Jason Dion - CompTIA A+ 1002 Exam Prep #1 Flashcards

1
Q

Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?

A. Rollback any system updates or changes since yesterday
B. Disable System Restore in Windows
C. Rollback the printer’s device driver in the Device Manager
D. Disable the Windows Update service to prevent future issues

A

A. Rollback any system updates or changes since yesterday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company’s wireless network was recently compromised by an attacker who utilized a brute force attack against the network’s PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur?

A. WPA2 encryption enabled
B. Default administrative login credentials
C. WPS enabled
D. Router with outdated firmware
E. TKIP encryption protocols
F. Guest network enabled
A

B. Default administrative login credentials

C. WPS enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions?

A. Surge suppressor
B. Grounding the server rack
C. Line conditioner
D. Battery backup

A

C. Line conditioner

D. Battery backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?

A. diskpart list
B. bootrec /fixmbr
C. bootrec /rebuildbcd
D. bootrec /fixboot

A

D. bootrec /fixboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following commands is used on a Linux system to change a file’s permissions or directory on a system?

A. pwd
B. chown
C. passwd
D. chmod

A

D. chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which version should you use when installing a Linux operating system and are concerned with end-of-life support?

A. Beta release
B. LTS release
C. Developer release
D. Rolling release

A

B. LTS release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?

A. SSH
B. TELNET
C. RDP
D. VNC (Virtual Network Computing)

A

D. VNC (Virtual Network Computing; remote access tool used for sharing on Linux and macOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are working at the service desk and just received the following email from an end-user who believes it is suspicious:

From: user@diontraining.com
To: abuse@diontraining.com
Subject: You won a free iPhone!

You have just won a brand new iPhone!

Just click the following link to provide your address so we can ship it out to you this afternoon: (http:www.freephone.io:8080/winner.php

Thanks!
Jonah Smith
Free Phone Giveaway, LLC

How should you classify this email?

A. Phishing
B. Zero-day
C. Spear phishing
D. Spoofing

A

A. Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the command “shutdown /s” do on a Windows workstation?

A. Reboot the workstation
B. Log off the workstation
C. Enter sleep mode
D. Shutdown the workstation

A

D. Shutdown the workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following MacOS features is used to manage passwords cached by the OS and is the equivalent of the Credential Manager in Windows?

A. Spotlight
B. Keychain
C. Apple ID
D. Mission Control

A

B. Keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are troubleshooting a desktop on the corporate network and have verified that it is infected with malware. What is the NEXT action you should perform?

A. Create a System Restore point and perform a full system backup
B. Remediate the infected system by conducting a full disk antivirus scan
C. Reboot to Safe Mode and uninstall the last application that was installed
D. Moving the desktop from the production network to a quarantined VLAN (Virtual Local Area Network)

A

D. Moving the desktop from the production network to a quarantined VLAN (Virtual Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user’s personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile file but cannot find it in their profile directory. Which of the following options do you need to configure to see this file?

A. User Accounts
B. Display Settings
C. Internet Options
D. Folder Options

A

D. Folder Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following MacOS features allows the user to search all of the hard drives, network shares, and files for a keyword or phrase?

A. Gesture
B. Spotlight
C. Finder
D. Dock

A

B. Spotlight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?

A. IP (Internet Protocol)
B. PII (Personally Identifiable Information)
C. CUI (Controlled Unclassified Information; federal non-classified information))
D. PHI (Protected Health Information)

A

D. PHI (Protected Health Information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building’s power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?

A. Uninterruptable power supply
B. Line conditioner
C Surge protector
D. Power distribution unit

A

A. Uninterruptable power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA?

A. Username and password
B. Thunbprint and password
C. Thumbprint and retina scan
D. Username and pin

A

B. Thunbprint and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro?

A. Boot Camp
B. Mission Control
C. Terminal
D. Device Manager

A

A. Boot Camp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The physical security manager has asked you to assist with the risk assessment of some proposed new security measures. The manager is concerned that during a power outage, the server room might be targeted for attack. Luckily, they have many different protection measures in place to keep intruders out of the server room. During a power outage, which of the following security controls would still be usable?

