Jason Dion - CompTIA A+ 1002 Exam Prep #3 Flashcards
You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company’s workstations had their files encrypted. You are worried about the rest of the network’s workstations. What should you do FIRST?
A. Immediately quarantine the affected workstations
B. Format the affected workstation’s hard drives and reinstall Windows
C. Perform a full disk anti-malware scan on the affected workstations
D. Update the anti-malware scanner’s signatures on all workstations
A. Immediately quarantine the affected workstations
Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?
A. RDP
B. SSH
C. TELNET
D. VNC
A. RDP
Eleanor, a user, contacts the help desk to report that her workstation will not boot up this morning. The help desk technician verifies that the workstation’s memory, power supply, and monitor function properly. The technician believes that the hard drive is not recognized by the system based on an error message displayed on the screen. Which of the following error messages was being displayed?
A. No boot device available
B. Operating system not found
C. NTLDR not found
D. BIOS ROM checksum error
A. No boot device available
Which of the following macOS features is used to backup and restore files to an external hard disk?
A. Boot Camp
B. Remote disc
C. Time Machine
D. Snapshot
C. Time Machine
Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers?
A. Strip-cut shredder
B. Recycling bin
C. Micro-cut shredder
D. Cross-cut shredder
C. Micro-cut shredder
Which file system type is used to mount remote storage devices on a Linux system?
A. exFAT (extensible file allocation table)
B. NFS
C. NTFS
D. APFS
B. NFS
Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?
A. Connections
B. Content
C. General
D. Privacy
A. Connections
An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows “limited” with no availability. What rollback action should the technician perform?
A. Server’s NIC drivers
B. Antivirus updates
C. Server’s IP address
D. Web browser
A. Server’s NIC drivers
You are installing a new firewall for Dion Training’s corporate network. Which of the following documents should you update FIRST?
A. Password policy
B. Network topology diagrams
C. Knowledge base articles
D. Incident database
B. Network topology diagrams
A corporate workstation was recently infected with malware. The malware was able to access the workstation’s credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?
A. Install a host-based intrusion detection system on all of the corporate workstations
B. Install an anti-virus or anti-malware solution that uses heuristic analysis
C. Monitor all workstations for failed login attempts and forward them to a centralized SYSLOG server
D. Install a Unified Threat Management system on the network to monitor for suspicious traffic
B. Install an anti-virus or anti-malware solution that uses heuristic analysis
You are troubleshooting a user’s laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue?
A. Setup
B. System log
C. Application log
D. Security log
B. System log
Which of the following is the LEAST secure wireless security and encryption protocol?
A. WEP
B. WPA
C. WPA3
D. WPA2
A. WEP
Which of the following operating systems are NOT used in modern smartphones or tablets?
A. Android
B. iPadOS
C. macOS
D. iOS
C. macOS
Which TWO of the following would provide the BEST security for both computers and smartphones?
A. Enabling multifactor authentication B. Using a cable lock C. Enforcing trusted software sources D. Configuring organizational units E. Enabling data loss prevention F. Utilizing access control lists
A. Enabling multifactor authentication
C. Enforcing trusted software sources
Which of the following is an APIPA or link-local address?
A. 192.168.1.34
B. 33.52.7.83
C. 127.0.0.1
D. 169.254.64.23
D. 169.254.64.23
A coworker is creating a file containing a script. You look over their shoulder and see “net use s:\fileserver\videos” in the file. Based on this, what type of file extension should this script use?
A. .py
B. .vbs
C. .js
D. .bat
D. .bat
Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?
A. Unattended installation
B. Repair installation
C. In-place upgrade
D. Remote network installation
A. Unattended installation
Which of the following is required for evidence to be admissible in a court of law?
A. Right to audit
B. Chain of custody
C. Legal host
D. Order of volatility
B. Chain of custody
You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend’s Windows 10 desktop. Which file format should you use?
A. NTFS
B. HFS
C. exFAT
D. FAT32
C. exFAT
An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?
A. Brute-force
B. Rainbow table
C. Dictionary
D. Hybrid
C. Dictionary
Last week, a technician remediated a malware infection on Karen’s laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete?
A. Quarantining the infected laptop
B. Enabling System Restore
C. Investigating and verify malware symptoms
D. Educating the end user
D. Educating the end user
A coworker is creating a file containing a script. You look over their shoulder and see “#!/bin/bash” as the first line in the file. Based on this, what type of file extension should this script use?
A. .vbs
B. .bat
C. .sh
D. .py
C. .sh
A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?
A. The touchscreen is faulty
B. The smartphone is infected with malware and is using a lot of processing power
C. The charging port is faulty
D. The battery is depleted
B. The smartphone is infected with malware and is using a lot of processing power
Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?
A. WPA2
B. WEP
C. RADIUS
D. WPS
C. RADIUS
A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?
A. Upgrade their web browser
B. Conduct an antivirus scan
C. Check the host.ini file
D. Disable System Restore
C. Check the host.ini file
Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and destroy the data on their hard disk drives. Which of the following methods would be the MOST effective?
A. Physically destroy the drives by drilling each HDD’s platter
B. Conduct a low-level format of each hard drive
C. Fully format each hard drive with a series of 0s
D. Degauss each of the hard drives
D. Degauss each of the hard drives
What network device uses ACLs to prevent unauthorized access into company systems?
A. Content filter
B. Load balancer
C. IDS
D. Firewall
D. Firewall
You are currently building a Linux server. Which of the following file system formats should you use for the server?
A. APFS
B. ext4
C. exFAT
D. NTFS
B. ext4
A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?
A. Turn off Wi-Fi and rely on their cellular data plan
B. Upgrade to a new smartphone
C. Increase the Wi-Fi signal being transmitted by their WAP
D. Enable MAC filtering on their WAP
C. Increase the Wi-Fi signal being transmitted by their WAP
Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?
A. The smartphone has been infected with a virus
B. The data speeds are insufficient with only one bar of signal
C. The cellular radio cannot connect to the cellphone towers
D. The baseband firmware needs to be updated
B. The data speeds are insufficient with only one bar of signal
Your smartphone just displayed a notification stating that a new pair of headphones has connected to your device. Which of the following threats is this an example of?
A. Unauthorized account access
B. Unintended Bluetooth pairing
C. Unauthorized location tracking
D. Unauthorized microphone activation
B. Unintended Bluetooth pairing
Which command is used to create a new disk partition on a Windows system?
A. format
B. chkdsk
C. dd
D. diskpart
D. diskpart
During a disaster recovery, which of the following statements is true?
A. A virtual machine cannot be used for redundancy or load balancing
B. A virtual machine has more downtime than a physical server
C. Both a virtual machine and a physical server has the same downtime
D. A virtual machine has less downtime than a physical server
D. A virtual machine has less downtime than a physical server
What does the command “shutdown /r” do on a Windows workstation?
A. Enter sleep mode
B. Reboot the workstation
C. Log off the workstation
D. Shutdown the workstation
B. Reboot the workstation
Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren’t working. Which of the following is MOST likely the problem?
A. Bluetooth is not enabled
B. The phone is in airplane mode
C. Wi-Fi is not enabled
D. Cellular is not enabled
A. Bluetooth is not enabled
You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal?
A. MOU
B. UPS
C. SOW
D. MSDS
D. MSDS