A+ 1102 Exam Questions

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 561

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

562 Terms

1

A technician has recently removed malware from a Windows computer, but the technician is concerned that some of the system files may have been modified. From the command line, analyze and repair any damaged operating system files.

C:\WINDOWS\system32>

sfc /scannow

New cards
2
term image

<p></p>
New cards
3

A user needs to access a file located on the \\gate-room server. The file is located in a share called ship-diagnostics. Use the command line to connect to this share using drive g:.

net use g: \\gate-room\ship-diagnostics

New cards
4
term image
knowt flashcard image
New cards
5

The motherboard of a server in the corporate data center has started smoking, and flames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this fire?

A. Water-based extinguisher

B. Foam-based extinguisher

C. Disconnect the power

D. Carbon dioxide extinguisher

D. Carbon dioxide extinguisher

New cards
6

Each time a user starts a specific corporate application, a page of disclaimers and usage requirements is shown before the login prompt. Which of the following would BEST describe this page?

A. Splash screen

B. Acceptable use policy

C. Standard operating procedures

D. Topology diagram

A. Splash screen

New cards
7

When connecting a new USB webcam to Windows 10, a message appears stating "The controller does not have enough resources for this device." Which of the following would be the BEST next troubleshooting step?

A. Close all large-memory processes

B. Modify the BCD

C. Move the webcam to a different USB interface

D. Use System Restore to rollback to a previous configuration

C. Move the webcam to a different USB interface

New cards
8

A system administrator has created a shared folder on a server to store operating system images. Technicians access the shared folder to download the latest images when performing large-scale system installations. Which of the following will be the MOST likely method of accessing this data?

A. Map the shared folder to an available drive letter

B. Download the shared folder through a proxy

C. Link the images to a cloud storage service

D. Access the folder using a remote access client

A. Map the shared folder to an available drive letter

New cards
9

A desktop administrator is installing a 64-bit version of Windows 10 Pro on a workstation, but the installation will not start. The workstation configuration is:

1 GHz CPU

2 GB of RAM

15 GB of free storage space

1280 x 720 video resolution

Which of the following would allow this installation to proceed?

A. Increase free storage space to 32 GB

B. Decrease resolution to 800 x 600

C. Upgrade to a faster processor

D. Increase RAM to 4 GB

A. Increase free storage space to 32 GB

New cards
10

A help desk technician has been called to a training room that uses Android tablets as presentation devices. An application used for the training program will not start on any of the tablets. When the application is selected, the splash screen appears for a moment and then completely disappears with no error message. Which of the following would be the best NEXT troubleshooting step?

A. Install all operating system updates

B. Uninstall the application

C. Power cycle the tablets

D. Roll back to the previous application version

C. Power cycle the tablets

New cards
11

A user on the headquarters network has opened a help desk ticket about their Windows desktop. When starting their computer, the login process proceeds normally but the Windows desktop takes fifteen minutes to appear. Yesterday, the desktop would appear in just a few seconds. Which of the following would be the MOST likely reason for this issue?

A. Slow profile load

B. Incorrect boot device order

C. Faulty RAM

D. Incorrect username and password

A. Slow profile load

New cards
12

A Linux administrator needs to modify the configuration text file for a service. Which of the following utilities would provide this functionality?

A. nano

B. chmod

C. df

D. sudo

A. nano

The nano utility is a full-screen text editor that can be used from the command line of a Linux device.

New cards
13

A network administrator has configured all of their wireless access points with WPA3 security. Which of the following technologies would be associated with this configuration?

A. RC4

B. TACACS

C. TKIP

D. GCMP

D. GCMP

WPA3 (Wi-Fi Protected Access version 3) uses GCMP (Galois/Counter Mode Protocol) to provide encryption of all wireless data.

New cards
14

A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST?

A. Remove the existing memory modules

B. Wear an air filter mask

C. Disconnect all power sources

D. Connect an ESD strap

C. Disconnect all power sources

New cards
15

A technician is dismantling a test lab for a recently completed project, and the lab manager would like to use the existing computers on a new project. However, the security administrator would like to ensure that none of the data from the previous project is accessible on the existing hard drives. Which of the following would be the best way to accomplish this?

A. Quick format

B. Deguass

C. Regular format

D. Reinstall the operating system

C. Regular format

A standard Windows format with the regular formatting option overwrites each sector of the drive with zeros. After this format is complete, the previous data on the drive is unrecoverable.

New cards
16

A system administrator needs to view a set of application log files contained in a folder named “logs.” Which of the following commands should be used to make this folder the current directory?

A. cd logs

B. mv logs

C. dir logs

D. md logs

A. cd logs

The "cd" command is short for change working directory, and it can be used in Windows or Linux to move around the file system.

New cards
17

A technician is installing a fresh Windows operating system on a file server. Unfortunately, the drive controller in the system is not recognized during the installation process. Which of the following would be the BEST way to manage this issue?

A. Load third-party drivers

B. Restart the system

C. Use a remote network installation

D. Boot from the recovery partition

A. Load third-party drivers

The Windows installation program includes drivers for most hardware devices, but occasionally additional device drivers will need to be added during the installation process.

