Comptia A+ 902 Flashcards
(124 cards)
A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet options will allow the user to create these settings?
a. Privacy
b. Advanced
c. Security
d. Conent
d. Content
A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond, boot up and shutdown and take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do next?
a. Reload the OS using FAT 32 instead of NTFS
b. Change the disk from basic to dynamic
c. Run chkdsk with the /r switch and reboot the PC
d. Open the defrag utility and run a drive analysis
c. Run chkdsk with the /r switch and reboot the PC
A technician is upgrading to a 4TB hard drive and wants to have six partitions. Which of the following allows a Windows boot partition to meet these requirements?
a. PRIMARY
b. NTFS
c. FAT32
d. GPT
c. NTFS
A Windows PC suffered a bad update, so a systems administrator removed the update. Which of the following tools should the system administrator run to ensure the Windows files are not corrupted.
a. MSConfig
b. Sfc
c. Defrag
d. Chkdsk
b. Sfc
Which of the following is a security threat that disguises itself as a legitimate software?
a. Trojan
b. Worm
c. Virus
d. Spyware
a. Trojan
A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?
a. chkdsk
b. Degauss
c. Quick Format
d. Drive wipe
d. drive wipe
A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices.
a. Identify symptoms, quarantine infected system, and create restore point
b. Quarantine infected system, identify symptoms, and create restore point
c. Identify symptoms, educate end user, and create restore point
d. Create restore point, identify symptoms, and quarantine infected system
a. identify symptoms, quarantine infected system, and create restore point
Which of the following statement is true regarding the differences between 32 bit and 64 bit OS?
a. The 32 bit version of the OS will not run 64 bit hardware but a 64 bit OS will run on 32 bit hardware
b. the 32 bit version of the OS requires twice the number of CPU clock cycles to write the same amount of data as a 64 bit OS
c. A 64 bit version of the OS will address memory in eight octets
d. A 64 bit version of the OS will write data to disk in blocks of eight octets
c. a 64 bit version of the OS will address memory in eight octets
A technician is running a CAT 5 cable from the IDF to a user’s PC in the office. Which of the following should the technician use for safety reasons?
a. Dusk Mask
b. ESD strap
c. Multimeter
d. Cable tester
c. multimeter
A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance on the host operating system (select 2)
a. Install more physical memory
b. Increase the size of the virtual hardware
c. Install a different hypervisor
d. Reduce physical memory allocated to the VM
e. Clear temporary files in the VM
f. Install additional physical hard drives
a. Install more physical memory
d. Reduce physical memory allocated to the VM
Which of the following feature of the mobile device operates the touch screen?
a. Gyroscope
b. Digitizer
c. Accelerometer
d. Geotracking
b. Digitizer
A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods are most effective.
a. Physical destruction
b. Quick format
c. Low Level Format
d. Overwrite
a. physical destruction
Which of the following is a risk of implementing a BYOD policy?
a. Introducing malware onto the network
b. DHCP may fail due to incompatibility
c. Different encryption technology
d. Higher risk of phishing acts
a. Introducing malware onto the network
A technician has just installed a video card into a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem?
a. Task Manager
b. Device Manager
c. System Configuration
d. Computer Management
b. device manager
Which of the following tools is used to type or past recovery commands directly into a Linux box?
a. Shell/terminal
b. Backup/time machine
c. Command/cmd
d. Restore/snapshot
a. Shell/terminal
A technician is in need of a device that would give the BEST network protection from a single device. Which of the following devices would the technician use?
a. NLX
b. IDS
c. UTM
d. ATX
c. UTM
A home user receives a call from a technician who claims to be with a virus control company. The technician explains that the user’s PC is infected with harmful viruses. The technician instructs the user how to get to the Event Viewer where all the errors can be seen. The technician claims that this can be fixed for money. Which of the following threats has the user been a victim of?
a. Phishing
b. Social Engineering
c. Man in the middle
d. Spoofing
b. social engineering
An end user reports that the Windows PC he is using automatically locks when he leaves his desk for a few minutes to walk to the printer and he must input his password to unlock it. The technician looks at the settings on the PC and notices that the screensaver and screen lock options are grayed out and cannot be changed. What is most likely the cause of this issue.
a. Domain level group policies
b. antivirus domain level policies
c. corrupted registry settings
d. incorrect local level user policies
a. Domain level group policies
A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?
a. 143
b. 23
c. 443
d. 3269
e. 3389
c. 443
A manager suspects a new user has obtained movies protected by copywrite by using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?
a. Secure the workstation in a limited access facility
b. Document the incident, purge all policy violating materials
c. Immediately delete all unauthorized materials
d. Reprimand the user and apply a content filter to their profile
a. Secure the workstation in a limited access facility
A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?
a. Educate the user regarding Internet browsing best practices.
b. Update the anti malware software on the user’s PC
c. Schedule scans and run updates
d. Enable system restore and create a restore point
a. Educate the user regarding Internet browsing best practices
A technician needs to perform a backup while a system is running. Which of the following services allow this task to be accomplished?
a. Robocopy
b. Shadow Copy
c. Xcopy
d. System restore
b. Shadow copy
A technician at a corporation receives an instant message from a user who states the new department shared drive that was given through managed settings is missing from the user’s PC. Which of the following tools should the technician use to BEST troubleshoot the missing shared drive?
a. chmod
b. ipconfig
c. msconfig
d. nslookup
e. gpresult
a. chmod
A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates for JAVA, but is still unable to view the map. The technician should change which of the following Internet Options?
a. Compatibility view
b. Manage add ons
c. Clear browser cache
d. pop up blocker
a. compatibility view