A. Motion detectors
B. Door locks
C. Video surveillance
D. Biometric scanners

A

B. Door locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A workstation was patched last night with the latest operating system security update. This morning, the workstation only displays a blank screen. You restart the computer, but the operating system fails to load. What is the NEXT step you should attempt to boot this workstation?

A. Reboot the workstation into safe mode and roll back the recent security update
B. Reboot the workstation into safe mode and disable Windows services/applications
C. Reboot the workstation into the BIOS (Basic Input Output System) and reconfigure boot options
D. Reboot the workstation into safe mode, open RegEdit, and repair the Windows Registry

A

A. Reboot the workstation into safe mode and roll back the recent security update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device?

A. Syslog
B. UTM (Unified Threat Management)
C. IPS (Intrusion Prevention System)
D. IDS (Intrusion Detection System)

A

B. UTM (Unified Threat Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company’s executive. Tim quickly checks the MDM (Mobile Device Management) administration tool and identifies that the user’s smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device’s data remains confidential and inaccessible to the thief?

A. Perform a remote wipe of the device
B. Reset the device’s password
C. Identify the IP (Internet Protocol) address of the smartphone
D. Remotely encrypt the device

A

A. Perform a remote wipe of the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You have submitted an RFC to install a security patch on all of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?

A. Purpose
B. Scope
C. Plan
D. Risk analysis

A

C. Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A corporate network user contacts the service desk because there is an alert from Windows Defender stating their workstation may be infected with a virus. What action should be performed FIRST to remediate this workstation?

A. Perform a full-disk antivirus scan
B. Backup the workstation
C. Enable System Restore
D. Disconnect the workstation from the network

A

D. Disconnect the workstation from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?

A. gpupdate (Group Policy Update)
B. regedit (Registry Editor; Windows)
C. sfc (System File Checker; Windows utility)
D. dxdiag (Direct X Diagnostics utility)

A

C. sfc (System File Checker; Windows utility)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following data types would be used to store the value of TRUE?

A. String
B. Boolean
C. Integers
D. Floating point

A

B. Boolean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Your company is concerned about the possibility of theft of sensitive information from their systems. The IT Director has directed that access to all USB storage devices be blocked on all corporate workstations to prevent this. The workstation should still use other USB devices, like scanners, printers, keyboards, and mice. Which of the following command-line tools should you use to install a Group Policy (GPO) to all workstations across the network to disable the use of USB storage devices?

A. gpupdate
B. diskpart
C. sfc
D. gpresult

A

A. gpupdate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A user’s workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem?

A. Enable the swap file
B. Increase the pagefile size
C. Defragment the hard disk
D. Disable the visual effects

A

B. Increase the pagefile size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash?

A. System information
B. Performance monitor
C. Event viewer
D. Registry editor

A

C. Event viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Malware infected Natalie’s iMac. The malware has deleted numerous files from the system and corrupted the operating system. Natalie needs to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities could restore access to those files?

A. Time Machine
B. Keychain
C. Snapshot
D. System Restore

A

A. Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?

A. Sleep
B. Shutdown
C. Lock
D.Hibernate

A

A. Sleep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Christina recently purchased a new Android smartphone and is going on a trip. At the airport, she found a public wireless network called “FreeAirportWiFi” and connects to it. She noticed a question mark (?) icon showing in the toolbar next to the Wi-Fi icon. Christina attempts to open a webpage but gets an error of “The page cannot be displayed.” She begins to troubleshoot the device by verifying that the airplane mode is disabled, Bluetooth is enabled, and tethering is enabled. Next, Christina attempts to make a phone call, which works without any issues. Which of the following is MOST likely the issue with Christina’s smartphone?

A. The smartphone can only support 3G data networks
B. The smartphone’s SIM card is deactivated
C. The smartphone is connected to the FreAirPortWifi but is not authenticated yet
D. The smartphone does not have a valid plan enabled

A

C. The smartphone is connected to the FreAirPortWifi but is not authenticated yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which mobile device strategy is most likely to introduce vulnerable devices to a corporate network?

