902 part 1 Flashcards Preview

compton a+ 902 > 902 part 1 > Flashcards

Flashcards in 902 part 1 Deck (50):
1

A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable which of the following FIRST?
A. PXE
B. WOL
C. WiFi
D. UPNP

A. PXE

2

A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands?
A.
extract
B.
diskpart
C.
bootrec
D.
chkdsk

B. diskpart

3

When using Microsoft Windows 8.1 Operating System, which of the following features allows scripts and snippets to run?
A.
One Drive
B.
XP Mode
C.
Power Shell
D.
Windows Firewall

C. Power shell

4

A PC technician notices that the printers deployed via a new Group Policy are not showing up on the workstation. Which of the following commands should be run on the PC?
A.
extract
B.
robocopy
C.
gpupdate
D.
tasklist

C. gpupdate

5

A technician is tasked with installing Windows on numerous network PCs. Which of the following is
the QUICKEST method for getting a standard configuration to the PCs?
A.
Prebuilt image using PXE
B.
Single solid state/flash drive with answer file
C.
Hot swappable image drive
D.
Internal hard drive partition with the image

A. Prebuilt image using PXE

6

A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however, when the laptop lid is closed, it goes into sleep mode. Which of the following Control Panel items can be used to disable this feature?
A.
Action Center
B.
System
C.
Display Settings
D.
Power Options

D. Power Options

7

A technician is remotely connecting to a workstation using SSH to transfer a security hotfix. Which of the following command line tools would the technician use to create a directory to store the hotfix?
A.dir
B.rd
C.cd
D.md

D. md

8

A small office experiences frequent power outages. Upon rebooting the Windows workstations after each power outage, users report the inability to open shared files. Which of the following MUST a technician configure to resolve this issue in the future?
A.
Check the “Reconnect at logon” checkbox for the mapped network drive
B.
Connect all computers in the office to UPS devices
C.
Re-map the mapped network drive with the domain administrator account
D.
Replace the hard drives on the file server hosting the shared files

A. Check the "Reconnect at logon" checkbox for the mapped network drive

9

Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?
A.
Anti-malware updates
B.
Driver updates
C.
Windows updates
D.
Firmware updates

C. Windows updates

10

A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do?
A.
Create a primary partition
B.
Use NTFS
C.
Enable PXE
D.
Install third-party drivers

D. Install third-party drivers

11

A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet Options will allow the user to create those
settings?
A.
Privacy
B.
Advanced
C.
Security
D.
Content

D. Content

12

A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but the computer does not recognize the optical disc. A “non-system disk or disk error” is observed. Which of the following should the technician do FIRST?
A.
Update the motherboard firmware
B.
Check the cables
C.
Replace the optical drive
D.
Check the BIOS setting

D. Check the BIOS setting

13

An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation’s domain. Which of the following utilities will the administrator access to configure this setting?
A.
System Properties
B.
System Information
C.
System Protection
D.
System Management

A. System Properties

14

A technician is attempting to remove malware from a customer’s workstation. Which of the following Control Panel utilities should the technician use?
A.
Folder Options > View hidden files
B.
System > Performance
C.
Display Settings > Refresh rate
D.
Internet Options > Privacy

A. Folder Options > View hidden files

15

Which of the following should be used to ensure that a Windows OS is functioning optimally?
A.
Driver updates
B.
Scheduled backups
C.
Application updates
D.
Restore points

A. Driver updates

16

A technician needs to log into a user's computer to fix the user's corrupt local profile. Which of the following connectivity tools will allow the technician to connect to the user’s computer?
A.
Remote Assistance
B.
Virtual Private Network
C.
Computer Management
D.
Remote Desktop

D. Remote Desktop

17

An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?
A.
Recovery partition
B.
Primary partition
C.
System restore
D.
System refresh

A. Recovery partition

18

A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken?
A.
Map printer
B.
Reboot computer
C.
Check to see if printer is turned on
D.
Log in as a different user and see if printer is mapped

A. Map printer

19

A technician needs to perform a backup while a system is running. Which of the following services allows this task to be accomplished?
A.
Robocopy
B.
Shadow copy
C.
Xcopy
D.
System restore

B. Shadow copy

20

A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this?
A.
Clone the operating system from an image onto optical media.
B.
Use the original software media to load the operation system on every PC.
C.
Set up a central image that the PCs can load from a PXE boot.
D.
Create an image and copy it from a USB drive using an unattended answer file.

