COMPTIA A+ 1102, Comptia A+ 1102

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/650

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

651 Terms

1
New cards

You are trying to connect from outside the company network to a server inside the company network using RDP (Remote Desktop Connection). However, the connection is failing.Which network device does your network administrator MOST likely need to configure to allow this connection?

Access point

Hub

Switch

Firewall

Firewall

2
New cards

You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used. Even though the monitor is made by a different manufacturer than the desktop computer, it still works with the computer. Which computer design concept makes this possible?

Firmware

Standardization

Componentization

Plug and play

Standardization

3
New cards

You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs?

Ethernet switch

Ethernet patch panel

Ethernet router

Wireless controller

Ethernet patch panel

4
New cards

You have been asked to install Windows 11 on 30 different computers for a new branch office that your company is setting up. The computers have been purchased from different companies and have different hardware.Which installation method should you use to reduce the installation time and effort that you need to spend?

Imaging

Unattended

Network

Optical disc

Unattended

5
New cards

4. You are an IT administrator for your company. You have been tasked with installing 300 copies of Windows 11. You need to finish this task as quickly and efficiently as possible.Which of the following boot methods would be the BEST method for installing Windows under these circumstances?

PXE

USB

Solid-state/flash drives

DVD

PXE

6
New cards

You are the owner of a small startup company that consists of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two.As a startup company, you want to keep costs low and facilitate easier file sharing and internet, printer, and local network resource access. Which of the following would be the BEST implementation for your business?

A domain

A forest

A tree

A workgroup

A workgroup

7
New cards

Which of the following commands displays a listing of the Group Policy Objects that have been applied to a computer and the user?

gpupdate

gpresult

gpupdate /force

gpedit.msc

gpresult

8
New cards

Which Windows feature can you use to encrypt a hard drive volume?

EFS

BitLocker

NTFS

BitLocker to Go

BitLocker

9
New cards

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service?

Print server

DHCP server

Web server

Proxy server

Proxy server

10
New cards

What is issued to a website in order for it to be validated as a trusted website?

Hash code

Extension

Certificate authority

DNS

Certificate authority

11
New cards

Which of the following is software that allows a user to access a computer's memory, file system, processes, and hardware?

CPU

Operating system

Application software

RAM

Operating system

12
New cards

What is another name for virtual machines?

Guest operating systems

Host machines

Hypervisors

Sandbox

Guest operating systems

13
New cards

You want to create a virtual machine environment in which you can develop and test new software. Which virtualization benefit BEST describes the testing environment that you want to implement?

Cross-platform virtualization

Sandbox

Hypervisor

Hardware virtualization

Sandbox

14
New cards

You need to remotely access a Windows server to perform maintenance tasks. However, the server does not have a graphical user interface. Which remote access solution would BEST work to complete the maintenance tasks?

Telnet

Screen Sharing

Quick Assist

Remote Assistance

Telnet

15
New cards

Which of the following Show Options tabs allows you to configure performance settings for your Remote Desktop connection?

General

Local Resources

Experience

Advanced

Experience

16
New cards

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use?

ls

grep

chmod

ps

chmod

17
New cards

Which of the following file systems on Linux uses checksums to verify a journal's integrity?

vfat

ext2

ext3

ext4

ext4

18
New cards

Which of the following is a disadvantage of using a UTM?

Is more expensive than using separate security appliances

Does not include a spam filter

Requires a separate endpoint management server

Has a single point of failure

Has a single point of failure

19
New cards

Which of the following keeps track of various network devices while ensuring that the software is secure?

Syslog server

All-in-one security appliance

Endpoint management server

Firewall

Endpoint management server

20
New cards

Which computer function takes data through a series of procedures as defined by a set of instructions?

Networking

Processing

Output

Storage

Processing

21
New cards

Which of the following vendors offers the largest variety of editions for its operating system?

Google Chrome

Ubuntu

Apple macOS

Microsoft Windows

Microsoft Windows

22
New cards

You have used your computer for several years, resulting in a lot of data stored on your hard disk. Lately, your computer's functions have slowed. Which of the following tools is LIKELY to help speed up your computer?

CHKDSK

DiskPart

Copy

Disk Defragmenter

Disk Defragmenter

23
New cards

Which utility allows you to choose Selective Startup in Windows?

