Comptia A+ 902 Flashcards

1
Q

A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet options will allow the user to create these settings?

a. Privacy
b. Advanced
c. Security
d. Conent

A

d. Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond, boot up and shutdown and take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do next?

a. Reload the OS using FAT 32 instead of NTFS
b. Change the disk from basic to dynamic
c. Run chkdsk with the /r switch and reboot the PC
d. Open the defrag utility and run a drive analysis

A

c. Run chkdsk with the /r switch and reboot the PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is upgrading to a 4TB hard drive and wants to have six partitions. Which of the following allows a Windows boot partition to meet these requirements?

a. PRIMARY
b. NTFS
c. FAT32
d. GPT

A

c. NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Windows PC suffered a bad update, so a systems administrator removed the update. Which of the following tools should the system administrator run to ensure the Windows files are not corrupted.

a. MSConfig
b. Sfc
c. Defrag
d. Chkdsk

A

b. Sfc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a security threat that disguises itself as a legitimate software?

a. Trojan
b. Worm
c. Virus
d. Spyware

A

a. Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?

a. chkdsk
b. Degauss
c. Quick Format
d. Drive wipe

A

d. drive wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices.

a. Identify symptoms, quarantine infected system, and create restore point
b. Quarantine infected system, identify symptoms, and create restore point
c. Identify symptoms, educate end user, and create restore point
d. Create restore point, identify symptoms, and quarantine infected system

A

a. identify symptoms, quarantine infected system, and create restore point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following statement is true regarding the differences between 32 bit and 64 bit OS?

a. The 32 bit version of the OS will not run 64 bit hardware but a 64 bit OS will run on 32 bit hardware
b. the 32 bit version of the OS requires twice the number of CPU clock cycles to write the same amount of data as a 64 bit OS
c. A 64 bit version of the OS will address memory in eight octets
d. A 64 bit version of the OS will write data to disk in blocks of eight octets

A

c. a 64 bit version of the OS will address memory in eight octets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician is running a CAT 5 cable from the IDF to a user’s PC in the office. Which of the following should the technician use for safety reasons?

a. Dusk Mask
b. ESD strap
c. Multimeter
d. Cable tester

A

c. multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance on the host operating system (select 2)

a. Install more physical memory
b. Increase the size of the virtual hardware
c. Install a different hypervisor
d. Reduce physical memory allocated to the VM
e. Clear temporary files in the VM
f. Install additional physical hard drives

A

a. Install more physical memory

d. Reduce physical memory allocated to the VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following feature of the mobile device operates the touch screen?

a. Gyroscope
b. Digitizer
c. Accelerometer
d. Geotracking

A

b. Digitizer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods are most effective.

a. Physical destruction
b. Quick format
c. Low Level Format
d. Overwrite

A

a. physical destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a risk of implementing a BYOD policy?

a. Introducing malware onto the network
b. DHCP may fail due to incompatibility
c. Different encryption technology
d. Higher risk of phishing acts

A

a. Introducing malware onto the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician has just installed a video card into a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem?

a. Task Manager
b. Device Manager
c. System Configuration
d. Computer Management

A

b. device manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following tools is used to type or past recovery commands directly into a Linux box?

a. Shell/terminal
b. Backup/time machine
c. Command/cmd
d. Restore/snapshot

A

a. Shell/terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician is in need of a device that would give the BEST network protection from a single device. Which of the following devices would the technician use?

a. NLX
b. IDS
c. UTM
d. ATX

A

c. UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A home user receives a call from a technician who claims to be with a virus control company. The technician explains that the user’s PC is infected with harmful viruses. The technician instructs the user how to get to the Event Viewer where all the errors can be seen. The technician claims that this can be fixed for money. Which of the following threats has the user been a victim of?

a. Phishing
b. Social Engineering
c. Man in the middle
d. Spoofing

A

b. social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An end user reports that the Windows PC he is using automatically locks when he leaves his desk for a few minutes to walk to the printer and he must input his password to unlock it. The technician looks at the settings on the PC and notices that the screensaver and screen lock options are grayed out and cannot be changed. What is most likely the cause of this issue.

a. Domain level group policies
b. antivirus domain level policies
c. corrupted registry settings
d. incorrect local level user policies

