Jason Dion - CompTIA A+ 1002 Exam Prep #3 Flashcards

1
Q

You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company’s workstations had their files encrypted. You are worried about the rest of the network’s workstations. What should you do FIRST?

A. Immediately quarantine the affected workstations
B. Format the affected workstation’s hard drives and reinstall Windows
C. Perform a full disk anti-malware scan on the affected workstations
D. Update the anti-malware scanner’s signatures on all workstations

A

A. Immediately quarantine the affected workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?

A. RDP
B. SSH
C. TELNET
D. VNC

A

A. RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Eleanor, a user, contacts the help desk to report that her workstation will not boot up this morning. The help desk technician verifies that the workstation’s memory, power supply, and monitor function properly. The technician believes that the hard drive is not recognized by the system based on an error message displayed on the screen. Which of the following error messages was being displayed?

A. No boot device available
B. Operating system not found
C. NTLDR not found
D. BIOS ROM checksum error

A

A. No boot device available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following macOS features is used to backup and restore files to an external hard disk?

A. Boot Camp
B. Remote disc
C. Time Machine
D. Snapshot

A

C. Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers?

A. Strip-cut shredder
B. Recycling bin
C. Micro-cut shredder
D. Cross-cut shredder

A

C. Micro-cut shredder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which file system type is used to mount remote storage devices on a Linux system?

A. exFAT (extensible file allocation table)
B. NFS
C. NTFS
D. APFS

A

B. NFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?

A. Connections
B. Content
C. General
D. Privacy

A

A. Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows “limited” with no availability. What rollback action should the technician perform?

A. Server’s NIC drivers
B. Antivirus updates
C. Server’s IP address
D. Web browser

A

A. Server’s NIC drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are installing a new firewall for Dion Training’s corporate network. Which of the following documents should you update FIRST?

A. Password policy
B. Network topology diagrams
C. Knowledge base articles
D. Incident database

A

B. Network topology diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A corporate workstation was recently infected with malware. The malware was able to access the workstation’s credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?

A. Install a host-based intrusion detection system on all of the corporate workstations
B. Install an anti-virus or anti-malware solution that uses heuristic analysis
C. Monitor all workstations for failed login attempts and forward them to a centralized SYSLOG server
D. Install a Unified Threat Management system on the network to monitor for suspicious traffic

A

B. Install an anti-virus or anti-malware solution that uses heuristic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are troubleshooting a user’s laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue?

A. Setup
B. System log
C. Application log
D. Security log

A

B. System log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the LEAST secure wireless security and encryption protocol?

A. WEP
B. WPA
C. WPA3
D. WPA2

A

A. WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following operating systems are NOT used in modern smartphones or tablets?

A. Android
B. iPadOS
C. macOS
D. iOS

A

C. macOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which TWO of the following would provide the BEST security for both computers and smartphones?

A. Enabling multifactor authentication
B. Using a cable lock
C. Enforcing trusted software sources
D. Configuring organizational units
E. Enabling data loss prevention
F. Utilizing access control lists
A

A. Enabling multifactor authentication

C. Enforcing trusted software sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an APIPA or link-local address?

A. 192.168.1.34
B. 33.52.7.83
C. 127.0.0.1
D. 169.254.64.23

A

D. 169.254.64.23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A coworker is creating a file containing a script. You look over their shoulder and see “net use s:\fileserver\videos” in the file. Based on this, what type of file extension should this script use?

A. .py
B. .vbs
C. .js
D. .bat

A

D. .bat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?

A. Unattended installation
B. Repair installation
C. In-place upgrade
D. Remote network installation

A

A. Unattended installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is required for evidence to be admissible in a court of law?

A. Right to audit
B. Chain of custody
C. Legal host
D. Order of volatility

A

B. Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend’s Windows 10 desktop. Which file format should you use?