Performance Monitor

Event Viewer

Regedit

Msinfo32

Msconfig (System Configuration)

Msconfig (System Configuration)

24
New cards

Which of the following actions directly improves system security on a Windows workstation?

Create a password reset disk.

Install the latest updates.

Create regular restore points.

Disable automatic reboot on an error.

Install the latest updates.

25
New cards

You would like to set Windows Update to delay updates for a week. Which of the following Windows Update settings would you use to configure the delay?

Pause Updates

Update History

Windows Insider Program

Advanced Options

Pause Updates

26
New cards

You are working at the local hospital in the IT department. You have just received a promotion to junior network technician. Part of your new role involves troubleshooting network communication issues.Which of the following user groups should your account be added to?

Administrator

Cryptographic Operator

Network Configuration Operator

Remote Desktop Users

Network Configuration Operator

27
New cards

Which of the following is an important aspect of evidence gathering in response to a security incident?

Back up all log files and audit trails.

Restore damaged data from backup media.

Monitor user access to compromised systems.

Purge transaction logs.

Back up all log files and audit trails.

28
New cards

After a malware infection has been fully remediated, you should re-enable System Restore and run a full system backup. Which of the following is the BEST place to save this backup?

On an external drive

On the main hard drive on your computer

In the cloud

On the secondary drive on your computer

On an external drive

29
New cards

Which of the following provides a set of rules that specify which types of network traffic are allowed through a firewall?

ACL

Application-level gateway

Circuit-layer gateway

Packet filtering

ACL

30
New cards

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

A. SFTP

B. SSH

C. VNC

D. MSRA

B. SSH

31
New cards

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

A. Reinstalling Windows

B. Performing a quick format

C. Using disk-wiping software

D. Deleting all files from command-line interface:

C. Using disk-wiping software

32
New cards

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

A. Reset the phone to factory settings.

B. Uninstall the fraudulent application.

C. Increase the data plan limits.

D. Disable the mobile hotspot.

B. Uninstall the fraudulent application.

33
New cards

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

A. End user acceptance

B. Perform risk analysis

C. Communicate to stakeholders

D. Sandbox testing

A. End user acceptance

34
New cards

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST?

A. Scan and remove the malware.

B. Schedule automated malware scans.

C. Quarantine the system.

D. Disable System Restore.

C. Quarantine the system.

35
New cards

A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

A. Anti-malware

B. Remote wipe

C. Locator applications

D. Screen lock

B. Remote wipe

36
New cards

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?

A. Disable the browser from sending notifications to the Action Center.

B. Run a full antivirus scan on the computer.

C. Disable all Action Center notifications.

D. Move specific site notifications from Allowed to Block.

B. Run a full antivirus scan on the computer.

37
New cards

After clicking on a link in an email, a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

A. Update the browser's CRLs.

B. File a trouble ticket with the bank.

C. Contact the ISP to report the CFO's concern.

D. Instruct the CFO to exit the browser.

D. Instruct the CFO to exit the browser.

38
New cards

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

A. Run a startup script that removes files by name.

B. Provide a sample to the antivirus vendor.

C. Manually check each machine.

D. Monitor outbound network traffic.

C. Manually check each machine.

39
New cards

Which of the following is a web-browser based operating system?

Chrome OS

macOS

Windows

Linux

Chrome OS

40
New cards

The microprocessor's program that starts the system up after the computer is powered on.

A user-friendly interface that uses icons and visual components to interact with the system.

The primary component of a computer that retrieves, processes, and executes instructions.

An important component of a computer that is used to store data and machine code while in use.

The microprocessor's program that starts the system up after the computer is powered on.

41
New cards

What tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Event Viewer

Computer Management

Resource Monitor

Advanced System Settings

Resource Monitor

42
New cards

You have recently purchased a third-party application and installed it on your workstation. However, after doing some maintenance work on the users and groups on your Windows system, the application begins to display error messages each time you try to run it.What is the MOST likely cause of the issue?

You switched from a domain account login to a local login.

You assigned the wrong permissions to your user account.

You deleted a group that was created by the third-party application.

You assigned the application user account to the Users group.

You deleted a group that was created by the third-party application.

43
New cards

You manage a Windows system. You want to view information about all of the programs running on your system and sort each program by the amount of memory and CPU that the program uses.

