Jason Dion - CompTIA A+ 1002 Exam Prep #2 Flashcards

1
Q

Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?

A. Asset ID
B. Location
C. MAC address
D. IP address

A

A. Asset ID

The asset ID should be used to uniquely identify each piece of hardware tracked in an asset management database. An asset management database can be configured to store as much or as little information as is deemed necessary. Typical data would be type, model, serial number, asset ID, location, user(s), value, and service information. Tangible assets can be identified using an identification number, barcode label, or Radio Frequency ID (RFID) tag attached to the device. An RFID tag is a chip programmed with asset data. When in range of a scanner, the chip powers up and signals the scanner. The scanner alerts management software to update the device’s location. As well as asset tracking, this allows the management software to track the device’s location, making theft more difficult. An IP address is a logical identifier, but it is frequently changed when using a network with DHCP and cannot be used to reliably identify a piece of hardware. The location of a device is not a unique way of identifying an asset since many pieces of hardware may be located in the space location. Additionally, virtual machines cannot easily be tracked using their physical location. This MAC address is used to identify every device on the local area network uniquely if an Asset ID is not available, but would not be useful when trying to identify monitors since they do not use a MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use?

A. .py
B. .bat
C. .sh
D. .ps1

A

D. .ps1

Windows PowerShell enables you to perform management and administrative tasks in Windows 7 and later. It is fully integrated with the operating system and supports both remote execution and scripting. Microsoft provides the Windows PowerShell Integrated Scripting Environment (ISE) to help create and manage your Windows PowerShell scripts. If you want to save a series of PowerShell commands in a file to rerun them later, you effectively create a PowerShell script by creating a text file with a .ps1 extension. The file can contain a series of PowerShell commands, with each command appearing on a separate line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup?

A. Update the operating system
B. Restore from backup
C. Run chkdsk on the system
D. Reboot into Safe Mode and see if the service starts

A

D. Reboot into Safe Mode and see if the service starts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which THREE of the following actions should you perform to increase the wireless network’s security?

A. Reduce the transmission power
B. Reduce the channel availability
C. Enable WPA3 encryption
D. Enable WEP encryption
E. Disable the SSID broadcast
F. Disable the DHCP server
A

A. Reduce the transmission power
C. Enable WPA3 encryption
E. Disable the SSID broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user’s computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?

A. Answer the phone and politely ask the user to call back later
B. Answer the phone, put the user on hold, and help them after their scheduled break
C. Troubleshoot the issue for the user regardless of how long it takes
D. Ask another Tier 2 technician to answer the call since it will take too long to solve

A

D. Ask another Tier 2 technician to answer the call since it will take too long to solve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are troubleshooting a network printer when a document is printed with sensitive employee data on it. Which of the following actions should you take?

A. Take the document to the office manager
B. Continue to troubleshoot the printer
C. Leave the document in the output tray
D. Remove the document and shred it

A

A. Take the document to the office manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

A. WEP
B. WPA2
C. WPS
D. RADIUS

A

D. RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is used to communicate data and preferences to child processes within a script or batch file?

A. Constants
B. Comments
C. Environmental variables
D. Variables

A

C. Environmental variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the command “shutdown /l” do on a Windows workstation?

A. Enter sleep mode
B. Reboot the workstation
C. Shutdown the workstation
D. Log off the workstation

A

D. Log off the workstation

The shutdown command allows a user or administrator to shut down or restart local or remote computers, one at a time. Using the /r option will reboot the computer. Using the /s option will shut down the computer. Using the /l option will log off the current user. Using the /h option will enter sleep or hibernation mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following file types are commonly used by scripts in a Linux command line environment?

A. .ps1
B. .js
C. .sh
D. .vbs

A

C. .sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nicole’s smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is in her apartment building. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?

A. Reset the smartphone’s wireless network settings
B. Verify the smartphone has adequate signal strength
C. Update the smartphone’s applications or OS
D. Reset the data usage statistics on the smartphone

A

B. Verify the smartphone has adequate signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your smartphone just displayed a notification stating that a new pair of headphones has connected to your device. Which of the following threats is this an example of?