A. NTFS
B. HFS
C. exFAT
D. FAT32

A

C. exFAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?

A. Brute-force
B. Rainbow table
C. Dictionary
D. Hybrid

A

C. Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Last week, a technician remediated a malware infection on Karen’s laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete?

A. Quarantining the infected laptop
B. Enabling System Restore
C. Investigating and verify malware symptoms
D. Educating the end user

A

D. Educating the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A coworker is creating a file containing a script. You look over their shoulder and see “#!/bin/bash” as the first line in the file. Based on this, what type of file extension should this script use?

A. .vbs
B. .bat
C. .sh
D. .py

A

C. .sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?

A. The touchscreen is faulty
B. The smartphone is infected with malware and is using a lot of processing power
C. The charging port is faulty
D. The battery is depleted

A

B. The smartphone is infected with malware and is using a lot of processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

A. WPA2
B. WEP
C. RADIUS
D. WPS

A

C. RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?

A. Upgrade their web browser
B. Conduct an antivirus scan
C. Check the host.ini file
D. Disable System Restore

A

C. Check the host.ini file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and destroy the data on their hard disk drives. Which of the following methods would be the MOST effective?

A. Physically destroy the drives by drilling each HDD’s platter
B. Conduct a low-level format of each hard drive
C. Fully format each hard drive with a series of 0s
D. Degauss each of the hard drives

A

D. Degauss each of the hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What network device uses ACLs to prevent unauthorized access into company systems?

A. Content filter
B. Load balancer
C. IDS
D. Firewall

A

D. Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You are currently building a Linux server. Which of the following file system formats should you use for the server?

A. APFS
B. ext4
C. exFAT
D. NTFS

A

B. ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?

A. Turn off Wi-Fi and rely on their cellular data plan
B. Upgrade to a new smartphone
C. Increase the Wi-Fi signal being transmitted by their WAP
D. Enable MAC filtering on their WAP

A

C. Increase the Wi-Fi signal being transmitted by their WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?

A. The smartphone has been infected with a virus
B. The data speeds are insufficient with only one bar of signal
C. The cellular radio cannot connect to the cellphone towers
D. The baseband firmware needs to be updated

A

B. The data speeds are insufficient with only one bar of signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Your smartphone just displayed a notification stating that a new pair of headphones has connected to your device. Which of the following threats is this an example of?

A. Unauthorized account access
B. Unintended Bluetooth pairing
C. Unauthorized location tracking
D. Unauthorized microphone activation

A

B. Unintended Bluetooth pairing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which command is used to create a new disk partition on a Windows system?

A. format
B. chkdsk
C. dd
D. diskpart

A

D. diskpart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

During a disaster recovery, which of the following statements is true?

A. A virtual machine cannot be used for redundancy or load balancing
B. A virtual machine has more downtime than a physical server
C. Both a virtual machine and a physical server has the same downtime
D. A virtual machine has less downtime than a physical server

A

D. A virtual machine has less downtime than a physical server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does the command “shutdown /r” do on a Windows workstation?

A. Enter sleep mode
B. Reboot the workstation
C. Log off the workstation
D. Shutdown the workstation

A

B. Reboot the workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren’t working. Which of the following is MOST likely the problem?

A. Bluetooth is not enabled
B. The phone is in airplane mode
C. Wi-Fi is not enabled
D. Cellular is not enabled

A

A. Bluetooth is not enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal?

A. MOU
B. UPS
C. SOW
D. MSDS

A

D. MSDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following devices should you NEVER disassemble during troubleshooting due to the risk of electrocution?

A. CRT display
B. Printer
C. Tablet
D. External hard drive enclosure

A

A. CRT display

38
Q

Which type of installation would require an answer file to install the operating system?

A. Unattended
B. Clean
C. Upgrade
D. Repair

A

A. Unattended

39
Q

A new corporate policy dictates that all access to network resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?

