Mike Meyers - TOTAL: A+ Certification 220-1002 Udemy Course Flashcards

1
Q

One of the best ways to gather information about a problem is to do what with the customer?

Spy on Them
Communicate
Accuse them
Blame them

A

Communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Tech should avoid this type of behavior when dealing with customers?

Professional
Friendly
Confident
Defensive

A

Defensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tech’s should avoid using this?

Jargon
Screwdriver
Power Meter
Plastic Tweezers

A

Jargon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should a tech do when solving a problem is beyond their ability?

Ask the customer for advice
Disassemble the system and rebuild it from scratch
Tell the customer that the problem can’t be fixed
Escalate

A

Escalate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which can have a negative impact in a wireless network environment?

ESD
RFI
Antistatic Mat
Antistatic Bag

A

RFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which is not a good way to prevent or reduce ESD?

Antistatic Mat
Antistatic Bag
Antistatic Wrist Strap
Antistatic Toolkit

A

Antistatic Toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What class of fire extinguisher is best for electric fires?

A
B
C
D

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which software is used by the Operating System to control computer components?

Kernel
Process
Device Drivers
iOS

A

Device Drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This Windows feature protects users from performing potentially dangerous actions?

Root
UAC (User Account Control)
Administrator
Superuser

A

UAC (User Account Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which operating system provides Single Sign-on and a Domain Controller?

iOS
Linux
Windows Server
SAMBA

A

Windows Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is a Microsoft Service for Cloud File Storage and Sharing?

Google Drive
OneDrive
Charms Drive
Metro Drive

A

OneDrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The bar at the bottom of a macOS desktop used to select and launch programs is called what?

Finder
Dock
Terminal
Apple Menu

A

Dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Linux comes in different variations known as what?

Distros
Desktops
Ubuntus
Mints

A

Distros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Linux uses what type of Partition to compensate for low available memory conditions?

Personal
Recovery
Operating System
Swap

A

Swap

Linux uses swap partitions as VM when needed.
Personal Partitions are used to hold programs and files.
Operating System partitions hold the bootable OS and utilities.
Recovery Partitions are used to restore a damaged OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is found at LBA 0?

Master Boot Record
OS Partition
Power-On-Self-Test (POST)
Windows Swap File

A

Master Boot Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the First GPT Header called?

Main
Secondary
Primary
Master

A

Primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which does formatting a drive NOT do?

Test the Blocks
Save Existing Data
Create the File Index
Create a Blank Root

A

Save the Existing Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The main file system used by current versions of Windows is what?

NTFS
FAT32
GPT
MBR

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic disks support drive mirroring. What happens if one of the mirrored drives fails?

The system fails until the failed drive is replaced.
The system automatically repairs the failed drive
The system selects an empty drive as a “Hot Spare” to replace the failed drive.
The system continues to function with no data loss.

A

The system continues to function with no data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which is NOT a Storage Solution RAID configuration?

Parity
Simple
Two-Way Mirror
RAID10
Three-Way Mirror
A

RAID10

Storage Spaces does not have a RAID10 configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What Operates a Software RAID Solution?

A RAID expansion card
A RAID controller built into the motherboard
The OS and CPU
The Drives in the Array

A

The OS and CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What kind of CHIP holds a BitLocker Key?

TPM
MPT
TMP
PTM

A

TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Aside from an Optical Disk, which storage device is best for creating portable bootable media from an ISO image?

Network Interface Card
USB Flash Drive
Hard Drive
SSD

A

USB Flash Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How can a user access the contents of an ISO file without first creating bootable media?