What tool should you use?

msconfig

Task Manager

Services

Device Manager

Task Manager

44
New cards

Which of the following stores user accounts, groups, and their assigned rights and permissions?

Active Directory

Microsoft account

Domain controller

Local Users and Groups

Domain controller

45
New cards

You are assisting the security administrator and discover that a user was logged in to their workstation after hours. After further investigation, you discover that the user's account was compromised, and someone used the account to steal sensitive data.

Which of the following could have BEST prevented this from happening?

Implement a password reset policy.

Require a stronger password.

Implement a screen saver lock.

Restrict the user's login times to work hours only.

Restrict the user's login times to work hours only.

46
New cards

What is the purpose of the chain of custody incident response step when it comes to security incident resolution?

Maintain compliance with federal privacy laws

Retain evidence integrity by identifying people coming into contact with evidence

Identify the evidence owner

Detail the timeline between evidence creation and discovery

Retain evidence integrity by identifying people coming into contact with evidence

47
New cards

As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside.

Which of the following would BEST meet your requirements?

Content filter

VPN

Forward proxy server

Reverse proxy server

Forward proxy server

48
New cards

You connect your computer to a wireless network available at the local library. You find that you cannot access several websites on the internet. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

The router has not been configured to perform port forwarding.

Port triggering is redirecting traffic to the wrong IP address.

A firewall is blocking ports 80 and 443.

A proxy server is filtering access to websites.

49
New cards

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

A. Keyboard

B. Touch pad

C. Ease of Access Center

D. Display settings

C. Ease of Access Center

50
New cards

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

A. Enable multifactor authentication.

B. Increase the failed log-in threshold.

C. Remove complex password requirements.

D. Implement a single sign-on with biometrics.

D. Implement a single sign-on with biometrics.

51
New cards

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

A. Application updates

B. Anti-malware software

C. OS reinstallation

D. File restore

C. OS reinstallation

52
New cards

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

A. Right-click the Windows button, then select Run... entering shell:startup and clicking OK, and then move items one by one to the Recycle Bin.

B. Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run.

C. Manually disable all startup tasks currently listed as enabled and reboot, checking for issue resolution at startup.

D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

53
New cards

A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do?

A. Have the user consider using an iPad if the user is unable to complete updates.

B. Have the user text the user's password to the technician.

C. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key.

D. Advise the user to wait for an upcoming, automatic patch.

C. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key.

54
New cards

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A. Have the user provide a callback phone number to be added to the ticket.

B. Assign the ticket to the department's power user.

C. Register the ticket with a unique user identifier.

D. Provide the user with a unique ticket number that can be referenced on subsequent calls.

C. Register the ticket with a unique user identifier.

55
New cards

Which of the following is the MOST important environmental concern inside a data center?

A. Battery disposal

B. Electrostatic discharge mats

C. Toner disposal

D. Humidity levels

D. Humidity levels

56
New cards

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the log-in issue?

A. Expired certificate

B. OS update failure

C. Service not started

D. Application crash

E. Profile rebuild needed

E. Profile rebuild needed

57
New cards

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A. FAT32

B. ext4

C. NTFS

D. exFAT

C. NTFS

58
New cards

Following the latest Windows update, PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

A. Network and Sharing Center

B. Programs and Features

C. Default Apps

D. Add or Remove Programs

C. Default Apps

59
New cards

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

A. Privacy

B. Indexing Options

C. System

D. Device Manager

B. Indexing Options

60
New cards

As part of a CYOD policy, a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

A. Use Settings to access Screensaver settings.

B. Use Settings to access Screen Timeout settings.

C. Use Settings to access General.

D. Use Settings to access Display.

A. Use Settings to access Screensaver settings.

61
New cards

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

A. Deploy a secondary hard drive with encryption on the appropriate workstation.

B. Configure a hardened SFTP portal for file transfers between file servers.

C. Require files to be individually password protected with unique passwords.

D. Enable BitLocker To Go with a password that meets corporate requirements.

D. Enable BitLocker To Go with a password that meets corporate requirements.

62
New cards

The command cat comptia.txt was issued on a Linux terminal. Which of the following results should be expected?

