CompTIA A+ 220-1001 & 1002 Flashcards

1
Q

A virus on a computer running Microsoft Windows 7 has altered the master boot record (MBR) and the computer will no longer boot. Before you can review the virus, you must FIRST repair the MBR so the computer will be able to BOOT
What utilities should you use to repair the MBR

A

Startup Repair

Bootrec.see

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A customer is concerned that personal data has been leaked from their mobile phone. They suspect this exposure has been hindering their device for a significant amount of time.

After completing a full malware scan, the system did not return any positive findings relating to or identifying any malware found as a result of the malware hidden within the systems files installed somewhere on the system.

Moving forward the client is requesting to secure any Data Leaks as soon as possible

A

Perform a Hard ReSet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Users complain that they cannot connect with any Internet websites. They can connect with a web server deployed in the local perimeter network
Technicians verify the problem by attempting to ping a known good site by URL, and the attempt files. They get the same result from multiple network client computers.
What should technicians attempt next ?

A

Ping an Internet site by Ip Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Customer bring in a PC for a repair, the customer complains about problems trying to print. Customer also brings in an external hard disk with 2 backups, one made 2 weeks ago, while the other immediately before the computer was brought into the shop for repair (today/that day)

You remove the virus. Determine the printer device has been overwritten and you suspect other alternate device drivers have also been overwritten as well. In order to repair the system as quickly as possible with minimum data loss

A

SFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An androids smartphones screen responds inaccurately to touch

A

Power off and back on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user of a computer running OS X wants the Safari browser on all his devices to remember his usernames and password! With credit card numbers as well how should they enable this /these features on ALL their DEVICES

A

Enable iCloud Keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Time Machine is a backup App
When you attach an external drive and indicate that it should be used as a backup,OS X performs a full backup and then backs up changes files hourly. You can also use Time Machine with network drives

A

Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your antivirus program identifies an infected files on a computer running Windows 8.1 but cannot remove it because it is already in use

You need to remove the infected file how do you proceed

A

Boot in Safe Mode and run the virus scan again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enterprise network has several locations spread across multiple different countries. Company reviews it’s disaster prevention policy and determines that it is advisable to update its backup policies, specifically backup storage locations

Company compares options for Local vs. Cloud Based Backup Solutions.

A

The storage solution can scale rapidly in response to changing requirements

Backup files are readily available form nearly any location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to write a batch file that can be scheduled for execution or run on an as-needed-basis. The batch file needs to backup a computer running Microsoft Windows Server 2012 R2 and the perform prevent disk maintenance, which command do you use to backup computer

A

Wbadmin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Maximum number of physical RAM supported by 32-bit installation of Windows 7 Pro

A

4 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Windows 7 Starter is limited to no more than

A

2 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Limit for 64 bit versions of Windows varies by edition. It is limited to _____ for Windows 7 Home Basic, _____ for Windows 7 Home Premium, and _______for Windows 7 Pro, Enterprise, and Ultimate

A

8GB
16GB
192GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a role of a software token on a computer and network security

A

As part of two factor authentication system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication is based on
What you know - Such as __________
What you have -Such as _____________
What you are - Such as __________________

A

Password
Security Token
Fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Setting up a Laptop running Windows 8.1 used primarily for on the road type business. Customer should have ability to store username and password info to make it easier to long onto company platform and to technical references sites. Both use KERBEROS Authentication. Customer needs to know where to enter information

A

Windows CardSpace

Credential Manager

17
Q

Tech wants to copy the contents of a fixed hard disk to a removable hard disk for backup

Which command can copy all files, directories, and subdirectory’s to another disk all at once .

A

XCopy

18
Q

Chrome OS is optimized for use of web applications

True/False

A

True

19
Q

Developed as a supplement to the A droid operating system rather than replacement. More recently the trend is to merge features of both into Android

A

Chrome OS

20
Q

SSH

A

Secured Shell provides. Command prompt connected to a remote device, Public key authentication is used for sever authentication, and all traffic with the remote device encrypted, so it provide a secure connection

21
Q

Provides remote command shell, but it does NOT support a secure connection . All communication is in plain text

A

Telnet

22
Q

What is CMD

A

CMD is used to open local command prompt on a computer running Windows, not a remote command prompt, and does not run on Linux

23
Q

What is RDP

A

Remote Desktop Protocol
Is not used to provide a command prompt. Developed by Microsoft to support remote desktop and input capabilities with computers configured to allow remote desktop connections

24
Q

Hitch operating systems are OPEN SOURCE

A

Linux and Android

25
Q

After running malware scan, scan returns ZERO RESULTS, however customer wants data leak to end now, what do you do next

A

Perform a Hard Reset

26
Q

Usually runs in the background and tries to avoid being noticed or detected. Gathers information about users activity on the computer, usually focusing on their internet activity, and may even send user info to a third party or make your computer a target if unsolicited marketing

A

Spyware

27
Q

Attempt to make one thing look like an another. For example a hacker might configure a computer with a computer name and an IP Address that is valid on users network in an attempt to gain entry to network.

A

Spoofing

28
Q

aka Bot, a computer that a hacker has taken control of and at some level and can use the computer for his own purposes. For example a hacker might attempt to infect several computers and then use them in a coordinated attack against a website or a company’s network

A

Zombie Attack

29
Q

Which version of Windows did not include the back up and restore utility

A

Windows 8.1

30
Q

Due to which of the following message conveyed a loss of occur on a system

A

Accidental deletion

Virus attack

31
Q

Which of the following can be an outcome of a malware attack

A

Application crash
System slow down
System lock up

32
Q

Which of the following can be including a set of security standards in organization

A

Specific operating system and updates
A set of security policies
A specific set of applications

33
Q

Which type of ransom ware generates pop-ups and demands ransom from the user but doesn’t actually pose a real race to their data

A

Scareware