Exam B Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

What does Group Policy Editor do?

A

Make a configuration change across all systems:

The Group Policy Editor allows an administrator to make configuration changes to devices on an Active Directory network.

https://www.professormesser.com/free-a-plus-training/220-1102/220-1102-video/the-microsoft-management-console-220-1102//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Performance Monitor do?

A

View the long-term CPU utilization of a server:

Performance Monitor can gather long-term statistics of OS metrics, set alerts and automated actions, store statistics, and display built-in reports.

https://www.professormesser.com/free-a-plus-training/220-1102/220-1102-video/the-microsoft-management-console-220-1102//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Device Manager do?

A

View the version number of a device driver:

All hardware is managed through the Windows Device Manager. Device drivers and hardware configurations can be managed through the Device Manager utility.

https://www.professormesser.com/free-a-plus-training/220-1102/220-1102-video/the-microsoft-management-console-220-1102//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Even Viewer do?

A

View the logs associated with an application:

The Windows Event Viewer is a central log consolidation tool for applications, security events, setup messages, and system details.

https://www.professormesser.com/free-a-plus-training/220-1102/220-1102-video/the-microsoft-management-console-220-1102/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Task Scheduler

A

The Windows Task Scheduler allows the user or administrator to run scripts or applications at designated times.

https://www.professormesser.com/free-a-plus-training/220-1102/220-1102-video/the-microsoft-management-console-220-1102/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disk Management

A

Add a partition to a volume

The Disk Management utility allows the administrator to create, change, remove, or format partitions on a storage drive.

https://www.professormesser.com/free-a-plus-training/220-1102/220-1102-video/the-microsoft-management-console-220-1102/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certificate Manager

A

Update a trusted Root Certificate

The Windows Certificate Manager is used to view, add, or remove local certificates.

https://www.professormesser.com/free-a-plus-training/220-1102/220-1102-video/the-microsoft-management-console-220-1102/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Script File: .vbs

A

Import data into an Excel spreadsheet:

VBScript, (.vbs) (Microsoft Visual Basic Scripting Edition) can be used for many Windows-related scripting purposes, and one of the most common is to automate the functionality of Microsoft Office applications.

https://professormesser.link/1102040801

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Script File: .js

A

Add animation to a website login screen:

JavaScript (.js) is used on many web sites to enhance the functionality within a user’s browser. This can be used for automation, tracking, interactivity features, and to extend the functionality of the browser.

https://professormesser.link/1102040801

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Script File: .py

A

Retrieve statistics from a network device:

Python (.py) is a scripting language that can handle almost anything, including a number of tasks in this list. However, Python is the best fit for a scripting language that can inter-operate with other devices, including devices across the network.

https://professormesser.link/1102040801

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Script File: .bat

A

Compare files on a Windows workstation:

A batch file (.bat) commonly runs in the console or command line of a Windows device, and it can automate the same processes that a user would perform manually at the Windows command prompt.

https://professormesser.link/1102040801

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Script File: .sh

A

Move log files on a Linux server

A shell script (.sh) commonly runs at the command prompt, or shell, of a Unix or Linux device. Since most Linux features can be managed from the command line, shell scripts are powerful automation options.

https://professormesser.link/1102040801

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Script File: .ps1

A

Disable an Active Directory account:

PowerShell (.ps1) is a Windows-only scripting environment that extends the functionality of the traditional Windows command line. PowerShell extends the functionality of the command prompt to enable the automation of internal Windows and Active Directory functions.

https://professormesser.link/1102040801

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Microsoft 10 edition can support 6TB of RAM?

A

Enterprise

https://professormesser.link/1102010102

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A system administrator is concerned that a Windows system may contain logical file system errors. Scan and repair any logical file system errors from the Windows command line.?

A

The chkdsk (Check Disk) command is used to identify and fix logical file system errors and bad physical sectors. The /f option will fix the logical file system and the /r option will locate bad sectors and attempt to recover any readable data.

chkdsk /f - Fix Logical files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company has just performed annual laser printer maintenance, and has accumulated hundreds of used toner cartridges. Which of the following would be the BEST way to dispose of the old cartridges?

