Comptia A+ 902 Flashcards
A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet options will allow the user to create these settings?
a. Privacy
b. Advanced
c. Security
d. Conent
d. Content
A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond, boot up and shutdown and take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do next?
a. Reload the OS using FAT 32 instead of NTFS
b. Change the disk from basic to dynamic
c. Run chkdsk with the /r switch and reboot the PC
d. Open the defrag utility and run a drive analysis
c. Run chkdsk with the /r switch and reboot the PC
A technician is upgrading to a 4TB hard drive and wants to have six partitions. Which of the following allows a Windows boot partition to meet these requirements?
a. PRIMARY
b. NTFS
c. FAT32
d. GPT
c. NTFS
A Windows PC suffered a bad update, so a systems administrator removed the update. Which of the following tools should the system administrator run to ensure the Windows files are not corrupted.
a. MSConfig
b. Sfc
c. Defrag
d. Chkdsk
b. Sfc
Which of the following is a security threat that disguises itself as a legitimate software?
a. Trojan
b. Worm
c. Virus
d. Spyware
a. Trojan
A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?
a. chkdsk
b. Degauss
c. Quick Format
d. Drive wipe
d. drive wipe
A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices.
a. Identify symptoms, quarantine infected system, and create restore point
b. Quarantine infected system, identify symptoms, and create restore point
c. Identify symptoms, educate end user, and create restore point
d. Create restore point, identify symptoms, and quarantine infected system
a. identify symptoms, quarantine infected system, and create restore point
Which of the following statement is true regarding the differences between 32 bit and 64 bit OS?
a. The 32 bit version of the OS will not run 64 bit hardware but a 64 bit OS will run on 32 bit hardware
b. the 32 bit version of the OS requires twice the number of CPU clock cycles to write the same amount of data as a 64 bit OS
c. A 64 bit version of the OS will address memory in eight octets
d. A 64 bit version of the OS will write data to disk in blocks of eight octets
c. a 64 bit version of the OS will address memory in eight octets
A technician is running a CAT 5 cable from the IDF to a user’s PC in the office. Which of the following should the technician use for safety reasons?
a. Dusk Mask
b. ESD strap
c. Multimeter
d. Cable tester
c. multimeter
A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance on the host operating system (select 2)
a. Install more physical memory
b. Increase the size of the virtual hardware
c. Install a different hypervisor
d. Reduce physical memory allocated to the VM
e. Clear temporary files in the VM
f. Install additional physical hard drives
a. Install more physical memory
d. Reduce physical memory allocated to the VM
Which of the following feature of the mobile device operates the touch screen?
a. Gyroscope
b. Digitizer
c. Accelerometer
d. Geotracking
b. Digitizer
A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods are most effective.
a. Physical destruction
b. Quick format
c. Low Level Format
d. Overwrite
a. physical destruction
Which of the following is a risk of implementing a BYOD policy?
a. Introducing malware onto the network
b. DHCP may fail due to incompatibility
c. Different encryption technology
d. Higher risk of phishing acts
a. Introducing malware onto the network
A technician has just installed a video card into a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem?
a. Task Manager
b. Device Manager
c. System Configuration
d. Computer Management
b. device manager
Which of the following tools is used to type or past recovery commands directly into a Linux box?
a. Shell/terminal
b. Backup/time machine
c. Command/cmd
d. Restore/snapshot
a. Shell/terminal
A technician is in need of a device that would give the BEST network protection from a single device. Which of the following devices would the technician use?
a. NLX
b. IDS
c. UTM
d. ATX
c. UTM
A home user receives a call from a technician who claims to be with a virus control company. The technician explains that the user’s PC is infected with harmful viruses. The technician instructs the user how to get to the Event Viewer where all the errors can be seen. The technician claims that this can be fixed for money. Which of the following threats has the user been a victim of?