A

a. Domain level group policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?

a. 143
b. 23
c. 443
d. 3269
e. 3389

A

c. 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A manager suspects a new user has obtained movies protected by copywrite by using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?

a. Secure the workstation in a limited access facility
b. Document the incident, purge all policy violating materials
c. Immediately delete all unauthorized materials
d. Reprimand the user and apply a content filter to their profile

A

a. Secure the workstation in a limited access facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?

a. Educate the user regarding Internet browsing best practices.
b. Update the anti malware software on the user’s PC
c. Schedule scans and run updates
d. Enable system restore and create a restore point

A

a. Educate the user regarding Internet browsing best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A technician needs to perform a backup while a system is running. Which of the following services allow this task to be accomplished?

a. Robocopy
b. Shadow Copy
c. Xcopy
d. System restore

A

b. Shadow copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A technician at a corporation receives an instant message from a user who states the new department shared drive that was given through managed settings is missing from the user’s PC. Which of the following tools should the technician use to BEST troubleshoot the missing shared drive?

a. chmod
b. ipconfig
c. msconfig
d. nslookup
e. gpresult

A

a. chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates for JAVA, but is still unable to view the map. The technician should change which of the following Internet Options?

a. Compatibility view
b. Manage add ons
c. Clear browser cache
d. pop up blocker

A

a. compatibility view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A technician has been given a PC that won’t power up. After brief troubleshooting, the technician comes to the conclusion that the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair.

a. The technician should replace the power supply
b. The technician should review disposal regulations
c. The technician should check the environment
d. The technician should remove jewelry

A

d. the technician should remove jewelry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A technician is remotely connecting to a workstation using SSH to transfer a security hotfix. Which of the following command line tools would the technician use to create a directory to store the hotfix?

a. dir
b. rd
c. cd
d. md

A

d. md

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable what first?

a. PXE
b. WOL
c. Wifi
d. UPNP

A

a. PXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue.

a. system restore
b. computer management
c. disk management
d. system configuration

A

a. system restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following combinations provides the strongest authentication security?

a. hardware token
b. username and password
c. smart card with pin
d. voice then fingerprint recognition

A

d. voice then fingerprint recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A technician is navigating through Windows OS through a command prompt. The technician needs to display the content of a folder. Which of the following is the Best option for accomplishing this?

a. dir
b. is
c. rd
d. cmd

A

a. dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A user reports browsing the internet is slow and an icon with a picture of a person with a headset keeps asking them to “click here for help”. The user clicked on the icon to try to resolve the slowness but all that happens is the computer directs them a website to purchase software. Which of the following should be performed first to resolve this?

a. create a restore point
b. run O/S/ updates
c. Train the user of malicious software
d. identify the type of malware

A

d. identify the type of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A technician would like to remove the dust inside a desktop computer. Which of the following should the tech use to minimize exposure to dust while protecting internal hardware components. (select 2)

a. mask
b. ESD mat
c. ESD strap
d. Antistatic bag
e. safety googles
f. rubber gloves

A

a. mask

e. safety googles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A technician contacted a vendor, informing them that they need to RMA a faulty memory stick . Which of the following should the technician use to BEST protect this component from further damage during shipment.

a. antistatic bag
b. plastic box
c. cardboard box
d. bubble wrap
e. padded envelope

A

b. plastic box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform next?

a. Copy the DLL from a working PC and use regsvr32 to command to load the file
b. Run the Windows update utility to manually reinstall the DLL file
c. Run the defrag utility to correct any fragmentation that may have damaged the file
d. Research the DLL file to identify the application it corresponds to before continuing

A

d. Research the DLL file to identify the application it corresponds to before continuing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation’s domain. Which of the following utilities will the administrator access to configure this setting?

a. system properties
b. system information
c. system protection
d. system management

A

a. system properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A PC technician is configuring IP addresses on a Windows system that has multiple NICs. Which of the following commands would show the IP addresses configured on each network interface?

a. netconfig
b. ifconfig
c. ipconfig
d. netstat

A

c. ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A user’s inbox is suddenly receiving dozens of rejection messages from various email servers. Which of the following would the technician perform to BEST solve the issue?