A. Unintended Bluetooth pairing
B. Unauthorized microphone activation
C. Unauthorized location tracking
D. Unauthorized account access

A

A. Unintended Bluetooth pairing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

A. .js
B. .py
C. .bat
D. .sh

A

C. .bat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which command-line tool is used on a Unix/Linux system to move upward on a directory in the system’s directory structure?

A. cd ..
B. cd .
C. dir
D. ls

A

A. cd ..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following commands is used on a Linux system to run a program with another user’s permissions?

A. sudo
B. chown
C. grep
D. passwd

A

A. sudo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What anti-malware solution is installed as a dedicated on-premise appliance to scan all incoming traffic and prevent malware from being installed on any of your clients without requiring the installation of any software on your clients?

A. Network-based anti-malware
B. Cloud-based anti-malware
C. Host-based anti-malware
D. Signature-based anti-malware

A

A. Network-based anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of several settings: Email (never), Maps (always), Calender (while using), Messages (while using), Photos (never), App Store (while using), Bank (while using), and Weather (while using). Based on the information provided, what should be changed to resolve this client’s problem?

A. Change the Weather setting to always
B. Change the Email setting to while using
C. Change the App Store to never
D. Change the Maps setting to while using

A

D. Change the Maps setting to while using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won’t turn on. He excitedly tells you that he needs the smartphone working again “right now” and cannot wait. What should you do?

A. Explain to the customer that the repairs may take several days
B. Post about the experience on Facebook after the customer leaves
C. Tell the customer to calm down because it is just a phone
D. Offer the customer the option to replace his phone

A

D. Offer the customer the option to replace his phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following file types are commonly used by scripts in a web page?

A. .js
B. .vbs
C. .ps1
D. .sh

A

A. .js

JavaScript is a scripting language that is designed to create interactive web-based content and web apps. The scripts are executed automatically by placing the script in the HTML code for a web page so that when the HTML code for the page loads, the script is run. JavaScript is stored in a .js file or as part of an HTML file. VBScript is a scripting language based on Microsoft’s Visual Basic programming language. Network administrators often use VBScript to perform repetitive administrative tasks. With VBScript, you can run your scripts from either the command-line or the Windows graphical interface. Scripts that you write must be run within a host environment. Windows 10 provides Internet Explorer, IIS, and Windows Script Host (WSH) for this purpose. Windows PowerShell enables you to perform management and administrative tasks in Windows 7 and later. It is fully integrated with the operating system and supports both remote execution and scripting. Microsoft provides the Windows PowerShell Integrated Scripting Environment (ISE) to help create and manage your Windows PowerShell scripts. If you want to save a series of PowerShell commands in a file to rerun them later, you effectively create a PowerShell script by creating a text file with a .ps1 extension. The file can contain a series of PowerShell commands, with each command appearing on a separate line. A shell script is a file that contains a list of commands to be read and executed by the shell in Linux and macOS. A .sh file is used for a shell script and its first line always begins with #!/bin/bash that designates the interpreter. This line instructs the operating system to execute the script. Shell scripts allow you to perform various functions. These functions include automation of commands and tasks of system administration and troubleshooting, creating simple applications, and manipulating text or files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?

A. Group Policy
B. Home Folder
C. Security Groups
D. Credential Manager

A

C. Security Groups

A security group is a collection of user accounts that can be assigned permissions in the same way as a single user object. Security groups are used when assigning permissions and rights, as it is more efficient to assign permissions to a group than to assign them individually to each user. You can assign permissions to a user simply by adding the user to the appropriate group. In most corporate environments, security groups control access to share drives, mailing lists, and other network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When Jason needs to log in to his bank, he must use a key fob to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?

