Test D Flashcards

1
Q
  1. Which type of hypervisor runs operating systems on bare metal?

A. Type 1

B. Type 2

C. Virtual PC

D. Windows XP Mode

A

A. Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following relies on PPTP to create a secure tunnel?

A. WWan

B. 4G LTE

C. VPN

D. WLAN

A

C. VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which of the following will occur if %temp% is executed from Run?

A. Applications located in the %temp% folder will be executed.

B. The operating system’s temporary folder will be open.

C. The current user temporary folder will be open.

D. Applications will be deleted in the %temp% folder.

A

C. The current user temporary folder will be open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which type of device uses an MOV to protect equipment?

A. Power strip

B. Power supply

C. Surge suppressor

D. Multimeter

A

C. Surge suppressor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Tay used file properties to hide files in his folder and now needs to get the files back. Using a command-line tool, which of the following combinations of parameters will make the files viewable once again?

A. Attrib - RV *.*

B. Attrib - A+H *.*

C. Attrib + A+ *.*

D. Attrib -H *.*

A

D. Attrib -H *.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which group is best to assign to a home user to prevent software installation?

A. Administrators

B. Power users

C. Remote Desktop users

D. Users

A

D. Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A Windows PC is not booting correctly. You need to locate bad sectors and recover information. Which command is best?

A. Chkdsk C: /R

B. Chkdsk C: /F

C. Chkdsk C: /C

D. Chkdsk C: /I

A

A. Chkdsk C: /R

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Where can a user’s Desktop folder be found in Windows by default?

A. C:\Users\%username%\desktop

B. C:\Documents and Settings\%username%\desktop

C. C:\System Volume Information\%username%\desktop

D. C:\Users\System32\%username%\desktop

A

A. C:\Users\%username%\desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A user who is part of a workgroup reports that she cannot print to a new printer. Everyone else in the workgroup can print to the new printer, and the user can still automatically send print jobs to the old printer. Which of the following statements describes how to remedy the problem? (2 best answers)

A. Add the new printer to the user’s computer.

B. Clear the print queue on the new printer.

C. Change the user’s password and permissions.

D. Set the new printer as the default printer.

A

A. Add the new printer to the user’s computer. D. Set the new printer as the default printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Your organization has an Active Directory domain. One of the users, Bill, should not have read access to a folder named Accounting. The Accounting folder is shared on a network server, on a partition formatted as NTFS. Which of the following statements best describes how to stop Bill from having read access to the folder without impacting any other users on the network?

A. Remove Bill from all domain groups that have access to the Accounting folder.

B. Deny read access to the Accounting folder for Bill through local access security.

C. Deny read access to the accounting folder for any group that bill is a member of.

D. Deny read access to the Accounting folder for Bill through shared access security.

A

D. Deny read access to the Accounting folder for Bill through shared access security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. One of the computers in your warehouse often requires the replacement of power supplies, CPU’s, and optical drives. Which tool can help to prevent these types of hardware faults?

A. Compressed air

B. Antistatic wrist straps

C. Rescue Disk

D. Multimeter

A

A. Compressed air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following is the most appropriate question to ask a customer first when attempting to troubleshoot an input device issue over the phone?

A. Can you describe the steps you have taken?

B. Have you verified that all USB plugs are secure?

C. Have you tried turning it off and on again?

D. Are you sure that the device is plugged in?

A

A. Can you describe the steps you have taken?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Examine the following figure. Then answer the question that follows.
A

B. Disk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following is the correct path if you wanted to disable a service in Windows?

A. Msconfig > Settings > Services

B. System Settings > Tools > Services

C. Control Panel > Services

D. Control Panel > Administrative Tools > Services

A

D. Control Panel > Administrative Tools > Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following programs in Windows 7 saves problem descriptions and solutions?

A. File History

B. Problem Reports and Solutions

C. Action Center

D. Performance Monitor

A

C. Action Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A co-worker tells you that a work PC has become infected with a virus. Which of the following statements best describes the rirst stemp you should take to remedy the problem?

A. Check for system security patches.

B. Perform an antivirus program scan.

C. Boot the PC into Safe Mode.

D. Remove the PC from the Network.

A

D. Remove the PC from the Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. A customer reports to you that a newely issued smart card does not work in a laptop. You try your smart card in the laptop, and it works without any problems. Which of the following statements best describes the most lekely solution to the problem?