New cards
18

A system administrator is upgrading four workstations from Windows 8.1 to Windows 11. All of the user files and applications are stored on the server, and no documents or settings need to be retained between versions. Which of these installation methods would be the BEST way to provide this upgrade?

A. Factory reset

B. Repair installation

C. Clean install

D. In-place upgrade

C. Clean install

A clean install of Windows 11 will completely delete the previous operating system and install a new installation of the Windows 11 operating system. The previous Windows 8.1 operating system will no longer be available on the computer.

New cards
19

An employee has modified the NTFS permissions on a local file share to provide read access to Everyone. However, users connecting from a different computer do not have access to the file. Which of the following is the reason for this issue?

A. The NTFS permissions were not synchronized

B. Share permissions restrict access from remote devices

C. The user is an Administrator

D. Remote users are connecting with Guest accounts

B. Share permissions restrict access from remote devices

NTFS (NT File System) permissions are used to control access from both local users and users over the network. For users connected over the network, the Windows share permissions are also used to determine access. If access is available locally but not across the network, then it's likely that the share permissions include additional access restrictions.

New cards
20

A user has received a pop up message on their computer that states applications on their computer are infected with a virus. A technician has determined that the pop up message is a hoax that needs to be removed from the computer. The technician has disabled System Restore to remove all previous restore points. Which of the following tasks would be the best NEXT step?

A. Update the anti-virus signatures

B. Educate the end-user

C. Schedule anti-virus scans for midnight each day

D. Boot the system with the original installation media

A. Update the anti-virus signatures

After disabling system restore, the next step in virus removal is to remediate the system. To remove the malware, it's important the technician is using the latest set of signatures.

New cards
21

In which of the following file types would a system administrator expect to see the command, “cd c:\source”?

A. .sh

B. .vbs

C. .py

D. .bat

D. .bat

The .bat file extension refers to Windows batch files. The "cd" command can refer to many different operating systems, but the reference to the drive letter "c:" is common to the Windows operating system.

New cards
22

A system administrator is creating a series of shared folders that should not be visible when users browse the network for available resources. What symbol should be added to the end of a share name to provide this functionality?

A. . (period)

B. $ (dollar sign)

C. ! (exclamation mark / bang)

D. # (hash sign / number sign)

B. $ (dollar sign)

Windows shares ending with a dollar sign ($) are hidden and won't be shown in the normal list of available shares. The hidden share can still be accessed if the user knows the share name, so this should not be considered a security feature.

New cards
23

A technician is troubleshooting a computer infected with a virus. The user thought they were opening a spreadsheet, but the file was actually a virus executable. Which of the following Windows options were MOST likely associated with this issue?

A. Always show icons, never thumbnails

B. Display the full path in the title bar

C. Always show menus

D. Hide extensions for known file types

D. Hide extensions for known file types

With extensions hidden, it's difficult to know the type of file based only on the filename. A filename named "Monthly Orders" might be a spreadsheet, or it could be an executable containing a virus.

New cards
24

A financial corporation is deploying tablets to their salespeople in the field. The company would like to ensure that the data on the tablets would remain private if the devices were ever stolen or lost. Which of the following would be the BEST way to meet this requirement?

A. Use full device encryption

B. Require multi-factor authentication

C. Install a locator application

D. Use a firewall app

A. Use full device encryption

Full device encryption ensures that all of the information on the tablet cannot be viewed by anyone outside of the company. If the tablet were lost or stolen, all of the data on the device would remain private

New cards
25

While using a laptop during presentations, a company vice president has found her system randomly locks up. While the problem is occurring, the screen continues to display the last presentation slide but none of the mouse or keyboard buttons will work. To regain control, the vice president must power down and reboot her computer. Which of the following would be the BEST option for troubleshooting this issue?

A. Examine the Task Manager

B. Install an anti-malware utility

C. Run the presentation software in Safe Mode

D. Check the Event Viewer

D. Check the Event Viewer

Random lock-ups are always a mystery. The Windows Event viewer can provide important information about events that may have occurred just prior to the issue and afterwards.

New cards
26

A business partner in a different country needs to access an internal company server during the very early morning hours. The internal firewall will limit the partner’s access to this single server. Which of these would be the MOST important security task to perform on this server?

A. Install the latest OS patches

B. Remove the server from the Active Directory domain

C. Use only 64-bit applications

D. Run a weekly anti-virus scan

A. Install the latest OS patches

This system will be used during non-working hours from a location that is not part of your organization, so keeping the operating system secure will be important. Maintaining an aggressive patching schedule will ensure that any known vulnerabilities are always removed before they could possibly be exploited.

New cards
27

A security administrator has received an alert that a user’s workstation in the shipping department has attempted to communicate to a command and control server for a well-known botnet. The logs on the workstation show that the user manually installed a new Internet browser the previous day. Which of the following would be the BEST next step for troubleshooting this issue?

A. Uninstall the new browser

B. Backup the user's documents

C. Roll back to a previous restore point

D. Disable the user's account

D. Disable the user's account

The first step after identifying a malware infection is to quarantine the system. This would include removing the system from the network and preventing the user's account from accessing other network resources.

New cards
28

A network administrator is troubleshooting an intermittent Internet link outage to a server at 8.8.8.8. The administrator believes that the outage is occurring on one of the WAN connections between locations. Use a Windows network utility that can identify the router closest to the outage.

