Mike Meyers - TOTAL: A+ Certification 220-1002 Udemy Course Flashcards

1
Q

One of the best ways to gather information about a problem is to do what with the customer?

Spy on Them
Communicate
Accuse them
Blame them

A

Communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Tech should avoid this type of behavior when dealing with customers?

Professional
Friendly
Confident
Defensive

A

Defensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tech’s should avoid using this?

Jargon
Screwdriver
Power Meter
Plastic Tweezers

A

Jargon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should a tech do when solving a problem is beyond their ability?

Ask the customer for advice
Disassemble the system and rebuild it from scratch
Tell the customer that the problem can’t be fixed
Escalate

A

Escalate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which can have a negative impact in a wireless network environment?

ESD
RFI
Antistatic Mat
Antistatic Bag

A

RFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which is not a good way to prevent or reduce ESD?

Antistatic Mat
Antistatic Bag
Antistatic Wrist Strap
Antistatic Toolkit

A

Antistatic Toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What class of fire extinguisher is best for electric fires?

A
B
C
D

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which software is used by the Operating System to control computer components?

Kernel
Process
Device Drivers
iOS

A

Device Drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This Windows feature protects users from performing potentially dangerous actions?

Root
UAC (User Account Control)
Administrator
Superuser

A

UAC (User Account Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which operating system provides Single Sign-on and a Domain Controller?

iOS
Linux
Windows Server
SAMBA

A

Windows Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is a Microsoft Service for Cloud File Storage and Sharing?

Google Drive
OneDrive
Charms Drive
Metro Drive

A

OneDrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The bar at the bottom of a macOS desktop used to select and launch programs is called what?

Finder
Dock
Terminal
Apple Menu

A

Dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Linux comes in different variations known as what?

Distros
Desktops
Ubuntus
Mints

A

Distros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Linux uses what type of Partition to compensate for low available memory conditions?

Personal
Recovery
Operating System
Swap

A

Swap

Linux uses swap partitions as VM when needed.
Personal Partitions are used to hold programs and files.
Operating System partitions hold the bootable OS and utilities.
Recovery Partitions are used to restore a damaged OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is found at LBA 0?

Master Boot Record
OS Partition
Power-On-Self-Test (POST)
Windows Swap File

A

Master Boot Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the First GPT Header called?

Main
Secondary
Primary
Master

A

Primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which does formatting a drive NOT do?

Test the Blocks
Save Existing Data
Create the File Index
Create a Blank Root

A

Save the Existing Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The main file system used by current versions of Windows is what?

NTFS
FAT32
GPT
MBR

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic disks support drive mirroring. What happens if one of the mirrored drives fails?

The system fails until the failed drive is replaced.
The system automatically repairs the failed drive
The system selects an empty drive as a “Hot Spare” to replace the failed drive.
The system continues to function with no data loss.

A

The system continues to function with no data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which is NOT a Storage Solution RAID configuration?

Parity
Simple
Two-Way Mirror
RAID10
Three-Way Mirror
A

RAID10

Storage Spaces does not have a RAID10 configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What Operates a Software RAID Solution?

A RAID expansion card
A RAID controller built into the motherboard
The OS and CPU
The Drives in the Array

A

The OS and CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What kind of CHIP holds a BitLocker Key?

TPM
MPT
TMP
PTM

A

TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Aside from an Optical Disk, which storage device is best for creating portable bootable media from an ISO image?

Network Interface Card
USB Flash Drive
Hard Drive
SSD

A

USB Flash Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How can a user access the contents of an ISO file without first creating bootable media?

Open the ISO file with Windows Explorer.
Use the WinRE Environment
Copy the ISO to a Thumb Drive
Mount the ISO File

A

Mount the ISO File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which is not a name that can be used to sign-in when Installing Windows?

Domain Name
Local Account Name
Enterprise Account Name
Microsoft Account Name

A

Enterprise Account Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When installing Windows, which is not necessary information to know and follow?

Domain Config
Workgroup Names
Naming Conventions
Cortana Config

A

Cortana Config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A Tech needs what to complete the Post-Installation tasks for a Windows Installation?

Motherboard Drivers
Hardware Compatibility List
An ISO of the OS
CPU Upgrade

A

Motherboard Drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which task does Windows perform during Installation?

Install anti-malware software
Create a Recovery Drive
Update all Drivers
Install a basic video driver

A

Install a basic video driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The creation of an answer file is needed for what kind of Windows Install?

