Comptia+ Core 2 packet Flashcards

1
Q

a new service desk is having a difficult time managing the volume of requests. which of the following is the best solution for the department?
A. Implementing a support portal
B. Creating a ticketing system
C. Commissioning an automated callback system
D. Submitting tickets through email

A

Implementing a support portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which of the following Linux commands would be used to install an application?
A. yum
B. grep
C. ls
D. sudo

A

yum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a network admin is deploying a client certificate to be used for wifi access for all devices in an organization. the certificate will be used in conjunction with the user’s existing username and password. which of the following BEST describes the security benefits realized after this deployment?
A. Multifactor authentication will be forced for wifi
B. All wifi traffic will be encrypted in transit
C. Eavesdropping attempts will be prevented
D. Rogue access points will not connect

A

Multifactor authentication will be forced for wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a user in a corporate office reports the inability to connect to any network drives. no other users have reported this issue. which of the following is the MOST likely reason the user is having this issue?
A. The user is not connected to the VPN
B. The file server is offline
C. A low battery is preventing the connection
D. The login script failed

A

The user is not connected to the VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a tech is installing new network equipment in a SOHO and wants to ensure the equipment is secure against external threats on the internet. which of the following actions should the tech do FIRST?
A. Lock all devices in a closet
B. Ensure all devices are from the same manufacturer
C. Change the default admin password
D. Install the latest operating system and patches

A

Change the default admin password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a user connected a laptop to a wireless network and was tricked into providing login credentials for a website. which of the following threats was used to carry out the attack?
A. Zero day
B. Phishing
C. DDoS
D. Evil twin

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a help desk tech runs the following script: Inventory.py. the tech receives the following error message:
How do you want to open this file?
which of the following is the MOST likely reason this script is unable to run?
A. Scripts are not permitted to run
B. The script was not built for Windows
C. The script requires administrator privileges
D. The runtime environment is not installed

A

The runtime environment is not installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a BSOD appears on a user’s workstation monitor. the user immediately presses the power button to shut down the PC, hoping to repair the issue. the user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. which of the following would the tech use to determine the cause?
A. Stope code
B. Event Viewer
C. Services
D. System Configuration

A

Stop code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a tech suspects the boot disk of a user’s computer contains bad sectors. which of the following should the tech verify in the command prompt to address the issue without making any changes?
A. Run sfc / scannow on the drive as the admin
B. Run cleanmgr on the drive as the admin
C. Run chkdsk on the drive as the admin
D. Run dfrgui on the drive as the admin

A

Run chkdsk on the drive as the admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. which of the following attacks is occurring?
A. Zero-day
B. SQL injection
C. Cross-site scripting
D. Distributed denial of service

A

Distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a tech connects an additional monitor to a PC using a USB port. the original HDMI monitor is mounted to the new monitor. when moving the mouse to the right from the original monitor to to the new monitor the mouse stops at the end of the screen on the original monitor. which of the following would allow the mouse to move to the new monitor?
A. Rearranging the monitor’s position in display settings
B. Swapping the cables for the monitors
C. Using the Ctrl+Alt+=> to correct the display orientation
D. Updating the display drivers for the video card

A

Rearranging the monitor’s position in display settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a user is attempting to browse the internet using Internet Explorer. when trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. which of the following would MOST likely solve the issue?
A. Updating the operating system
B. Changing proxy settings
C. Reinstall the browser
D. Enabling port forwarding

A

Changing the proxy settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

an admin has submitted a change request for an upcoming server deployment. which of the following must be completed before the change can be approved?
A. Risk analysis
B. Sandbox testing
C. End-user acceptance

A

Risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a field tech applied a Group Policy setting to all the workstations in the network. this forced the workstations to use a specific SNTP server. users are unable to log in now. which of the following is the MOST likely cause of this issue?
A. The SNTP server is offline
B. A user changed the time zone on a local machine
C. The Group Policy setting has disrupted domain authentication on the system
D. The workstation and the authentication server have a system clock difference