C. Set up a central image that the PCs can load from a PXE boot.

21

A technician is navigating through a Windows OS via command prompt. The technician needs to display the content of a folder. Which of the following is the BEST option for accomplishing this task?
A.
dir
B.
ls
C.
rd
D.
cmd

A. dir

22

A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?
A.
SSH
B.
VPN
C.
SFTP
D.
RDP

B. VPN

23

A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change which of the following Internet Options?
A.
Compatibility view
B.
Manage add-ons
C.
Clear browser cache
D.
Pop-up blocker

A. Compatibility view

24

A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO).
A.
View the CMD process in Task Manager
B.
Type EXIT at the command prompt and press Enter
C.
Minimize the CMD box to the taskbar
D.
Click the “x” in the top right of the CMD window
E.
Select Switch User on the PC

B. Type EXIT at the command prompt and press Enter
D. Minimize the CMD box to the taskbar

25

An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map a shared network drive for the user, an “access denied” error is encountered while using the user’s credentials. Which of the following should be the administrator’s NEXT step?
A.
Ensure the user’s account is not locked out
B.
Use the fully qualified domain name of the share
C.
Open the location with administrator privileges
D.
Try mapping with a different drive letter

C. Open the location with administrator privileges

26

Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?
A.
Backup
B.
Recovery Image
C.
chkdsk
D.
System Restore

D. System Restore

27

A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings?
A.
Advanced
B.
Security
C.
Privacy
D.
Connections

A. Advanced

28

Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?
A.
File server
B.
Web server
C.
WINS server
D.
Proxy server

D. Proxy Server

29

Which of the following best practices is used to fix a zero-day vulnerability on Linux?
A.
Scheduled backup
B.
Scheduled disk maintenance
C.
Patch management
D.
Antivirus update

C. patch management

30

Which of the following tools is used to type or paste recovery commands directly into a Linux box?
A.
Shell/terminal
B.
Backup/time machine
C.
Command/cmd
D.
Restore/snapshot

A. Shell/terminal

31

A technician is installing Bluetooth speakers in a conference room. Which of the following will be
the average operating range of the speakers?
A.
10 feet (3 meters)
B.
15 feet (5 meters)
C.
30 feet (9 meters)
D.
45 feet (14 meters)

C. 30 feet(9 meters)

32

A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications?
A.
Microsoft Store
B.
DVD
C.
Google Play
D.
iTunes

A. Microsoft Store

33

A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?
A.
Hybrid
B.
Community
C.
Private
D.
Public

A. Hybrid

34

An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem?
A.
The cable connected to the network
B.
Virtual host network adapter
C.
USB host adapter
D.
The domain of the virtual machine

B. virtual host network adapter

35

A Google account on an Android device by default will synchronize to which of the following locations?
A.
Cloud
B.
SSD
C.
PC desktop
D.
MicroSD

A. Cloud

36

How would a technician install Windows OS on a MAC OS computer without using third-party software?
A.
Terminal
B.
Boot Disk
C.
Disk Utility
D.
Boot Camp

B. Boot Camp

37

A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?

A.
Google Drive
B.
iCloud
C.
One Drive
D.
FTP

C. One Drive

38

Virtual machines provide users with the ability to do which of the following?
A.
Extend 32-bit machines to 64-bits
B.
Share hardware resources
C.
Increase the network download speed
D.
Use less memory in the machine

B. Share hardware resources

39

Which of the following features of a mobile device operates the touch screen?
A.
Gyroscope
B.
Digitizer
C.
Accelerometer
D.
Geotracking

B. Digitizer

40

A technician contacts the network administrator to request a list of all static IP addresses in the
building. Which of the following server roles would the technician MOST likely review to find that information?
A.
DHCP server
B.
DNS server
C.
File server
D.
Proxy server

A. DHCP server

41

A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE).
A. Free/busy
B. Programs
C. Documents
D. Calendar
E. Favorites
F. Social media
G. Contacts

A. Free/Busy
D. Calendar
G. Contacts

42

A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?
A.
The workstation is victim of a denial of service attack.
B.
The username is not authenticating on the network.
C.
The username is not part of the local administrator group.
D.
The administrator has not applied appropriate security patches.

C. The username is not part of the local administrator group

43

A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
A.
VPN
B.
ACL
C.
RDP
D.
DLP

B. ACL

44

An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?
A.
The HIPS device is blocking the messages
B.
The access control list is blocking the messages
C.
The email filter has quarantined the messages
D.
The firewall is blocking the sender’s email address

C. The email filter has quarantined the messages

45

A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?
A.
Enter all passwords they have used in the past
B.
Verify a smart card has been issued
C.
Check the network cable
D.
Reboot the computer

B. Verify a smart card has been issued

46

A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on
it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
A.
Require biometric identification to log into the laptop.
B.
Require multifactor authentication to log into laptop.
C.
Require laptop hard drives to be encrypted.
D.
Require users to change their password at frequent intervals.
E.
Require users to have strong passwords.

C. Require laptop hard drives to be encrypted

47

The type of security threat that uses computers or other networks to accept and pass on viruses is called:
A.
phishing.
B.
botnets.
C.
logic bomb.
D.
man-in-the-middle.

B. botnets

48

Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it
unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which
of the following?
A.
Trojan horse
B.
Spyware
C.
Social engineering
D.
Worms

A. Trojan horse

49

A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?
A.
exFAT
B.
COMPRESSED
C.
EFS
D.
NTFS

C. EFS

50

When securing a mobile device, which of the following types of screen locks is the MOST secure?
A.
Fingerprint lock
B.
Swipe lock
C.
Passcode lock
D.
Face lock

A. fingerprint lock