Open the ISO file with Windows Explorer.
Use the WinRE Environment
Copy the ISO to a Thumb Drive
Mount the ISO File

A

Mount the ISO File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which is not a name that can be used to sign-in when Installing Windows? Domain Name Local Account Name Enterprise Account Name Microsoft Account Name
Enterprise Account Name
26
When installing Windows, which is not necessary information to know and follow? Domain Config Workgroup Names Naming Conventions Cortana Config
Cortana Config
27
A Tech needs what to complete the Post-Installation tasks for a Windows Installation? Motherboard Drivers Hardware Compatibility List An ISO of the OS CPU Upgrade
Motherboard Drivers
28
Which task does Windows perform during Installation? Install anti-malware software Create a Recovery Drive Update all Drivers Install a basic video driver
Install a basic video driver
29
The creation of an answer file is needed for what kind of Windows Install? Upgrade Unattended Clean Multiboot
Unattended
30
Which step is NOT required when upgrading from one Windows edition to a different edition of Windows (For instance, from a Home Edition to a Pro Edition)? ``` Back up user files Perform a Clean Install Deploy an Image over a network connection Install apps Restore backup files ```
Deploy an image over a network connection
31
Which is NOT a Root Key in Registry? ``` HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_USERS HKEY_CURRENT_MACHINE ```
HKEY_CURRENT_MACHINE
32
The registry files are stored in the C:\Windows\System32\_____ folder? regback config registry reg
config
33
Which creates a graphical interface for users to interact with? Process Tree Services Applications Process ID
Applications
34
To run an application or service, a computer creates one or more _______? Process Program Dynamic-Link Library (DLL) App
Process
35
You can use the Services applet to manage a service. With what other utility can you manage services? Resource Monitor Task Manager Performance Monitor Event Viewer
Task Manager
36
Which method brings up a context menu for a resource, file or folder? CTRL-SHIFT-ESC RIGHT-CLICK CTRL-ALT-DEL LEFT-CLICK
RIGHT-CLICK
37
Which system category is not monitored by Task Manager? CPU Registry Memory Network
Registry
38
This setting keeps applications from accessing memory used by other applications? DEP MMC Safe Boot Restore Point
DEP Data Execution Prevention
39
A _______ is an event monitored by Performance Monitor? Set Counter Service Baseline
Counter
40
Which of these is NOT a valid event category in Event Viewer? ``` Application Security Setup User System ```
User
41
Which Windows File System has the most security Features? macOS Shares NTFS FAT
NTFS
42
Which statement about Groups is True? If a User is a member of a group, the user account cannot have any individual permission assignments. Permissions granted to a group apply to all of the members in the group. Permissions granted to a user apply to all co-members of any groups that the user is a member of. Users can be members of groups and groups can be members of users.
Permissions granted to a group apply to all of the members in the group.
43
How does the Administrator account receive it's power? By being a member of the Power Users Group By being a member of the Administrators Group By changing its account type from Standard User to Administrator By having a Full Control NTFS Permission for the root of the C: Drive
By being a member of the Administrators Group
44
Which is NOT a way to create user accounts? Settings Control Panel Local Users and Groups User Creation Tool
User Creation Tool
45
Which file action is NOT controlled by NTFS "Modify" Permission? Read a File Write to a File Delete a File Execute a Program File
Execute a Program File
46
On Linux, which is NOT a File Permission? Read Write eXecute Delete
Delete
47
Which part of the File Explorer interface displays frequently used files and folders? Navigation Pane Details Pane Quick Access This PC
Quick Access
48
Which is an Accurate UNC? //share/share //share\share \\share/share \\share\share
\\share\share
49
Local Security Policy settings apply to which of these? A Single Computer All of the Computers within a Workgroup All of the Computers on a Domain All of the Computers that are logged into the same server.
A Single Computer
50
Which is NOT set in the Account Lockout Policy Settings? Lockout Threshold Minimum Password Length Lockout Duraction Reset Lockout Counter
Minimum Password Length
51
How does Windows keep the OS up to date? Windows Update Patch Management Firmware Update Software Update