❍ A. Take to a hazardous waste facility
❍ B. Return to the manufacturer
❍ C. Separate the parts and dispose of normally
❍ D. Contract with an incineration company

A

The Answer: A. Take to a hazardous waste facility

The toner in a laser printer cartridge can be harmful, so it’s important to dispose of the cartridges at a local hazardous waste facility.

17
Q

Jack, a user, has opened a help desk ticket to remove malware from his laptop. A previous removal occurred two weeks earlier with a similar malware infection. Which of the following was missed during the first malware removal?

❍ A. Restart the computer
❍ B. Educate the end-user
❍ C. Enable System Protection
❍ D. Quarantine infected systems

A

The Answer: B. Educate the end-user

Of the available possible answers, this is the only option that would have resulted in a reinfection if not properly followed. Users aren’t malware experts, and they may not realize their actions can have a negative effect on their system. Spending some quality time explaining anti-malware best practices can help prevent future infections.

18
Q

A mobile user is using apps on their smartphone for all business tasks. To ensure that no data will be lost, the smartphone will need to have multiple backups each day. The user travels most of the time and rarely visits the home office. Which of the following would be the best way to provide these backups?

❍ A. Connect an external USB drive
❍ B. Use incremental backups each night
❍ C. Connect the smartphone to a laptop
❍ D. Use a cloud backup service

A

The Answer: D. Use a cloud backup service

Using a cloud backup service such as Apple iCloud or Google Drive
provides an automated method to constantly backup all user data on the smartphone. If the phone is lost or stolen, the user can purchase a new smartphone and restore all of the data from the cloud.

19
Q

A user in the shipping department has logged into the Windows domain. However, the desktop does not show the user’s normal wallpaper and all of the user’s spreadsheets and documents in the “My Documents” folder are missing. Which of these would be the BEST way to restore the user’s normal work environment?

❍ A. Rename the user’s folder and delete their profile in the registry
❍ B. Boot into Safe Mode and disable all startup applications
❍ C. Add the user to the Administrator group
❍ D. Update to the latest operating system version

A

The Answer: A. Rename the user’s folder and delete their profile
in the registry.

Problems with a user profile causes display problems on the desktop and user documents to disappear. To recreate the profile, the user’s folder is deleted and the profile setting in the registry is deleted. Once the computer is restarted and the user logs in, a new profile will be created.

20
Q

A system administrator has inadvertently installed a Trojan horse that has deleted a number of files across many Windows file shares. The Trojan also had access to user documents and login credentials and transmitted numerous documents to an off-site file storage system. Which of the following would limit the scope of future exploits?

❍ A. Require multi-factor authentication
❍ B. Disable all guest accounts
❍ C. Modify the default permissions
❍ D. Configure full disk encryption
❍ E. Require complex passwords
❍ F. Require a screensaver lock

A

The Answer: C. Modify the default permissions
Many system administrators configure their accounts to have full access to the network as their default setting. This means that malicious software would also have full access if the administrator’s desktop was exploited. Changing the default permissions to have limited access would also limit the scope of a Trojan horse exploit.

https://professormesser.link/1102020901

21
Q

Which of the following Windows Share permissions has the priority
when assigning access on a mapped drive?

❍ A. Allow
❍ B. Full control
❍ C. List folder contents
❍ D. Deny

A

The Answer: D. Deny

In Windows shares, the most restrictive setting has priority over all others. For example, the deny option takes priority over all other permissions.

https://professormesser.link/1102020503

22
Q

A server administrator is installing a 4 TB drive in a database server
and would like to use all free space as a single partition. Which of the
following technologies should be used with this drive?

