Comptia+ Core 2 Professor Messer Flashcards
a Windows admin needs to define a minimum password length for all network users. which of the following should be used to complete this task?
A. Device Manager
B. Certificate Manager
C. Group Policy Editor
D. Performance Monitor
Group Policy Editor
a user in the shipping department is able to view order information, but they cannot modify or delete any order details. which of the following would best describe this security principle?
A. Multi-factor authentication
B. Least Privilege
C. Group Policy
D. Organizational Units
Least privilege
a user is receiving this message on their Windows desktop: “The controller does not have enough resources for this device.” which of the following would be the MOST likely reason for this issue?
A. Remote printer has been disabled
B. Wireless bandwidth exceeded
C. USB endpoints are exceeded
D. The system clock is incorrect
USB endpoints are exceeded
a small office is located in a large office building with over 50 different companies. a network admin would like to limit the possibility of someone else in the building accidentally connecting to their wireless network. which of these configuration settings would prevent their wireless network from appearing in a list of available networks?
A. MAC filtering
B. Static IP addressing
C. WPA3 encryption
D. Disabling SSID broadcast
disabling SSID broadcast
a help desk is receiving reports that a group of devices is not able to communicate outside of their local IP subnet. a tech can ping devices on the same network, but does not receive a response when pinging the IP address of external devices. which of the following would be the MOST likely cause of this issue?
A. Default gateway
B. DNS server
C. Proxy server
D. Metered connection
Default gateway
a network tech has been tasked with preventing corporate laptops from connecting to a training rooms wireless network. which of the following would be the BEST way to accomplish this?
A. Enable MAC filtering
B. Change the channel on the access point
C. Apply static IP addressing
D. Create content filters
Enable MAC filtering
a user’s workstation has been identified as participating in a DDoS to a large Internet service provider. the computer has been powered down and stored in a locked area until investigators arrive. which of these procedures would be the MOST important to follow in the meantime?
A. Create documentation of the storage area
B. Retrieve logs from the workstation Event Viewer
C. Obtain the purchase records of the workstation
D. Maintain the integrity of the workstation data
Maintain integrity of the workstation data
a system admin had configured EFS on a user’s workstation. which of the following would describe this functionality?
A. Encryption of individual files and folders
B. Secure wireless communication
C. Encrypted network tunnel
D. Full disk encryption
Encryption of individual files and folders
an application update has been installed on all computers in the accounting department. a user starts the updated application for the first time but nothing appears on the screen. which of the following would be the next BEST troubleshooting step?
A. Reinstall the application
B. Add the user to the administrative group
C. Install the latest Windows update
D. Check the Event Viewer
Check the Event Viewer
a company has recently been the victim of a storm with large-scale flooding, and all systems and backups at the corporate data center were completely destroyed. which of the following would be the BEST way to avoid this loss of data in the future?
A. Battery backup
B. Cloud storage
C. RADIUS administration servers
D. Image-level backup
Cloud storage
a company deploys a suite of commercial software onto every workstation in the organization. which of the following would BEST describe this kind of licensing?
A. Personal license
B. Corporate license
C. Open-source license
D. End user licensing agreement
Corporate licensing
a clients desktop is randomly rebooting throughout the workday without any warning or error messages. which of the following would be the BEST next troubleshooting step?
A. Update the system BIOS
B. Reinstall the Windows operating system
C. Boot to Safe Mode and disable all startup applications
D. Perform a full system diagnostic
Perform a full system diagnostic
a user is working with a .dmg file on their macOS desktop. which of the following would describe the contents of this file?
A. Debug information
B. Disk image
C. Application library
D. Disk maintenance utility
Disk image
a user has noticed his computer starts to slow down during daily use and eventually locks up completely. during the lock-up, the keyboard and mouse do not respond and the screen does not show any error messages. which of the following tasks should a tech follow to BEST troubleshooting the issue?
(choose 2)
A. Start the computer in Safe Mode
B. Perform a hardware diagnostic
C. Connect the computer to a different VLAN
D. Update the OS to the latest patches
E. Rollback to a previous configuration
F. Scan for viruses and malware
Perform a hardware diagnostic, and scan for viruses and malware
a user receives this message each time they visit a secure website. “the site’s security certificate is not trusted.” a technician investigates the issue and finds the problem only occurs on this user’s computer and not with other computers in the same office. which of the following would be the best NEXT troubleshooting task?
A. Disable Windows Firewall for all HTTPS traffic
B. Create a new certificate for the user’s computer
C. Check the date and time on the user’s computer
D. Release and refresh the IP address configuration
Check the date and time on the user’s computer