Windows Update
52
Windows 7 has two categories of updates: Important and ______? Automatic Optional Manual Recommended
Optional
53
Windows 10 Automatically performs which function on a regular basis? Error Checking Defrag AFU Driver Updates
Defrag
54
Which is a typical option when Installing an Application in Windows? Uninstall Include Uninstaller Install as Administrator Installation Folder
Installation Folder
55
Which Windows tool is used to uninstall programs? Application Uninstaller Programs and Features IIS Control Panel
Programs and Features
56
Before creating a Restore Point, what must be enabled? Restore Point Creation System Windows Repair Environment System Protection Image Backup
System Protection
57
Which is NOT preserved by a Restore Point? Applications Registry User Files Drivers
User Files
58
Backups should be saved where for best recoverability? The Windows Recovery Environment Internal SSD Same Drive as the Data Being Backed Up External Storage
External Storage
59
Which is a tool to automate launching and running Windows programs at specific times? File History Task Scheduler Time Machine Restore Point
Task Scheduler
60
What is the Resolution for WUXGA? 1600 x 1200 2560 x 1440 1440 x 900 1920 x 1200
1920 x 1200
61
What resolution is 1280 x 1024? SXGA SVGA VGA UXGA
SXGA
62
Which is not a display option for multiple monitors in Windows? ``` Show only on monitor 1 Show only on monitor 2 Disable all Monitors Duplicate on Both monitors Extend monitor ```
Disable all Monitors
63
Which is NOT true about multiple monitors in Windows? Multiple monitors can function on one video card Different monitors must have the same resolution Multiple Monitors can work with multiple video cards multiple monitors can be different sizes
Different monitors must have the same resolution
64
Which is NOT a Type of Windows Firewall? Domain Enterprise Private Public
Enterprise
65
Which exposes a LAN host to the Internet? Firewall DMZ SMB Whitelist
DMZ
66
Which is NOT a Wireless Encryption Standard? WEP WPA WEP2 WPA2
WEP2
67
If you spot a WAP on the ceiling of a large room with no obvious power outlet nearby, how is it most-likely powered? PoE RADIUS Battery Solar
PoE
68
Telnet uses Port ______ and SSH uses Port _______? 23, 22 22, 23 20, 21 21, 20
23, 22
69
Windows RDP uses which port? 3983 3389 3893 8933
3389
70
HTTP uses Port _____ and HTTPS uses Port _____? 88, 4430 8080, 443 80, 443 80, 343
80, 443
71
Which is NOT a typical Android screen lock option? Swipe Token Pattern Pin
Token
72
Which is least likely solution for a DIM mobile device screen? Charge the Battery Adjust the display's brightness. Enable automatic brightness adjustments Replace the display or its backlight.
Change the Battery
73
Which is NOT a core component of Computer Security? Peripheral-based Host-based Network-based Physical-based
Peripheral-based
74
Which is NOT a layer of physical security? Perimeter Room Locks Log Files Individual Devices
Log Files
75
Which is NOT a password cracking technique? Brute Force Dictionary Attack Reverse Hashing Rainbow Tables
Reverse Hashing
76
Which term does NOT describe how malware spreads to new systems? Virus Worms Key Logger Trojan
Key Logger
77
In CompTIA's 7 Step malware management process, which step immediately follows Step 3 (Disable System Restore)? Quarantine Infected Systems Remediate Infected Systems Schedule Scans and Run Updates Educate Users
Remediate Infected Systems
78
Which is NOT a Social Engineering Attack? Phishing Tailgating Trojan Shoulder Surfing
Trojan
79
Which is NOT a standard business document? Virus Signature List Network Topology Diagram Regulatory and Compliance Doc Acceptable Use Policy
Virus Signature List
80
Which is NOT a critical data type? PII PHI GDPR Password Policy
Password Policy
81
What is NOT a change-management consideration? Documented Practices Purpose of the Change Risk Analysis History of Changes
History of the Changes
82
Which is the worst location for the only backup of some data? Same drive as the data being backed up External hard drive USB flash drive Cloud Storage
Same drive as the data being backed up
83
Which is NOT a common device that can be recycled? Lithium-Ion Batteries CRT Monitors Alkaline Batteries Toner Cartirdges
Alkaline Batteries
84
Which wires determine the location of data or instructions in System RAM? External Data Bus Memory Controller Chip Address Bus CPU Cache Controller
Address Bus
85