A. CYOD (choose your own device)
B. BYOD (bring your own device)
C. COPE (company-owned/personally enabled)
D. MDM (Mobile Device Management)

A

B. BYOD (bring your own device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You are trying to connect to another server on the network but are unable to ping it. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server?

A. dig
B. ifconfig
C. netstat
D. traceroute

A

D. traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to “click here” to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?

A. Whaling
B. Spear phishing
C. Brute force
D. Phishing

A

D. Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

You are working as a server administrator at Dion Training. You unlock the server room door using your proximity badge and walk through the door. Before the door shuts, another person walks in behind you. What social engineering technique did this person utilize?

A. Impersonation
B. Shoulder surfing
C. Tailgating
D. Spoofing

A

C. Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?

A. Attempt to restore to a test server from one of the backup files to verify them
B. Frequently restore the server from backup files to test them
C. Set up scripts to automatically reattempt any failed backup jobs
D. Create an additional copy of the backups in an off-site datacenter

A

A. Attempt to restore to a test server from one of the backup files to verify them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Which RAID solution will provide the BEST speed and redundancy for a backup and disaster recovery server? 
A. RAID 1
B. RAID 10
C. RAID 5
D. RAID 0
A

B. RAID 10

38
Q

Another technician tells you that they are PXE booting a computer. What is the technician MOST likely doing with the computer?

A. An in-place upgrade of the OS
B. Installing an image to the computer over the network
C. Conducting a system repair
D. Using a multiboot configuration

A

B. Installing an image to the computer over the network

39
Q

Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off?

A. Power saver
B. Sleep
C. Hibernate
D. Balanced

A

C. Hibernate

40
Q

Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer’s recommendations?

A. Patch panel 
B. Server rack
C. Modem
D. VOIP device (Voice Over Internet Protocol)
E. Desktop printer
F. UPS (Uninterruptable Power Supply)
A

B. Server rack

F. UPS (Uninterruptable Power Supply)

41
Q

Dion Training is worried about the security of the data on their corporate smartphones if lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the corporate smartphones’ data?

A.Disable the installation of applications from untrusted sources
B. Require complex passwords
C. Enable full device encryption
D. Enable device lockouts after 3 failed attempts
E. Enable a pattern lock
F. Configure the ability to perform a remote wipe

A

C. Enable full device encryption

F. Configure the ability to perform a remote wipe

42
Q

You are working as part of a penetration testing team during an assessment of Dion Training’s headquarters. Your boss has requested that you search the company’s recycling bins for any information that might be valuable during the reconnaissance phase of your attack. What type of social engineering method are you performing?

A. Impersonation
B. Phishing
C. Dumpster diving
D. Whaling

A

C. Dumpster diving

43
Q

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

A. Ransomware
B. Virus
C. Trojan
D. Worm

A

D. Worm

44
Q

What is the symbolic representation of the octal numeric permission 644?

A. r–rw-rw
B. rwx-r-xr-x
C. rw-r–r–
D.rw——-

A

C. rw-r–r–

(RW- is 6 and R– is 4. In Linux, you can convert letter permissions to octal by giving 4 for each R, 2 for each W, and 1 for each X. R is for read-only, W is for write, and X is for execute. The permissions strings are written to represent the owner’s permissions, the group’s permissions, and the other user’s permissions)

45
Q

A user has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. The user states they do not want to pay for the software. Which of the following would MOST likely be the best option for them?

A. Corporate
B. Enterprise
C. Open-source
D. Personal

A

C. Open-source

46
Q

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar’s printer icon. Which of the following actions should Peter try FIRST to solve this issue?

A. Check to ensure the printer selected is the default printer
B. Check that the printer is not offline
C. Check the status of the print server queue
D. Cancel all documents and print them again

A

C. Check the status of the print server queue

47
Q

What is the FOURTH step of the seven-step malware removal process?

A. Enable System Restore and create a restore point in Windows
B. Remediate the infected systems
C. Quarantine the infected system
D. Update the applications and the operating system

A

B. Remediate the infected systems

48
Q

Which of the following is considered a form of regulated data?