A. Biometric lock
B. PIV card
C. Hardware token
D. Smart card

A

C. Hardware token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?

A. xcopy
B. copy
C. robocopy
D. cp

A

C. robocopy

The robocopy tool is used to mirror or synchronize directories and their contents. Robocopy will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn’t waste time copying unchanged files. The xcopy tool, on the other hand, copies all of the files from one directory to another. To meet your boss’s requirements to synchronize the two hard drive’s contents, you must use robocopy since it will also remove files from the second drive that were removed from the first drive, too. The copy command is used to copy one or more files from one location to another. The copy command cannot copy files that are 0 bytes long or for copying all of a directory’s files and subdirectories. The cp command is used in Linux to copy one or more files and directories from one location to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You have just installed a second monitor for a bookkeeper’s workstation so they can stretch their spreadsheets across both monitors. This would essentially let them use the two monitors as one combined larger monitor. Which of the following settings should you configure?

A. Refresh rate
B. Extended mode
C. Color depth
D. Resolution

A

B. Extended mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following Windows 10 system utilities would be used to test the functionality of the DirectX subsystem for video and sound-related problems?

A. taskchd
B. msinfo32
C. eventvwr
D. dxdiag

A

D. dxdiag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An employee at Dion Training complains that their smartphone is broken. They state that it cannot connect to the internet, nor can it make or receive phone calls and text messages. You ask them to start up the music player on his phone, and it opens without any issues. It appears the common issue has to do with the device’s network connectivity. Which of the following is MOST likely the problem with this smartphone?

A. The Bluetooth connection is disabled
B. Airplane mode is enabled on the device
C. The cellular radio in it is broken
D. The VPN password was entered incorrectly

A

B. Airplane mode is enabled on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. A request for change (RFC) is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval?

A. Update the asset management database with the new router’s asset ID
B. Extend the maintenance windows from 1 hour to 8 hours
C. Configure a secondary route during the maintenance window
D. Document a backout plan if the update is not successful

A

D. Document a backout plan if the update is not successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A user is complaining that when they attempt to access Google’s homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?

A. Remove any proxy servers configured in their web browser
B. Download the latest security updates for Windows
C. Verify the user’s date and timezone are correctly listed in Windows
D. Disable the Windows Firewall

A

A. Remove any proxy servers configured in their web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You have been asked to classify a hospital’s medical records as a form of regulated data. Which of the following would BEST classify this type of data?

A. PII
B. PHI
C. PCI
D. GDPR

A

B. PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You need to move a 75-pound box with a rack-mounted UPS in it. Which of the following actions should you take?

A. Open the box and carry up the UPS in pieces
B. Ask a coworker to team lift it with you
C. Life with your legs and not your back
D. Lift with your back and not your legs

A

B. Ask a coworker to team lift it with you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?

A. Under-voltage event
B. Power spikes
C. Power failure
D. Power surge

A

D. Power surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which command-line tool is used on a Linux system to display a list of the files and directories within the current path?

A. ls
B. chkdsk
C. sfc
D. pwd

A

A. ls

The ls command lists the files or directories in the current path on a Linux system. When invoked without any arguments, ls lists the files in the current working directory. The pwd command displays the present working directory (current directory) path to the terminal or display. If you are working on a Linux system and are unsure of where you are in the directory structure, type “pwd” and hit enter to display the path to the screen. The chkdsk command is used to check the file system and file system metadata of a volume for logical and physical errors. The system file checker (SFC) command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company’s web servers. Which of the following is the MOST likely cause of the issue?

A. Session hijacking
B. Evil twin
C. ARP spoofing
D. Distributed DoS (Denial of Service)

A

D. Distributed DoS (Denial of Service)

A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to the Internet. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network. Session hijacking, also known as TCP session hijacking, is a method of taking over a web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. An evil twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A user contacts the service desk after they just finished attempting to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?

A. Setup
B. System log
C. Application log
D. Security log

A

A. Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which version of Windows supports Virtual Desktops?

