A+ Core 2 Flashcards
(157 cards)
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?
A. Install to a network drive
B. Install to a USB drive
C. Install to a DVD-RW
D. Install to a security internal_HDD
A. Install to a network drive
A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?
A. Rootkit
B. Keylogger
C. Trojan
D. Ransomware
A. Rootkit
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
A. Guest network
B. TKIP
C. Default login
D. Outdated firmware
E. WPS
F. WEP
C. Default login
F. WEP
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?
A. Open license
B. Personal license
C. Corporate license
D. Enterprise license
A. Open license
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)
A. UPS
B. Server rack
C. PoE phone
D. Desktop printer
E. Modem
F. Patch panel
A. UPS
B. Server rack
An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO)
A. Close applications when tasks are completed.
B. Increase the time to dim the screen automatically
C. Increase the frequency for syncing corporate email
D. Set the smartphone display to maximum brightness
E. Connect to the office WiFi network automatically
F. Disable 802 11ac and use mobile data exclusively
A. Close applications when tasks are completed.
D. Set the smartphone display to maximum brightness
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?
A. Activate real-time protection on both antivirus software programs
B. Uninstall one antivirus software program and install a different one
C. Run OS updates
D. Enable the quarantine feature on both antivirus software programs
E. Remove the user-installed antivirus software
E. Remove the user-installed antivirus software
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.
Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
A. Full device encryption
B. Account lock
C. Multifactor authentication
D. Strong password requirements
C. Multifactor authentication
A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?
A. Enable System Restore and create a restore point so no data is lost
B. Educate the user about how to avoid malware in the future
C. Update the antivirus software and run a full system scan
D. Move the infected system to a lab with no network connectivity
D. Move the infected system to a lab with no network connectivity
A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
A. sudo
B. chmod
C. grep
D. pwd
A. sudo
A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue?
A. PSU alarm
B. Humidity alarm
C. Temperature alarm
D. Motion alarm
C. Temperature alarm
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.
Which of the following should the technician have covered previously as part of the original repair?
A. End-user education
B. Pre-installation environment cleaning
C. Disabling of System Restore
D. Infected system quarantine
A. End-user education
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
A. Time Machine
B. Snapshot
C. System Restore
D. Boot Camp
A. Time Machine
Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar.
She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?
A. There is unauthenticated wireless connectivity
B. She has exceeded the data allowance
C. The phone is only 3G capable
D. It is an unrooted phone
E. The SIM card was not activated
F. A data plan was not purchased
A. There is unauthenticated wireless connectivity
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
A. Access control lists
B. Multifactor authentication
C. Organizational unit
D. Trusted software sources
E. Data loss prevention
F. Pre-shared key
B. Multifactor authentication
D. Trusted software sources
Which of the following BEST describes the Guest account on a Windows system?
A. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system.
B. This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software.
C. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones
D. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.
B. This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software.
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
A. 2GB
B. 4GB
C. 8GB
D. 16GB
B. 4GB
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
A. SSO
B. Permission propagation
C. Inheritance
D. MFA
A. SSO
Joe, an end user, has been prompted to provide his username and password to access the payroll system.
Which of the following authentication methods is being requested?
A. Single-factor
B. Multifactor
C. RADIUS
D. TACACS
A. Single-factor
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)
A. Remove applications from startup
B. Defragment the hard drive
C. Install additional RAM
D. Install a faster hard drive
E. End the processes in Task Manager
F. Run the Disk Cleanup utility
A. Remove applications from startup
B. Defragment the hard drive
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed?
A. NTLDR not found
B. No boot device available
C. Operating system not found
D. BIOS ROM checksum error
B. No boot device available
A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?
A. Reset the device’s network settings
B. Check the data usage statistics on the device
C. Verify the SSID with which the device is associated
D. Run any pending application or OS updates
C. Verify the SSID with which the device is associated
Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.
Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)
A. Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop
B. Verify Ann’s laptop has the correct browser settings
C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website
D. Attempt to log on to another vendor’s website from Ann’s laptop
E. Ask Ann about the notification and review the installed programs
F. Reinstall the browser, reboot the laptop, and check the vendor’s website again
C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website
E. Ask Ann about the notification and review the installed programs
Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe’s slow data speeds?
A. Joe’s data transmission is over the limit
B. The phone needs to be rebooted from overuse
C. The use of GPS interferes with data speeds
D. There is unintended Bluetooth pairing
A. Joe’s data transmission is over the limit