The tracert (traceroute) command will display a list of all network hops between two devices. If a route is down, the tracert output will show the last hop before the faulty link.

<p>The tracert (traceroute) command will display a list of all network hops between two devices. If a route is down, the tracert output will show the last hop before the faulty link.</p><p></p>
New cards
29
term image
knowt flashcard image
New cards
30
term image
knowt flashcard image
New cards
31

A system administrator is concerned that a Windows system may contain logical file system errors. Scan and repair any logical file system errors from the Windows command line.

The chkdsk (Check Disk) command is used to identify and fix logical file system errors and bad physical sectors. The /f option will fix the logical file system and the /r option will locate bad sectors and attempt to recover any readable data.

In this example, the administrator would run this from the command line:

chkdsk /f

New cards
32

A user runs a corporate app on their smartphone that downloads a database each time the app is started. This download process normally takes a few seconds, but today the download is taking minutes to complete. Which of the following should a technician follow as the best NEXT troubleshooting step?

A. Disable Bluetooth

B. Run a network speed check

C. Charge the smartphone battery

D. Check the cloud storage resource usage

Run a network speed check

Delays associated with the download process would initially indicate a problem with the network connection. A speed check would evaluate the network connectivity and provide a baseline for download speeds.

New cards
33

Which of the following features would be found in Windows 10 Pro but not in Windows 10 Home?

A. 32-bit and 64-bit versions

B. Domain access

C. RDP client

D. Windows Workgroup

B. Domain access

Windows 10 Home does not include any access or connectivity to a Windows Domain

New cards
34

A local coffee shop has a public wireless network for customers and a private wireless network for company devices. The shop owner wants to be sure that customers can never connect to the company network. Which of the following should be configured on this network?

A. Install a new access point for company devices

B. Configure WPA3 on the company network

C. Require static IP addresses on the customer network

D. Assign MAC filters to the company network

E. Use a firewall between the customer and corporate network

Configure WPA3 on the company network

Enabling WPA3 (Wi-Fi Protected Access version 3) would require a password to connect and would prevent customers from connecting to the company wireless network.

New cards
35

A system administrator has inadvertently installed a Trojan horse that has deleted a number of files across many Windows file shares. The Trojan also had access to user documents and login credentials and transmitted numerous documents to an off-site file storage system. Which of the following would limit the scope of future exploits?

A. Require multi-factor authentication

B. Disable all guest accounts

C. Modify the default permissions

D. Configure full disk encryption

E. Require complex passwords

F. Require a screensaver password

C. Modify the default permissions

Many system administrators configure their accounts to have full access to the network as their default setting. This means that malicious software would also have full access if the administrator's desktop was exploited. Changing the default permissions to have limited access would also limit the scope of a Trojan horse exploit.

New cards
36

Which of the following Windows Share permissions has the priority when assigning access on a mapped drive?

A. Allow

B. Full control

C. List folder contents

D. Deny

D. Deny

In Windows shares, the most restrictive setting has priority over all others. For example, the deny option takes priority over all other permissions.

New cards
37

A desktop administrator has just removed malware from a user’s desktop computer and has configured the system to automatically update antivirus signatures and perform a scan each night. Which of the following should be the NEXT step in the removal process?

A. Enable System Protection

B. Educate the end-user

C. Quarantine the computer

D. Boot to Safe Mode

A. Enable System Protection

Before the malware was removed, System Protection was disabled to delete all potentially-infected restore points. Once the malware is removed and the anti-malware process is working again, System Protection can be re-enabled.

New cards
38

A security administrator is installing a new VPN connection for remote users. The administrator would like all users to authenticate with their Windows Active Directory credentials. Which of the following technologies would provide this functionality?

A. RADIUS

B. WPA3

C. TKIP

D. AES

A. RADIUS

RADIUS (Remote Authentication Dial-in User Service) is an authentication protocol commonly used to provide authentication from devices to a centralized database. A common use of RADIUS is to authenticate users to an Active Directory database from a router, switch, VPN concentrator, or any other service.

New cards
39

Which of the following partition types limit a Windows installation to a maximum partition size of 2 TB?

A. FAT32

B. GPT

C. APFS

D. MBR

D. MBR

The MBR (Master Boot Record) partition style is an older method partitioning files, and the maximum partition size of an MBR partition is two terabytes in size.

New cards
40

A Linux administrator is modifying a log file and needs to rename the file. Which of the following should be used to make this change?

A. rm

B. mv

C. mkdir

D. pwd

B. mv

The Linux mv (move) command will move a file from one location to another, or move/rename a file from one name to another.

New cards
41

A user receives a browser security alert on his laptop when visiting any website that uses HTTPS. If he uses his smartphone, he does not receive any error messages. Which of the following would BEST describe this situation?

A. The date and time on the laptop is incorrect

B. The smartphone is not updated with the latest OS version

C. The laptop has an incorrect subnet mask

D. The laptop does not have the latest anti-virus signatures

A. The date and time on the laptop is incorrect

The date and time on a device is important when encryption is involved. If a date is very different between devices, the encryption process may fail or the encryption certificate may appear to be expired.