A

The workstation and the authentication server have a system clock difference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a tech is setting up a backup method on a workstation that only requires 2 sets of tapes to restore. which of the following would BEST accomplish this task?
A. Differential backup
B. Off-site backup
C. Incremental backup
D. Full backup

A

Full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a tech receives a call stating that all files in a user’s documents folder appear to be changed, and each of the files now has a .lock file extension. which of the following actions is the FIRST step the tech should take?
A. Run a live disk clone
B. Run a full anti-virus scan
C. Use batch file to rename the files
D. Disconnect the machine from the network

A

Disconnect the machine from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

which of the following file extensions are commonly used to install applications on a macOS machine? (choose 3)
A. .mac
B. .pkg
C. .deb
D. .dmg
E. .msi
F. .appx
G. .app
H. .apk

A

.pkg
.deb
.app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a suite of security applications was installed a few days ago on a user’s home computer. the user reports that the computer has been running slow since the installation. the user notices the hard drive activity light is constantly solid. which of the following should be checked FIRST?
A. Services in Control Panel to check for overutilization
B. Performance Monitor to check for resources
C. System File Checker to check for modified Windows files
D. Event Viewer to identify errors

A

Performance Monitor to check for resource utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a user is unable to access a website and has submitted a help desk ticket. the website has been verified to be online. which of the following troubleshooting steps will MOST likely resolve this issue?
A. Deleting the browser history
B. Clearing the cache
C. Enable private mode browsing
D. Enabling ad blocking

A

Clearing the cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a tech is installing a new business application on a users desktop computer. the machine is running Windows 10 Enterprise 32-bit operating system. which of the following files should the tech execute in order to complete the installation?
A. Installer_x64.exe
B. Installer_Files.zip
C. Installer_32.msi
D. Installer_x86.exe
E. Installer_Win10Enterprise.dmg

A

Installer_x86.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a tech is setting up a new laptop for an employee who travels. which of the following is the BEST security practice for this scenario?
A. PIN-based login
B. Quarterly password changes
C. Hard drive encryption
D. A physical laptop lock

A

Hard drive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. the user logs on to the old desktop and receives the same message. a tech checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. which of the following should the tech do to MOST likely resolve the issue?
A. Bridge the LAN connection between the laptop and the desktop
B. Set the laptop configuration to DHCP to prevent conflicts
C. Remove the static IP configuration from the desktop
D. Replace the network card in the laptop, as it may be defective

A

set the laptop configuration to DHCP to prevent conflicts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a user is having issues with document processing software on a Windows workstation. other users that log in to the same device do not have the same issues. which of the following should the tech do to remediate the issue?
A. Roll back the updates
B. Increase the page file
C. Update the drivers
D. Rebuild the profile

A

Increase the page file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

which of the following is the MOST basic of the Windows that includes BitLocker?
A. Home
B. Pro
C. Enterprise
D. Pro for Workstation

A

Pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

a tech is setting up a conference room computer with a script that boots the application on log-in. which of the following would the tech use to accomplish this task? ( Choose 2)
A. File Explorer
B. Startup Folder
C. System Information
D. Programs and features
E. Task Scheduler
F. Device Manager

A

Startup Folder
Task Scheduler

26
Q

a Windows user reported that a pop-up indicated a security issue. during the inspection, an anti-virus system identified malware from a recent download, but it was unable to remove the malware. which of the following actions would be the BEST to remove the malware while also preserving the user’s files?
A. Run the virus scanner in an administrative mode
B. Reinstall the OS
C. Reboot the system in safe mode and rescan
D. Manually delete the infected files

A

Manually delete the infected files

27
Q

. a system admin is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. which of the following Windows utilities is the BEST choice for accessing the necessary configuration to complete this goal?
A. Security and Maintenance
B. Network and Sharing Center
C. Windows Defender Firewall
D. Internet Options

