1102 Certification Practice Exam 5 Flashcards

1
Q

An employee calls to complain that their browser keeps opening up to a strange search engine page, and a toolbar has been added to their browser.

Which of the following malware issues are MOST likely causing the problem?

A

Software issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is true of a domain controller?

A

A domain controller is a Windows server that holds a copy of the Active Directory database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

While troubleshooting an issue with an Apache web server on your Linux system, you need to look at the last several entries in the log file.

Which of the following tools would be best suited for this task? (Select two.)

A
  • Cat
  • Tail

Both tail and cat are suited for this task. The tail command prints out the last 10 lines of a file by default. The cat command prints out the contents of a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user.

Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other’s files.

Which of the following would MOST likely increase this system’s security?

A

-Set a screen saver password.

-Disable Autorun on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In which of the following situations would you use a custom/clean installation?

A

You want to preserve the existing operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are a junior network technician for a small consulting firm. Your team recently split the network into smaller subnets, one for each department.

One of your users, Jaclyn in HR, is trying to access shared files from Tom’s computer in the sales department. Jaclyn states she was able to previously access these files.

As part of your troubleshooting, you verify that both Tom and Jaclyn can access the network printer in their departments.

Which of the following would be the MOST likely reason Jaclyn is unable to access files on Tom’s computer?

A

Tom and Jaclyn are no longer on the same subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following BEST describes the purpose of the USB Selective Suspend feature?

A

If a USB device is not in use, the USB Selective Suspend feature stops providing power to the port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To protect a Windows 11 system, you’ve configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

A

No. You need to enable File History.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Jeannette’s workstation is overheating. She decides to open the workstation and clean any accumulated dust to see if it helps with the overheating issue.

Which of the following can Jeannette safely do to remove dust?

A

-Use a special vacuum to clean dust from all hardware components.

-Use short bursts of compressed air to clean delicate components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have just finished installing a new Windows Update when your computer locks up. What should you do first?

A

Uninstall the Windows Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following paths open the Computer Management tool in Windows?

A

-Right-click the Windows icon and select Computer Management.

-In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not.

A

Which category do apps fall into if they have been reviewed, approved, and signed with a certificate?
-TRUSTED

What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?
-UNTRUSTED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Windows service stores registered biometric scans for authentication and determines whether they match the stored scan?

A

Windows Hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two employees are unable to access any websites on the internet, but they can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem.

Which of the following actions would BEST resolve this issue?

A

Identify the proxy server name and port number in Internet Options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following Windows components is designed to help you make video calls with contacts through their Microsoft accounts?

A

Chat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a troubleshooting step to try when troubleshooting application conflicts?

A

Check for application driver updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Match each file system component on the left with the correct description on the right.

A

A logical division of a storage device associated with a hard drive.
-Partition
A single accessible storage area within a file system.
-Volume
A container in a file system used to logically sort and organize data.
-Directory
A one-dimensional stream of bits treated as a logical unit.
-File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following door locks provides authentication to a specific lock over a Bluetooth connection?

A

Key fob

19
Q

Your company is creating a financial application that you want to first test on mobile devices. Several customers have asked to be part of the beta testing process.

What do the employees need to do on their mobile devices in order to be able to participate in the beta test?

A

Turn on Developer mode.

20
Q

Match each disk type on the left with its corresponding description/features on the right. Each disk type may be used once, more than once, or not at all.

A

Support up to 128 volumes.
-Dynamic Disks
Use primary and extended partitions.
-Basic Disks
Are supported by all operating systems.
-Basic Disks
Support volumes that use discontiguous disk space.
-Dynamic Disks
Store partitioning information in a hidden database on all such disks in the system.
-Dynamic Disks
Only support volumes made up of contiguous disk space.
-Basic Disks

21
Q

Which of the following would you MOST likely recommend that your client do to increase security based on this information?

A

Install the WAP on the ceiling or inside of a special locked box.

22
Q

Which of the following terms describes a Windows 11 operating system patch for a desktop that targets a specific problem and is released on a short-term, periodic basis?

A

Hotfix

23
Q

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

A

Phishing

24
Q

What method is used to ensure proper ventilation in a server room?

A

Hot and Cold aisles

25
Q

Which of the following Mac features is used to launch apps, switch between running apps, access the Trash, and access specific folders?