Upgrade
Unattended
Clean
Multiboot

A

Unattended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which step is NOT required when upgrading from one Windows edition to a different edition of Windows (For instance, from a Home Edition to a Pro Edition)?

Back up user files
Perform a Clean Install
Deploy an Image over a network connection
Install apps
Restore backup files
A

Deploy an image over a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which is NOT a Root Key in Registry?

HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_MACHINE
A

HKEY_CURRENT_MACHINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The registry files are stored in the C:\Windows\System32\_____ folder?

regback
config
registry
reg

A

config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which creates a graphical interface for users to interact with?

Process Tree
Services
Applications
Process ID

A

Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

To run an application or service, a computer creates one or more _______?

Process
Program
Dynamic-Link Library (DLL)
App

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

You can use the Services applet to manage a service. With what other utility can you manage services?

Resource Monitor
Task Manager
Performance Monitor
Event Viewer

A

Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which method brings up a context menu for a resource, file or folder?

CTRL-SHIFT-ESC
RIGHT-CLICK
CTRL-ALT-DEL
LEFT-CLICK

A

RIGHT-CLICK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which system category is not monitored by Task Manager?

CPU
Registry
Memory
Network

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This setting keeps applications from accessing memory used by other applications?

DEP
MMC
Safe Boot
Restore Point

A

DEP

Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A _______ is an event monitored by Performance Monitor?

Set
Counter
Service
Baseline

A

Counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of these is NOT a valid event category in Event Viewer?

Application
Security
Setup
User
System
A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which Windows File System has the most security Features?

macOS
Shares
NTFS
FAT

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which statement about Groups is True?

If a User is a member of a group, the user account cannot have any individual permission assignments.
Permissions granted to a group apply to all of the members in the group.
Permissions granted to a user apply to all co-members of any groups that the user is a member of.
Users can be members of groups and groups can be members of users.

A

Permissions granted to a group apply to all of the members in the group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How does the Administrator account receive it’s power?

By being a member of the Power Users Group
By being a member of the Administrators Group
By changing its account type from Standard User to Administrator
By having a Full Control NTFS Permission for the root of the C: Drive

A

By being a member of the Administrators Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which is NOT a way to create user accounts?

Settings
Control Panel
Local Users and Groups
User Creation Tool

A

User Creation Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which file action is NOT controlled by NTFS “Modify” Permission?

Read a File
Write to a File
Delete a File
Execute a Program File

A

Execute a Program File

46
Q

On Linux, which is NOT a File Permission?

Read
Write
eXecute
Delete

A

Delete

47
Q

Which part of the File Explorer interface displays frequently used files and folders?

Navigation Pane
Details Pane
Quick Access
This PC

A

Quick Access

48
Q

Which is an Accurate UNC?

//share/share
//share\share
\share/share
\share\share

A

\share\share

49
Q

Local Security Policy settings apply to which of these?

A Single Computer
All of the Computers within a Workgroup
All of the Computers on a Domain
All of the Computers that are logged into the same server.

A

A Single Computer

50
Q

Which is NOT set in the Account Lockout Policy Settings?

Lockout Threshold
Minimum Password Length
Lockout Duraction
Reset Lockout Counter

A

Minimum Password Length

51
Q

How does Windows keep the OS up to date?

Windows Update
Patch Management
Firmware Update
Software Update

A

Windows Update

52
Q

Windows 7 has two categories of updates: Important and ______?

Automatic
Optional
Manual
Recommended

A

Optional

53
Q

Windows 10 Automatically performs which function on a regular basis?

Error Checking
Defrag
AFU
Driver Updates

A

Defrag

54
Q

Which is a typical option when Installing an Application in Windows?

Uninstall
Include Uninstaller
Install as Administrator
Installation Folder

A

Installation Folder

55
Q

Which Windows tool is used to uninstall programs?

Application Uninstaller
Programs and Features
IIS
Control Panel

A

Programs and Features

56
Q

Before creating a Restore Point, what must be enabled?

Restore Point Creation System
Windows Repair Environment
System Protection
Image Backup

A

System Protection

57
Q

Which is NOT preserved by a Restore Point?

Applications
Registry
User Files
Drivers

A

User Files

58
Q

Backups should be saved where for best recoverability?

The Windows Recovery Environment
Internal SSD
Same Drive as the Data Being Backed Up
External Storage

A

External Storage

59
Q

Which is a tool to automate launching and running Windows programs at specific times?

File History
Task Scheduler
Time Machine
Restore Point

A

Task Scheduler

60
Q

What is the Resolution for WUXGA?