A. PII (Personally Identifiable Information)
B. DRM (Digital rights management)
C. DMCA (Digital Millennium Copyright Act)
D. AUP (acceptable use policy)

A

A. PII (Personally Identifiable Information)

49
Q

Samantha works in the human resource department in an open floorplan office. She is concerned about the possibility of someone conducting shoulder surfing to read sensitive information from employee files while accessing them on her computer. Which of the following physical security measures should she implement to protect against this threat?

A. Privacy screen
B. Hardware token
C. Biometric lock
D. Badge reader

A

A. Privacy screen

50
Q

You are working as a file server administrator. You are backing up the files on the server when you observe numerous inappropriate photos and videos stored on the corporate share drive by the user jsmith. These files are clearly in violation of the company’s AUP. What should you do FIRST?

A. Contact the user and ask them to remove the files
B. Delete the files immediately
C. Notify your immediate supervisor
D. Copy the files to an external hard drive

A

C. Notify your immediate supervisor

51
Q

You have just finished installing a new workstation for a user in your office. They need to be able to see the other workstations on the company’s workgroup. Which of the following settings should you ensure is enabled?

A. Enable BitLocker
B. Enable an RDP connection
C. Enable network discovery
D.Enable file and folder sharing

A

C. Enable network discovery

52
Q

You are configuring a SOHO network for a small coffee shop. They have found that certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. The owner has asked you to block this customer’s laptop from connecting by placing it on a blocklist. Which of the following configurations would you use to blocklist this customer’s device based on its unique hardware identifier?

A. Port filtering
B. MAC filtering
C. Port forwarding
D. Enforce a WPA2 password

A

B. MAC filtering

53
Q

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system’s filesystem?

A. rm -rf .
B. rm -rf /
C. rm .
D. rm /

A

B. rm -rf /

The rm command is a command-line utility for removing files or directories. The “rm -rf /” is the most dangerous command to issue in Linux. The rm -rf command is one of the fastest ways to delete a folder and its contents. But a little typo or ignorance may result in unrecoverable system damage. The -r option means that the command will recursively delete the folder and its subfolders. The -f option means that even read-only files will be removed without asking the user. The use of / indicates that the remove command should begin at the root directory (/) and recursively force all files and folders to be deleted under the root. This would delete everything on the system. The . would only begin deleting from the current working directory and then delete all files and folders further down the directory structure, not the entire file system.

54
Q

A small doctor’s office has asked you to configure their network to use the highest levels of wireless security and desktop authentication. The office only uses cloud-based SaaS applications to store their patient’s sensitive data. Which TWO of the following protocols or authentication methods should you implement for the BEST security?

A. WEP
B. RADIUS
C. WPA2
D. WPS
E. Multifactor
F. SSO
A

C. WPA2

E. Multifactor

55
Q

An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows “limited” with no availability. What rollback action should the technician perform?

A. Antivirus updates
B. Web browser
C. Server’s IP address
D. Server’s NIC address

A

D. Server’s NIC address

When automatically receiving updates through the Windows Update service, your server can receive driver updates for its network interface card (NIC), graphics cards, and other peripherals. This can accidentally install an incompatible driver that causes network connectivity issues to occur. A best practice is to always set driver updates to “manual” so that you can download and test them in a lab before upgrading your production servers. If your drivers were updated and this is causing the connectivity issue, you can perform a driver rollback to the last known working version of the drivers. An IP address is bound to a network interface card using DHCP and there is no such thing as a “rollback” for a server’s IP address. The error of “limited” connectivity is associated with the network interface card and the network connection, not the antivirus or the web browser.

56
Q

A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have?

A. Ransomware
B. Keylogger
C. Rootkit
D. Trojan

A

D. Trojan

57
Q

Which of the following types of mobile device screen locks uses biometrics to securely unlock the device?

A. FaceID
B. Passcode
C. Swipe
D. TouchID

A

A. FaceID

D. TouchID

58
Q

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be?

A. Social engineering
B. Spoofing
C. Zero-day attack
D. VLAN hopping

A

A. Social engineering

59
Q

An offsite tape backup storage facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the MOST likely reason for this?

