Jason Dion - CompTIA A+ 1002 Exam Prep #1 Flashcards
(90 cards)
Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?
A. Rollback any system updates or changes since yesterday
B. Disable System Restore in Windows
C. Rollback the printer’s device driver in the Device Manager
D. Disable the Windows Update service to prevent future issues
A. Rollback any system updates or changes since yesterday
Your company’s wireless network was recently compromised by an attacker who utilized a brute force attack against the network’s PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur?
A. WPA2 encryption enabled B. Default administrative login credentials C. WPS enabled D. Router with outdated firmware E. TKIP encryption protocols F. Guest network enabled
B. Default administrative login credentials
C. WPS enabled
You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions?
A. Surge suppressor
B. Grounding the server rack
C. Line conditioner
D. Battery backup
C. Line conditioner
D. Battery backup
You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?
A. diskpart list
B. bootrec /fixmbr
C. bootrec /rebuildbcd
D. bootrec /fixboot
D. bootrec /fixboot
Which of the following commands is used on a Linux system to change a file’s permissions or directory on a system?
A. pwd
B. chown
C. passwd
D. chmod
D. chmod
Which version should you use when installing a Linux operating system and are concerned with end-of-life support?
A. Beta release
B. LTS release
C. Developer release
D. Rolling release
B. LTS release
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?
A. SSH
B. TELNET
C. RDP
D. VNC (Virtual Network Computing)
D. VNC (Virtual Network Computing; remote access tool used for sharing on Linux and macOS)
You are working at the service desk and just received the following email from an end-user who believes it is suspicious:
From: user@diontraining.com
To: abuse@diontraining.com
Subject: You won a free iPhone!
You have just won a brand new iPhone!
Just click the following link to provide your address so we can ship it out to you this afternoon: (http:www.freephone.io:8080/winner.php
Thanks!
Jonah Smith
Free Phone Giveaway, LLC
How should you classify this email?
A. Phishing
B. Zero-day
C. Spear phishing
D. Spoofing
A. Phishing
What does the command “shutdown /s” do on a Windows workstation?
A. Reboot the workstation
B. Log off the workstation
C. Enter sleep mode
D. Shutdown the workstation
D. Shutdown the workstation
Which of the following MacOS features is used to manage passwords cached by the OS and is the equivalent of the Credential Manager in Windows?
A. Spotlight
B. Keychain
C. Apple ID
D. Mission Control
B. Keychain
You are troubleshooting a desktop on the corporate network and have verified that it is infected with malware. What is the NEXT action you should perform?
A. Create a System Restore point and perform a full system backup
B. Remediate the infected system by conducting a full disk antivirus scan
C. Reboot to Safe Mode and uninstall the last application that was installed
D. Moving the desktop from the production network to a quarantined VLAN (Virtual Local Area Network)
D. Moving the desktop from the production network to a quarantined VLAN (Virtual Local Area Network)
A user’s personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile file but cannot find it in their profile directory. Which of the following options do you need to configure to see this file?
A. User Accounts
B. Display Settings
C. Internet Options
D. Folder Options
D. Folder Options
Which of the following MacOS features allows the user to search all of the hard drives, network shares, and files for a keyword or phrase?
A. Gesture
B. Spotlight
C. Finder
D. Dock
B. Spotlight
You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?
A. IP (Internet Protocol)
B. PII (Personally Identifiable Information)
C. CUI (Controlled Unclassified Information; federal non-classified information))
D. PHI (Protected Health Information)
D. PHI (Protected Health Information)
Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building’s power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?
A. Uninterruptable power supply
B. Line conditioner
C Surge protector
D. Power distribution unit
A. Uninterruptable power supply
Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA?
A. Username and password
B. Thunbprint and password
C. Thumbprint and retina scan
D. Username and pin
B. Thunbprint and password
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro?
A. Boot Camp
B. Mission Control
C. Terminal
D. Device Manager
A. Boot Camp
The physical security manager has asked you to assist with the risk assessment of some proposed new security measures. The manager is concerned that during a power outage, the server room might be targeted for attack. Luckily, they have many different protection measures in place to keep intruders out of the server room. During a power outage, which of the following security controls would still be usable?
A. Motion detectors
B. Door locks
C. Video surveillance
D. Biometric scanners
B. Door locks
A workstation was patched last night with the latest operating system security update. This morning, the workstation only displays a blank screen. You restart the computer, but the operating system fails to load. What is the NEXT step you should attempt to boot this workstation?
A. Reboot the workstation into safe mode and roll back the recent security update
B. Reboot the workstation into safe mode and disable Windows services/applications
C. Reboot the workstation into the BIOS (Basic Input Output System) and reconfigure boot options
D. Reboot the workstation into safe mode, open RegEdit, and repair the Windows Registry
A. Reboot the workstation into safe mode and roll back the recent security update
Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device?
A. Syslog
B. UTM (Unified Threat Management)
C. IPS (Intrusion Prevention System)
D. IDS (Intrusion Detection System)
B. UTM (Unified Threat Management)
Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company’s executive. Tim quickly checks the MDM (Mobile Device Management) administration tool and identifies that the user’s smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device’s data remains confidential and inaccessible to the thief?
A. Perform a remote wipe of the device
B. Reset the device’s password
C. Identify the IP (Internet Protocol) address of the smartphone
D. Remotely encrypt the device
A. Perform a remote wipe of the device
You have submitted an RFC to install a security patch on all of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?
A. Purpose
B. Scope
C. Plan
D. Risk analysis
C. Plan
A corporate network user contacts the service desk because there is an alert from Windows Defender stating their workstation may be infected with a virus. What action should be performed FIRST to remediate this workstation?
A. Perform a full-disk antivirus scan
B. Backup the workstation
C. Enable System Restore
D. Disconnect the workstation from the network
D. Disconnect the workstation from the network
While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?
A. gpupdate (Group Policy Update)
B. regedit (Registry Editor; Windows)
C. sfc (System File Checker; Windows utility)
D. dxdiag (Direct X Diagnostics utility)
C. sfc (System File Checker; Windows utility)