a. Changing the user’s email password
b. Enable spam filtering on email account
c. Change the email account from POP to IMAP
d. Disable the user’s email account

A

a. changing the user’s email password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following Windows OS capabilities allow modern Windows versions to run applications written for older versions natively?

a. Microsoft Virtual PC
b. compatibility mode
c. Hyper - V
d. Virtual XP mode

A

b. compatibility mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of the following is the best method of removing dust from the computer.

a. Use compressed air to free the dust from the components and remove it with an ESD vaccum
b. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away
c. Use a shop vacuum with enough power to ensure all the dust has been removed
d. Remove as much dust as possible by hand and use compressed air to blow the rest out

A

a. use compressed air to free the dust from the components and remove it with an ESD vaccum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A users mobile device appears to be losing it’s battery life rapidly and and often feels warm to the touch, even when put away. The device is relatively new, so the user is concerned it is defective. Which of the following settings can be changed to resolve the issue.

a. privacy-maps
b. display- brightness
c. storage-photos
d. mail-work

A

b. display-brightness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees laptops have successfully connected to the wireless network, the company would like to prevent additional accesses to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?

a. Enable MAC filtering
b. Disable SSID broadcast
c. Reduce radio power level
d. Update router firmware

A

a. Enable MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A technician installs a new application and restarts the computer. After signing into Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following tools would be used to troubleshoot the problem.

a. msconfig
b. appwiz.cpl
c. gpedit
c. regsrv32

A

a. msconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

An employee was arrested after it was determined that an office computer was used for illegal activity that damaged the company. Which of the following MUST be documented on the employee’s computer to ensure the evidence is admissible in court.

a. software inventory
b. personally identifiable information
c. security best practices
d. chain of custody

A

d. chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A user states he is unable to use his Android phone after updating the OS. He is in a hurry and wants a quick solution that would most likely fix the issue. Which of the following methods can the technician use?

a. Initiate a factory reset
b. Perform a hard reset
c. Remove the micro SD card
d. Rollback the OS update

A

b. Perform a hard reset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following security threats happen when another person enters a secured area with an authorized person.

a. tailgating
b. shoulder surfing
c. spoofing
d. phishing

A

a. tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is the BEST option to prevent data breaches on lost mobile devices.

a. Install a locator application on the mobile device
b. Apply a restriction to lock the device after a certain number of failed login attempts
c. Configure the device to remote wipe as soon as it is reported lost
d. utilize a fingerprint scanner and passcode for multifactor authentication

A

c. Configure the device to remote wipe as soon as it’s reported lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Utilizing login information for social media platforms or email providers without requiring additional credentials is commonly referred to as…

a. system federation
b. mutual authentification
c. single sign on
d. multifactor authentification

A

c. single sign on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A user’s computer has detected a S.M.A.R.T error. Which of the following should the user run to diagnose the issue?

a. scheduled disk maintainence
b. system restore utility
c. disk maintenance utilities
d. driver/firmware updates

A

d. driver/firmware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A technician is using a domain account to access files located on a server at the path \computername\C$. The technician receives an “access denied” error message. Which of the following is most likely the cause of the error?

a. The server is no longer accepting connections since reaching its limit of open shares
b. The password is incorrect, requiring the user to reset it before authentication will proceed
c. The username should be prefixed by the domain, followed by a backslash (domain/username)
d. The account does not have local administrative permissions to access the server share

A

d. The account does not have local administrative permissions to access the server share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation?

a. extract
b. tasklist
c. gpupdate
d. gpresult
e. chkdsk

A

d. gpresult

51
Q

In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed first?

a. use safety googles
b. remove jewelry
c. put on an ESD strap
d. disconnect power

A

d. disconnect power

52
Q

A customer call the help desk to report an issue. The customer suggests the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?

a. Follow the customer’s proposed course of action
b. Convince the customer to take a better course of action to resolve the issue
c. Explain why the customer’s prescribed course of action is incorrect
d. Acknowledge the customer’s input , but follow another course of action

A

d. Acknowledge the customer’s input , but follow another course of action

53
Q

A technician is tasked with setting up a user’s webmail on a tablet, phone and laptop. The user would like the data synced on all 3 devices. Which of the following items can be synced to the devices via webmail?

