Jason Dion - CompTIA A+ 1002 Exam Prep #1 Flashcards
Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?
A. Rollback any system updates or changes since yesterday
B. Disable System Restore in Windows
C. Rollback the printer’s device driver in the Device Manager
D. Disable the Windows Update service to prevent future issues
A. Rollback any system updates or changes since yesterday
Your company’s wireless network was recently compromised by an attacker who utilized a brute force attack against the network’s PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur?
A. WPA2 encryption enabled B. Default administrative login credentials C. WPS enabled D. Router with outdated firmware E. TKIP encryption protocols F. Guest network enabled
B. Default administrative login credentials
C. WPS enabled
You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions?
A. Surge suppressor
B. Grounding the server rack
C. Line conditioner
D. Battery backup
C. Line conditioner
D. Battery backup
You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?
A. diskpart list
B. bootrec /fixmbr
C. bootrec /rebuildbcd
D. bootrec /fixboot
D. bootrec /fixboot
Which of the following commands is used on a Linux system to change a file’s permissions or directory on a system?
A. pwd
B. chown
C. passwd
D. chmod
D. chmod
Which version should you use when installing a Linux operating system and are concerned with end-of-life support?
A. Beta release
B. LTS release
C. Developer release
D. Rolling release
B. LTS release
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?
A. SSH
B. TELNET
C. RDP
D. VNC (Virtual Network Computing)
D. VNC (Virtual Network Computing; remote access tool used for sharing on Linux and macOS)
You are working at the service desk and just received the following email from an end-user who believes it is suspicious:
From: user@diontraining.com
To: abuse@diontraining.com
Subject: You won a free iPhone!
You have just won a brand new iPhone!
Just click the following link to provide your address so we can ship it out to you this afternoon: (http:www.freephone.io:8080/winner.php
Thanks!
Jonah Smith
Free Phone Giveaway, LLC
How should you classify this email?
A. Phishing
B. Zero-day
C. Spear phishing
D. Spoofing
A. Phishing
What does the command “shutdown /s” do on a Windows workstation?
A. Reboot the workstation
B. Log off the workstation
C. Enter sleep mode
D. Shutdown the workstation
D. Shutdown the workstation
Which of the following MacOS features is used to manage passwords cached by the OS and is the equivalent of the Credential Manager in Windows?
A. Spotlight
B. Keychain
C. Apple ID
D. Mission Control
B. Keychain
You are troubleshooting a desktop on the corporate network and have verified that it is infected with malware. What is the NEXT action you should perform?
A. Create a System Restore point and perform a full system backup
B. Remediate the infected system by conducting a full disk antivirus scan
C. Reboot to Safe Mode and uninstall the last application that was installed
D. Moving the desktop from the production network to a quarantined VLAN (Virtual Local Area Network)
D. Moving the desktop from the production network to a quarantined VLAN (Virtual Local Area Network)
A user’s personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile file but cannot find it in their profile directory. Which of the following options do you need to configure to see this file?
A. User Accounts
B. Display Settings
C. Internet Options
D. Folder Options
D. Folder Options
Which of the following MacOS features allows the user to search all of the hard drives, network shares, and files for a keyword or phrase?
A. Gesture
B. Spotlight
C. Finder
D. Dock
B. Spotlight
You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?
A. IP (Internet Protocol)
B. PII (Personally Identifiable Information)
C. CUI (Controlled Unclassified Information; federal non-classified information))
D. PHI (Protected Health Information)
D. PHI (Protected Health Information)
Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building’s power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?
A. Uninterruptable power supply
B. Line conditioner
C Surge protector
D. Power distribution unit
A. Uninterruptable power supply
Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA?
A. Username and password
B. Thunbprint and password
C. Thumbprint and retina scan
D. Username and pin
B. Thunbprint and password
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro?
A. Boot Camp
B. Mission Control
C. Terminal
D. Device Manager
A. Boot Camp
The physical security manager has asked you to assist with the risk assessment of some proposed new security measures. The manager is concerned that during a power outage, the server room might be targeted for attack. Luckily, they have many different protection measures in place to keep intruders out of the server room. During a power outage, which of the following security controls would still be usable?
A. Motion detectors
B. Door locks
C. Video surveillance
D. Biometric scanners
B. Door locks
A workstation was patched last night with the latest operating system security update. This morning, the workstation only displays a blank screen. You restart the computer, but the operating system fails to load. What is the NEXT step you should attempt to boot this workstation?