New cards
42

A user in the accounting department has installed a new application for the upcoming tax year. Although the current application worked perfectly, the newer application runs significantly slower. Which of the following should be the FIRST troubleshooting step?

A. Roll back to the previous application

B. Run a repair installation

C. Verify the requirements for the new application

D. Perform a system file check

C. Verify the requirements for the new application

The new application may not have the same requirements as the older application, so the user's computer may require additional CPU, memory, or storage space.

New cards
43

A macOS user needs encrypt all of the information on their laptop. Which of the following would be the BEST choice for this requirement?

A. Spaces

B. Remote Disc

C. FileVault

D. Keychain

C. FileVault

The FileVault utility provides full disk encryption for macOS devices.

New cards
44

A graphics designer has been editing image files that have become increasingly large over the last few months. The designer is now receiving error messages from their graphics application complaining of low temporary file cache space. Which of the following would be the best NEXT step?

A. Replace all system RAM

B. Increase available storage space

C. Roll back to a previous restore point

D. Rebuild the user's profile

B. Increase available storage space

Graphics files can become very large to store, and the error messages from the application point to a lack of available storage space. Upgrading the available drive space would be the best next troubleshooting step.

New cards
45

A network administrator is installing a set of upgraded Internet routers in the data center. Which of the following would be the best choices to secure the access to the internal data center door? (Select TWO)

A. Biometric lock

B. ACL

C. Bollard

D. Additional lighting

E. Motion sensor

F. Access control vestibule

A. Biometric lock and F. Access control vestibule

A biometric door lock provides access based on a fingerprint, handprint, or some other biometric characteristic. An access control vestibule is often used to limit or control the flow of people through a particular area. Often an access control vestibule is used in conjunction with additional authentication factors to allow or prevent access to an area.

New cards
46

A network administrator has a report showing a single user with numerous visits to a website. This website is known to violate the company’s AUP. Which of the following should the administrator do NEXT?

A. Create a firewall filter to block the website

B. Scan all computers with the latest anti-malware signatures

C. Contact the company’s security officer

D. Change the user’s password

C. Contact the company's security officer

A company's AUP (Acceptable Use Policy) is in place to limit the legal liability of an organization. If a person in the organization is not following the terms of the AUP, then the security officer's team should manage the results of that action.

New cards
47

An employee used their tablet to take pictures of the company's newest product. Those pictures were posted on an industry rumor website the following week. Which of the following should be evaluated as the MOST likely security concern?

A. Cloud storage

B. USB flash drive use

C. Application updates

D. Deleted email messages

A. Cloud storage

Many mobile devices use cloud storage to backup documents, videos, and photos. Anyone with access to the cloud storage would also have access to all of the photos.

New cards
48

A system administrator needs to configure a laptop to support inbound Remote Desktop services for the help desk team. Which of these Control Panel features provides access to these settings?

A. Internet Options

B. Devices and Printers

C. Network and Sharing Center

D. System

D. System

The System utility includes a Remote tab for Remote Assistance and Remote Desktop. The Remote Desktop option is available in non-Home editions of Windows.

New cards
49

A system administrator is installing a new video editing application on a user’s workstation from an installation USB flash drive. However, the installation process fails due to lack of available drive space. Which of the following would be the BEST way to complete the installation process?

A. Use a share drive for the installation source

B. Compress the installation files

C. Install the application to a network share

D. Manually copy the installation files to the application directory

C. Install the application to a network share

The installed application files can be much larger than the installation utility, so using a network share with a larger available storage space can be a good alternative until free space is available on the local computer.

New cards
50

An organization has distributed new laptops to all of their home-office employees. Although the users at home can successfully connect through the Internet to resources at the corporate office, there have been complaints that printers and shared drives at home are not accessible. Which of the following would explain this issue?

A. Incorrect login credentials

B. Port security is turned on

C. The corporate VPN is enabled

D. Blocked by DLP

C. The corporate VPN is enabled

A VPN (Virtual Private Network) connection that sends all traffic back to the corporate office by default would effectively disconnect the user from any other local resources, such as printers, other computers, and local file shares.

New cards
51

A customer wants to transfer data from the DVR to a DVD. What hardware will be required to enable the workstation to collect the data to archive to the DVD?

Capture card

New cards
52

A customer reports that after a technician cleaned up a rogue anti-virus program, the customer cannot browse the Web. Which of the following should the technician check to resolve the situation?

Proxy settings

New cards
53

Henry installs a new local printer without any problems. At the end of the installation, the program asks if he wants to print a test page. He clicks "No," but then changes his mind. Where can he go to print a test page for the new printer?

Right-click on the new printer, select Properties, and then click the Print Test Page button.

New cards
54

A user has too many applications starting when they log into Windows. From the command line, which of the following tools is the fastest option to prevent these applications from running on startup?

MSCONFIG

New cards
55

Which of these are symptoms of malware on a PC? (Select two.)

A. When your PC is sitting idle, you notice the network and hard drive activity is higher then normal.

B. When your computer prints, it prints nothing but random character and symbols instead of regular text.

C. The optical drive in your computer ejects at random times

D. When you browse the Internet, you are redirected to Web sites that you didn't click on.

E. Your computer's display has a residual ghosted image on it.

A. and D.

New cards
56

John can ping any other computer on his LAN by IP address or name. He can also ping hosts outside his network by IP address or Fully Qualified Domain Name (FQDN). However, when he opens his Web browser, he's unable to access any Web sites. Which of the following problems is the MOST likely cause? Below is his current IPCONFiG. 

