CompTIA A+ Core 2 Practice Test Flashcards
Over the day, a user’s computer becomes slow. Then pop-ups start to appear randomly. Later on, the pop-ups become more frequent, and the user notices that internet searchers are using Google when their default search provider is in Firefox. Once the computer starts crashing repeatedly, the user calls for help. Considering all of these data points, what is the best diagnosis of the problem?
All of the symptoms listed in this scenario are common to adware and spyware. Another symptom is redirection, where a user tries to open one page but gets sent to another.
Ransomware
The goal of ransomware is extortion. Ransomware encrypts files to shut down access to data until payment is made.
DNS server is corrupted and is mapping domain names to the wrong IP addresses.
A DNS server mapping domain names to the wrong IP addresses is an example of a redirection attack, where a user is redirected to a malicious site. It does not generate the other symptoms.
HOSTS file is corrupted and is mapping domain names to the wrong IP addresses.
HOSTS is a legacy means of mapping domain names and IP addresses. If corrupted and incorrectly mapped, it is a redirection attack, and the other symptoms do not occur.
A server administrator wants to run the latest technologies. What technology should the administrator start using which will replace the New Technology File System (NTFS)?
Resilient File System (ReFS) is being developed to replace NTFS. ReFS is only available for Pro for Workstations and Enterprise editions and cannot currently be used for the boot volume.
ext3
Most Linux distributions use some version of the extended (ext) file system to format partitions on mass storage devices. ext3 is a 64-bit file system with journaling support.
APFS
Where Windows uses NTFS and Linux typically uses ext3 or ext4, Apple Mac workstations and laptops use the proprietary Apple File System (APFS).
exFAT
exFAT is a 64-bit version of FAT designed for use with removable hard drives and flash media.
What uses domain names of components loading on the web page against a vast blacklist?
Ad blockers use more sophisticated techniques to prevent displaying anything that does not seem to be part of the site’s main content or functionality.
Clearing browsing data
Clearing browsing data options are used to delete browsing history. The user can have the browser do this automatically or do it manually.
Private browsing mode
Private browsing mode disables the caching features of the browser so that no cookies, browsing history, form fields, passwords, or temp files will be stored when the session is closed.
Browser sign-in
Browser sign-in allows the user to synchronize settings between instances of the browser software on different devices.
A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?
Electrical fire safety ensures that equipment is properly stored and away from any flammable material and electrical wires do not start a fire.
Equipment grounding
Electrical equipment must be grounded. The power plug connects devices such as PCs and printers to the building ground.
Proper power handling
Proper power handling is done with the correct training. PC power supply units can carry dangerously high levels of voltage. Disconnection of power should be done before repairing a PC.
Fuse
An electrical device has a fuse appropriate to its maximum current. If the current increases past the fuse capacity, the fuse will blow. However, if the fuse fitted is rated too low, the fuse will blow too easily.
What type of data breach can be associated with a specific person or use an anonymized or de-identified data set for analysis and research?
Healthcare data refers to medical and insurance records plus associated hospital and laboratory test results.
Personal government-issued information
Personal government-issued information is issued to individuals by federal or state governments. Personal information may be social security numbers, passports, driving licenses, and birth/marriage certificates.
PII
Personally identifiable information (PII) is data that can be used to identify, contact, locate an individual or, in the case of identity theft, impersonate that individual.
Open-source license
The open-source license makes it free to use, modify, and share and makes the program code used to design it available.
An analyst is a method that calculates a product of the likelihood and impact of the potential threat category. What is this method?
Risk levels are included in the risk assignment that could be expressed as a discrete value or as a traffic light-type of indicator, where red is high, orange is moderate risk, and green is minimal risk.
Sandbox testing
Sandbox testing is a computing environment designed to replicate the production environment but isolated from it.
Rollback plan
A rollback plan is when a change can be reversed if it has harmful or unforeseen consequences.
End-user acceptance
End-user acceptance must be accounted for when a change of plan is implemented. It can be difficult for people to adapt to new processes and easy for them to magnify minor problems into major complaints.