A. Windows 8
B. Windows 8.1
C. Windows 7
D. Windows 10

A

D. Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following types of software CANNOT be updated via the Windows Update program?

A. Critical fixes
B. Firmware updates
C. Driver updates
D. Security patches

A

B. Firmware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You are troubleshooting an issue with a Windows desktop and need to display the machine’s active TCP connections. Which of the following commands should you use?

A. net use
B. ping
C. netstat
D. ipconfig

A

C. netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A user’s workstation is infected with malware. You have quarantined it from the network. When you attempt to boot it to the Windows 10 desktop, it fails. Which of the following should you do NEXT to begin remediating this system?

A. Restart into Safe Mode and conduct an antivirus scan
B. Disable System Restore and reinstall Windows 10
C. Format the workstation and reinstall Windows 10
D. Restore the workstation from the last system restore point

A

A. Restart into Safe Mode and conduct an antivirus scan

38
Q

Dion Training has set up a lab consisting of 12 laptops for students to use outside of normal classroom hours. The instructor is worried that a student may try to steal one of the laptops. Which of the following physical security measures should be used to ensure the laptop is not stolen or moved out of the lab environment?

A. Key fob
B. USB lock
C. Biometric locks
D. Cable locks

A

D. Cable locks

39
Q

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

A. Clear the browser’s cookies and history, enable the pop-up blocker, and scan the system for malware
B. Quarantine the machine and report it as infected to you company’s cybersecurity department for investigation
C. Document the pop-ups displayed and take a screenshot
D. Reinstall or reimage the operating system

A

A. Clear the browser’s cookies and history, enable the pop-up blocker, and scan the system for malware

40
Q

Which of the following is categorized as an APIPA address?

A. 192.168.1.123
B. 172.30.15.12
C. 169.254.12.64
D. 8.8.8.8

A

C. 169.254.12.64

41
Q

Which of the following is required for evidence to be admissible in a court of law?

A. Right to audit
B. Order of volatility
C. Legal hold
D. Chain of custody

A

D. Chain of custody

42
Q

A company owns four kiosks that are near a shopping center. The owner is concerned about someone accessing the Internet via the kiosk’s wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk?

A. Host-based antivirus
B. Web filtering
C. MAC filtering
D. Firewall

A

C. MAC filtering

43
Q

You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company’s workstations had their files encrypted. You are worried about the rest of the network’s workstations. What should you do FIRST?

A. Update the antimalware scanner’s signatures on all workstations
B. Perform a full disk antimalware scan on the affected workstations
C. Format the affected workstation’s hard drives and reinstall Windows
D. Immediately quarantine the affected workstations

A

D. Immediately quarantine the affected workstations

44
Q

You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation?

A. format
B. ipconfig
C. chkdsk
D. diskpart

A

C. chkdsk

45
Q

A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer’s file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?

A. Perform a data wipe operation on the USB thumb drive before its next use
B. Manually update the antivirus on the workstation and set it to perform on-access scans
C. Disable System Restore and remove the previous restore points
D. Connect the workstation to the Internet to receive the latest Windows XP patches

A

B. Manually update the antivirus on the workstation and set it to perform on-access scans

46
Q

A small business recently experienced a catastrophic data loss due to flooding from a recent hurricane. The customer had no backups, and flooding destroyed all of the hardware associated with the small business. As part of the rebuilding process, the small business contracts with your company to help create a disaster recovery plan to ensure this never reoccurs again. Which of the following recommendations should you include as part of the disaster recovery plan?

A. Purchase waterproof devices to prevent data loss
B. Local backups should be conducted
C. Backups should be conducted to a cloud-based storage solution
D. Local backups should be verified weekly to ensure no data loss occurs

A

C. Backups should be conducted to a cloud-based storage solution

47
Q

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

A. HOTP (HMAC-based one-time password)
B. Smart cards
C. Proximity cards
D. TOTP (Time-based one-time password)

A

C. Proximity cards

48
Q

Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers?