C:\>ipconfig 

Windows IP Configuration

Ethernet adapter Local Area Connection:         

     Connection-specific DNS Suffix  . : total.local         

     IP Address. . . . . . . . ..... . . . : 192.168.4.76         

     Subnet Mask . . . . . . . . . . . : 255.255.255.0         

     Default Gateway . . .. . . . . . : 192.168.4.1

A. His DHCP server is down.

B. His proxy server settings are wrong.

C. His DNS server is down.

D. His router is blocking outgoing port 443.

His proxy server settings are wrong. Odds are good he needs to configure the Web browser. However, this answer is best answered by eliminating the other three answers. Look at why the other three answers are not eligible below. 

Incorrect: 

His DNS server is down. No way, as he's pinging by FQDN. 

His DHCP server is down. Doubtful, as he's getting a non-APIPA address in IPCONFIG. If the DHCP server was down we'd expect to see a 169.254.X.Y address. 

His router is blocking outgoing port 443. This would prevent his Web browser from accessing Secure HTTP sites (HTTPS), but it wouldn’t stop him from accessing port 80 (HTTP) sites.

New cards
57

Which Control Panel applet enables you to view but not change the status of critical security information for a Windows computer?

Security Center

Windows Defender

Programs and Features

Internet Options

Windows Security Center provides a quick overview of the status of your firewall, automatic updating, malware protection, and other security settings. 

Incorrect: 

The Internet Options applet enables you to change settings that apply to Internet Explorer primarily, and to define default applications for other Internet services such as e-mail. 

You can uninstall and modify applications in the Programs and Features applet. It has nothing to do with security. 

Windows Defender provides protection against spyware and other malware. You can actively run a scan from this applet. It's a good answer, in other words, but not the best answer here.

New cards
58

From a command-line environment what is the best way to view files with the hidden attribute checked?

dir /s

dir /a

dir /p

dir /?

dir /a is used to see files with hidden, system, read, and archive attributes checked. 

Incorrect Answers: 

dir /s is used to see folders and subfolders.   

Dir /? Is used to see all the capabilities the dir command can offer.   

Dir /p is used to see a directory listing a page at a time.

New cards
59

Tom's C: drive is filling up. He needs to install a bigger drive and reinstall Windows onto the larger drive, but he's short on time. Instead, he installs the much larger drive, partitions it into a single simple volume and formats it as NTFS. Instead of giving the new volume a drive letter, he configures it as C:\NEW. We call this feature of Windows:

UAC

Dynamic disk

ATAPI

Mount point

Mount point. Whenever a volume is assigned a folder name on another existing volume instead of a drive letter,it's called a mount point. 

Incorrect: 

ATAPI is a feature of the ATA standard that enables non-hard drives to use the PATA and SATA connections. 

UAC is the Windows feature that prevents programs from automatically running with enhanced permissions by popping up a warning box. 

Dynamic disk is a proprietary Windows feature that enables more advanced features for hard drives.

New cards
60

Anakin is running defrag on his Windows computer. About half way through running the defrag a random power outage occurs and his computer shuts down abruptly. What should he do next to finish his defrag?

Install a UPS.

Start in Safe Mode and run defrag.

Nothing—restart your computer and run defrag.

Run CHKDSK on your drive to ensure data integrity.

Defrag is totally safe. When it's working it's actually copying the files to new contiguous locations on the drive. That's why you need 15% of your drive free. That's a lot of copying going on! 

Incorrect Answers: 

CHKDSK is cool, but not really needed in this situation.   

Installing a UPS would be great for getting around the random power outages, but our real concern here was defrag.   

Safe Mode is another great place to do troubleshooting, but not really needed to do a defrag anymore.

New cards
61

Under what Control Panel applet is Computer Management located?

Control Center

Security Center

System

Administrative Tools

Administrative Tools. If you need to access Computer Management via the Control Panel, you must first open the Administrative Tools. 

Incorrect: 

You cannot access Computer Management via any of the other Control Panel applets listed.

New cards
62

You are working with files on your NTFS partition. Which of the following actions will cause the files to inherit permissions of the new container? (Choose three.)

Moving a file to a new location on the same partition

Copying a file to a FAT32 partition

Moving a file to a different NTFS partition

Copying a file to a new location on the same partition

Copying a file to a different NTFS partition

Copying a file to a new location on the same partition. 

Moving a file to a different NTFS partition. 

Copying a file to a different NTFS partition. 

These will all cause the file to inherit the permssions of the new container it  inhabits. 

Incorrect Answers: 

Moving a file to a new location on the same partition will cause the file to RETAIN its original permissions. 

Copying or moving a file to a FAT32 partition will cause the file to lose all of its NTFS permissions.

New cards
63

You are working with files on your NTFS partition. Which of the following actions will cause the files to retain their original NTFS permissions?

