Jason Dion - CompTIA A+ 1002 Exam Prep #2 Flashcards
Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?
A. Asset ID
B. Location
C. MAC address
D. IP address
A. Asset ID
The asset ID should be used to uniquely identify each piece of hardware tracked in an asset management database. An asset management database can be configured to store as much or as little information as is deemed necessary. Typical data would be type, model, serial number, asset ID, location, user(s), value, and service information. Tangible assets can be identified using an identification number, barcode label, or Radio Frequency ID (RFID) tag attached to the device. An RFID tag is a chip programmed with asset data. When in range of a scanner, the chip powers up and signals the scanner. The scanner alerts management software to update the device’s location. As well as asset tracking, this allows the management software to track the device’s location, making theft more difficult. An IP address is a logical identifier, but it is frequently changed when using a network with DHCP and cannot be used to reliably identify a piece of hardware. The location of a device is not a unique way of identifying an asset since many pieces of hardware may be located in the space location. Additionally, virtual machines cannot easily be tracked using their physical location. This MAC address is used to identify every device on the local area network uniquely if an Asset ID is not available, but would not be useful when trying to identify monitors since they do not use a MAC address.
Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use?
A. .py
B. .bat
C. .sh
D. .ps1
D. .ps1
Windows PowerShell enables you to perform management and administrative tasks in Windows 7 and later. It is fully integrated with the operating system and supports both remote execution and scripting. Microsoft provides the Windows PowerShell Integrated Scripting Environment (ISE) to help create and manage your Windows PowerShell scripts. If you want to save a series of PowerShell commands in a file to rerun them later, you effectively create a PowerShell script by creating a text file with a .ps1 extension. The file can contain a series of PowerShell commands, with each command appearing on a separate line.
One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup?
A. Update the operating system
B. Restore from backup
C. Run chkdsk on the system
D. Reboot into Safe Mode and see if the service starts
D. Reboot into Safe Mode and see if the service starts
You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which THREE of the following actions should you perform to increase the wireless network’s security?
A. Reduce the transmission power B. Reduce the channel availability C. Enable WPA3 encryption D. Enable WEP encryption E. Disable the SSID broadcast F. Disable the DHCP server
A. Reduce the transmission power
C. Enable WPA3 encryption
E. Disable the SSID broadcast
A user’s computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?
A. Answer the phone and politely ask the user to call back later
B. Answer the phone, put the user on hold, and help them after their scheduled break
C. Troubleshoot the issue for the user regardless of how long it takes
D. Ask another Tier 2 technician to answer the call since it will take too long to solve
D. Ask another Tier 2 technician to answer the call since it will take too long to solve
You are troubleshooting a network printer when a document is printed with sensitive employee data on it. Which of the following actions should you take?
A. Take the document to the office manager
B. Continue to troubleshoot the printer
C. Leave the document in the output tray
D. Remove the document and shred it
A. Take the document to the office manager
Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?
A. WEP
B. WPA2
C. WPS
D. RADIUS
D. RADIUS
Which of the following is used to communicate data and preferences to child processes within a script or batch file?
A. Constants
B. Comments
C. Environmental variables
D. Variables
C. Environmental variables
What does the command “shutdown /l” do on a Windows workstation?
A. Enter sleep mode
B. Reboot the workstation
C. Shutdown the workstation
D. Log off the workstation
D. Log off the workstation
The shutdown command allows a user or administrator to shut down or restart local or remote computers, one at a time. Using the /r option will reboot the computer. Using the /s option will shut down the computer. Using the /l option will log off the current user. Using the /h option will enter sleep or hibernation mode.
Which of the following file types are commonly used by scripts in a Linux command line environment?
A. .ps1
B. .js
C. .sh
D. .vbs
C. .sh
Nicole’s smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is in her apartment building. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?
A. Reset the smartphone’s wireless network settings
B. Verify the smartphone has adequate signal strength
C. Update the smartphone’s applications or OS
D. Reset the data usage statistics on the smartphone
B. Verify the smartphone has adequate signal strength
Your smartphone just displayed a notification stating that a new pair of headphones has connected to your device. Which of the following threats is this an example of?