A

Dock

26
Q

You are a PC technician for a company. An employee needs you to install some software on his computer over his lunch break. When you log on to the computer, you notice the employee’s desktop has so many shortcuts and files that you can hardly see the desktop background.

A

Install the software and leave the employee’s computer exactly how you found it.

27
Q

A user complains that his USB scanner no longer works. You check Device Manager and see an icon with a black down arrow through it. What should you do?

A

Enable the device in Device Manager.

An icon with a black down arrow through it in Device Manager means that the device is disabled. Simply re-enable the device

28
Q

Which of the following was developed by Microsoft as one of the first VPN protocols and supports only TCP/IP?

A

PPTP

29
Q

You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately.

What should you do?

A

Edit settings in the Local Security Policy.

30
Q

Which of the following are examples of social engineering?

A

-Dumpster Diving
-Shoulder Surfing

31
Q

An administrator configures the Time Machine application on macOS computers and develops scripts that use the tar command on Linux computers.

Which of the following best practices is the administrator following?

A

Scheduled backups

32
Q

Computer configuration policies (also called machine policies) are enforced for the entire computer and are applied when the computer boots. Which of the following are computer configuration policies?

A

-Network communication security settings.
-Software that has been installed on the local system.

33
Q

Which of the following statements is true regarding hard tokens?

A

Hard tokens provide a higher level of security.

34
Q

You use a Linux distribution that uses RPM for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies?

A

yum install httpd

35
Q

You provide desktop support at a bank’s branch office. One of the Windows workstations you manage is used to set up new customer accounts and fill out customer loan applications.

Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other’s files.

Which of the following would MOST likely increase this system’s security?

A

-Install a privacy filter on the monitor.

-Secure the computer system to the desk with a cable lock.

36
Q

You are the computer specialist for a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server has started to experience intermittent failures, so you transfer the shares on the server to a spare server and take the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company’s DNS server and redirect the hostname to the spare server’s IP address of 10.0.0.3.

Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating that the FS1 server cannot be found.

Enter the command you can run from Command Prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

A

ipconfig /flushdns

Workstations maintain a cache of recently resolved DNS names. When you use a DNS name, the computer first checks its cache. If the name is in the cache, the corresponding IP address is used. This can sometimes cause problems if a host’s IP address has changed. Old values in the cache might continue to be used for a time, making communication using the DNS name impossible.

To correct this problem on a Windows computer, run ipconfig /flushdns to delete the local DNS name cache.

37
Q

One of your customers has called you regarding some issues he is having with his graphics while gaming. After troubleshooting the issue over the phone for a time, you feel it would be helpful to get a detailed report of his system to see if the computer meets the minimum system requirements for the game he is playing.

Which of the following is the BEST tool to create the desired report?

A

dxdiag

The dxdiag tool is Microsoft’s DirectX Diagnostic Tool (Dxdiag.exe). It can be used to view or troubleshoot DirectX-related issues regarding such things as your computer’s display and sound devices. It also provides system information. After running this tool, if you know which area is causing a problem, you can click on the appropriate tab, such as Display 1, Sound 1, or Input. The dxdiag tool can be a valuable tool for determining things like hardware specifications and to help determine whether the video drivers are up to date or need to be updated. This tool also has the ability to create reports.

38
Q

A software vendor has had recurring problems with customers misusing their proprietary software.

Which of the following technologies can give them the MOST control in regulating who, how, and when their software is being used?

A

Persistent license activation

39
Q

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD).

After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up.

Which of the following is the BEST place to begin repairing Wendy’s computer?

A

answer
Correct Answer:

Boot the computer from the Windows installation disc and run Startup Repair.

40
Q

You are comparing methods for securing your mobile device.

Which of the following is the BEST method to secure your device’s storage?

A

Full device encryption

41
Q

Which of the following is the purpose of the Services snap-in?

A

View and manage software programs running in the background.

42
Q

You are troubleshooting a computer that runs Windows 11. The operating system has halted, and a black screen is displayed on the monitor with an error message.

What is the first step you should take to troubleshoot the issue?

A

Search for the error in Microsoft’s knowledge base or by using an internet search engine.

43
Q

Which formatting method is done by the manufacturer to write new sectors and tracks to a hard drive?

A

Low-level formatting

A low-level format writes new sectors and tracks to the drive and is typically done by the manufacturer when the drive is first assembled. When performing a low-level format, the sectors and tracks are recreated, and all empty space is filled with zeroes.