Exam C Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

A Windows administrator would like to query the local DNS server to view the IP address for www.professormesser.com. Use a command line utility to view this information

A

C:\nslookup www.professormesser.com.au

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Linux Command - mv

A

Rename a directory

The mv (move) command is used to “move” a file from one location to another,
or from one name to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Linux command - pwd

A

Display the current working directory path

The pwd (Print Working Directory) command will display the current working directory path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Linux Command - chmod

A

Make a file read-only

The chmod (Change Mode) command allows the user to change the access (mode) of a file to read, write, execute, or a combination of those permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Linux Command - man

A

View the documentation for a command

The man (manual) command is used to view documentation for a Linux command or utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Linux Command - cat

A

Combine two files into a single document

The cat (concatenate) utility is used to link files together in a series. This can be used to view multiple files to the screen or to save multiple files into one single large file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Linux Command -chown

A

Modify the owner of a file

The chown (Change Owner) command is used to modify the file owner or group owner assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Linux command- Sudo

A

Run a program with elevated permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

. A user has contacted the help desk because they are not able to browse any websites. The technician suspects a fault with the server that converts fully qualified domain names to IP addresses. What command line would confirm connectivity to this server?

A

C:>ping 9.9.9.9

The device that converts between fully qualified domain names and IP addresses is the DNS (Domain Name System) server. The nslookup results show the configured DNS server is located at 9.9.9.9, and the ping command is the easiest way to confirm the connectivity of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Linux file system?

A

The ext4 file system (Fourth extended file system) is commonly associated with Linux and the Android operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Flash drives file system?

A

exFAT (Extended File Allocation Table) is a Microsoft file system designed for USB flash drives and similar removable flash storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Windows file system?

A

The Windows operating system runs optimally using the NTFS (NT File System), and most Windows devices will be configured with NTFS by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

macOS file system?

A

The APFS (Apple File System) is optimized for solid-state storage devices and include support for encryption, snapshots, and increased data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe User Account and its function?

A

The User Accounts applet is used to modify user rights, passwords, certificate
information, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe File ExplorerOptions and its function?

A

Disable indexing of system directories

The Windows 10 File Explorer Options control the general operation of File Explorer, the file viewing options, and search engine configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Indexing options and its functions?

A

Customize the search process

The Indexing Options can speed up the search process by customizing specific folders and locations to be indexed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe Device manager and its functions?

A

Disable a USB audio controller

Device Manager is the central management view of all hardware and devices connected to the system. All device drivers can be enabled and disabled from the Device Manager applet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technician has been called to resolve an issue with a desktop computer in a training facility. The computer appears to boot properly to the desktop, but applications take five minutes to load. While using the application, pop-up messages and other windows appear on the desktop. Which of the following should be the best NEXT troubleshooting step?

❍ A. View running processes in Task Manager
❍ B. Disable System Restore
❍ C. Remove the computer from the network
❍ D. Educate the end user

A

The Answer: C. Remove the computer from the network
The first step after identifying a potential malware infection is to
quarantine the system to prevent the unintended spread of the malware.

19
Q

. A system administrator would like to remove the TFTP Client in
Windows 10. Which of the following Control Panel options would be the BEST choice for this task?

❍ A. Programs and Features
❍ B. Services
❍ C. Network and Sharing Center
❍ D. File Explorer options

A

The Answer: A. Programs and Features
The Programs and Features option of the Control Panel is used to view and manage installed applications, or to enable or disable individual Windows features.

20
Q

A system administrator is planning to upgrade two physical servers in the corporate data center to external cloud-based platforms. Which of the following would provide information on connectivity and the plans for remote site access?

❍ A. Change scope
❍ B. End-user acceptance
❍ C. Backout plan
❍ D. Risk analysis

A

The Answer: A. Change scope

When making a change, the details of the modifications must be well documented as part of the change scope. The change scope would include all of the systems affected by the change, the timeframe for completing the change, and any other important details about the modification.

21
Q

A user has just installed a driver update from a laptop manufacturer. After restarting, their system shows a Windows Stop Error before the login prompt is displayed. Each subsequent reboot causes the same error to be displayed.
Which of the following should the system administrator follow
to BEST resolve this issue?

❍ A. Modify the BIOS boot order
❍ B. Boot to Safe Mode and perform a Windows Reset
❍ C. Perform a System Restore
❍ D. Reinstall the patch files

A

The Answer: C. Perform a System Restore

A System Restore can be launched from the Advanced Boot Options under Repair Your Computer. From there, you can select an existing restore point that will restore the computer to a previous configuration.

22
Q

The available storage space on a user’s workstation is running low, and some updates are failing due to insufficient drive space. Which of the following would be the BEST way to increase drive space until a larger storage drive can be installed?

❍ A. Use a Guest login
❍ B. Enable System Protection
❍ C. Disable the internal Ethernet interface
❍ D. Set the paging file size to zero

A

The Answer: D. Set the paging file size to zero

The paging file is used with your system RAM to keep the applications performing at peak efficiency. Although disabling the paging file may affect the performance of a computer, it will free up all of the storage space that’s normally reserved for the swap file.