A. Perform a BIOS flash.

B. Reinstall the OS.

C. Upgrade the smart card reader firmware.

D. Replace the smart card reader.

A

C. Upgrade the smart card reader firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. A Windows 7 computer has an Experience Index Base score of 3.8. The technician discovers that the computer has the following:

Performance index

Ram 1GB 4.6 Video3D 3.8CPU2, 4GHz 4.2

The tech upgrades the mem to 2GB and gets the following results:

Performance Index

Ram 2GB 5.0 Video3D 3.8CPU2, 4GHz 4.2

But the Windows Experience Index Base Score is still at 3.8. Which of the following can the technician do to improve the performance index Base score?

A. Double the RAM again

B. Upgrade the CPU to 3 GHz

C. Increase the resolution on the screen

D. Upgrade the video card

A

D. Upgrade the video card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Which of the following commands enables you to copy a file without prompts?

A. Comy /z

B. Xcopy

C. Copy /Y

D. Copy /A

A

C. Copy /Y

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Which of the following is the best Windows utility to back up important system settings without requiring external storage?

A. Msconfig

B. Task Manager

C. System Protection

D. Xcopy

A

C. System Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Examine the following Win 7 Figure. Then Answer the question that follows.
A

B. System Information–I/O setting of IEEE 1394 controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. You are working just outside a server room that is being built and you hear a loud popping sound from inside. As you enter the server room, you notice an electrician lying on the floor with an electrical cord in his hand. Which of the following statments describes the first step you should take.

A. Call 911

B. Call the building super.

C. Pull the electrician away from the cord.

D. Turn off the electrical power at the source.

A

D. Turn off the electrical power at the source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Your boss wants to encrypt a hard drive that will be storing critical data. Your boss needs to be able to drag and drop folders onto the volume and have them be encrypted in real-time. Which encryption technique should you suggest?

A. BitLocker

B. PKI

C. TPM

D. Kerberos

A

A. BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Which of the following file extnesions will start the program installion process in Windows?

A. *.INI

B. *.CFG

C. *.SYS

D. *.EXE

A

D. *.EXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Your boss asks you to troubleshoot a computer with a vires. Which of the following bests describes the first step you should take to remedy the problem?

A. Run a System Restore.

B. Identify the malware.

C. Roll back drivers.

D. Research malware types.

A

B. Identify the malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. Examine the following figure. Then answer the question that follows.
A

C. ABOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. User A is part of the Users Group on a Windows computer. User A attempts to access files on a UNC path:\server\fileshare. Fileshare has the following share permissions:

Admin–Full Control

Users–Read only

Guests–No Access

However, the directory on the hard drive where the share is located has the following permissions:

Admin–Full Control

Users–Change

Guests–No Access

Which level of access with the account User A have?

A. Read only

B. Change

C. Full Control

D. No Access

A

A. Read only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. Your boss wants to implement BitLocker on yet a second laptop for traveling purposes. Which of the following should be performed before implementing BitLocker?

A. Enable TPM in the BIOS/UEFI.

B. Disable UAC

C. Defrag the hard drive.

D. Conver the file system to NTFS

A

A. Enable TPM in the BIOS/UEFI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. One of your customers has a defective disk. Which command can be used to extract readable information?

A. Recover

B. Replace

C. Convert

D. REM

A

A. Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. Which of the following are advantages of Xcopy over Copy? (Select 2)

A. The ability to copy files off of a mapped network drive.

B. The ability to copy NTFS permissions.

C. the ability to copy files and decrypt them.

D. The ability to copy entire folder structures.

E. The ability to copy entire folder structures to remote computers.

A

B. The ability to copy NTFS permissions.

D. The ability to copy entire folder structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. You have been asked to load a copy of the company’s purchased software on a personal computer. Which of the following statements best describes the first step you should take to remedy the problem?

A. Verify that the install is allowed under the company’s licensing agreements.

B. Notify the company’s owner of the breach

C. Advise the individual that downloading unlicensed software is illegal.

D. Leave the premises and call local law enforcement.

A

A. Verify that the install is allowed under the company’s licensing agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Examine the following figure. Then answer the question that follows.
A

D. Run > MMC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. Your friend is playing the latest first-person game on a PC, but the screen is pausing during game play. Your friend has a high-end graphics card and the maximum memory for the motherboard. Which of the following statements best describes how to remedy the problem?