1600 x 1200
2560 x 1440
1440 x 900
1920 x 1200

A

1920 x 1200

61
Q

What resolution is 1280 x 1024?

SXGA
SVGA
VGA
UXGA

A

SXGA

62
Q

Which is not a display option for multiple monitors in Windows?

Show only on monitor 1
Show only on monitor 2
Disable all Monitors
Duplicate on Both monitors
Extend monitor
A

Disable all Monitors

63
Q

Which is NOT true about multiple monitors in Windows?

Multiple monitors can function on one video card
Different monitors must have the same resolution
Multiple Monitors can work with multiple video cards
multiple monitors can be different sizes

A

Different monitors must have the same resolution

64
Q

Which is NOT a Type of Windows Firewall?

Domain
Enterprise
Private
Public

A

Enterprise

65
Q

Which exposes a LAN host to the Internet?

Firewall
DMZ
SMB
Whitelist

A

DMZ

66
Q

Which is NOT a Wireless Encryption Standard?

WEP
WPA
WEP2
WPA2

A

WEP2

67
Q

If you spot a WAP on the ceiling of a large room with no obvious power outlet nearby, how is it most-likely powered?

PoE
RADIUS
Battery
Solar

A

PoE

68
Q

Telnet uses Port ______ and SSH uses Port _______?

23, 22
22, 23
20, 21
21, 20

A

23, 22

69
Q

Windows RDP uses which port?

3983
3389
3893
8933

A

3389

70
Q

HTTP uses Port _____ and HTTPS uses Port _____?

88, 4430
8080, 443
80, 443
80, 343

A

80, 443

71
Q

Which is NOT a typical Android screen lock option?

Swipe
Token
Pattern
Pin

A

Token

72
Q

Which is least likely solution for a DIM mobile device screen?

Charge the Battery
Adjust the display’s brightness.
Enable automatic brightness adjustments
Replace the display or its backlight.

A

Change the Battery

73
Q

Which is NOT a core component of Computer Security?

Peripheral-based
Host-based
Network-based
Physical-based

A

Peripheral-based

74
Q

Which is NOT a layer of physical security?

Perimeter
Room Locks
Log Files
Individual Devices

A

Log Files

75
Q

Which is NOT a password cracking technique?

Brute Force
Dictionary Attack
Reverse Hashing
Rainbow Tables

A

Reverse Hashing

76
Q

Which term does NOT describe how malware spreads to new systems?

Virus
Worms
Key Logger
Trojan

A

Key Logger

77
Q

In CompTIA’s 7 Step malware management process, which step immediately follows Step 3 (Disable System Restore)?

Quarantine Infected Systems
Remediate Infected Systems
Schedule Scans and Run Updates
Educate Users

A

Remediate Infected Systems

78
Q

Which is NOT a Social Engineering Attack?

Phishing
Tailgating
Trojan
Shoulder Surfing

A

Trojan

79
Q

Which is NOT a standard business document?

Virus Signature List
Network Topology Diagram
Regulatory and Compliance Doc
Acceptable Use Policy

A

Virus Signature List

80
Q

Which is NOT a critical data type?

PII
PHI
GDPR
Password Policy

A

Password Policy

81
Q

What is NOT a change-management consideration?

Documented Practices
Purpose of the Change
Risk Analysis
History of Changes

A

History of the Changes

82
Q

Which is the worst location for the only backup of some data?

Same drive as the data being backed up
External hard drive
USB flash drive
Cloud Storage

A

Same drive as the data being backed up

83
Q

Which is NOT a common device that can be recycled?

Lithium-Ion Batteries
CRT Monitors
Alkaline Batteries
Toner Cartirdges

A

Alkaline Batteries

84
Q

Which wires determine the location of data or instructions in System RAM?

External Data Bus
Memory Controller Chip
Address Bus
CPU Cache Controller

A

Address Bus

85
Q

What should a tech do to improve performance if the Virtual Memory file is constantly full?

increase the size of the virtual memory file
add more RAM to the computer
close some applications
the tech should do nothing, virtual memory works best when the file is full

A

add more RAM to the computer.

86
Q

Which device protects only from Power Spikes?

UPS
Power Supply Unit (PSU)
Heat Sink
Surge Supressor

A

Surge Suppressor

87
Q

Which of the following is not provided by a Power Supply?

Surge Suppression
Sag Protection
Power Good signal to the Computer
Voltage to the CPU and Motherboard

A

Sag Protection

88
Q

Which do Link Lights not normally indicate?