A. Reboot the workstation into safe mode and roll back the recent security update
B. Reboot the workstation into safe mode and disable Windows services/applications
C. Reboot the workstation into the BIOS (Basic Input Output System) and reconfigure boot options
D. Reboot the workstation into safe mode, open RegEdit, and repair the Windows Registry
A. Reboot the workstation into safe mode and roll back the recent security update
Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device?
A. Syslog
B. UTM (Unified Threat Management)
C. IPS (Intrusion Prevention System)
D. IDS (Intrusion Detection System)
B. UTM (Unified Threat Management)
Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company’s executive. Tim quickly checks the MDM (Mobile Device Management) administration tool and identifies that the user’s smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device’s data remains confidential and inaccessible to the thief?
A. Perform a remote wipe of the device
B. Reset the device’s password
C. Identify the IP (Internet Protocol) address of the smartphone
D. Remotely encrypt the device
A. Perform a remote wipe of the device
You have submitted an RFC to install a security patch on all of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?
A. Purpose
B. Scope
C. Plan
D. Risk analysis
C. Plan
A corporate network user contacts the service desk because there is an alert from Windows Defender stating their workstation may be infected with a virus. What action should be performed FIRST to remediate this workstation?
A. Perform a full-disk antivirus scan
B. Backup the workstation
C. Enable System Restore
D. Disconnect the workstation from the network
D. Disconnect the workstation from the network
While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?
A. gpupdate (Group Policy Update)
B. regedit (Registry Editor; Windows)
C. sfc (System File Checker; Windows utility)
D. dxdiag (Direct X Diagnostics utility)
C. sfc (System File Checker; Windows utility)
Which of the following data types would be used to store the value of TRUE?
A. String
B. Boolean
C. Integers
D. Floating point
B. Boolean
Your company is concerned about the possibility of theft of sensitive information from their systems. The IT Director has directed that access to all USB storage devices be blocked on all corporate workstations to prevent this. The workstation should still use other USB devices, like scanners, printers, keyboards, and mice. Which of the following command-line tools should you use to install a Group Policy (GPO) to all workstations across the network to disable the use of USB storage devices?
A. gpupdate
B. diskpart
C. sfc
D. gpresult
A. gpupdate
A user’s workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem?
A. Enable the swap file
B. Increase the pagefile size
C. Defragment the hard disk
D. Disable the visual effects
B. Increase the pagefile size
A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash?
A. System information
B. Performance monitor
C. Event viewer
D. Registry editor
C. Event viewer
Malware infected Natalie’s iMac. The malware has deleted numerous files from the system and corrupted the operating system. Natalie needs to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities could restore access to those files?
A. Time Machine
B. Keychain
C. Snapshot
D. System Restore
A. Time Machine
Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?
A. Sleep
B. Shutdown
C. Lock
D.Hibernate
A. Sleep
Christina recently purchased a new Android smartphone and is going on a trip. At the airport, she found a public wireless network called “FreeAirportWiFi” and connects to it. She noticed a question mark (?) icon showing in the toolbar next to the Wi-Fi icon. Christina attempts to open a webpage but gets an error of “The page cannot be displayed.” She begins to troubleshoot the device by verifying that the airplane mode is disabled, Bluetooth is enabled, and tethering is enabled. Next, Christina attempts to make a phone call, which works without any issues. Which of the following is MOST likely the issue with Christina’s smartphone?
A. The smartphone can only support 3G data networks
B. The smartphone’s SIM card is deactivated
C. The smartphone is connected to the FreAirPortWifi but is not authenticated yet
D. The smartphone does not have a valid plan enabled
C. The smartphone is connected to the FreAirPortWifi but is not authenticated yet
Which mobile device strategy is most likely to introduce vulnerable devices to a corporate network?
A. CYOD (choose your own device)
B. BYOD (bring your own device)
C. COPE (company-owned/personally enabled)
D. MDM (Mobile Device Management)
B. BYOD (bring your own device)
You are trying to connect to another server on the network but are unable to ping it. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server?
A. dig
B. ifconfig
C. netstat
D. traceroute
D. traceroute
Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to “click here” to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?
A. Whaling
B. Spear phishing
C. Brute force
D. Phishing
D. Phishing
You are working as a server administrator at Dion Training. You unlock the server room door using your proximity badge and walk through the door. Before the door shuts, another person walks in behind you. What social engineering technique did this person utilize?
A. Impersonation
B. Shoulder surfing
C. Tailgating
D. Spoofing
C. Tailgating
You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?
A. Attempt to restore to a test server from one of the backup files to verify them
B. Frequently restore the server from backup files to test them
C. Set up scripts to automatically reattempt any failed backup jobs
D. Create an additional copy of the backups in an off-site datacenter
A. Attempt to restore to a test server from one of the backup files to verify them