A. Cross-cut shredder
B. Micro-cut shredder
C. Strip-cut shredder
D. Recycling bin

A

B. Micro-cut shredder

49
Q

Your company’s Security Operations Center (SOC) is currently detecting an ongoing DDoS attack against your network’s file server. A cybersecurity analyst has identified forty internal workstations on the network conducting the attack against your network’s file server. The cybersecurity analyst believes these internal workstations are infected with malware and places them into a quarantined network area. The analyst then submits a service desk ticket to have the workstations scanned and cleaned of the infection. What type of malware was the workstation likely a victim of based on the scenario provided?

A. Botnet
B. Spyware
C. Rootkit
D. Ransomware

A

A. Botnet

50
Q

Which of the following is the LEAST secure wireless security and encryption protocol?

A. WPA
B. WPA3
C. WEP
D. WPA2

A

C. WEP

51
Q

Which command is used in the Linux terminal to change the permissions of a file?

A. sudo
B. chmod
C. pwd
D. chown

A

B. chmod

The chmod command sets the permissions of files or directories on a Linux system. A set of flags associated with each file determines who can access that file and how they can access it. These flags are called file permissions or modes. The command name chmod stands for change mode and it restricts the way a file can be accessed. The chown command is used to change the owner of the file, directory, or link in Linux. The pwd command displays the present working directory (current directory) path to the terminal or display. If you are working on a Linux system and are unsure of where you are in the directory structure, type “pwd” and hit enter to display the path to the screen. The sudo command allows programs to be executed as a superuser (known as the root user) or another user. The command’s name is an abbreviation of the phrase “superuser do” and works on all Unix-based operating systems.

52
Q

Samuel’s computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?

A. Perform a Disk Cleanup
B. Replace the hard drive with a SSD
C. Remove unnecessary applications from startup
D. Install additional RAM
E. Defragment the hard drive
F. Terminate process in the Task Manager
A

C. Remove unnecessary applications from startup

E. Defragment the hard drive

53
Q

You are troubleshooting a computer that plays a loud chime noise every day at 3 pm. Which of the following tools should you use to troubleshoot this workstation?

A. Task scheduler
B. Msconfig
C. Performance monitor
D. Device manager

A

A. Task scheduler

54
Q

Which file system type is used to mount remote storage devices on a Linux system?

A. APFS (Apple file system)
B. NFS (Network File System)
C. NTFS (NT file system)
D. exFAT (extensible file allocation table)

A

B. NFS (Network File System)

55
Q

Dion Training’s offices are frequently experiencing under-voltage events, sags, and power failures. Which of the following solutions would protect their servers from these issues?

A. Surge suppressor
B. Line conditioner
C. Uninterruptable power supply
D. Diesel generator

A

C. Uninterruptable power supply

56
Q

You have been asked to install a computer in a public workspace. Only an authorized user should use the computer. Which of the following security requirements should you implement to prevent unauthorized users from accessing the network with this computer?

A. Require authentication on wake-up
B. Remove the guest account from the administrator group
C. Disable single sign-on
D. Issue the same strong and complex password for all users

A

A. Require authentication on wake-up

57
Q

Your company wants to ensure that users cannot access USB mass storage devices. You have conducted some research online and found that if you modify the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor key, it will prevent USB storage devices from being used. Which of the following tools should you use to modify this key?

A. MSConfig (Microsoft configuration utility)
B. RegEdit (registry editor)
C. MMC (Microsoft management console)
D. RDS (Remote desktop services)

A

B. RegEdit (registry editor)

58
Q

Which type of installation would require an answer file to install the operating system?

A. Clean
B. Upgrade
C. Repair
D. Unattended

A

D. Unattended

59
Q

You are trying to copy a 4.7 GB file from your Windows laptop to an external hard drive using USB 3. The external hard drive is formatted with FAT32. Every time you attempt this copy, you receive an error. What is MOST likely the issue?