A. Upgrade the drivers

B. Reinstall the OS

C. Replace the hard Drive

D. Reinstall the game

A

A. Upgrade the drivers

34
Q
  1. A user calls and complains that he cannot get onto the internet, although he could just minutes before. Which of the following statements best describes how to properly respond to the user?

A. “What is your IP address?”

B. “Wait 10 mins, and then try it again.”

C. “Do you remember the last thing that you did?”

D. “Let me get my supervisor.”

A

C. “Do you remember the last thing that you did?”

35
Q

35 You have been asked to move data from one laptop to another, each of which has efs functioning. Which of the following statements best describes the first step you should take to remedy the problem?

A. Give the user of the second laptop administrator privileges.

B. Export the user’s certificate.

C. Disable networking.

D. Convert the partition to FAT32

A

B. Export the user’s certificate.

36
Q
  1. A technician you work with just finished installing AV software on a PC. Which of the following statements best describes the first step the technician should take to remedy the problem?

A. Update the AV signatures

B. Remove infected files

C. Run a full scan

D. Quarantine infected files.

A

A. Update the AV signatures

37
Q
  1. Which of the following statements best describes how to confirm that a new vires definition is authentic?

A. Check the file owner

B. Check the creation date

C. Check the file version

D. Check the hash key.

A

D. Check the hash key.

38
Q

A customer is having a hard time describing a computer problem. You are not sure what the problem is or where it is occurring. Which of the following statements best describes how to remedy the problem?

A. Offer various different repair options

B. Use computer jargon to help relax the customer

C. Ask the customer to slowly repeat what the problem is

D. Tell the customer that you have ato leave and that the problem will be fixed soon.

A

C. Ask the customer to slowly repeat what the problem is

39
Q
  1. Which type of malware appears to perform desired functions but is actually performing malicious functions behind the scenes?

A. Virus

B. Trojan

C. Spyware

D. Rootkit

A

B. Trojan

40
Q
  1. The Disk Management utility lists a disk as “Foreign.” Which of the following statements best describes how to make the disk usable?

A. Convert the disk to basic

B. Convert the disk to dynamic

C. Import the disk.

C. Set the disk to active

A

C. Set the disk to active

41
Q
  1. Which of the following statements best describes how to reach the System Restore utility in Windows 7? (Select 2)

A. Start > right-click Computer > Properties > click the system protection link.

B. Start > right-click Computer > Advanced

C. Run > type: systempropertiesprotection.exe

D. Start > right-click Computer > Properties > click the Advanced system settings link.

A

A. Start > right-click Computer > Properties > click the system protection link.

C. Run > type: systempropertiesprotection.exe

42
Q
  1. Examine the following figure. Then answer the question that follows.
A

D. Control Panel > Devices and Printers > right-click the printer and select printer Properties > Advanced.

43
Q
  1. Which of the following statements is true?

A. Authentication can be something a user knows such as a smart card.

B. Authentication can be something a user is such as a finger print.

C. Authentication can be something a user does such as a PIN or password.

D. Authentication can be something a user has such as a signature.

A

B. Authentication can be something a user is such as a finger print.

44
Q
  1. Which of the following is a type of phishing attack that is directed at the CEO of an organization.

A. Power phishing

B. Vishing

C. Whaling

D. Spear phishing

A

C. Whaling

45
Q
  1. It seems someone has spilled a large amount of coffee in the break room and has not cleaned it up. It is seeping into the server room next door. Which of the following statements best describes the first step you should take to remedy the problem?

A. Fill out an accident report

B. Notify the network administrator

C. Start mopping up the mess

D. Reference the MSDS

A

B. Notify the network administrator

46
Q
  1. Which type of data purging standard requires seven full passes or rewrites with bit-level erasure software.

A. Magnetic degausser

B. Low level format

C. Peter Gutman security method

D. DoD 5220.22-M

A

D. DoD 5220.22-M

47
Q
  1. You are required to implement an organizational policy that states user passwords can’t be used twice in a row. Which of the following policies should be configured?

A. Minimum password length

B. Enforce password history

C. Minimum password age

D. Complexity requirements

A

B. Enforce password history.

48
Q
  1. Examine the following figure. Then answer the question that follows.
A

A. Settings > General > Passcode lock > Turn Passcode On.

49
Q
  1. Which of the following switches skips the process that compares directory entries to the file record segments corresponding to those entries, when running the Chkdsk command?