A. Blocklists
B. Permission creep
C. Least privilege
D. Directory permissions

A

C. Least privilege

40
Q

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

A. HOTP
B. Proximity cards
C. TOTP
D. Smart cards

A

B. Proximity cards

41
Q

Karen, a salesperson in your company, is currently on travel this week. She calls your company’s help desk and is yelling because she cannot connect to her email using her hotel room’s WiFi. Her laptop shows that it is connected to the “HotelWiFi” network, but Windows states it has “Limited or no connectivity.” What action should Karen perform to fix this issue?

A. Disable and enable her wireless adapter
B. Purchase an ethernet cable and use her room’s wired connection
C. Reboot into Safe Mode and perform an antivirus scan
D. Open a web browser and agree to the hotel’s capture page AUP

A

D. Open a web browser and agree to the hotel’s capture page AUP

42
Q

Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA?

A. Thumbprint and retina scan
B. Thumbprint and password
C. Username and password
D. Username and pin

A

B. Thumbprint and password

43
Q

Your company has just installed 50 new LCD monitors to replace some older CRT monitors. How should you properly dispose of the old CRT monitors?

A. Recycle them
B. Follow local government regulations and handling procedures
C. Haul then to the landfill
D. Give them to charity

A

B. Follow local government regulations and handling procedures

44
Q

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?

A. DHCP
B. MDM
C. UPnP
D. NAT

A

C. UPnP

45
Q

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of several settings: Email (never), Maps (always), Calender (while using), Messages (while using), Photos (never), App Store (while using), Bank (while using), and Weather (while using). Based on the information provided, what should be changed to resolve this client’s problem?

A. Change the Maps setting to while using
B. Change the App Store to never
C. Change the Email setting to while using
D. Change the Weather setting to always

A

A. Change the Maps setting to while using

46
Q

Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer’s recommendations?

A. Desktop printer
B. UPS
C. Server rack
D. Modem
E. VOIP device
F. Patch panel
A

B. UPS

C. Server rack

47
Q

A.
B.
C.
D.

A
48
Q

A.
B.
C.
D.

A
49
Q

A.
B.
C.
D.

A
50
Q

A.
B.
C.
D.

A
51
Q

A.
B.
C.
D.

A
52
Q

A.
B.
C.
D.

A
53
Q

A.
B.
C.
D.

A
54
Q

A.
B.
C.
D.

A
55
Q

A.
B.
C.
D.

A
56
Q

A.
B.
C.
D.

A
57
Q

A.
B.
C.
D.

A
58
Q

A.
B.
C.
D.

A
59
Q

A.
B.
C.
D.

A
60
Q

A.
B.
C.
D.

A
61
Q

A.
B.
C.
D.

A
62
Q

A.
B.
C.
D.

A
63
Q

A.
B.
C.
D.

A
64
Q

A.
B.
C.
D.

A
65
Q

A.
B.
C.
D.

A
66
Q

A.
B.
C.
D.

A
67
Q

A.
B.
C.
D.

A
68
Q

A.
B.
C.
D.

A
69
Q

A.
B.
C.
D.

A
70
Q

A.
B.
C.
D.

A
71
Q

A.
B.
C.
D.

A
72
Q

A.
B.
C.
D.

A
73
Q

A.
B.
C.
D.

A
74
Q

A.
B.
C.
D.

A
75
Q

A.
B.
C.
D.

A
76
Q

A.
B.
C.
D.

A
77
Q

A.
B.
C.
D.

A
78
Q

A.
B.
C.
D.

A
79
Q

A.
B.
C.
D.

A
80
Q

A.
B.
C.
D.

A
81
Q

A.
B.
C.
D.

A
82
Q

A.
B.
C.
D.

A
83
Q

A.
B.
C.
D.

A
84
Q

A.
B.
C.
D.

A
85
Q

A.
B.
C.
D.

A
86
Q

A.
B.
C.
D.

A
87
Q

A.
B.
C.
D.

A
88
Q

A.
B.
C.
D.

A
89
Q

A.
B.
C.
D.

A
90
Q

A.
B.
C.
D.

A