a. Free/busy
b. Programs
c. Documents
d. Calendar
e. Favorites
f. Social Media
g. contacts

A

a. Free/busy
d. Calendar
g. Contacts

54
Q

A technician is troubleshooting a startup failure on a Windows domain controller DNS service. The technician discovers a third party application is running a database server application that happens to capture the same high number ports as the DNS service. The application service ports cannot be changed due to application design. Which is the following is the BEST solution to resolve the problem.

a. Allow the database application to start up first, and set the DNS service to delayed start
b. Allow the DNS server service to start up first, and set the application service to delayed start
c. Move the third party database application to a different domain controller
d. Contact the application vendor to find out if the ports it uses can be changed

A

c. Move the third party database application to a different domain controller

55
Q

An end user calls the company’s IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following BEST represents a possible cause?

a. A valid certificate suitable for S/MIME is not installed
b. Emails received by the user lack suitable digital signatures
c. SSL/TLS certificates stored on the device are expired
d. The sender did not have the addressee’s public certificate

A

a. A valid certificate suitable for S/MIME is not installed

56
Q

A user wants to save a file into another user’s directory, but the file saved is denied. Which of the following is the most likely reason the file save cannot be completed?

a. The user must be a member of the Users group
b. The user requires write permissions to the folder
c. The user requires read permission to the folder
d. The user must be a member of the Administrators group

A

b. The user requires write permissions to the folder

57
Q

A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?

a. Disable System Restore
b. Schedule scans and run updates in safe mode
c. Quarantine the system
d. Create a system restore point

A

c. Quarantine the system

58
Q

A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud based service. Which of the following would be BEST to use to accomplish this?

a. Google Drive
b. iCloud
c. One Drive
d. FTTP

A

c. One Drive

59
Q

A recent data breach has revealed that compromised files contained employee photos, names and addresses. This information is sensitive because it is considered to be:

a. a detriment to employee/employer relations
b. personally identifiable information
c. a violation of information access policies
d. proof of employee corporate affiliation

A

b. personally identifiable information

60
Q

A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline review. Which of the following Windows command line tools would allow the technician to accomplish this task?

a. gpedit.msc
b. gpupdate
c. gpresult
d. gpmc.msc

A

c. gpresult

61
Q

After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The malware disables the computers antivirus software and internet connection. Which of the following would be BEST tool to remove the malware without risking loss of the user’s data?

a. run system restore
b. reinstall windows with the repair option
c. reinstall windows on top of itself
d. run system file checker

A

a. run system restore

62
Q

A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. What is the BEST step the user can take to fix this problem?

a. Perform a force stop
b. Reset to factory default
c. Upgrade to a larger battery
d. Close running apps

A

b. Restore to factory default

63
Q

Joe just downloaded a game on his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is a victim of what threat?

a. Trojan Horse
b. Spyware
c. Social Engineering
d. Worms

A

a. Trojan Horse

64
Q

Joe reports that his computer is displaying numerous pop up ads and is performing very slowly during the work day. Which of the following tools should the technician use FIRST to troubleshoot this issue?

a. Reinstall the Internet browser software
b. Run a trusted antivirus scan
c. Perform a System Restore
d. Enable the local firewall

A

b. Run a trusted antivirus scan

65
Q

Which of the following commands are used from a Linux command line interface to elevate a user’s access level to administrative privilege (select 2)

a. chmod
b. passwd
c. sudo
d. su
e. runas
f. pwd

A

c. sudo

d. su

66
Q

An IPS appliance is installed on the network Which of the following is the purpose of the IPS?

a. To check the network for unwanted activity
b. To check and stop unwanted activity
c. To provide connectivity to the network
d. To test the resilience of the network

A

b. To check and stop unwanted activity

67
Q

Which of the following built in accounts removed in Windows 10?

a. Power user
b. Administrator
c. Guest
d. Standard User

A

c. Guest

68
Q

A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help to accomplish this?

a. Place directional antennas
b. Use omni-directional antennas
c. Enable MAC filtering
d. Disable SSID broadcast

A

a. Place directional antennas

69
Q

Which of the following should be used to ensure that a Windows OS is functioning optimally?