A. The contents of the text comptia.txt will be replaced with a new blank document.

B. The contents of the text comptia.txt would be displayed.

C. The contents of the text comptia.txt would be categorized in alphabetical order.

D. The contents of the text comptia.txt would be copied to another comptia.txt file.

B. The contents of the text comptia.txt would be displayed.

63
New cards

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

A. Encrypt the files.

B. Clone any impacted hard drives.

C. Contact the cyber insurance company.

D. Inform law enforcement.

B. Clone any impacted hard drives.

64
New cards

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified; however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

A. Full

B. Differential

C. Off-site

D. Grandfather-father-son

B. Differential

65
New cards

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

A. Avoid distractions

B. Deal appropriately with customer's confidential material

C. Adhere to user privacy policy

D. Set and meet timelines

A. Avoid distractions

66
New cards

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

A. sfc

B. chkdsk

C. git clone

D. robocopy

D. robocopy

67
New cards

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

A. Full

B. Non-parity

C. Differential

D. Incremental

A. Full

68
New cards

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

A. Operating system updates

B. Remote wipe

C. Antivirus

D. Firewall

D. Firewall

69
New cards

A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.)

A. Scan the computer with the company-provided antivirus software.

B. Install a new hard drive and clone the user's drive to it.

C. Deploy an ad-blocking extension to the browser.

D. Uninstall the company-provided antivirus software.

E. Click the link in the messages to pay for virus removal.

F. Perform a reset on the user's web browser.

A. Scan the computer with the company-provided antivirus software.

F. Perform a reset on the user's web browser.

70
New cards

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A. .deb

B. .vbs

C. .exe

D. .app

D. .app

71
New cards

A technician is investigating an employee's smartphone that has the following symptoms:

✑ The device is hot, even when it is not in use.

✑ Applications crash, especially when others are launched.

✑ Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Choose two.)

A. Turn on autorotation.

B. Activate airplane mode.

C. Close unnecessary applications.

D. Perform a factory reset.

E. Update the device's operating system.

F. Reinstall the applications that have crashed.

A. Turn on autorotation.

C. Close unnecessary applications.

72
New cards

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

A. Install alternate open-source software in place of the applications with issues.

B. Run both CPU and memory tests to ensure that all hardware functionality is normal.

C. Check for any installed patches and roll them back one at a time until the issue is resolved.

D. Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.

B. Run both CPU and memory tests to ensure that all hardware functionality is normal.

73
New cards

Which of the following could be used to implement secure physical access to a data center?

A. Geofence

B. Alarm system

C. Badge reader

D. Motion sensor

C. Badge reader

74
New cards

The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank's risk? (Choose two.)

A. Enable multifactor authentication for each support account.

B. Limit remote access to destinations inside the corporate network.

C. Block all support accounts from logging in from foreign countries.

D. Configure a replacement remote-access tool for support cases.

E. Purchase a password manager for remote-access tool users.

F. Enforce account lockouts after five bad password attempts.

A. Enable multifactor authentication for each support account.

F. Enforce account lockouts after five bad password attempts.

75
New cards

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

A. Disk Cleanup

B. Group Policy Editor

C. Disk Management

D. Resource Monitor

D. Resource Monitor

76
New cards

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90c8ee97fa7c211b7673a8

Which of the following BEST describes the purpose of this string?

A. XSS verification

B. AES-256 verification

C. Hash verification

D. Digital signature verification

C. Hash verification

77
New cards

A user's mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.)

A. Prevent a device root.

B. Disable biometric authentication.

C. Require a PIN on the unlock screen.

D. Enable developer mode.

E. Block a third-party application installation.

F. Prevent GPS spoofing.

A. Prevent a device root.

F. Prevent GPS spoofing.

78
New cards

A technician is unable to join a Windows 10 laptop to a domain. Which of the following is the MOST likely reason?

A. The domain's processor compatibility is not met.

B. The laptop has Windows 10 Home installed.

C. The laptop does not have an onboard Ethernet adapter.

D. The laptop does not have all current Windows updates installed.

B. The laptop has Windows 10 Home installed.

79
New cards

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use, browser-based interface?

A. FreeBSD

B. Chrome OS

C. macOS

D. Windows

B. Chrome OS

80
New cards

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain.

Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

A. Control Panel > Security and Maintenance > Change Security and Maintenance > Windows Hello Fingerprint

B. Windows 10 Settings > Accounts > Sign-in options > Windows Hello Fingerprint

C. Windows 10 Settings > Update & Security > Sign-in options > Windows Hello Fingerprint

D. > Control Panel > Administrative Tools > select user account in the list > Windows Hello Fingerprint

B. Windows 10 Settings > Accounts > Sign-in options > Windows Hello Fingerprint

81
New cards

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

A. All updated software must be tested with all system types and accessories.

B. Extra technician hours must be budgeted during installation of updates.

C. Network utilization will be significantly increased due to the size of CAD files.

D. Large update and installation files will overload the local hard drives.

C. Network utilization will be significantly increased due to the size of CAD files.

82
New cards

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

A. Pretexting

B. Spoofing

C. Vishing

D. Scareware

C. Vishing

83
New cards

The network was breached over the weekend. System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

A. Encryption at rest

B. Account lockout

C. Automatic screen lock

D. Antivirus

B. Account lockout

84
New cards

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

A. resmon.exe

B. msconfig.exe

C. dfrgui.exe

D. msinfo32.exe

C. dfrgui.exe

85
New cards

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

A. Drilling

B. Degaussing

C. Low-level formatting

D. Erasing/wiping

B. Degaussing

86
New cards

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

A. Home

B. Pro for Workstations

C. Enterprise

D. Pro

D. Pro

87
New cards

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

A. Device Manager

B. Indexing Options

C. File Explorer

D. Administrative Tools

C. File Explorer

88
New cards

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

A. Encryption

B. Wi-Fi channel

C. Default passwords

D. Service set identifier

C. Default passwords

89
New cards

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?

A. Continue researching the issue.

B. Repeat the iterative processes.

C. Inform the CEO the repair will take a couple of weeks.

D. Escalate the ticket.

D. Escalate the ticket.

90
New cards

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

A. Acceptable use

B. Chain of custody

C. Security policy

D. Information management

B. Chain of custody

91
New cards

A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same

IP address at all times. Which of the following should the technician use?

A. DHCP reservation

B. Port forwarding

C. DNS A record

D. NAT

A. DHCP reservation

92
New cards

Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

A. Install and run Linux and the required application in a PaaS cloud environment.

B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.

C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed.

D. Set up a dual boot system by selecting the option to install Linux alongside Windows.

B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.

93
New cards

A user connects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

A. Control Panel > Power Options > Change Plan Settings > Plugged In category > Put the Computer to Sleep > Never

B. Control Panel > Power Options > Change Plan Settings > Plugged In category > On Battery category > Never

C. Control Panel > Power Options > Change Plan Settings > Plugged In category >Choose When to Turn Off the Display > Plugged In category > Turn Off the Display > Never

C. Control Panel > Power Options > Change Plan Settings > Plugged In category >Choose When to Turn Off the Display > Plugged In category > Turn Off the Display > Do Nothing

C. Control Panel > Power Options > Change Plan Settings > Plugged In category >Choose When to Turn Off the Display > Plugged In category > Turn Off the Display > Do Nothing

94
New cards

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message, and no changes have been made within the company. Which of the following has infected the computer?

A. Cryptominer

B. Phishing

C. Ransomware

D. Keylogger

C. Ransomware

95
New cards

A technician is replacing the processor in a desktop computer. Prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Choose two.)

A. Utilizing an ESD strap

B. Disconnecting the computer from the power source

C. Placing the PSU in an antistatic bag

D. Ensuring proper ventilation

E. Removing dust from the ventilation fans

F. Ensuring equipment is grounded

A. Utilizing an ESD strap

B. Disconnecting the computer from the power source

96
New cards

Which of the following is a proprietary Cisco AAA protocol?

A. TKIP

B. AES

C. RADIUS.

D. TACACS+

D. TACACS+

97
New cards

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

A. Console

B. Disk Utility

C. Time Machine

D. FileVault

B. Disk Utility

98
New cards

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

A. Internet-based upgrade

B. Repair installation

C. Clean install

D. USB repair

E. In-place upgrade

C. Clean install

99
New cards

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine.

The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

A. Spyware

B. Cryptominer

C. Ransomware

D. Boot sector virus

B. Cryptominer

100
New cards

Which of the terms listed below is used to describe the initial storage drive formatting typically performed at the factory by the drive manufacturer?

Low-level format

Quick format

Standard format

High-level format

Low-level format