A. The external hard drive must be formatted as APFS to support this transfer
B. The laptop must be reformatted as FAT32 to support this transfer
C. Files over 4 GB cannot be stored on a FAT32 formatted drive
D. USB 3 is too slow to transfer a file this large

A

C. Files over 4 GB cannot be stored on a FAT32 formatted drive

60
Q

An attacker is using a precomputed table of values to attempt to crack your Windows password. What type of password attack is this?

A. Hybrid
B. Brute-force
C. Dictionary
D. Rainbow table

A

D. Rainbow table

A rainbow table is a tool for speeding up attacks against Windows passwords by precomputing possible hashes. A rainbow table is used to authenticate users by comparing the hash value of the entered password against the one stored in the rainbow table. Using a rainbow table makes password cracking a lot faster and easier for an attacker. A dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary. A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. A hybrid attack combines a dictionary list with the ability to add brute-force combinations to crack a password that is slightly different than the dictionary list entry.

61
Q

Which of the following should you use to remove any usernames and passwords that you no longer wish to store in Windows 10?

A. Credential manager
B. Device manager
C. Internet options
D. Keychain

A

A. Credential manager

62
Q

Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, an error of “Access denied” is received. What security issue is MOST likely occurring?

A. Rogue anti-virus
B. Renamed system files
C. Disappearing files
D. File permission change

A

D. File permission change

63
Q

You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?

A. Failed DNS resolution
B. Duplicate IP address
C. DHCP failure
D. Poisoned ARP cache

A

C. DHCP failure

64
Q

Mark’s laptop is running Windows 10 and appears to become slower and slower over time with use. You decide to check the current CPU utilization and observe that it remains in the 95% to 100% range fairly consistently. You close three of Mark’s open applications and recheck the CPU utilization. You notice the utilization dropped to the 30% to 35% range. A week later, Mark calls you again and says the computer is extremely slow. Which of the following tools can you use to check the CPU utilization and manage any high-resource processes?

A. MCsconfig
B. Task Manager
C. RDS
D. PerfMon

A

B. Task Manager

65
Q

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST during troubleshooting?

A. WAP SSID
B. Encryption type
C. Bandwidth saturation
D. WAP placement

A

D. WAP placement

66
Q

Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. Which type of malware might her computer be infected with?

A. Logic bomb
B. Trojan
C. Adware
D. Worm

A

B. Trojan

67
Q

You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user’s workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You noticed that the systems all received a security patch and other updates from the Microsoft Endpoint Configuration Management (MECM) server last night. Which of the following actions should you take to resolve this issue?

A. Reboot the system into Safe Mode and allow the user to continue their work
B. Rollback the video card driver and wait for a new driver to be released
C. Use SFC to ensure all system files are correct and not corrupted
D. Disable the DirectX service in services.msc

A

B. Rollback the video card driver and wait for a new driver to be released

68
Q

An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing?

A. ARP spoofing
B. DoS
C. Phishing
D. Bluejacking

A

B. DoS

69
Q

Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?

A. Repair installation
B. Unattended installation
C. Remote network installation
D. In-place upgrade

A

B. Unattended installation

70
Q

Which of the following commands is used on a Linux system to display the current working directory’s full pathname to the screen?

A. passwd
B. chown
C. chmod
D. pwd

A

D. pwd

71
Q
What is the name of a program that monitors user activity and sends that information to someone else?
A. Rootkit
B. Virus
C. Keylogger
D. Spyware
A

D. Spyware

72
Q

Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring?

A. 25
B. 23
C. 110
D. 443

A

B. 23

73
Q

Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?

A. GDPR (General Data Protection Regulation)
B. PHI (Protected health information)
C. PCI-DSS (Payment Card Industry Data Security Standard)
D. PII (Personally identifiable information)

A

C. PCI-DSS (Payment Card Industry Data Security Standard)

74
Q

You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the scope of work and change request before its approval?

A. Risk analysis
B. Plan for change
C. End-user acceptance
D. Rollback plan

A

D. Rollback plan

75
Q

Which of the following types of screen locks uses a biometric authentication system to prevent access to a mobile device?