A

Internet Options

28
Q

an analyst needs GUI access to server software running on a macOS server. which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
A. RDP through RD Gateway
B. Apple Remote Desktop
C. SSH access with SSH keys
D. VNC with the username and password

A

VNC with username and password
VNC Virtual Network Computing

29
Q

a company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that the users will root/jailbreak their phones. which of the following technologies can be implemented to prevent this issue?
A. Signed system images
B. Antivirus
C. SSO
D. MDM

A

MDM

30
Q

a tech just completed a Windows 10 installation on a PC that has a total of 10 GB of RAM. the tech notice the Windows OS has only 4 GB of RAM available for use. which of the following explains why the OS can only access 4 GB of RAM?
A. The UEFI settings need to be changed
B. The RAM has compatibility issues with Windows 10
C. Some of the RAM is defective
D. The newly installed OS is x86

A

The newly installed OS is x86

31
Q

an organization’s Chief Financial Officer is concerned about losing access to very sensitive, legacy, unmaintained PII on a workstation if a ransomware outbreak occurs. the CFO has a regulatory requirement to retain this data for many years. which of the following backup methods would BEST meet the requirement?
A. A daily, incremental backup that is saved to the corporate file server
B. Am additional, secondary hard drive in a mirrored RAID configuration
C. A full backup of the data that is stored off-site in cold storage
D. Weekly, differential backups that are stored in a cloud-hosting provider

A

A full backup of the data that is stored in cold storage

32
Q

a tech is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application. the PC uses a USB microphone connected to a powered hub. the tech verifies the microphone works on the PC using Voice Recorder. which of the following should the tech do to solve the issue?
A. Remove the microphone from the USB hub and plug it directly into a USB port on the PC
B. Enable the microphone under Windows Privacy settings to allow desktop apps to access it
C. Delete the microphone from Device Manager and scan for new hardware
D. Replace the USB microphone with one that uses a traditional 3.5mm plug

A

Enable the microphone under Windows Privacy settings to allow desktop apps to access it

33
Q

a user calls the help desk to report potential malware on a computer. the anomalous activity began after the user clicked a link to a free gift card in a recent email. the tech asks the user to describe any unusual activity, such as slow performance, excessive pop-ups and browser redirection. which of the following should the tech do NEXT?
A. Advise the user to run a complete system scan using the OS anti-malware applications
B. Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present
C. Have the user check for recently installed apps and outline those installed since the link in the email was clicked
D. Instruct the user to disconnect the Ethernet connection to the corporate network

A

Instruct the user to disconnect the Ethernet connection to the corporate network

34
Q

a tech downloaded software from the Internet that required the tech to scroll through a text box and at the end of the text box, click a button labeled Accept. which of the following agreements is MOST likely in use?
A. DRM
B. NDA
C. EULA
D. MOU

A

EULA

35
Q

a wireless network is set up, but it is experiencing some interference from other nearby SSIDs. which of the following can BEST resolve the interference?
A. Changing channels
B. Modifying the wireless security
C. Disabling the SSID broadcast
D. Changing the access point name

A

Changing channels

36
Q

a user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. which of the following will MOST likely solve this issue?
A. Recalibrating the magnetometer
B. Recalibrating the compass
C. Recalibrating the digitizer
D. Recalibrating the accelerometer

A

Recalibrating the accelerometer

37
Q

a Microsoft Windows PC needs to be set up for a user at a large corporation. the user will need access to the corporate domain to access emails and shared drives. which of the following versions of Windows would a tech MOST likely deploy for the user?
A. Windows Enterprise Edition
B. Windows Professional Edition
C. Windows Server Standard Edition
D. Windows Home Edition

