Comptia+ Core 2 Professor Messer Flashcards
a user is attempting to Airdrop a document to an associate, but they do not see any destination devices in their list of available Airdrop locations. which of the following would be the MOST likely reason for this issue?
A. Low battery
B. Rotation lock is enabled
C. Low storage space
D. Wi-Fi and Bluetooth are disabled
Wi-Fi and Bluetooth are disabled
a company maintains data retention requirements of 5 years for all customer names, addresses, and phone numbers. which of the following would BEST describe this data?
A. Credit card transaction
B. Government issued information
C. PII
D. Healthcare data
PII
Personally identifiable information
each time a user starts a specific corporate application, a page of disclaimers and usage requirements is shown before the login prompt. which of the following would BEST describe this page?
A. Splash screen
B. Acceptable use policy
C. Standard operating procedure
D. Topology diagram
Splash screen
a system admin is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC process. which of the following options would provide access to these settings?
A. Device manager
B. System information
C. Event viewer
D. User accounts
User accounts
an office power system occasionally experiences minor voltage spikes during the business day. which of the following would be the BEST way to address this power issue?
A. Power down when not actively working
B. Confirm that the building has an electrical ground
C. Connect a surge suppressor to each system
D. Maintain an inventory of replacement power supplies
Connect a surge suppressor to each system
what is the maximum amount of RAM supported by a 32-bit version of an operating system?
A. 4 GB
B. 8 GB
C. 16 GB
D. 192 GB
4 GB
when connecting a new USB webcam to Windows 10, a message appears stating “The controller does not have enough resources for this device.” which of the following would be the BEST next troubleshooting step?
A. Close all large-memory processors’
B. Modify the BCD
C. Move the webcam to a different USB interface
D. Use System Restore to rollback a previous configuration
Move the webcam to a different USB interface
a system admin has created a shared folder on a server to store operating system images. technicians access the shared folder to download the latest images when performing large-scale system installation. which of the following will be the MOST likely method of accessing this data?
A. Map the shared folder to an available drive letter
B. Download the shared folder through a proxy
C. Link the images to a cloud storage service
D. Access the folder using a remote access client
Map the shared folder to an available drive letter
a security tech has identified malware running in the OS kernel. traditional anti-malware scans were not able to identify any problems on the computer. which of the following would be the BEST description of this malware?
A. Rootkit
B. Worm
C. Botnet
D. Cryptominer
Rootkit
a user on the headquarters network has opened a help desk ticket about their Windows desktop. when starting their computer, the login process proceeds normally but the Windows desktop takes 15 minutes to appear. Yesterday, the desktop would appear in just a few seconds. which of the following would be the MOST likely reason for this issue?
A. slow profile load
B. Incorrect boot device load
C. Incorrect username and password
D. Faulty RAM
Slow profile load
a Linux admin needs to modify the configuration text file for a service. which of the following utilities would provide this functionality?
A. nano
B. chmod
C. df
D. sudo
nano
an internal audit has found that a server in the DMZ appears to be infected with malware. the malware does not appear to be part of a file in the OS, and the malware is started each time the system started. what type of malware would be the MOST likely found on this server?
A. Trojan
B. Ransomware
C. Keylogger
D. Spyware
E. Boot sector virus
Boot sector virus
a network admin has configured all of their wireless access points with WPA3 security. which of the following technologies would be associated with this configuration?
A. RC4
B. TACACS
C. TKIP
D. GCMP
GCMP
Galois/counter mode protocol