23
Q

An attacker has gained access to a password hash file. Which of the following will the attacker use to obtain the passwords?

❍ A. DoS
❍ B. Decryption
❍ C. Brute force
❍ D. Phishing

A

The Answer: C. Brute force

Since a hash is a one-way cryptographic method, the only way to
determine the original plaintext is to try every possible
combination until the hash is matched. This brute force method is the only way to determine the original source of the hash.

24
Q

A server administrator needs to create a folder on a Windows server to store weekly status report documents. Which of the following commandline tools would provide this functionality?

❍ A. md
❍ B. net use
❍ C. cd
❍ D. dir
❍ E. ls

A

The Answer: A. md

The md (Make Directory) command is used to create a subdirectory or folder on the file system.

25
Q

An app on a user’s corporate smartphone has stopped updating. Which of the following would be the BEST way to resolve this issue?

❍ A. Connect the smartphone to a power source
❍ B. Restart the smartphone
❍ C. Disable rotation lock
❍ D. Disable Bluetooth

A

The Answer: B. Restart the smartphone

The update process for the app may need to be restarted, and the easiest way to reinitialize the process is to restart the smartphone.

26
Q

A technician has been asked to replace a faulty adapter card in a server. The technician doesn’t have an anti-static strap, but they have removed the server from a power source. Which of the following would be the BEST way to safely complete this repair?

❍ A. Store the faulty card in an anti-static bag
❍ B. Periodically touch the server’s metal chassis
❍ C. Wear safety goggles
❍ D. Have a carbon dioxide extinguisher nearby

A

The Answer: B. Periodically touch the server’s metal chassis

If a an anti-static strap isn’t available to maintain a constant connection between a person and the equipment they’re working on, the next-best option would be to occasionally touch some metal on the device to equalize the electrical potential and prevent ESD (electrostatic discharge)

27
Q

Which of the following would be the BEST choice for a system
administrator to manage an Active Directory database?

❍ A. Batch file
❍ B. PowerShell
❍ C. JavaScript
❍ D. Visual Basic Scripting

A

The Answer: B. PowerShell

PowerShell is Microsoft’s command line scripting environment for the Windows operating system and provides integrations to automate almost every aspect of Windows.

28
Q

A Windows 10 application includes the installation of a service during the setup process. Which of the following would be the MOST important consideration during the application setup?

❍ A. OS compatibility
❍ B. Available storage space
❍ C. Network connectivity
❍ D. User permissions

A

The Answer: D. User permissions

A standard user account does not have permission to make significant operating system changes, especially those that would include the installation of a service. To prevent the unintended installation of malicious software, the Windows UAC (User Account Control) feature will request additional rights and permissions for these operating system changes.

29
Q

A desktop administrator has been tasked with removing malware from an executive’s laptop computer. The system has been removed from the network, but the Windows startup process shows a Stop Error before rebooting into a repeating cycle. Which of the following would be the best NEXT step in the malware removal process?

❍ A. Perform a Windows Repair installation
❍ B. Boot with a pre-installation environment
❍ C. Schedule periodic scans
❍ D. Create a restore point

A

The Answer: B. Boot with a pre-installation environment

A Windows PE (Pre-installation Environment) can be used to boot into the Windows Recovery Console to resolve problems with the primary operating system. This is a common task when the primary operating system has been corrupted or will not boot properly.

30
Q

.A user in the shipping department is using a tracking app on a tablet. The app normally takes 10 seconds to load, but is now taking over a minute before it can be used. Tracking searches that normally take seconds are taking almost a minute to show the tracking details. Other tablets are not experiencing this slowdown. Which of the following would be the best NEXT troubleshooting step?

❍ A. Reinstall the tracking app
❍ B. Check the app battery usage
❍ C. Roll back to the previous tablet OS version
❍ D. Perform a reboot

A

The Answer: D. Perform a reboot

Before making any significant changes, a reboot can be used to clear memory space and reset any potential conflicts.

31
Q

C44. A user is receiving this message on their Windows desktop: “The controller does not have enough resources for this device.” Which of the following would be the MOST likely reason for this issue?

❍ A. Remote printer has been disabled
❍ B. Wireless network bandwidth exceeded
❍ C. USB endpoints are exceeded
❍ D. The system clock is incorrect

A

The Answer: C. USB endpoints are exceeded
USB devices contain buffers called “endpoints,” and if those endpoints exceed the capacity of the USB controllers, this “resources exceeded” message will appear. To resolve this issue, move a USB device to a different interface.

32
Q

8A help desk is receiving reports that a group of devices is not able to communicate outside of their local IP subnet. A technician can ping devices on the same network, but does not receive a response when pinging the IP address of external devices. Which of the following would be the MOST likely cause of this issue?

❍ A. Default gateway
❍ B. DNS server
❍ C. Proxy server
❍ D. Metered connection

A

The Answer: A. Default gateway

The default gateway is the router providing the communication between the local IP subnet and the rest of the world. If the default gateway isn’t working, users will not be able to access services that are outside of the local subnet.