a. Phishing
b. Social Engineering
c. Man in the middle
d. Spoofing
b. social engineering
An end user reports that the Windows PC he is using automatically locks when he leaves his desk for a few minutes to walk to the printer and he must input his password to unlock it. The technician looks at the settings on the PC and notices that the screensaver and screen lock options are grayed out and cannot be changed. What is most likely the cause of this issue.
a. Domain level group policies
b. antivirus domain level policies
c. corrupted registry settings
d. incorrect local level user policies
a. Domain level group policies
A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?
a. 143
b. 23
c. 443
d. 3269
e. 3389
c. 443
A manager suspects a new user has obtained movies protected by copywrite by using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?
a. Secure the workstation in a limited access facility
b. Document the incident, purge all policy violating materials
c. Immediately delete all unauthorized materials
d. Reprimand the user and apply a content filter to their profile
a. Secure the workstation in a limited access facility
A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?
a. Educate the user regarding Internet browsing best practices.
b. Update the anti malware software on the user’s PC
c. Schedule scans and run updates
d. Enable system restore and create a restore point
a. Educate the user regarding Internet browsing best practices
A technician needs to perform a backup while a system is running. Which of the following services allow this task to be accomplished?
a. Robocopy
b. Shadow Copy
c. Xcopy
d. System restore
b. Shadow copy
A technician at a corporation receives an instant message from a user who states the new department shared drive that was given through managed settings is missing from the user’s PC. Which of the following tools should the technician use to BEST troubleshoot the missing shared drive?
a. chmod
b. ipconfig
c. msconfig
d. nslookup
e. gpresult
a. chmod
A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates for JAVA, but is still unable to view the map. The technician should change which of the following Internet Options?
a. Compatibility view
b. Manage add ons
c. Clear browser cache
d. pop up blocker
a. compatibility view
A technician has been given a PC that won’t power up. After brief troubleshooting, the technician comes to the conclusion that the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair.
a. The technician should replace the power supply
b. The technician should review disposal regulations
c. The technician should check the environment
d. The technician should remove jewelry
d. the technician should remove jewelry
A technician is remotely connecting to a workstation using SSH to transfer a security hotfix. Which of the following command line tools would the technician use to create a directory to store the hotfix?
a. dir
b. rd
c. cd
d. md
d. md
A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable what first?
a. PXE
b. WOL
c. Wifi
d. UPNP
a. PXE
An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue.
a. system restore
b. computer management
c. disk management
d. system configuration
a. system restore
Which of the following combinations provides the strongest authentication security?
a. hardware token
b. username and password
c. smart card with pin
d. voice then fingerprint recognition
d. voice then fingerprint recognition
A technician is navigating through Windows OS through a command prompt. The technician needs to display the content of a folder. Which of the following is the Best option for accomplishing this?
a. dir
b. is
c. rd
d. cmd
a. dir
A user reports browsing the internet is slow and an icon with a picture of a person with a headset keeps asking them to “click here for help”. The user clicked on the icon to try to resolve the slowness but all that happens is the computer directs them a website to purchase software. Which of the following should be performed first to resolve this?
a. create a restore point
b. run O/S/ updates
c. Train the user of malicious software
d. identify the type of malware
d. identify the type of malware
A technician would like to remove the dust inside a desktop computer. Which of the following should the tech use to minimize exposure to dust while protecting internal hardware components. (select 2)
a. mask
b. ESD mat
c. ESD strap
d. Antistatic bag
e. safety googles
f. rubber gloves
a. mask
e. safety googles
A technician contacted a vendor, informing them that they need to RMA a faulty memory stick . Which of the following should the technician use to BEST protect this component from further damage during shipment.
a. antistatic bag
b. plastic box
c. cardboard box
d. bubble wrap
e. padded envelope
b. plastic box
A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform next?
a. Copy the DLL from a working PC and use regsvr32 to command to load the file
b. Run the Windows update utility to manually reinstall the DLL file
c. Run the defrag utility to correct any fragmentation that may have damaged the file
d. Research the DLL file to identify the application it corresponds to before continuing
d. Research the DLL file to identify the application it corresponds to before continuing
An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation’s domain. Which of the following utilities will the administrator access to configure this setting?