Copying a file to a FAT32 partition

Moving a file to a different NTFS partition

Moving a file to a new location on the same partition

Copying a file to a new location on the same partition

When on an NTFS partition, the only way to keep the original permissions of a file or folder is to MOVE that file or folder into a new location on the same partition. 

Incorrect Answers: 

By copying a file to a new location on the same partition or moving a file to a different NTFS partition, the file will inherit the permissions of the new container. 

Copying or moving the file to a FAT32 partition will cause the file to lose all of its permission settings.

New cards
64

John worked on his PowerPoint presentation yesterday, but today the program won't run. What Windows tool or option should he try to get PowerPoint working again?

Safe mode

Last Known Good Configuration

System Restore

Safe mode with networking

The key fact here is that the application worked in the past but doesn't work now. Given the choices you have it's safe to assume that John possibly installed another program that created a problem with PowerPoint and that his best fix to this problem would be to restore the system to a time that PowerPoint was working. 

Incorrect: 
Last Known Good is a fine answer, but not the best.

Last Known Good is used when you have a driver or registry problem that prevents Windows from starting up. 

Safe mode and Safe mode with networking are good answers as well, but with no drivers loaded in safe mode, it may be hard to troubleshoot this application-based problem.

New cards
65

Which of the following actions would best show a computer was connected to the Internet?

Pinging your DNS server

Pinging your router

Pinging www.comptia.org

Pinging localhost

Pinging a remote system means you have to use the Internet. In this case, www.comptia.org is a great example.   

Incorrect: 

Both your router and your localhost do not require you to go out to the Internet.   

Pinging a DNS server might be good proof if your DNS server is outside your local network, but pinging www.comptia.org will always work.

New cards
66

Which power management mode uses the least battery life because all active data is copied from RAM to HDD (or SSD) and the computer is powered down?

Drive cache

Standby

Full off

Hibernate

Hibernate will take all the contents of RAM and place it in a file on the hard drive. To be exact, if you have Windows, hiberfil.sys is the name of the file it saves RAM data to. 

Incorrect: 

Drive cache is high-speed RAM on the hard drive that increases the speed of data access. 

Standby will stop the CPU and all the peripherals, but RAM will still be on, holding data.   

Full off just turns the computer off. You won't have anything being saved!

New cards
67

Karen is unable to access the Internet on her home network, but she can access both her roommate's computer and her home theater PC. She thinks her router might not be working. Which of the following tools could she use to test this theory?

IPCONFIG /all

NET VIEW

ICACLS

TRACERT

Use TRACERT to try to access some remote host. TRACERT works even better at this point if you get around any DNS problems by using a legitimate IP address instead of a FQDN name. 

Incorrect: 

IPCONFIG /all will only tell you your IP settings, not if you are able to get out on the Internet. 

NET VIEW shows you all the local computers on your network, but tells you nothing about getting out on the Internet. 

ICACLS is a tool to enable you to configure NTFS permissions from the command line and has nothing to do with Internet access.

New cards
68

A customer reports that their wireless laptop cannot connect after removing it from its carrying case. The laptop boots and the user is able to login. Which of the following should be checked first?

Status in Device Manager

Laptop battery levels

Available hard drive space

External Wi-Fi switch

t's highly likely that the Wi-Fi switch got knocked into the wrong position during transport. Just flip the switch back into the correct position and you're good to go! 

Incorrect Answers: 

It's possible that the wireless card got disabled in Device Manager somehow, it's far more likely that the Wi-Fi switch got turned to the wrong position. 

Hard drive space doesn't affect wireless connectivity. 

A low battery would prevent the PC from turning on at all, not just from connecting to a wireless network.

New cards
69

What does the Windows feature "Sticky Keys" do for users?

Locks down the function key to Enable mode

Plays a tone when you press Caps Lock, Num Lock, or Scroll Lock.

Tells the computer to ignore quick or repeated keystrokes

Lets you press key combinations such as (Windows Key+Tab) one key at a time.

These features are accessed in the Control Panel under Ease of Access in Windows. In this case, Sticky Keys lets you press key combinations, such as Windows Key+Tab, one key at a time. 

Incorrect: 

The Toggle Keys feature plays a tone when the Caps Lock, Num Lock, or Scroll Lock keys are pressed. 

The Filter Keys feature tells the computer to ignore quick or repeated keystrokes. 

There is no "Enable mode"  feature in Windows.

New cards
70

Jenny has a laptop with Windows. What tool can she use to encrypt an entire hard drive so that even if the laptop is stolen, no one can access her files?

Encrypting File System (EFS)

exFAT

NTFS

BitLocker

BitLocker would enable her to encrypt the complete hard drive. Note that the laptop would need to have a Trusted Platform Module (TPM) chip for this to work easily. 

Incorrect: 

EFS enables you to encrypt files and folders, but not drives.

exFAT, like other FAT-style formats, has no encryption.   

Because EFS is part of NTFS, NTFS would enable file and folder encryption, but not drive encryption.

New cards
71

You are cleaning the desk area around your computer and you notice that your UPS has a small flashing LED on the front, however, the PC is running just fine. When you first installed the UPS about a year ago, you noticed the light was a steady green. What does this indicate?

