A+ 220-1001 & 1002 Flashcards
A virus on a computer running Microsoft Windows 7 has altered the master boot record (MBR) and the computer will no longer boot. Before you can review the virus, you must FIRST repair the MBR so the computer will be able to BOOT
What utilities should you use to repair the MBR
Startup Repair
Bootrec.see
A customer is concerned that personal data has been leaked from their mobile phone. They suspect this exposure has been hindering their device for a significant amount of time.
After completing a full malware scan, the system did not return any positive findings relating to or identifying any malware found as a result of the malware hidden within the systems files installed somewhere on the system.
Moving forward the client is requesting to secure any Data Leaks as soon as possible
Perform a Hard ReSet
Users complain that they cannot connect with any Internet websites. They can connect with a web server deployed in the local perimeter network
Technicians verify the problem by attempting to ping a known good site by URL, and the attempt files. They get the same result from multiple network client computers.
What should technicians attempt next ?
Ping an Internet site by Ip Address
Customer bring in a PC for a repair, the customer complains about problems trying to print. Customer also brings in an external hard disk with 2 backups, one made 2 weeks ago, while the other immediately before the computer was brought into the shop for repair (today/that day)
You remove the virus. Determine the printer device has been overwritten and you suspect other alternate device drivers have also been overwritten as well. In order to repair the system as quickly as possible with minimum data loss
SFC
An androids smartphones screen responds inaccurately to touch
Power off and back on
A user of a computer running OS X wants the Safari browser on all his devices to remember his usernames and password! With credit card numbers as well how should they enable this /these features on ALL their DEVICES
Enable iCloud Keychain
Time Machine is a backup App
When you attach an external drive and indicate that it should be used as a backup,OS X performs a full backup and then backs up changes files hourly. You can also use Time Machine with network drives
Time Machine
Your antivirus program identifies an infected files on a computer running Windows 8.1 but cannot remove it because it is already in use
You need to remove the infected file how do you proceed
Boot in Safe Mode and run the virus scan again
Enterprise network has several locations spread across multiple different countries. Company reviews it’s disaster prevention policy and determines that it is advisable to update its backup policies, specifically backup storage locations
Company compares options for Local vs. Cloud Based Backup Solutions.
The storage solution can scale rapidly in response to changing requirements
Backup files are readily available form nearly any location
You need to write a batch file that can be scheduled for execution or run on an as-needed-basis. The batch file needs to backup a computer running Microsoft Windows Server 2012 R2 and the perform prevent disk maintenance, which command do you use to backup computer
Wbadmin
Maximum number of physical RAM supported by 32-bit installation of Windows 7 Pro
4 GB
Windows 7 Starter is limited to no more than
2 GB
Limit for 64 bit versions of Windows varies by edition. It is limited to _____ for Windows 7 Home Basic, _____ for Windows 7 Home Premium, and _______for Windows 7 Pro, Enterprise, and Ultimate
8GB
16GB
192GB
What is a role of a software token on a computer and network security
As part of two factor authentication system
Authentication is based on
What you know - Such as __________
What you have -Such as _____________
What you are - Such as __________________
Password
Security Token
Fingerprint