a. Driver updates
b. Scheduled backups
c. Application updates
d. restore points

A

a. driver updates

70
Q

A company wants all new PCs to have a standard sleep and hibernate schedule. Which of the following would allow this to be accomplished?

a. Adjust the power plan to Energy Saver
b. Schedule nightly shutdowns
c. Import a customized power plan
d. Change the settings in the BIOS

A

c. Import a customized power plan

71
Q

Ann receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST described this type of attack?

a. Shoulder surfing
b. man in the middle
c. social engineering
d. ransomware

A

c. social engineering

72
Q

A user is experiencing unexpectedly long boot times and abnormally slow performance on a Windows computer. The technician opens the Task Manager and notices there is extremely high disk utilization with low network utilization, even after a reboot. Which of the following should the technician use to diagnose the issue?

a. Regsvr32
b. Computer Management
c. Dr. Watson
d. MSConfig

A

b. Computer Management

73
Q

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation (select 2)

a. rename default accounts
b. disable Windows Update
c. Configure single sign on
d. Run gpupdate tool
e. disable guest account
f. disable action center popups

A

a. rename default accounts

e. disable guest account

74
Q

A customer’s Windows 7 Home Premium computer displays a stop error and automatically reboots. Which of the following utilities can a support technician use to find more information about the cause of the error?

a. Action Center
b. Event Viewer
c. File Explorer
d. Disk Management

A

b. Event Viewer

75
Q

A user wants to see extensions for all files when navigating the desktop’s file structure. Which of the following Control Panel utilities should the technician access to configure the display of file extensions?

a. System
b. User Accounts
c. Personalization
d. Administrative Tools
e. Folder Options

A

e. Folder Options

76
Q

A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?

a. VPN
b. ACL
c. RDP
d. DLP

A

b. ACL

77
Q

A technician wants to delete all information from a laptop so its not recoverable, but needs to repurpose the laptop drive for future use. Which of the following is the BEST option to accomplish this task?

a. Degauss
b. Overwrite
c. Standard format
d. Low level format

A

d. low level format

78
Q

A PC technician has been asked to verify certain Group Policies applied to a workstation. Which of the following commands should be run on the workstation?

a. extract
b. tasklist
c. gpupdate
d. gpresult
e. chkdsk

A

d. gpresult

79
Q

A user tries to login and receives the error message “The User Profile service failed to login. User profile cannot be leaded”. Which of the following should be the FIRST method to troubleshoot the issue.

a. Use Automated System Recovery
b. Boot PC into safe mode
c. Use System File Checker
d. Perform hardware diagnostics

A

b. Boot PC into safe mode

80
Q

A computer on a Windows domain has been identified as not having the most current policy. Which of the following tools would a technician run on the local machine to rectify this?

A

a. gpresult
b. msconfig
c. ipconfig
d. gpupdate

81
Q

Which of the following Windows features would be used to encrypt a single file or folder?

a. EFS
b. NTFS
c. BitLocker
d. Security

A

a. EFS

82
Q

A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files have green letters in the filenames. Which of the following file systems is causing this to occur?

a. exFAT
b. COMPRESSED
c. EFS
d. NTFS

A

c. EFS

83
Q

A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken?

a. Map printer
b. Reboot computer
c. Check to see if printer is turned on
d. Log in as a different user and see if printer is mapped

A

a. Map printer

84
Q

A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?

a. recycling
b. shredding
c. overwriting
d. reformatting

A

b. shredding

85
Q

Which of the following best practices is used to fix a zero-day vulnerability on Linux?

a. Scheduled backup
b. Scheduled disk maintainence
c. Patch management
d. Antivirus Update

A

c. Patch management

86
Q

A PC technician issues the following command in a terminal window: cat passwd

The output of the command is garbled and unreadable. Which of the following BEST explains this output?

a. The passwd file is binary
b. The passwd file is a system file
c. The passwd file cannot be edited
d. The technician does not have proper permissions

A

b. The passwd file is a system file

87
Q

A technician needs to format a new drive on a workstation. The technician will need to configure read attributes to specific local files and write extended attributes to specific folders. Which of the following will allow the technician to configure these settings in a Windows environment?