A. Chkdsk /V

B. Chkdsk /F

C. Chkdsk /I

D. Chkdsk /R

A

C. Chkdsk /I

50
Q
  1. You are working on a computer in which you just installed a new hard drive. The system already runs Windows. The new hard drive does not appear in Explorer. Which of the following statements best describes the next step you should take to ensure the drive will be recognized by the operating system?

A. Reboot the computer

B. Initialize and formant the hard drive in Disk Management

C. Configure the drive in the BIOS/UEFI.

D. Assign a drive letter to the hard drive in Disk Management.

E. Set the drive to active.

A

B. Initialize and formant the hard drive in Disk Management

51
Q
  1. Which utility displays important messages about solving issues in Windows 8?

A. Task Manager

B. Windows Defender

C. Action Center

D. Problem Reports and Solutions

A

C. Action Center

52
Q
  1. A Company has Category 6 cabling lying on the floor in several locations. Which of the following statements best describes the most appropriate action to take?

A. Reroute the cables using protective material.

B. Secure the cables to the floor with tape.

C. Install a wireless network.

D. Move the computers closer to the server.

A

A. Reroute the cables using protective material.

53
Q
  1. A customer has a computer running Windows. THe Windows Firewall appears to be causing communications to fail within a certain gaming application even though you set up an exception for the program. You stop the Windows Firewall, but when the computer reboots, the service starts up again. Which of the following tools should be used to disable the windows Firewall service?

A. Task Scheduler

B. System Configuration

C. System Properties

D. Local Security Policy

A

B. System Configuration

54
Q
  1. Examine the following figure. Then answer the question that follows.
A

B. Windows 7 DVD and the Data Folder

55
Q
  1. An attacker is constattly trying to hack into one of your customer’s SOHO networks. Which of the following statements best describes the easiest, most practical way to protect the network from intrusion.

A. Disable the SSID broadcast.

B Install an antivirus server application.

C. Disconnect the Internet connection

D. Install a firewall

E. Install an IDS.

A

E. Install an IDS.

56
Q
  1. When explaining a technical concept to a customer, which of the following is not permissible?

A. Using analogies.

B. Using visual aides

C. Using jargon

D. Limiting the amount of information to what is necessary for the user to know.

A

C. Using jargon

57
Q
  1. Examine the following figure. Then answer the question that follows.
A

A. System > Advanced System Settings > Computer Name > Change.

C. Run > systempropertiescomputername.exe > change

58
Q
  1. Which command in the Linux terminal enables you to find out informantion about a wireless network adapter?

A. ipconfig

B. regedit

C. apt-get

D. Iwconfig

A

D. Iwconfig

59
Q
  1. You have a Windows computer that you wish to write a batch file for. You want the batch file to turn off the computer after a certain amount of time. Which main command should be run in the batch file?

A. Taskkill

B. Down

C. Kill

D. Shutdown

A

D. Shutdown

60
Q
  1. Which switch of the Robocopy command copies subdirectories but skips empty ones?

A. /E

B. /B

C. /S

D. /DCOPY:T

A

C. /S

61
Q
  1. You are on a service call and receive an urgent phone call. Which of the following statements best describes the proper way to respond?

A. Leave the site and take the call.

B. Talk with the person while working.

C. Ask to be excused, and after dermining the urgency of the call, go back to work.

D. Ask to be excused, and agter determining that it is not a truly urgent call, get right back to work while talking on the phone.

A

C. Ask to be excused, and after dermining the urgency of the call, go back to work.

62
Q
  1. Your organization wants to use a cloud service that will allow developers to program entire applications within a working environment that they can modify as they see fit. Which type of technologhy should be used?

A. SaaS

B. IaaS

C. PaaS

D. Community cloud

A

C. PaaS

63
Q
  1. A user just returned from another country and connect to the WLAN with a smartphone. Which of the following should he check first?

A. Bluetooth conflict.

B. Hotspot configuration

C. Wi-Fi calling

D. Airplane mode

A

D. Airplane mode

64
Q
  1. Examine the following figure. Then answer the question that follows.
A

D. C:\Windows\System\32\spool\print$

65
Q
  1. which of the following are components of dealing with prohibited content? (3 best answers)

A. First response

B. Maintaining a positive attitude

C. Preserving data

D. Creating a chain of custody

E. Avoiding distraction

A

A. First response

C. Preserving data

D. Creating a chain of custody

66
Q
  1. Acustomer is frantic because a mobile device’s operating system has crashed. The customer keeps referring to KitKat in excited tones but isn’t making much sense. Which OS is the customer referring to?