A. A data transport request
B. A chain of custody breach
C. The process of discovery
D. A notice of legal hold

A

D. A notice of legal hold

60
Q

You have just completed a repair for a customer’s smartphone that took you three days. The customer complained that the repair took too long and began to question you about the steps you took to repair the device. What should you do NEXT?

A. Provide documentation of the repair to the customer and thank them for their patience
B. Clearly tell the customer that if they had been more careful with the device then it wouldn’t have needed to be fixed in the first place
C. Listen to the customer’s complaints with concern and then post about the encounter on Facebook
D. Become defensive and explain why each step was necessary to repair the device

A

A. Provide documentation of the repair to the customer and thank them for their patience

61
Q

You want to ensure that only one person can enter or leave the server room at a time. Which of the following physical security devices would BEST help you meet this requirement?

A. Access control vestibule
B. Cipher lock
C. Thumbprint reader
D. Video monitoring

A

A. Access control vestibule

An access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens. Video monitoring is a passive security feature, so it won’t prevent two people from entering at once. The thumbprint reader or cipher lock will ensure that only an authorized user can open the door, but it won’t prevent someone from piggybacking and entering with them.

62
Q

You have submitted an RFC to install a security patch on all of your company’s Windows 2019 server on Friday at 11 pm using an automated patch installation process. Which of the following change request documents would describe any uncertainty or adverse effects that may occur during the installation process?

A. Risk analysis
B. Purpose
C. Scope
D. Plan

A

A. Risk analysis

63
Q

Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user’s passwords?

A. Tailgating
B. Phishing
C. On-path attack
D. Shoulder surfing

A

D. Shoulder surfing

64
Q

You are troubleshooting a user’s laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which of the following actions should you attempt to fix the problem in Windows 10?

A. Disable/enable the wireless network adapter
B. Restart the print spooler service
C. Rollback the USB drivers
D. Restart Windows Defender

A

B. Restart the print spooler service

65
Q

You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?

A. bootrec /rebuildbcd
B. bootrec /fixboot
C. diskpart list
D. bootrec /fixmbr

A

D. bootrec /fixmbr

The master boot record (MBR) is the first 512-byte sector on a hard disk. It contains the partitioning information for a drive. To repair the master boot record (MBR), you should use the command “bootrec /fixmbr” and reboot the computer. If the disk cannot be detected, enter the system setup and try modifying settings (or even resetting the default settings). If the system firmware reports the disk’s presence, but Windows still will not boot, use a startup repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drive’s boot information. The “bootrec /fixboot” command is used to attempt a repair of the boot sector of a drive. The “bootrec /rebuildbcd” command is used to add missing Windows installations to the Boot Configuration Database (BCD). The diskpart command is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions

66
Q

What type of structure is a “Do While” in scripting?

A. Branch
B. Constant
C. Loop
D. Variable

A

C. Loop

67
Q

You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize?

A. A surge protector connected to a UPS
B. A surge protector
C. A line conditioner
D. A uninterruptible power supply (UPS)

A

D. A uninterruptible power supply (UPS)

68
Q

A customer is complaining that they cannot connect to the local network share drive. You run the command ‘ipconfig /all’ from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation?

A. The workstation couldn’t reach the DNS server
B. The workstation couldn’t reach the DHCP server
C. The workstation couldn’t reach the proxy server
D. The workstation couldn’t reach the gateway

A

B. The workstation couldn’t reach the DHCP server

69
Q

Which of the following macOS features is used to backup and restore files to an external hard disk?

A. Snapshot
B. Time Machine
C. Remote disc
D. Boot Camp

A

B. Time Machine

Time Machine is the built-in backup feature of the macOS operating system. The Time Machine utility enables data to be backed up to an external drive. By default, Time Machine keeps hourly backups for the past 24 hours, daily backups for a month, and weekly backups for all previous months. When the drive used to store backups becomes full, Time Machine removes older backups to free up space. Time Machine automatically backs up all of the system’s files, including apps, music, photos, email, documents, and system files. Once a user has a valid backup in Time Machine, they can restore files from the backup if the original files are ever corrupted or deleted on their Mac or if the hard disk (or SSD) is erased or replaced. Remote disc is a feature in macOS that enables a user to access a CD/DVD on another Mac or Windows computer. This was created because Apple’s Mac computers have not been sold with an internal optical drive since 2016. Boot Camp is used to allow dual booting on a Macintosh computer. It allows the user to boot into either macOS (OS X) or Windows as the computer is rebooted. Boot Camp is only supported on Intel-based macOS systems, though. A snapshot is used to backup virtual machines by creating a state of the disk at a particular point in time. Snapshots allow a technician to roll back any changes made to a VM during a session if needed.