❍ A. FAT32
❍ B. MBR
❍ C. Active Directory
❍ D. GPT

A

The Answer: D. GPT

The GPT (GUID Partition Table) partition style provides for very large
partition sizes. GPT would easily allow a single partition of 4 terabytes.

https://professormesser.link/1102010901

23
Q

A user receives a browser security alert on his laptop when visiting any website that uses HTTPS. If he uses his smartphone, he does not receive any error messages. Which of the following would BEST describe this situation?

❍ A. The date and time on the laptop is incorrect
❍ B. The smartphone is not updated with the latest OS version
❍ C. The laptop has an incorrect subnet mask
❍ D. The laptop does not have the latest anti-virus signatures

A

The Answer: A. The date and time on the laptop is incorrect
The date and time on a device is important when encryption is involved. If a date is very different between devices, the encryption process may fail or the encryption certificate may appear to be expired.

https://professormesser.link/1102021001

24
Q

A graphics designer has been editing image files that have become
increasingly large over the last few months. The designer is now receiving error messages from their graphics application complaining of low temporary file cache space. Which of the following would be the best NEXT step?

❍ A. Replace all system RAM
❍ B. Increase available storage space
❍ C. Roll back to a previous restore point
❍ D. Rebuild the user’s profile

A

The Answer: B. Increase available storage space
Graphics files can become very large to store, and the error messages from the application point to a lack of available storage space. Upgrading the available drive space would be the best next troubleshooting step.

https://professormesser.link/1102030102

25
Q

A network administrator has a report showing a single user with
numerous visits to a website. This website is known to violate the
company’s AUP. Which of the following should the administrator do
NEXT?

❍ A. Create a firewall filter to block the website
❍ B. Scan all computers with the latest anti-malware signatures
❍ C. Contact the company’s security officer
❍ D. Change the user’s password

A

The Answer: C. Contact the company’s security officer

A company’s AUP (Acceptable Use Policy) is in place to limit the legal
liability of an organization. If a person in the organization is not following the terms of the AUP, then the security officer’s team should manage the results of that action.

https://professormesser.link/1102040103

26
Q

B72. Which of the following script extensions would commonly be used inside of a Microsoft Office application?

❍ A. .vbs
❍ B. .py
❍ C. .bat
❍ D. .js

A

The Answer: A. .vbs

The .vbs extension is used for Microsoft Visual Basic Scripting Edition
scripts. These scripts provide general purpose scripting in Windows, and are common inside of Microsoft Office applications.

https://professormesser.link/1102040801

27
Q

A system administrator is installing a new video editing application on a user’s workstation from an installation USB flash drive. However, the installation process fails due to lack of available drive space. Which of the following would be the BEST way to complete the installation process?

❍ A. Use a share drive for the installation source
❍ B. Compress the installation files
❍ C. Install the application to a network share
❍ D. Manually copy the installation files to the application directory

A

The Answer: C. Install the application to a network share

The installed application files can be much larger than the installation utility, so using a network share with a larger available storage space can be a good alternative until free space is available on the local computer.

https://professormesser.link/1102010701

28
Q

A user would like to install an image and photo editing program on their home computer, but they would prefer an application without a monthly subscription. Which of the following would be the BEST licensing option for this requirement?

❍ A. Open-source
❍ B. Corporate
❍ C. Personal
❍ D. DRM

A

The Answer: A. Open-source

Open-source software is distributed without charge and includes a copy of the source code.

https://professormesser.link/1102040601

29
Q

A user on the marketing team is experiencing slower load times and
ongoing sluggishness with applications on their laptop. A technician
examines the Windows Update logs and finds the monthly updates
are failing. Which of the following should be the best NEXT step for
resolving this issue?

❍ A. Perform an anti-malware scan
❍ B. Install the Windows Updates manually
❍ C. Increase the amount of RAM in the laptop
❍ D. Re-install the applications

A

The Answer: A. Perform an anti-malware scan

The combination of slower applications, poor load times, and the failure of Windows updates, indicates that the system may be infected with malware. Given the available options, an anti-malware scan would be the best next troubleshooting step.

https://professormesser.link/1102030201