A

Windows Enterprise Edition

38
Q

an Android user contacts the help desk because a company smartphone failed to complete a tethered OS update. a tech determines there are no error messages on the device. which of the following should the tech do NEXT?
A. Verify all third-party apps are disabled
B. Determine if the device has adequate storage available
C. Check if the battery is sufficiently charged
D. Confirm a strong internet connection is available using WI-FI or cellular data

A

Confirm a strong internet connection is available using WI-FI or cellular data

39
Q

a bank would like to enhance building security to prevent vehicles from driving into the building while also maintaining easy access for customers. which of the following BEST address this need?
A. Guards
B. Bollards
C. Motion sensor
D. Access control vestibule

A

Bollards

40
Q

after a company installed a new SOHO router, customers were unable to access the company hosted public website. which of the following will MOST likely allow customers to access the website?
A. Port forwarding
B. Firmware updates
C. IP filtering
D. Content filtering

A

IP filtering

41
Q

an Android user reports that when attempting to open the company’s proprietary mobile application, it immediately closes. the user states that the issue persists, even after rebooting the phone. the app contains critical information that cannot be lost. which of the following steps should a system admin attempt FIRST?
A. Uninstall and reinstall the app
B. Reset the phone to factory settings
C. Install an alternative app with similar functionality
D. Clear the app cache

A

Clear the app cache

42
Q

a change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. which of the following should be updated before requesting approval again?
A. Scope of change
B. Risk level
C. Rollback plan
D. End-user acceptance

A

Rollback plan

43
Q

a tech is setting up a new laptop. the company’s security policy states that users cannot install virtual machines. which of the following should the tech implement to prevent users from enabling virtual technology on their laptops?
A. UEFI password
B. Secure boot
C. Account lockout
D. Restricted user permissions

A

UEFI password

44
Q

during a recent flight, an executive was unexpectedly sent several dog and cat pictures while trying to watch a movie via in-flight WI-FI on an iPhone. the executive has no records of any contacts sending pictures like these and has not seen these pictures before. to BEST resolve this issue, the executive should?
A. Set AirDrop so that transfers are only accepted from known contacts
B. Completely disable all wireless systems during the flight
C. Disconnect using iMessage and only use secure communication apps
D. Only allow messages and calls from saved contacts

A

Set AirDrop so that transfers are only accepted from known contacts

45
Q

a tech receives a call from a user who is unable to open Outlook. the user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. which of the following is the MOST likely reason Outlook has stopped functioning?
A. Spam filter installation
B. Invalid registry settings
C. Malware infection
D. Operating system update

A

Operating system update

46
Q

a tech is asked to resize a partition on the internal storage drive of a computer running macOS. which of the following tools should the tech use to accomplish this task?
A. Console
B. Disk Utility
C. Time Machine
D. FileVault

A

Disk Utility

47
Q

a user reports that a PC seems to be running more slowly than usual. a tech checks resources, but disk, CPU, and memory usage seem to be fine. the tech sees the GPU temperature is extremely high. which of the following types of malware is MOST likely to blame?
A. Spyware
B. Cryptominer
C. Ransomware
D. Boot sector virus

A

Cryptominer

48
Q

a user is experiencing frequent malware symptoms on a Windows workstation. the user has tried several times to roll back the state, but the malware persists. which of the following would MOST likely resolve the issue?
A. Quarantining the system files
B. Reimaging the workstation
C. Encrypting the hard drive
D. Disabling TLS 1.0 support

A

Reimaging the workstation

49
Q

the user is unable to login to the domain with a desktop PC, but a laptop PC is working properly on the same network. a tech logs in to the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. which of the following is the MOST likely cause of this issue?
A. Time drift
B. Dual in-line memory module failure
C. Application crash
D. Filesystem error

A

Time drift

50
Q

which of the following is a proprietary Cisco AAA protocol?
A. TKIP
B. AES
C. RADIUS
D. TACACS+