What should a tech do to improve performance if the Virtual Memory file is constantly full? increase the size of the virtual memory file add more RAM to the computer close some applications the tech should do nothing, virtual memory works best when the file is full
add more RAM to the computer.
86
Which device protects only from Power Spikes? UPS Power Supply Unit (PSU) Heat Sink Surge Supressor
Surge Suppressor
87
Which of the following is not provided by a Power Supply? Surge Suppression Sag Protection Power Good signal to the Computer Voltage to the CPU and Motherboard
Sag Protection
88
Which do Link Lights not normally indicate? Connection Duplex Status Speed Activity
Duplex Status
89
Wake-On-LAN is Triggered by What? Magic Bullet Magic Frame Magic Message Magic Packet
Magic Packet
90
Which is NOT an ACPI Power Mode in a Laptop? On Sleep Hibernation Off
Off
91
Which choice increases the Permissions a Command is run with? Precede the command with sudo Run Bash shell in Root mode Put sudo at the end of a command line Precede the command with man
Precede the command with sudo
92
Which command displays a list of files and directories in Windows? ls dir cls su
dir
93
Which command displays the current directory? ls -l ls cd pwd
pwd (Print Working Directory)
94
Which switch should be added to the rmdir command in order to delete a directory and its subdirectories? #NAME? -~ /s -r
-r Explanation: rmdir -r removes directories and subdirectories in Linux. -subs and -~ are not valid switches for rmdir. /s is the switch used with the Windows rd command to remove subdirectories.
95
Which command finds and fixes file table problems on a Windows Computer? dism chkdsk format sfc
chkdsk Explanation: chkdsk (also called error checking) finds and fixes problems with file tables. dism finds and fixes certain Windows files. format creates a new file table and blank root directory, wiping out the old table. sfc finds and fixes certain Windows files.
96
If SFC finds errors, what should a technician do? Run dism Run chkdsk Run format Run chkdsk /f
Run dism
97
Which command causes /dev/sdb to be overwritten with zeros? dd if=/dev/zero of=/dev/sdb dd if=/dev/sdb of=/dev/zero dd if=/dev/sda of=/dev/sdb dd if/dev/sdb of=~/backup.img
dd if=/dev/zero of=/dev/sdb
98
Which command has replaced apt-get? get redhat debian apt
apt
99
To take ownership of a Linux File, which command should you use? pwd chmod chown passwd
chown
100
Which symbol in a Bash script indicates the rest of the line is a comment? * \ # !
#
101
If you encounter boot problems, which tool is a good place to start your troubleshooting? Network Troubleshooter System Troubleshooter WinPE WinRE
WinRE Explanation: WinRE is an excellent tool to begin troubleshooting boot issues. WinPE is not a troubleshooting tool. System Troubleshooter and Network Troubleshooter are inaccessible if the system won't boot correctly.
102
Which type of Boot causes Windows to boot with Minimal set of Drivers, Services, and Applications? Minimum Safe Full Normal
Safe
103
How many times must Windows Crash during boot for the Windows Recovery Environment to add an advanced options menu? 0 1 2 3
3
104
A user reports that their computer won't boot this morning. What is the most likely reason? The system automatically updated drivers last night The computer is stuck in Safe Mode The user left their thumb drive plugged into a USB Port The computer is not plugged in
The user left their thumb drive plugged into a USB port.
105
A computer boots but can't load the graphical desktop. Which is not a recommended troubleshooting procedure? Reboot multiple times if necessary. Add more RAM Boot to Safe Mode Use WinRE to access the System Logs in Event Viewer
Add more RAM
106
Which is not a likely cause for a slow running computer? Application Issues Low RAM Not enough services running Disk is Fragmented
Not enough services running
107
A corrupt profile may prevent the Windows GUI from loading. Which method might repair the Profile? Delete the user account edit the registry disable start programs Run chkdsk /f
Edit the Registry
108
A user reports that their word processor crashes every time it gets launched. Which tool should a technician use first to diagnose the problem? Programs and Features Task Manager Event Viewer Disk Defrag
Event Viewer
109
Which is the most likely cause of a Windows BSoD? New software installed USB 3.0 New hardware installed Flashed BIOS
New hardware installed
110
Which of the following NTFS Security Settings Overrides ALL other settings? Deny Modify Read Write
Deny Explanation: Deny is NOT a Permission Setting, it's a Security Setting and does override ALL other Settings, including the Permission Settings.