a. system properties
b. system information
c. system protection
d. system management
a. system properties
A PC technician is configuring IP addresses on a Windows system that has multiple NICs. Which of the following commands would show the IP addresses configured on each network interface?
a. netconfig
b. ifconfig
c. ipconfig
d. netstat
c. ipconfig
A user’s inbox is suddenly receiving dozens of rejection messages from various email servers. Which of the following would the technician perform to BEST solve the issue?
a. Changing the user’s email password
b. Enable spam filtering on email account
c. Change the email account from POP to IMAP
d. Disable the user’s email account
a. changing the user’s email password
Which of the following Windows OS capabilities allow modern Windows versions to run applications written for older versions natively?
a. Microsoft Virtual PC
b. compatibility mode
c. Hyper - V
d. Virtual XP mode
b. compatibility mode
A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of the following is the best method of removing dust from the computer.
a. Use compressed air to free the dust from the components and remove it with an ESD vaccum
b. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away
c. Use a shop vacuum with enough power to ensure all the dust has been removed
d. Remove as much dust as possible by hand and use compressed air to blow the rest out
a. use compressed air to free the dust from the components and remove it with an ESD vaccum
A users mobile device appears to be losing it’s battery life rapidly and and often feels warm to the touch, even when put away. The device is relatively new, so the user is concerned it is defective. Which of the following settings can be changed to resolve the issue.
a. privacy-maps
b. display- brightness
c. storage-photos
d. mail-work
b. display-brightness
A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees laptops have successfully connected to the wireless network, the company would like to prevent additional accesses to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?
a. Enable MAC filtering
b. Disable SSID broadcast
c. Reduce radio power level
d. Update router firmware
a. Enable MAC filtering
A technician installs a new application and restarts the computer. After signing into Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following tools would be used to troubleshoot the problem.
a. msconfig
b. appwiz.cpl
c. gpedit
c. regsrv32
a. msconfig
An employee was arrested after it was determined that an office computer was used for illegal activity that damaged the company. Which of the following MUST be documented on the employee’s computer to ensure the evidence is admissible in court.
a. software inventory
b. personally identifiable information
c. security best practices
d. chain of custody
d. chain of custody
A user states he is unable to use his Android phone after updating the OS. He is in a hurry and wants a quick solution that would most likely fix the issue. Which of the following methods can the technician use?
a. Initiate a factory reset
b. Perform a hard reset
c. Remove the micro SD card
d. Rollback the OS update
b. Perform a hard reset
Which of the following security threats happen when another person enters a secured area with an authorized person.
a. tailgating
b. shoulder surfing
c. spoofing
d. phishing
a. tailgating
Which of the following is the BEST option to prevent data breaches on lost mobile devices.
a. Install a locator application on the mobile device
b. Apply a restriction to lock the device after a certain number of failed login attempts
c. Configure the device to remote wipe as soon as it is reported lost
d. utilize a fingerprint scanner and passcode for multifactor authentication
c. Configure the device to remote wipe as soon as it’s reported lost
Utilizing login information for social media platforms or email providers without requiring additional credentials is commonly referred to as…
a. system federation
b. mutual authentification
c. single sign on
d. multifactor authentification
c. single sign on
A user’s computer has detected a S.M.A.R.T error. Which of the following should the user run to diagnose the issue?
a. scheduled disk maintainence
b. system restore utility
c. disk maintenance utilities
d. driver/firmware updates
d. driver/firmware updates
A technician is using a domain account to access files located on a server at the path \computername\C$. The technician receives an “access denied” error message. Which of the following is most likely the cause of the error?
a. The server is no longer accepting connections since reaching its limit of open shares
b. The password is incorrect, requiring the user to reset it before authentication will proceed
c. The username should be prefixed by the domain, followed by a backslash (domain/username)
d. The account does not have local administrative permissions to access the server share
d. The account does not have local administrative permissions to access the server share