A. Windows 10 Mobile

B. Apple iOS version 8

C. Android version 4

D. BlackBerry OS

A

C. Android version 4

67
Q
  1. You just installed a customer’s new printer and tested it. Which of the following should be performed next?

A. Recheck all connections.

B. Bill the customer.

C. Turn the printer on and off.

D. Show the customer the printer’s basic functionality.

E. Install a maintenance kit.

A

D. Show the customer the printer’s basic functionality.

68
Q
  1. Which of the following statements best describes how to properly deal with difficult customers?

A. Do not minimize a customer’s problems.

B. Report through proper channels.

Track evidence through documentation.

D. Tell the customer to remove confidential documents.

A

A. Do not minimize a customer’s problems.

69
Q
  1. Which of the following security threats can be updated remotely from a command center?

A. Virus

B. Worm

C. Spam

D. Zombie

A

D. Zombie

70
Q
  1. Which of the following is a potential risk associated with WEP when that protocol is used to secure a WLAN?

A. SSID broadcast

B. Weak encryption

C. Data emanation

D. Zero protection against war driving attacks

A

B. Weak encryption

71
Q
  1. Your co-worker just installed a new printer, replacing his older one. However, when he tries to print from Microsoft Word, the old printer comes up in the print window. Which of the following statements describes how to remedy the problem?

A. Advise him to save the print job by printing to file, and then print the file with the new printer selected.

B. Advise hom to select the new printer from the list every time a document is printed.

C. Advise him to open the printers folder, right click the new printer, and then select Properties > Security Tab > Make this the Default Printer.

D. Advise him to open the Printers folder, right click the new printer, and click set as Default Printer.

A

D. Advise him to open the Printers folder, right click the new printer, and click set as Default Printer.

72
Q
  1. Which of the following OSI model layers is where SSL provides encryption?

A. Network

B. Application

C. Transport

D. Session

A

D. Session

73
Q
  1. Which step of the CompTIA A+ troubleshooting theory does “conduct external or internal research” exist within?

A. Step 1 - Identify the problem.

B. Step 2 - Establish a theory of probable cause.

C. Step 3 - Test the theory to determine cause.

D. Step 4 - Establish a plan of action and implement solution.

E. Step 5 - Verify full system func. & implement preventative measures.

F. Step 6 - Document findings, actions and outcomes.

A

B. Step 2 - Establish a theory of probable cause.

74
Q
  1. In which step of the CompTIA A+ procedure for malware removal should anti-malware programs be updated.

A. Identify malware symptoms.

B. Quarantine the infected system

C. Remediate infected systems.

D. Schedule scans.

A

C. Remediate infected systems.

75
Q
  1. Which of the following social engineering attacks relies on impersonation in an attempt to gain personal information?

A. Hoaxes

B. Phishing

C. Dumpster diving

D. Shoulder surfing

A

B. Phishing

76
Q
  1. A user’s smartphone is overheating. Which of the following is the most likely cause?

A. Faulty GPS program

B. Damaged battery

C. Proper ventilation

D. Virus

E. Damage to the CPU

A

A. Faulty GPS program

77
Q
  1. Which of the following is the best solution for repairing a hard drive when a computer displays an “NTLDR is missing error? upon booting?

A. Recover Console with the fixmbr command

B. Recover Console with the fixboot command

C. Recover Console with the chkdsk command

D. Recover Console with the bootcfg /rebuild command

A

B. Recover Console with the fixboot command

78
Q
  1. You are designing the environmental controls for a server room that contains several servers and other network devices. Which of the following statements best describes the role of an HVAC system in this enviornment? (select 2 best)

A. It shields equipment from EMI.

B. It provides isolation in case of a fire.

C. It provides an appropriate ambient temperature.

D. It maintains appropriate humitiry levels.

E. It vents fumes from the server room.

A

C. It provides an appropriate ambient temperature.

D. It maintains appropriate humitiry levels.

79
Q
  1. A Faraday cage prevents the usage of which of the following items?

A. USB flash drives

B. Uninterruptible power supplies

C. Cell Phones

D. Wired keyboards

A

C. Cell Phones

80
Q
  1. You have some DLLs and ActiveX controls that need to be troubleshot. Which command can manipulate these?

A. Regedit

B. Regsvr32

C. ODBC32

D. Regedt32

A

B. Regsvr32