Comptia+ Core 2 packet Flashcards
a new service desk is having a difficult time managing the volume of requests. which of the following is the best solution for the department?
A. Implementing a support portal
B. Creating a ticketing system
C. Commissioning an automated callback system
D. Submitting tickets through email
Implementing a support portal
which of the following Linux commands would be used to install an application?
A. yum
B. grep
C. ls
D. sudo
yum
a network admin is deploying a client certificate to be used for wifi access for all devices in an organization. the certificate will be used in conjunction with the user’s existing username and password. which of the following BEST describes the security benefits realized after this deployment?
A. Multifactor authentication will be forced for wifi
B. All wifi traffic will be encrypted in transit
C. Eavesdropping attempts will be prevented
D. Rogue access points will not connect
Multifactor authentication will be forced for wifi
a user in a corporate office reports the inability to connect to any network drives. no other users have reported this issue. which of the following is the MOST likely reason the user is having this issue?
A. The user is not connected to the VPN
B. The file server is offline
C. A low battery is preventing the connection
D. The login script failed
The user is not connected to the VPN
a tech is installing new network equipment in a SOHO and wants to ensure the equipment is secure against external threats on the internet. which of the following actions should the tech do FIRST?
A. Lock all devices in a closet
B. Ensure all devices are from the same manufacturer
C. Change the default admin password
D. Install the latest operating system and patches
Change the default admin password
a user connected a laptop to a wireless network and was tricked into providing login credentials for a website. which of the following threats was used to carry out the attack?
A. Zero day
B. Phishing
C. DDoS
D. Evil twin
Evil twin
a help desk tech runs the following script: Inventory.py. the tech receives the following error message:
How do you want to open this file?
which of the following is the MOST likely reason this script is unable to run?
A. Scripts are not permitted to run
B. The script was not built for Windows
C. The script requires administrator privileges
D. The runtime environment is not installed
The runtime environment is not installed
a BSOD appears on a user’s workstation monitor. the user immediately presses the power button to shut down the PC, hoping to repair the issue. the user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. which of the following would the tech use to determine the cause?
A. Stope code
B. Event Viewer
C. Services
D. System Configuration
Stop code
a tech suspects the boot disk of a user’s computer contains bad sectors. which of the following should the tech verify in the command prompt to address the issue without making any changes?
A. Run sfc / scannow on the drive as the admin
B. Run cleanmgr on the drive as the admin
C. Run chkdsk on the drive as the admin
D. Run dfrgui on the drive as the admin
Run chkdsk on the drive as the admin
a company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. which of the following attacks is occurring?
A. Zero-day
B. SQL injection
C. Cross-site scripting
D. Distributed denial of service
Distributed denial of service
a tech connects an additional monitor to a PC using a USB port. the original HDMI monitor is mounted to the new monitor. when moving the mouse to the right from the original monitor to to the new monitor the mouse stops at the end of the screen on the original monitor. which of the following would allow the mouse to move to the new monitor?
A. Rearranging the monitor’s position in display settings
B. Swapping the cables for the monitors
C. Using the Ctrl+Alt+=> to correct the display orientation
D. Updating the display drivers for the video card
Rearranging the monitor’s position in display settings
a user is attempting to browse the internet using Internet Explorer. when trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. which of the following would MOST likely solve the issue?
A. Updating the operating system
B. Changing proxy settings
C. Reinstall the browser
D. Enabling port forwarding
Changing the proxy settings
an admin has submitted a change request for an upcoming server deployment. which of the following must be completed before the change can be approved?
A. Risk analysis
B. Sandbox testing
C. End-user acceptance
Risk analysis
a field tech applied a Group Policy setting to all the workstations in the network. this forced the workstations to use a specific SNTP server. users are unable to log in now. which of the following is the MOST likely cause of this issue?
A. The SNTP server is offline
B. A user changed the time zone on a local machine
C. The Group Policy setting has disrupted domain authentication on the system
D. The workstation and the authentication server have a system clock difference
The workstation and the authentication server have a system clock difference
a tech is setting up a backup method on a workstation that only requires 2 sets of tapes to restore. which of the following would BEST accomplish this task?
A. Differential backup
B. Off-site backup
C. Incremental backup
D. Full backup
Full backup
a tech receives a call stating that all files in a user’s documents folder appear to be changed, and each of the files now has a .lock file extension. which of the following actions is the FIRST step the tech should take?
A. Run a live disk clone
B. Run a full anti-virus scan
C. Use batch file to rename the files
D. Disconnect the machine from the network
Disconnect the machine from the network
which of the following file extensions are commonly used to install applications on a macOS machine? (choose 3)
A. .mac
B. .pkg
C. .deb
D. .dmg
E. .msi
F. .appx
G. .app
H. .apk
.pkg
.deb
.app
a suite of security applications was installed a few days ago on a user’s home computer. the user reports that the computer has been running slow since the installation. the user notices the hard drive activity light is constantly solid. which of the following should be checked FIRST?
A. Services in Control Panel to check for overutilization
B. Performance Monitor to check for resources
C. System File Checker to check for modified Windows files
D. Event Viewer to identify errors
Performance Monitor to check for resource utilization
a user is unable to access a website and has submitted a help desk ticket. the website has been verified to be online. which of the following troubleshooting steps will MOST likely resolve this issue?
A. Deleting the browser history
B. Clearing the cache
C. Enable private mode browsing
D. Enabling ad blocking
Clearing the cache
a tech is installing a new business application on a users desktop computer. the machine is running Windows 10 Enterprise 32-bit operating system. which of the following files should the tech execute in order to complete the installation?
A. Installer_x64.exe
B. Installer_Files.zip
C. Installer_32.msi
D. Installer_x86.exe
E. Installer_Win10Enterprise.dmg
Installer_x86.exe
a tech is setting up a new laptop for an employee who travels. which of the following is the BEST security practice for this scenario?
A. PIN-based login
B. Quarterly password changes
C. Hard drive encryption
D. A physical laptop lock
Hard drive encryption
a user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. the user logs on to the old desktop and receives the same message. a tech checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. which of the following should the tech do to MOST likely resolve the issue?
A. Bridge the LAN connection between the laptop and the desktop
B. Set the laptop configuration to DHCP to prevent conflicts
C. Remove the static IP configuration from the desktop
D. Replace the network card in the laptop, as it may be defective
set the laptop configuration to DHCP to prevent conflicts
a user is having issues with document processing software on a Windows workstation. other users that log in to the same device do not have the same issues. which of the following should the tech do to remediate the issue?
A. Roll back the updates
B. Increase the page file
C. Update the drivers
D. Rebuild the profile
Increase the page file
which of the following is the MOST basic of the Windows that includes BitLocker?
A. Home
B. Pro
C. Enterprise
D. Pro for Workstation
Pro