The UPS is charging the batteries

The UPS battery needs replacement

The UPS is running a self-diagnostic

The UPS is working and ready

The UPS batteries need to be replaced. When the lights start flashing, it usually indicates this. Just be lucky it didn’t start beeping at you. 

Incorrect Answers: 

When you first turn on the UPS, it should run through a diagnostic test, in which lights will be going on and off at random times according to its bootup procedure. 

There shouldn't be any flashing lights while the UPS is charging or if it's in a ready state.

New cards
72

A Windows administrator would like to query the local DNS server to view the IP address for www.professormesser.com. Use a command line utility to view this information.

nslookup www.professormesser.com

The nslookup (name server lookup) command can query a DNS server for information about IP addresses, fully qualified domain names, email server addresses, and other important name services.

New cards
73
<p></p>

knowt flashcard image
New cards
74
term image
knowt flashcard image
New cards
75
term image
knowt flashcard image
New cards
76

A system administrator would like to remove the TFTP Client in Windows 10. Which of the following Control Panel options would be the BEST choice for this task?

A. Programs and Features

B. Services

C. Network and Sharing Center

D. File Explorer options

A. Programs and Features

The Programs and Features option of the Control Panel is used to view and manage installed applications, or to enable or disable individual Windows features.

New cards
77

A system administrator needs to modify the Linux group associated with a file. Which of the following would provide this functionality?

A. ps

B. df

C. chown

D. grep

C. chown

The chown (Change Owner) command will modify the owner or group associated with a file system object.

New cards
78

A server administrator needs to create a folder on a Windows server to store weekly status report documents. Which of the following commandline tools would provide this functionality?

A. md

B. net use

C. cd

D. dir

E. ls

A. md

The md (Make Directory) command is used to create a subdirectory or folder on the file system.

New cards
79

A desktop administrator is removing a virus from a laptop computer in a shared lab. The computer has been removed from the network and the System Restore feature has been disabled. When the administrator attempts to update to the latest anti-virus signatures, the anti-virus utility disables itself. Which of the following would be the best NEXT step?

A. Boot to Safe Mode and use signatures downloaded from a separate computer

B. Roll back to a previous configuration

C. Schedule periodic updates and reconnect to the network

D. Discuss anti-virus strategies with the end user

A. Boot to Safe Mode and use signatures downloaded from a separate computer

It's not uncommon for viruses to disable access to recovery software. To work around this issue, a technician may often need to restart in Safe Mode and copy utilities and recovery files from a different computer.

New cards
80

Which of the following would be the BEST choice for a system administrator to manage an Active Directory database?

A. Batch file

B. PowerShell

C. JavaScript

D. Visual Basic Scripting

B. PowerShell

PowerShell is Microsoft's command line scripting environment for the Windows operating system and provides integrations to automate almost every aspect of Windows.

New cards
81

A Linux administrator is using the grep command while monitoring a database application. Which of the following would BEST describe this activity?

A. Search through a file for specific text

B. View a list of running processes

C. Change the permissions of a file

D. View the name of the working directory

A. Search through a file for specific text The grep command is used to search through a file or set of files for specific text.

New cards
82

A Windows 10 application includes the installation of a service during the setup process. Which of the following would be the MOST important consideration during the application setup?

A. OS compatibility

B. Available storage space

C. Network connectivity

D. User permissions

D. User permissions

A standard user account does not have permission to make significant operating system changes, especially those that would include the installation of a service. To prevent the unintended installation of malicious software, the Windows UAC (User Account Control) feature will request additional rights and permissions for these operating system changes.

New cards
83

A medical center's hospital staff uses shared computer systems installed in hallways and patient rooms. However, hospital administrators are concerned that patient information might be visible if someone leaves the computer without logging out. Which of the following would help prevent this type of issue?

A. Multi-factor authentication

B. Password expiration policy

C. Login time restrictions

D. Screensaver passwords

D. Screensaver passwords

Screensaver passwords would ensure the information on the computer would be protected if someone walks away and leaves the system unattended. Other security enhancements might include a proximity monitor to automatically lock the system when someone walks away, making the screensaver password a good secondary security option.

New cards
84

George, a user, has a smartphone to assist with maps and directions when traveling to other company locations. At a remote site, George finds his phone is attempting to contact a third-party website to share location information. Which of the following would be the BEST way to address this issue?

A. Disable the GPS

B. Perform a soft reset

C. Run an anti-malware scan

D. Use the cellular network instead of Wi-Fi

C. Run an anti-malware scan

The symptom of the phone contacting a third-party website would commonly be associated with malware. None of the other options would provide any mitigation of the potential issue.

New cards
85

A desktop administrator has been tasked with removing malware from an executive’s laptop computer. The system has been removed from the network, but the Windows startup process shows a Stop Error before rebooting into a repeating cycle. Which of the following would be the best NEXT step in the malware removal process?

A. Perform a Windows Repair installation

B. Boot with a pre-installation environment

C. Schedule periodic scans

D. Create a restore point

B. Boot with a pre-installation environment

A Windows PE (Pre-installation Environment) can be used to boot into the Windows Recovery Console to resolve problems with the primary operating system. This is a common task when the primary operating system has been corrupted or will not boot properly

New cards
86

A system administrator would like to upgrade a user's Windows video editing application to the latest version, but the upgrade utility fails with the error "Not enough free space." Which of the following utilities would allow the system administrator to resolve this issue?