A. TouchID
B. Passcode
C. Pattern lock
D. Swipe

A

A. TouchID

76
Q

A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files?

A. sfc (system file checker)
B. gpupdate
C. xcopy
D. chkdsk

A

A. sfc (system file checker)

77
Q

Which of the following should you use to configure a network adapter’s duplex setting manually in Windows 10?

A. Device Manager
B. Internet Options
C. System
D. Windows Defender Firewall

A

A. Device Manager

78
Q

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?

A. TELNET
B. VNC
C. SSH
D. RDP

A

D. RDP

79
Q

A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?

A. The battery is depleted
B. The smartphone is infected with malware and is using a lot of processing power
C. The charging port is faulty
D. The touchscreen is faulty

A

B. The smartphone is infected with malware and is using a lot of processing power

80
Q

A user’s workstation is opening up browser windows without any action from the user. A technician attempts to troubleshoot the workstation, but the machine is extremely slow when in use. Which of the following actions should the technician perform?

A. Enable the pop-up blocker in the web browser
B. Perform an anti-malware scan of the workstation
C. Format and reinstall the operating system
D. Update the Windows operating system

A

B. Perform an anti-malware scan of the workstation

81
Q

Jason is out of town on a business trip and needs to access the share drive on his company’s corporate network. Which of the following types of network connections should he use to access the share drive from his hotel room?

A. VPN
B. Dial-up
C. Wired
D. Wireless

A

A. VPN

82
Q

Which command-line tool could you use on a Windows system to enable an inactive administrator account?

A. gpresult
B. net user
C. robocopy
D. taskkill

A

B. net user

83
Q

Jason’s company issued him an old 2018 laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company’s internal servers, email, or share drive files. The Windows 10 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company’s headquarters, the company will provide him with a new laptop due to the broken screen. Until then, he is working out of his hotel room during a 45-day business trip and needs to continue using this laptop. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

A. Purchase a new laptop as the cost to repair might be more than a new laptop
B. Replace the display and contact the manufacturer for reimbursement
C. Sell him an external 15” tablet/monitor to connect to the laptop as a workaround
D. Replace the display and charge him for the parts/installation

A

C. Sell him an external 15” tablet/monitor to connect to the laptop as a workaround

84
Q

A cybersecurity analyst notices that an attacker is trying to crack the WPS pin associated with a wireless printer. The device logs show that the attacker tried 00000000, 00000001, 00000002 and continued to increment by 1 number each time until they found the correct PIN of 13252342. Which of the following type of password cracking was being performed by the attacker?

A. Brute-force
B. Dictionary
C. Rainbow table
D. Hybrid

A

A. Brute-force

85
Q

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system’s web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?

A. Verify the hosts.ini file has not been maliciously modified
B. Perform a System Restore to an earlier date before the infection
C. Reformat the system and reinstall the OS
D. Install a secondary anti-malware solution on the system

A

A. Verify the hosts.ini file has not been maliciously modified

86
Q

Which command-line tool is used on a Windows system to move upward in a directory within the system’s directory structure?

A. cd .
B. dir
C. cd ..
D. ls

A

C. cd ..

87
Q

You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered?

A. Drill/hammer the HDD platters
B. Low-level formatting of the HDDs
C. Degaussing of the HDDs
D. Standard formatting of the HDDs

A

C. Degaussing of the HDDs

88
Q

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

A. MAC filtering
B. WPA personal
C. WEP
D. WPA2 Enterprise

A

B. WPA personal

89
Q

Which of the following is an APIPA or link-local address?

A. 169.254.64.23
B. 192.168.1.34
C. 33.52.7.83
D. 127.0.0.1

A

A. 169.254.64.23

90
Q

Your Android device’s battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?

A. Check which apps are using the most battery life
B. Dim your phone’s display
C. Reboot your phone
D. Enable airplane mode to save battery

A

A. Check which apps are using the most battery life