A. Unintended Bluetooth pairing
B. Unauthorized microphone activation
C. Unauthorized location tracking
D. Unauthorized account access
A. Unintended Bluetooth pairing
Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?
A. .js
B. .py
C. .bat
D. .sh
C. .bat
Which command-line tool is used on a Unix/Linux system to move upward on a directory in the system’s directory structure?
A. cd ..
B. cd .
C. dir
D. ls
A. cd ..
Which of the following commands is used on a Linux system to run a program with another user’s permissions?
A. sudo
B. chown
C. grep
D. passwd
A. sudo
What anti-malware solution is installed as a dedicated on-premise appliance to scan all incoming traffic and prevent malware from being installed on any of your clients without requiring the installation of any software on your clients?
A. Network-based anti-malware
B. Cloud-based anti-malware
C. Host-based anti-malware
D. Signature-based anti-malware
A. Network-based anti-malware
A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of several settings: Email (never), Maps (always), Calender (while using), Messages (while using), Photos (never), App Store (while using), Bank (while using), and Weather (while using). Based on the information provided, what should be changed to resolve this client’s problem?
A. Change the Weather setting to always
B. Change the Email setting to while using
C. Change the App Store to never
D. Change the Maps setting to while using
D. Change the Maps setting to while using
A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won’t turn on. He excitedly tells you that he needs the smartphone working again “right now” and cannot wait. What should you do?
A. Explain to the customer that the repairs may take several days
B. Post about the experience on Facebook after the customer leaves
C. Tell the customer to calm down because it is just a phone
D. Offer the customer the option to replace his phone
D. Offer the customer the option to replace his phone
Which of the following file types are commonly used by scripts in a web page?
A. .js
B. .vbs
C. .ps1
D. .sh
A. .js
JavaScript is a scripting language that is designed to create interactive web-based content and web apps. The scripts are executed automatically by placing the script in the HTML code for a web page so that when the HTML code for the page loads, the script is run. JavaScript is stored in a .js file or as part of an HTML file. VBScript is a scripting language based on Microsoft’s Visual Basic programming language. Network administrators often use VBScript to perform repetitive administrative tasks. With VBScript, you can run your scripts from either the command-line or the Windows graphical interface. Scripts that you write must be run within a host environment. Windows 10 provides Internet Explorer, IIS, and Windows Script Host (WSH) for this purpose. Windows PowerShell enables you to perform management and administrative tasks in Windows 7 and later. It is fully integrated with the operating system and supports both remote execution and scripting. Microsoft provides the Windows PowerShell Integrated Scripting Environment (ISE) to help create and manage your Windows PowerShell scripts. If you want to save a series of PowerShell commands in a file to rerun them later, you effectively create a PowerShell script by creating a text file with a .ps1 extension. The file can contain a series of PowerShell commands, with each command appearing on a separate line. A shell script is a file that contains a list of commands to be read and executed by the shell in Linux and macOS. A .sh file is used for a shell script and its first line always begins with #!/bin/bash that designates the interpreter. This line instructs the operating system to execute the script. Shell scripts allow you to perform various functions. These functions include automation of commands and tasks of system administration and troubleshooting, creating simple applications, and manipulating text or files.
An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?
A. Group Policy
B. Home Folder
C. Security Groups
D. Credential Manager
C. Security Groups
A security group is a collection of user accounts that can be assigned permissions in the same way as a single user object. Security groups are used when assigning permissions and rights, as it is more efficient to assign permissions to a group than to assign them individually to each user. You can assign permissions to a user simply by adding the user to the appropriate group. In most corporate environments, security groups control access to share drives, mailing lists, and other network resources.
When Jason needs to log in to his bank, he must use a key fob to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?
A. Biometric lock
B. PIV card
C. Hardware token
D. Smart card
C. Hardware token
Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?
