CompTIA a+ 1002 practice test Quizlet

Recommended textbook solutions

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

Engineering Electromagnetics

8th EditionJohn Buck, William Hayt

483 solutions

Python Programming: An Introduction to Computer Science

2nd EditionJohn M Zelle

484 solutions

In Windows, how would you go about sharing your CD-Rom on a network?
A] In My Computer, right-click the CD-ROM icon, then click sharing
B] Right-click My Computer and select Control Panel, then click Network, File and Print Sharing
C] Select Start | Settings | Control Panel, then right-click Network, CD-ROM, Sharing
D] Select Start | Settings | Control Panel, then click Network, File and Print Sharing

How do you update a sound card driver in Windows 10?
A] In Computer Management, select Device Manager, right-click the sound device and select Properties, click the Driver tab, and click Update Driver
B] In the Control Panel, select System, select Drivers, select Sound Devices, then click Update Driver
C] Right-click My Computer and select Properties, select the Hardware tab, select Drivers, select Sound Devices, then click Update My Driver
D] In the Control Panel, select Sound Devices, click the Drivers Tab, and then click Update

In Windows, how do you close an application that has stopped responding?
A] Open Task Manager, select the Applications tab, select the application, click the Switch To button
B] Open Task Manager, select the Applications tab, select the application, then click the End Task button
C] Click and hold your mouse button on the application's Taskbar icon, then select Force Quit from the popup dialog box
D] Open Device Manager, right-click on the application, select Disable from the popup menu

Recommended textbook solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Engineering Electromagnetics

8th EditionJohn Buck, William Hayt

483 solutions

Starting Out with C++ from Control Structures to Objects

8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis

1,294 solutions

Problem Solving with C++

9th EditionWalter Savitch

283 solutions

Upgrade to remove ads

Only SGD 41.99/year

  1. Science
  2. Computer Science

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set [128]

Which of the following operating systems is a free download with no evaluation period limitations?

A. Windows 10 Home
B. Ubuntu 18.04
C. macOS
D. iOS

B. Ubuntu 18.04

What is the name of the folder where windows 10 stores 64-bit system files?

A. Systemroot
B. System32
C. SysWOW64
D. Program Files [x86]

B. System32

Which of the following is used on iPads?

A. Chrome OS
B. Windows 10
C. iOS
D. Android

C. iOS

Scenario: It's the summer of 2023. Your company has many types of technologies running-many of which interact with each other. Of the following OSes and devices that are used in your company's infrastructure, which are security concerns? [Select the best answers.]

A. Windows 7
B. Windows 10
C. MacBook Pro 2012
D. Android 6.0
E. Windows 8.1

A. Windows 7
B. Windows 10
C. MacBook Pro 2012
D. Android 6.0
E. Windows 8.1

Which of the following statements is true?

A. Android is an example of closed-source software.
B. 32-bit CPUs can only address a maximum of 256 GB of RAM.
C. Chrome OS is designed by Apple to use mostly desktop applications.
D. 64-bit versions of Windows can run 32-bit apps as well as 64-bit apps.

D. 64-bit versions of Windows can run 32-bit apps as well as 64-bit apps.

Which editions of Windows 10 offer Hyper-V? [Select the three best answers.]

A. Windows 10 Home
B. Windows 10 Pro
C. Windows 10 Education
D. Windows 10 Enterprise

B. Windows 10 Pro
C. Windows Education'
D. Windows 10 Enterprise

What is the minimum hard drive requirement for Windows 10 64-bit?

A. 2 GB of RAM
B. 2 GHz
C. 32 GB of hard drive space
D. 200 GB of hard drive

C. 32 GB of hard drive space

Where should you go to find out what applications are running in the background of Windows 10?

A. Taskbar
B. Start menu
C. Quick launch
D. Notification Area
E. Cortana

D. Notification Area

Which of the following installation types would require PXE compliance?

A. Local
B. Network'
C. Internal
D. USB flash drive

B. Network

To avoid SID conflicts when driving imaging, which program should you use in Windows?

A. Sysprep
B. Diskpart
C. SIM
D. Windows Deployment Services

A. Sysprep

You are tasked with installing Windows with the standard configuration. The file system needs to be able to access an 8-TB partition. Which of the following should you configure the system to use?

A. GPT
B. NTFS
C. FAT32
D. MBR
E. ext4

B. NTFS

Which of the following uses an answer file to provide responses with no user intervention required?