70
Q

Which command-line tool on a Windows system is used to display the resulting set of policy settings that were enforced on a computer for a specified user when they logged on?

A. gpupdate
B. sfc
C. gpresult
D. dism

A

C. gpresult

71
Q

Your companies share drive has several folders that have become encrypted by a piece of ransomware. During your investigation, you found that only the Sales department folders were encrypted. You continue your investigation and find that a salesperson’s workstation was also encrypted. You suspect that this workstation was the original source of the infection. Since it was connected to the Sales department share drive as a mapped S:\ drive, it was also encrypted. You have unplugged the network cable from this workstation. What action should you perform NEXT to restore the company’s network to normal operation?

A. Disable System Restore on the workstation
B. Restore the Sales department folders from backups
C. Schedule a full disk anti-malware scan on the workstation
D. Schedule weekly scans and enable on-access scanning

A

B. Restore the Sales department folders from backups

72
Q

You are the first help desk technician on the scene of a potential data breach. What is the FIRST thing you need to do as part of the incident response?

A. Preserve the evidence
B. Report it to your supervisor
C. Identify the issue
D. Quarantine the system

A

C. Identify the issue

73
Q

Which of the following types of attacks involves changing the system’s MAC address before it connects to a wireless network?

A. Botnet
B. Zombie
C. DDoS
D. Spoofing

A

D. Spoofing

74
Q

Which of the following commands is used on a Linux system to list the currently running processes on a system?

A. grep
B. ps
C. ls
D. kill

A

B. ps

The ps command is used to list the currently running processes, and their PIDs and some other information depend on different options. It reads the process information from the virtual files in the /proc file system. The /proc directory contains virtual files and is known as a virtual file system. The kill command sends a signal to specified processes or process groups, causing them to act according to the signal. When the signal is not specified, it defaults to -15 (-TERM), which terminates the specified process by gracefully stopping it. If “kill -9” is used instead, it will immediately kill the process. The grep is a command-line utility for searching plain-text data sets for lines that match a regular expression. The grep command works on Unix, Linux, and macOS operating systems. Grep is an acronym that stands for Global Regular Expression Print. The ls command lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, ls lists the files in the current working directory.

75
Q

An attacker uses the nslookup interactive mode to locate information on a Domain Name Service (DNS). What command should they type to request the appropriate records for only the name servers?

A. request type=ns
B. locate type=ns
C. transfer type=ns
D. set type=ns

A

D. set type=ns

The nslookup command is used to query the Domain Name System to obtain the mapping between a domain name and an IP address or to view other DNS records. The “set type=ns” tells nslookup only reports information on name servers. If you used “set type=mx” instead, you would receive information only about mail exchange servers.

76
Q

You are working for a brand new startup company that allows you to use your laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines?

A. SLA (service level agreement)
B. MOU (memorandum of understanding)
C. NDA (non-disclosure agreement)
D. BYOD (Bring Your Own Device)

A

D. BYOD (Bring Your Own Device)

77
Q

Whenever you reboot your domain controller, you notice it takes a very long time to boot up. As the server is booting, you hear noises that sound like a steady series of clicks coming from the hard drive. Which of the following is the BEST action to help speed up the boot time of the server?

A. Terminate process in the Task Manager
B. Remove unnecessary applications from startup
C. Defragment the hard drive
D. Perform a Disk Cleanup

A

C. Defragment the hard drive

78
Q

What umask should be set for a directory to have 700 as its octal permissions?