a. ext4
b. HFS+
c. FAT32
d. NTFS

A

d. NTFS

88
Q

A user has become the victim of data harvesting. The user wants to know more about the potential for mobile device application security issues. Which of the following settings should a technician advise the user to change on the user’s mobile device ( select 3)

a. Location tracking
b. Camera activation
c. Data transmission limit
d. System lockouts
e. Developer options
f. Accessibility
g. Synchronization
h. Storage

A

a. Location Tracking
f. Accessibility
h. Storage

89
Q

Users on the corporate network are reporting that accessing folders is very slow on internal network servers. Which of the following should the technician troubleshoot to resolve the problem?

a. DHCP server
b. Web server
c. File server
d. Proxy server

A

c. File server

90
Q

A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this?

a. place directional antennas
b. use omi-directional antennas
c. Enable MAC filtering
d. Disable SSID broadcast

A

a. place directional antennas

91
Q

A technician is asked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?

a. GPT
b. Logical
c. MBR
d. Extended

A

a. GPT

92
Q

A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to move to the next user. Which of the following is the appropriate NEXT step (select 2)

a. View the CMD process in Task Manager
b. Type EXIT at the command prompt and press ENTER
c. Minimize the CMD box to the taskbar
d. Click the “x” in the top right of the CMD window
e. Select Switch User on the PC

A

b. Type EXIT at the command prompt and press ENTER

d. Click the “x” in the top right of the CMD window

93
Q

An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?

a. Recovery Partition
b. Primary Partition
c. System restore
d. System refresh

A

a. Recovery Partition

94
Q

A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands

a. extract
b. diskpart
c. bootrec
d. chkdsk

A

b. diskpart

95
Q

An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user?

a. Power User
b. Adminstrator
c. Standard
d. Guest

A

a. Power User

96
Q

A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this?

a. Clone the operating system from an image onto optical media
b. Use the original software to load the operating system on every PC
c. Set up a central image that the PCs can load from a PXE boot
d. Create an image and copy it from a USB drive using an unattended answer file

A

c. Set up a central image that the PCs can load from a PXE boot

97
Q

A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?

a. 10 feet
b. 15 feet
c. 30 feet
d. 45 feet

A

c. 30 feet

98
Q

A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?

a, The workstation is a victim of a denial of service attack

b. The username is not authenticating on the network
c. The username is not part of a local administrator group
d. The administrator has not applied appropriate security patches

A

c. The username is not part of a local administrator group

99
Q

A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should be performed next?

a. Reset the device’s network settings
b. Check the data usage statistics on the device
c. Verify the SSID with which the device is associated
c. Run any pending OS or application updates

A

a. Reset the device’s network settings

100
Q

A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task?

a. msconfig
b. perfmon
c. taskmgr
d .dxdiag

A

a. msconfig

101
Q

A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?

a. Change the router firewall settings
b. Check for and apply a firmware update
c. Reconfigure the QoS settings
d. Change router user names and passwords

A

b. Check for and apply a firmware update

102
Q

A system administrator wants to test a tool to enhance productivity but does not want to run it in the live production environment. The system administrator has a powerful PC running Windows 8.1. Which of the following should the systems administrator set up to test the tool on the PC without changing the base configuration?

a. Native Windows
b. Virtualization
c. Emulation
d. Safe Mode

A

c. Emulation

103
Q

Joes reports he is unable to install an OS on a home computer. An investigation reveals Joe is using an enterprise license key. Which of the following is MOST likely the issue?

a. The wrong media is being used
b. The media is corrupt
c. The hardware is unsupported
d. The boot order is incorrect

A

c. The hardware is unsupported

104
Q

A user reports that the Internet connection is not working on a corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next?

a. host files
b. IPv6 settings
c. Proxy settings
d. Lmhosts files

A

c. proxy settings

105
Q

A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll?

a. gpresult
b. msconfig
c. regedit
d. gpupdate
e. regsvr32

A

e. regsvr32

106
Q

Which of the following should be used to ensure that a Windows OS is functioning optimally?

a, Driver updates

b. Scheduled backups
c. Application updates
d. Restore points

A

a, Driver updates

107
Q

A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss?

a. Factory restore
b. SecureBoot
c. msconfig
d. diskpart

A

c. misconfig

108
Q

An administrator has verified that a PC has no internet connectivity. Using ipconfig shows that the IP address for the machine is completely different than the assigned network address. After using ipconfig/release and ipconfig/renew, the computer is still asosigned the same address. Which of the following is MOST likely the cause of the issues?

