Jason Dion - CompTIA A+ 1002 Exam Prep #3 Flashcards
(90 cards)
You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company’s workstations had their files encrypted. You are worried about the rest of the network’s workstations. What should you do FIRST?
A. Immediately quarantine the affected workstations
B. Format the affected workstation’s hard drives and reinstall Windows
C. Perform a full disk anti-malware scan on the affected workstations
D. Update the anti-malware scanner’s signatures on all workstations
A. Immediately quarantine the affected workstations
Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?
A. RDP
B. SSH
C. TELNET
D. VNC
A. RDP
Eleanor, a user, contacts the help desk to report that her workstation will not boot up this morning. The help desk technician verifies that the workstation’s memory, power supply, and monitor function properly. The technician believes that the hard drive is not recognized by the system based on an error message displayed on the screen. Which of the following error messages was being displayed?
A. No boot device available
B. Operating system not found
C. NTLDR not found
D. BIOS ROM checksum error
A. No boot device available
Which of the following macOS features is used to backup and restore files to an external hard disk?
A. Boot Camp
B. Remote disc
C. Time Machine
D. Snapshot
C. Time Machine
Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers?
A. Strip-cut shredder
B. Recycling bin
C. Micro-cut shredder
D. Cross-cut shredder
C. Micro-cut shredder
Which file system type is used to mount remote storage devices on a Linux system?
A. exFAT (extensible file allocation table)
B. NFS
C. NTFS
D. APFS
B. NFS
Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?
A. Connections
B. Content
C. General
D. Privacy
A. Connections
An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows “limited” with no availability. What rollback action should the technician perform?
A. Server’s NIC drivers
B. Antivirus updates
C. Server’s IP address
D. Web browser
A. Server’s NIC drivers
You are installing a new firewall for Dion Training’s corporate network. Which of the following documents should you update FIRST?
A. Password policy
B. Network topology diagrams
C. Knowledge base articles
D. Incident database
B. Network topology diagrams
A corporate workstation was recently infected with malware. The malware was able to access the workstation’s credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?
A. Install a host-based intrusion detection system on all of the corporate workstations
B. Install an anti-virus or anti-malware solution that uses heuristic analysis
C. Monitor all workstations for failed login attempts and forward them to a centralized SYSLOG server
D. Install a Unified Threat Management system on the network to monitor for suspicious traffic
B. Install an anti-virus or anti-malware solution that uses heuristic analysis
You are troubleshooting a user’s laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue?
A. Setup
B. System log
C. Application log
D. Security log
B. System log
Which of the following is the LEAST secure wireless security and encryption protocol?
A. WEP
B. WPA
C. WPA3
D. WPA2
A. WEP
Which of the following operating systems are NOT used in modern smartphones or tablets?
A. Android
B. iPadOS
C. macOS
D. iOS
C. macOS
Which TWO of the following would provide the BEST security for both computers and smartphones?
A. Enabling multifactor authentication B. Using a cable lock C. Enforcing trusted software sources D. Configuring organizational units E. Enabling data loss prevention F. Utilizing access control lists
A. Enabling multifactor authentication
C. Enforcing trusted software sources
Which of the following is an APIPA or link-local address?
A. 192.168.1.34
B. 33.52.7.83
C. 127.0.0.1
D. 169.254.64.23
D. 169.254.64.23
A coworker is creating a file containing a script. You look over their shoulder and see “net use s:\fileserver\videos” in the file. Based on this, what type of file extension should this script use?
A. .py
B. .vbs
C. .js
D. .bat
D. .bat
Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?
A. Unattended installation
B. Repair installation
C. In-place upgrade
D. Remote network installation
A. Unattended installation
Which of the following is required for evidence to be admissible in a court of law?
A. Right to audit
B. Chain of custody
C. Legal host
D. Order of volatility
B. Chain of custody
You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend’s Windows 10 desktop. Which file format should you use?
A. NTFS
B. HFS
C. exFAT
D. FAT32
C. exFAT
An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?
A. Brute-force
B. Rainbow table
C. Dictionary
D. Hybrid
C. Dictionary
Last week, a technician remediated a malware infection on Karen’s laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete?
A. Quarantining the infected laptop
B. Enabling System Restore
C. Investigating and verify malware symptoms
D. Educating the end user
D. Educating the end user
A coworker is creating a file containing a script. You look over their shoulder and see “#!/bin/bash” as the first line in the file. Based on this, what type of file extension should this script use?
A. .vbs
B. .bat
C. .sh
D. .py
C. .sh
A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?
A. The touchscreen is faulty
B. The smartphone is infected with malware and is using a lot of processing power
C. The charging port is faulty
D. The battery is depleted
B. The smartphone is infected with malware and is using a lot of processing power
Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?
A. WPA2
B. WEP
C. RADIUS
D. WPS
C. RADIUS