Connection
Duplex Status
Speed
Activity

A

Duplex Status

89
Q

Wake-On-LAN is Triggered by What?

Magic Bullet
Magic Frame
Magic Message
Magic Packet

A

Magic Packet

90
Q

Which is NOT an ACPI Power Mode in a Laptop?

On
Sleep
Hibernation
Off

A

Off

91
Q

Which choice increases the Permissions a Command is run with?

Precede the command with sudo
Run Bash shell in Root mode
Put sudo at the end of a command line
Precede the command with man

A

Precede the command with sudo

92
Q

Which command displays a list of files and directories in Windows?

ls
dir
cls
su

A

dir

93
Q

Which command displays the current directory?

ls -l
ls
cd
pwd

A

pwd (Print Working Directory)

94
Q

NAME?

Which switch should be added to the rmdir command in order to delete a directory and its subdirectories?

-~
/s
-r

A

-r

Explanation:
rmdir -r removes directories and subdirectories in Linux. -subs and -~ are not valid switches for rmdir. /s is the switch used with the Windows rd command to remove subdirectories.

95
Q

Which command finds and fixes file table problems on a Windows Computer?

dism
chkdsk
format
sfc

A

chkdsk

Explanation:
chkdsk (also called error checking) finds and fixes problems with file tables. dism finds and fixes certain Windows files. format creates a new file table and blank root directory, wiping out the old table. sfc finds and fixes certain Windows files.

96
Q

If SFC finds errors, what should a technician do?

Run dism
Run chkdsk
Run format
Run chkdsk /f

A

Run dism

97
Q

Which command causes /dev/sdb to be overwritten with zeros?

dd if=/dev/zero of=/dev/sdb
dd if=/dev/sdb of=/dev/zero
dd if=/dev/sda of=/dev/sdb
dd if/dev/sdb of=~/backup.img

A

dd if=/dev/zero of=/dev/sdb

98
Q

Which command has replaced apt-get?

get
redhat
debian
apt

A

apt

99
Q

To take ownership of a Linux File, which command should you use?

pwd
chmod
chown
passwd

A

chown

100
Q

Which symbol in a Bash script indicates the rest of the line is a comment?

*
\
#
!

A

#

101
Q

If you encounter boot problems, which tool is a good place to start your troubleshooting?

Network Troubleshooter
System Troubleshooter
WinPE
WinRE

A

WinRE

Explanation:
WinRE is an excellent tool to begin troubleshooting boot issues.
WinPE is not a troubleshooting tool.
System Troubleshooter and Network Troubleshooter are inaccessible if the system won’t boot correctly.

102
Q

Which type of Boot causes Windows to boot with Minimal set of Drivers, Services, and Applications?

Minimum
Safe
Full
Normal

A

Safe

103
Q

How many times must Windows Crash during boot for the Windows Recovery Environment to add an advanced options menu?

0
1
2
3

A

3

104
Q

A user reports that their computer won’t boot this morning. What is the most likely reason?

The system automatically updated drivers last night
The computer is stuck in Safe Mode
The user left their thumb drive plugged into a USB Port
The computer is not plugged in

A

The user left their thumb drive plugged into a USB port.

105
Q

A computer boots but can’t load the graphical desktop. Which is not a recommended troubleshooting procedure?

Reboot multiple times if necessary.
Add more RAM
Boot to Safe Mode
Use WinRE to access the System Logs in Event Viewer

A

Add more RAM

106
Q

Which is not a likely cause for a slow running computer?

Application Issues
Low RAM
Not enough services running
Disk is Fragmented

A

Not enough services running

107
Q

A corrupt profile may prevent the Windows GUI from loading. Which method might repair the Profile?

Delete the user account
edit the registry
disable start programs
Run chkdsk /f

A

Edit the Registry

108
Q

A user reports that their word processor crashes every time it gets launched. Which tool should a technician use first to diagnose the problem?

Programs and Features
Task Manager
Event Viewer
Disk Defrag

A

Event Viewer

109
Q

Which is the most likely cause of a Windows BSoD?

New software installed
USB 3.0
New hardware installed
Flashed BIOS

A

New hardware installed

110
Q

Which of the following NTFS Security Settings Overrides ALL other settings?

Deny
Modify
Read
Write

A

Deny

Explanation:
Deny is NOT a Permission Setting, it’s a Security Setting and does override ALL other Settings, including the Permission Settings.