a. The NIC drivers are not properly installed
b. HomeGroup is misconfigured
c. DHCP server is unavailable
d. A static IP address is configured

A

d. A static IP address is configured

109
Q

After confirming BIOS support, technician has added a second video card and a new sound card to a computer’s motherboard. The computer continuously restarts. This is an indication of which of the following?

a. Incompatible sound card
b. Insufficient power supply
c. Insufficient memory
d. Defective video card

A

b. Insufficient power supply

110
Q

The type of security threat that uses computers or other networks to accept and pass on viruses is called:

a. phishing
b. botnets
c. logic bomb
d. man in the middle

A

b. botnets

111
Q

A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part?

a. Ground the computer and remove jewelry
b. Self ground and handle the new card by the edges
c. Place the computer on an ESD mat
d. Attach an ESD strap to the new card during handling

A

b. Self ground and handle the new card by the edges

112
Q

Data on full disk encryption drives using BitLocker is MOST secure from loss when combined with which of the following technologies?

a. USB authentication token
b. Filesystem access controls
c. Trusted platform module
d. Fingerprint reader

A

c. Trusted platform module

113
Q

A user needs to access files within a shared folder on a Linux server. The user is mapped to the folder but cannot access the files. Which of the following tools should the technician use to give the user access to these files (select 2)

a. groups
b. netshare
c. chown
d. chmod
e. apt-get
f. passwd

A

c. chown

d. chmod

114
Q

Ann reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the internet. Which of the following is the FIRST step in implementing a best practice security policy?

a. Require biometric identification to log into the laptop
b. Require multifactor authentication to log into laptop
c. Require laptop hard drives to be encrypted
d. Require users to change their password at frequent intervals
e. Require users to have strong passwords

A

c. Require laptop hard drives to be encrypted

115
Q

A technician is upgrading a computer to Windows 7 Professional 64 bit version. The current OS is Windows Vista 32 bit. Which of the following methods should the technician use?

a. Windows 7 Professional x64 DVD and select upgrade option
b. Windows 7 Professional x64 DVD and custom install
c. Windows 7 Professional x86 DVD and select remote install
D. Windows 7 Professional x86 in place upgrade

A

b. Windows 7 Professional x64 DVD and custom install

116
Q

An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about 2 years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem?

a. Run defrag on the hard drive
b. Restore the CAD files from backup
c. Replace the hard drive
d. Remove and reinstall the CAD software

A

A. Run defrag on the hard drive

117
Q

A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition?

a. credential manager
b. computer management
c. device manager
d. TPM manager

A

b. computer management

118
Q

Which of the following technologies ensures full device encryption on a Windows mobile device?

a. BitLocker
b. UEFI
c. TPM
d. Passcode

A

a. BitLocker

119
Q

A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands?

a. extract
b. diskpart
c. bootrec
d. chkdsk

A

b. diskpart

120
Q

A technician is installing Windows 7 on a computer with a previously used hard drive. After receiving an error, the technician realizes the hard drive does not support this install. Which of the following tasks should the technician perform?

a. partition the hard drive in extended format
b. use windows update to download the appropriate driver
c. enable multiboot in the BIOS
d. convert the file system to NTFS

A

d. convert the file system to NTFS

121
Q

Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?

a. anti malware updates
b. driver updates
c. windows updates
d. firmware updates

A

c. windows updates

122
Q

A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector’s features safeguard the connected equipment by directing surges to the:

a. path of shortest conductance
b. path of lowest inductance
c. path of highest voltage
d. path of least resistance

A

d. path of least resistance

123
Q

An end user calls the company’s IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following BEST represents a possible cause?

a. a valid certificate suitable for S/MIME is not installed
b. Emails received by the user lack suitable digital signatures
c. SSL/TLS certificates stored on the device are expired
d. The sender did not have the addressee’s public certificate

A

a. a valid certificate suitable for S/MIME is not installed

124
Q

A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done next?

a. Enter all the passwords they have used in the past
b. Verify a smart card has been issued
c. check the network cable
d. reboot the computer

A

b. verify a smart card has been issued