A

TACACS+
terminal access controller access-control system

51
Q

a user reports that a workstation is operating sluggishly. several other users operate on the same workstation and have reported that the workstation is operating normally. the system admin has validated that the workstation functions normally. which of the following steps should the system admin most likely attempt NEXT?
A. Increase the paging file size
B. Run chkdsk command
C. Rebuild the user’s profile
D. Add more system memory

A

Rebuild the user’s profile

52
Q

a tech is setting up a desktop computer in a small office. the user will need to access files on a drive shared from another desktop on the network. which of the following configurations should the tech employ to achieve this goal?
A. Configure the network as private
B. Enable a proxy server
C. Grant network admin role to the user
D. Create a shortcut to public documents

A

Configure the network as private

53
Q

an organization is centralizing support functions and requires the ability to support a remote user’s desktop. which of the following technologies will allow the tech to see the issue along with the user?
A. RDP
B. VNC
C. SSH
D. VPN

A

VNC
virtual network computing

54
Q

which of the following provide the BEST way to secure physical access to a data center server room? (choose 2)
A. Biometric lock
B. Badge reader
C. USB token
D. Video surveillance
E. Locking rack

A

Biometric lock
Badge reader

55
Q

a department has the following technical requirements for a new application

Quad Core processor
250GB of hard drive space
6GB of RAM
Touch screen

the company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. which of the following will the company be able to fully take advantage of after the upgrade?
A. CPU
B. Hard drive
C. RAM
D. Touch screen

A

RAM

56
Q

a tech found that an employee is mining cryptocurrency on a work desktop. the company has decided that this action violates its guidelines. which of the following should be updated to reflect this new requirement?
A. MDM
B. EULA
C. IRP
D. AUP

A

AUP
acceptable use policy

57
Q

a user reports that antivirus software indicates a computer is infected with viruses. the user thinks this happened while browsing the internet. the tech does not recognize the interface with which the antivirus message is presented. which of the following is the NEXT step the tech should take?
A. Shut down the infected computer and swap it with another computer
B. Investigate what the interface is and what triggered it to pop up
C. Proceed with initializing a full scan and removal of the viruses using the presented interface
D. Call the phone number displayed in the interface of the antivirus removal tool

A

Proceed with initializing a full scan and removal of the viruses using the presented interface

58
Q

once weekly, a user needs Linux to run a specific open-source app that is not available for the current installed Windows platform. the user has limited bandwidth throughout the day. which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux app and Windows app?
A. Install and run Linux and the required app in a PaaS environment
B. Install and run Linux and the required app as a virtual machine installed under Windows OS
C. Use a swappable drive bay for the boot drive and install each OS with apps on its own drive
D. Set up a dual boot system be selecting the option to install Linux alongside Windows

A

Install and run Linux and the required app as a virtual machine installed under the Windows OS

59
Q

a user attempts to open some files, but a message appears stating that the files are encrypted. the user was able to access these files before without receiving this message, and no changes have been made within the company. which of the following has infected the computer?
A. Cryptominer
B. Phishing
C. Ransomware
D. Keylogger

A

Ransomware

60
Q

which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
A. Acceptable use
B. Chain of custody
C. Security policy
D. Information management

A

Chain of custody

61
Q

a tech is configuring a SOHO device. company policy dictates that static IP addresses cannot be used. the company wants the server to maintain the same IP address at all times. which of the following should the tech use?
A. DHCP reservation
B. Port forwarding
C. DNS A record
D. NAT

A

DHCP reservation

62
Q

security software was accidentally uninstalled from all servers in the environment. after requesting the same version of the software to be reinstalled, the security analyst learns that a change request will need to be filled out. which of the following is the BEST reason to follow the change management process in this scenario?
A. Owners can be notified a change is being made and can monitor it for performance impact
B. A risk assessment can be performed to determine if the software is needed
C. End user can be aware of the scope of the change
D. A rollback plan can be implemented in case the software breaks an app

A

Owners can be notified a change is being made and can monitor it for performance impact