A. xcopy
B. copy
C. robocopy
D. cp
C. robocopy
The robocopy tool is used to mirror or synchronize directories and their contents. Robocopy will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn’t waste time copying unchanged files. The xcopy tool, on the other hand, copies all of the files from one directory to another. To meet your boss’s requirements to synchronize the two hard drive’s contents, you must use robocopy since it will also remove files from the second drive that were removed from the first drive, too. The copy command is used to copy one or more files from one location to another. The copy command cannot copy files that are 0 bytes long or for copying all of a directory’s files and subdirectories. The cp command is used in Linux to copy one or more files and directories from one location to another.
You have just installed a second monitor for a bookkeeper’s workstation so they can stretch their spreadsheets across both monitors. This would essentially let them use the two monitors as one combined larger monitor. Which of the following settings should you configure?
A. Refresh rate
B. Extended mode
C. Color depth
D. Resolution
B. Extended mode
Which of the following Windows 10 system utilities would be used to test the functionality of the DirectX subsystem for video and sound-related problems?
A. taskchd
B. msinfo32
C. eventvwr
D. dxdiag
D. dxdiag
An employee at Dion Training complains that their smartphone is broken. They state that it cannot connect to the internet, nor can it make or receive phone calls and text messages. You ask them to start up the music player on his phone, and it opens without any issues. It appears the common issue has to do with the device’s network connectivity. Which of the following is MOST likely the problem with this smartphone?
A. The Bluetooth connection is disabled
B. Airplane mode is enabled on the device
C. The cellular radio in it is broken
D. The VPN password was entered incorrectly
B. Airplane mode is enabled on the device
You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. A request for change (RFC) is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval?
A. Update the asset management database with the new router’s asset ID
B. Extend the maintenance windows from 1 hour to 8 hours
C. Configure a secondary route during the maintenance window
D. Document a backout plan if the update is not successful
D. Document a backout plan if the update is not successful
A user is complaining that when they attempt to access Google’s homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?
A. Remove any proxy servers configured in their web browser
B. Download the latest security updates for Windows
C. Verify the user’s date and timezone are correctly listed in Windows
D. Disable the Windows Firewall
A. Remove any proxy servers configured in their web browser
You have been asked to classify a hospital’s medical records as a form of regulated data. Which of the following would BEST classify this type of data?
A. PII
B. PHI
C. PCI
D. GDPR
B. PHI
You need to move a 75-pound box with a rack-mounted UPS in it. Which of the following actions should you take?
A. Open the box and carry up the UPS in pieces
B. Ask a coworker to team lift it with you
C. Life with your legs and not your back
D. Lift with your back and not your legs
B. Ask a coworker to team lift it with you
Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?
A. Under-voltage event
B. Power spikes
C. Power failure
D. Power surge
D. Power surge
Which command-line tool is used on a Linux system to display a list of the files and directories within the current path?
A. ls
B. chkdsk
C. sfc
D. pwd
A. ls
The ls command lists the files or directories in the current path on a Linux system. When invoked without any arguments, ls lists the files in the current working directory. The pwd command displays the present working directory (current directory) path to the terminal or display. If you are working on a Linux system and are unsure of where you are in the directory structure, type “pwd” and hit enter to display the path to the screen. The chkdsk command is used to check the file system and file system metadata of a volume for logical and physical errors. The system file checker (SFC) command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line.
The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company’s web servers. Which of the following is the MOST likely cause of the issue?
A. Session hijacking
B. Evil twin
C. ARP spoofing
D. Distributed DoS (Denial of Service)
D. Distributed DoS (Denial of Service)
A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to the Internet. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network. Session hijacking, also known as TCP session hijacking, is a method of taking over a web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. An evil twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the user’s knowledge.
A user contacts the service desk after they just finished attempting to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?
A. Setup
B. System log
C. Application log
D. Security log
A. Setup
Which version of Windows supports Virtual Desktops?
A. Windows 8
B. Windows 8.1
C. Windows 7
D. Windows 10
D. Windows 10
Which of the following types of software CANNOT be updated via the Windows Update program?
A. Critical fixes
B. Firmware updates
C. Driver updates
D. Security patches
B. Firmware updates
You are troubleshooting an issue with a Windows desktop and need to display the machine’s active TCP connections. Which of the following commands should you use?
A. net use
B. ping
C. netstat
D. ipconfig
C. netstat