33
Q

While working at a customer’s desk, a technician’s mobile phone begins to ring. Which of the following would be the MOST appropriate response?

❍ A. Take the call and address the caller’s requests before continuing
❍ B. Take the call and ask the caller if you can return their call later
❍ C. Send the call to voicemail and apologize for the interruption
❍ D. Politely excuse yourself and step out to take the call

A

The Answer: C. Send the call to voicemail and apologize for the interruption
When actively working on a problem with a customer, it’s important to avoid interruptions, distractions, and anything else that would change from the current task.

34
Q

C61. A user has noticed his computer begins to slow down during daily use and eventually locks up completely. During the lock up, the keyboard and mouse do not respond and the screen does not show any error messages. Which of the following tasks should a technician follow to BEST
troubleshoot this issue? (Choose TWO)

❍ A. Start the computer in Safe Mode
❍ B. Perform a hardware diagnostic
❍ C. Connect the computer to a different VLAN
❍ D. Update the OS to the latest patches
❍ E. Roll back to a previous configuration
❍ F. Scan for viruses and malware

A

The Answer: B. Perform a hardware diagnostic, and
F. Scan for viruses and malware

Without knowing the root cause of the issue, it will be important to gather as much information about the issue without making any changes to the operating system or applications. A diagnostic would provide information about the health of the hardware, and scanning for viruses would check for any malicious software. Neither of those options would make any changes to the configuration of the system.

35
Q

A user receives this message each time they visit a secure website: “The site’s security certificate is not trusted.” A technician investigates the issue and finds the problem only occurs on this user’s computer and not with other computers in the same office. Which of the following would be the
best NEXT troubleshooting task?

❍ A. Disable Windows Firewall for all HTTPS traffic
❍ B. Create a new certificate for the user’s computer
❍ C. Check the date and time on the user’s computer
❍ D. Release and refresh the IP address configuration

A

The Answer: C. Check the date and time on the user’s computer
The message regarding the site’s security certificate is shown because the local computer can’t validate the certificate on the web server. The server’s certificate has a specific issuing and expiration date and time, so time drift on the workstation could cause the validation to fail on the workstation.

36
Q

A user would like to configure their local printer to be accessible to anyone on the corporate network. Which of the following would be the BEST way to configure this connection?

❍ A. Configure a VPN connection
❍ B. Create a share name in printer properties
❍ C. Configure a metered connection
❍ D. Use a static IP address

A

The Answer: B. Create a share name in printer properties

The printer properties includes a sharing tab with the option to “Share this printer” and to create the name for the printer share.

37
Q

A computer on a manufacturing floor has a virus, and the system administrator has removed the system from the company network. Which of the following virus removal tasks should occur NEXT?

❍ A. Discuss virus prevention with the end user
❍ B. Install the latest anti-virus signatures
❍ C. Schedule a virus scan to run each morning
❍ D. Disable System Restore

A

The Answer: D. Disable System Restore

Before making any updates or changes to the system, it’s important to remove any potentially infected restore points by disabling the System Restore feature.

38
Q

When a user starts their desktop computer, the Windows splash screen is shown with a rotating circle, but the login screen is never displayed. A technician researches the issue and finds the computer was just updated to the latest set of Windows patches. Which of the following would be the NEXT step the technician should follow to help solve this issue?

❍ A. Restart the computer
❍ B. Perform a Startup Repair
❍ C. Start in VGA mode
❍ D. Rebuild the user’s profile

A

The Answer: B. Perform a Startup Repair

The Windows Startup Repair is an automated feature that will examine each phase of the startup process and reconfigure any invalid or incorrect settings. This is a common repair to use when the startup process is not working properly after an application or operating system update.

39
Q

Which of the following should a company use to reduce their legal liability if an employee is dismissed?

❍ A. End user licensing agreement
❍ B. Acceptable use policy
❍ C. Standard operating procedures
❍ D. Regulatory compliance documentation

A

The Answer: B. Acceptable use policy

An Acceptable Use Policy (AUP) provides detailed documentation on the correct and expected use of company assets. If someone is dismissed, this document will provide a well-documented set of reasons to legally justify the dismissal.

40
Q

A technician is troubleshooting a problem on a Linux server and needs to view the real-time CPU and memory utilization for each operating system process. Which of the following would provide this functionality?

❍ A. dig
❍ B. df
❍ C. cat
❍ D. top

A

The Answer: D. top

The linux top command is a common methods of viewing real-time information about CPU, RAM, and resource utilizations. This information is updated every second by default and can quickly identify highly utilized processes.

41
Q

Linux command Dig?

A

The dig command is used to query DNS (Domain Name System) servers and view the configuration of the DNS database.

42
Q

Linux command Df?

A

The df (Disk Free) command displays filesystem information and the free space available for each volume.

43
Q

Linux command cat?

A

The cat (Concatenate) command is used to combine files together on the screen or as part of a file.