A. rwxrwxrwx
B. r–r–r–
C. rwx——
D. rwx—rwx

A

C. rwx——

RWX is 7 and — is 0. In Linux, you can convert letter permissions to octal by giving 4 for each R, 2 for each W, and 1 for each X. R is for read-only, W is for write, and X is for execute. The permissions strings are written to represent the owner’s permissions, the group’s permissions, and the other user’s permissions.

79
Q

Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system?

A. pwd
B. passwd
C. chown
D. chmod

A

C. chown

80
Q

Which of the following commands is used on a Linux system to change a user’s password on the system?

A. pwd
B. passwd
C. chown
D. chmod

A

B. passwd

81
Q

A web server has a planned firmware upgrade for Saturday evening. During the upgrade, the power to the building is lost, and the firmware upgrade fails. Which of the following plans should be implemented to revert to the most recent working version of the firmware on the webserver?

A. Rollback plan
B. Alternative plan
C. Backup plan
D. Contingency plan

A

A. Rollback plan

82
Q

Dion Training’s offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these under-voltage events?

A. Uninterruptible power supply
B. Surge suppressor
C. Diesel generator
D. Line conditioner

A

D. Line conditioner

83
Q

A user receives the following error message: “Windows Update cannot currently check for updates because the service is not running.” The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT?

A. Reboot the computer
B. Register the Windows Update service’s DLL files
C. Restart the network services
D. Rollback the device drivers

A

A. Reboot the computer

84
Q

You have just installed a second monitor for a salesperson’s workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other from across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure?

A. Color depth
B. Extended mode
C. Resolution
D. Refresh rate

A

C. Resolution

85
Q

You have submitted an RFC to install a security patch on all of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?

A. Risk analysis
B. Purpose
C. Plan
D. Scope

A

B. Purpose

86
Q

A user calls the service desk and states that their workstation has a virus. The user states that they were browsing their favorite website when the antivirus displayed a full-screen message stating, “1532 file infected on this computer - Click to remove infected files NOW!” The user states that when they click the button, a message from the company’s content filter states it is blocked, and they need your assistance to remove the infected files. Which of the following has MOST likely occurred?

A. The user’s workstation is infected with ransomware
B. The user’s antivirus needs to be updated
C. The user’s workstation should be reimaged immediately
D. The user’s is the victim of a rogue antivirus attack

A

D. The user’s is the victim of a rogue antivirus attack

87
Q

After a company rolls out software updates, Ann, a lab researcher, can no longer use the lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest version of the drivers. Which of the following should the technician perform to get the researcher back to work as quickly as possible?

A. Rollback the drivers to the previous version
B. Downgrade the PC to a working patch level
C. Restore Ann’s PC to the last known good configuration
D. Reset Ann’s equipment configuration from a backup

A

A. Rollback the drivers to the previous version

88
Q

You are troubleshooting a computer that is not producing any sounds through its speakers. Which of the following tools should you use to troubleshoot this workstation?

A. Task scheduler
B. Device manager
C. Performance monitor
D. RDS (Remote desktop services)

A

B. Device manager

89
Q

Sam and Mary both work in the accounting department and use a web-based SaaS product as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam’s computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam’s computer when she attempted to log in to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam’s computer?

A. Verify Sam’s computer has the correct web browser configuration and settings
B. Ask Sam for his username/password to log on to the website from Mary’s computer
C. Install a new web browser, reboot Sam’s computer, and attempt to log on to the website again from Sam’s computer
D. Have Sam attempt to log on to another website from Sam’s computer to see if it works
E. Ask Sam about the pop-up notification and determine what new programs he installed on his computer
F. Have Sam clear his browser cache on his computer and then attempt to log on to the website again

A

A. Verify Sam’s computer has the correct web browser configuration and settings
E. Ask Sam about the pop-up notification and determine what new programs he installed on his computer

90
Q

You have been asked to help a user upgrade their laptop from Windows 10 to Windows 11. The user has asked that all of their applications, user profiles, documents, and PST files be preserved during the upgrade. Which of the following types of upgrades or installations should you perform on this laptop?

A. Unattended installation
B. In-place upgrade
C. Clean installation
D. Repair upgrade

A

B. In-place upgrade