A. cleanmgr

B. perfmon

C. eventvwr

D. taskschd

E. diskmgmt

A. cleanmgr

The cleanmgr.exe (Disk Cleanup) utility will find unused or unneeded files and remove them from the file system. This might include temporary Internet files, error reports, downloaded program files, and others.

New cards
87

A small office is located in a large office building with over fifty different companies. A network administrator would like to limit the possibility of someone else in the building accidentally connecting to their wireless network. Which of these configuration settings would prevent their wireless network from appearing in a list of available networks?

A. MAC filtering

B. Static IP addressing

C. WPA3 encryption

D. Disabling SSID broadcasts

D. SSID suppression

Disabling the SSID (Service Set Identifier) broadcast will prevent the wireless network name from appearing in lists of available networks. Users who know the name can still connect to the network manually

New cards
88

A help desk is receiving reports that a group of devices is not able to communicate outside of their local IP subnet. A technician can ping devices on the same network, but does not receive a response when pinging the IP address of external devices. Which of the following would be the MOST likely cause of this issue?

A. Default gateway

B. DNS server

C. Proxy server

D. Metered connection

A. Default gateway

The default gateway is the router providing the communication between the local IP subnet and the rest of the world. If the default gateway isn't working, users will not be able to access services that are outside of the local subnet.

New cards
89

A technician has been asked to work on an urgent computer repair while the user is at lunch. When the technician arrives, they notice paperwork on the desk that may contain private customer information. Which of the following would be the BEST next step?

A. Complete the repair as quickly as possible

B. Ask an associate in the department for assistance

C. Move the papers somewhere out of sight

D. Leave without repairing the computer

B. Ask an associate in the department for assistance The technician has a job to complete, but privacy and access to sensitive information is an important consideration. In these situations, it's best to work with others to remove any of these concerns from the work area.

New cards
90

A user is working with a .dmg file on their macOS desktop. Which of the following would describe the contents of this file?

A. Debug information

B. Disk image

C. Application library

D. Disk maintenance utility

B. Disk image

The macOS equivalent to an ISO file is a DMG (Disk Image) file. Disk images can be created and managed from the macOS Disk Utility

New cards
91

A user would like to configure their local printer to be accessible to anyone on the corporate network. Which of the following would be the BEST way to configure this connection?

A. Configure a VPN connection

B. Create a share name in printer properties

C. Configure a metered connection

D. Use a static IP address

B. Create a share name in printer properties

The printer properties includes a sharing tab with the option to "Share this printer" and to create the name for the printer share.

New cards
92

A user has purchased a computer that uses a 32-bit version of an operating system. Which of the following would be the maximum amount of RAM supported in this OS?

A. 32 GB

B. 2 TB

C. 512 GB

D. 128 GB

E. 4 GB

F. 16 GB

E. 4 GB

A 32-bit operating system can store 232 values, or approximately 4 GB of address space.

New cards
93

A technician is troubleshooting a problem on a Linux server and needs to view the real-time CPU and memory utilization for each operating system process. Which of the following would provide this functionality?

A. dig

B. df

C. cat

D. top

D. top

The linux top command is a common methods of viewing real-time information about CPU, RAM, and resource utilizations. This information is updated every second by default and can quickly identify highly utilized processes.

New cards
94

A company has configured a server for daily backups, and a full backup is created each Sunday based on the previous incremental backups. Which of the following would BEST describe this backup strategy?

A. Differential

B. GFS

C. Synthetic

D. 3-2-1

C. Synthetic

A synthetic backup combined a previously taken full backup with a series of updates to build a completely new full backup based on the most recent changes.

New cards
95

What is the physical memory limit for the 64-bit (x64) Windows 10 Pro edition?

  • 2 TB

  • 4 TB

  • 6 TB

  • 8 TB

  • 2 TB

New cards
96

Which of the 64-bit (x64) Windows 10 editions provide(s) support for up to 6 TB of physical memory? (Select all that apply)

  • Windows 10 Home

  • Windows 10 Pro

  • Windows 10 Pro for Workstations

  • Windows 10 Enterprise

  • Windows 10 Pro for Workstations

  • Windows 10 Enterprise

New cards
97

An operating system installation type that preserves system settings, personal files, and applications from the older OS version is referred to as an in-place upgrade. Microsoft Windows versions that can be upgraded to Windows 10 via this method include: (Select 2 answers)

  • Windows XP

  • Windows Vista

  • Windows 7

  • Windows 8.0

  • Windows 8.1

  • Windows 7

  • Windows 8.1

New cards
98

Which of the answers listed below refer to Windows command-line commands used for directory traversal? (Select 2 answers)

  • cd

  • pwd

  • dir

  • chdir

  • path

  • cd

  • chdir

New cards
99

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory? (Select all that apply)

  • dir

  • dir /?

  • dir *.*

  • dir /all

  • dir /list

  • dir

  • dir *.*

New cards
100

Which of the answers listed below refer to Windows command-line commands used to create a directory or subdirectory? (Select 2 answers)

  • md

  • mkd

  • mdir

  • mkdr

  • mkdir

  • md

  • mkdir

New cards
robot