A. Factory recovery partition
B. Clean installation
C. Unattended installation
D. Reset your PC

C. Unattended installation

Which command can copy multiple files and entire directory trees?

A. copy
B. cut
C. paste
D. robocopy

D. robocopy

Which command will determine if protected system files have been overwritten and replace those files with the original version?

A. chkdsk
B. msconfig
C. SFC
D. xcopy

C. SFC

Which command will show the path of routers between your computer and a web server?

A. ping
B. ipconfig
C. tracert
D. nbstat

C. tracert

You need to map a network drive to a share named data1 on a computer named Jupiter-Server. You want to use the J: drive letter. Which syntax should you use if you were to do this in the Command Prompt?

A. net use J: \\Jupiter-Server\data 1
B. net use J \Jupiter-Server\data 1
C. net use Jupiter-Server\J\data 1
D. net use J: \Jupiter-Server\data 1

A. net use J: \\Jupiter-Server\data 1

You have been tasked with bringing the policies of a Windows 10 computer up to date. You won't be able to log off and back on, and you must use the Command Prompt. Which of the following tools should you use?

A. Shutdown'
B. DISM
C. gpupdate
D. Local Security Policy
E. nslookup

C. gpupdate

A user's WINWORD.EXE application is completely frozen. How can you determine the application's processes ID and then terminate the frozen application process? [Select the two best answers.]

A. Use the net user command to identify the current PID of the application.
B. Use the net user /delete command to terminate the frozen process ID.
C. Run tasklist and record the process ID [PID]
D. Run taskkill /PID number

C. Run tasklist and record the process ID [PID]
D. Run taskkill /PID number

Which of the following should be typed in the Run prompt to open the Device Manager?

A. MMC
B. secpol.msc
C.CMD
D. devmgmt.msc

D. devmgmt.msc

Which of the following would you use to track what percentage of resources are being used?

A. devmgmt.msc
B. eventvwr.msc
C. systemproperiesadvanced.exe
D. perfmon.exe

D. perfmon.exe

Where can a user go to start and stop services in Windows? [Select all that apply].

A. MSConfig
B. Task Manager
C. Computer Management'
D. Command Prompt

B. Task Manager
C. Computer Management'
D. Command Prompt

Which log file in the Event Viewer contains information concerning auditing?

A. System
B. Application
C. Local Users and Groups
D. Security

D. Security

You are preparing to troubleshoot a system that is having some driver issues. Which of the following tools should you use to configure the system to boot safely?

A. Event Viewer
B. Performance Monitor
C. Local Users and Groups
D. System Configuration'
E. MMC

D. System Configuration'

Which tool can run particular programs at a time designated by the user?

A. Services
B. Task Scheduler
C. Event Viewer
D. Windows Memory Diagnostics

B. Task Scheduler

You have been tasked with repairing a magnetic-based hard drive that is running sluggishly. Which of the following tools should you use to fix the problem? [Select the best answer.]

A. Disk management
B. Optimize Drives
C. Storage Spaces
D. Mount point

B. Optimize Drives

What is HKEY__LOCAL__MACHINE considered to be?

A. A registry entry
B. A subkey
C. A string value
D. A hive

D. A hive

Which of the following system utilities should be used to create a text file with no formatting?

A. Notepad
B. Explorer
C. msinfo32
D. Registry

A. Notepad

A customer is having a problem connecting to mapped network drives but can connect to the Internet just fine. You are tasked with fixing that system. Which tool should you use to take charge of the system and analyze it?

A. dxdiag
B. mstsc
C. msinfo32
D. dfrgui
E. diskpart
F. System Restore

B. mstsc

What must you do first to a basic disk to create spanned, stripped, mirrored, or RAID-5 Volumes in Disk Management?

A. Extend it
B. Shrink it
C. Split it
D. Initialize it
E. Convert it to dynamic

E. Convert it to dynamic

You have been tasked with verifying the certificates that are in use on a computer that is configured to use Microsoft Edge. Which tab of the Internet Properties dialog box should you access?

A. General
B. Security
C. Privacy
D. Content
E. Connections
F. Programs
G. Advanced

D. Content

Which window would you navigate to in order to modify the virtual memory settings in Windows? [Select the best answer]

A. Device Manager
B. Performance Options
C. System
D. Folder Options
E. System Properties

B. Performance Options

Which power management mode stores f=data on the hard drive?

A. Sleep
B. Hibernate
C. Standby
D. Pillow.exe

B. Hibernate

What should you modify if you need to change the number of pixels that are displayed horizontally and vertically on the screen?

A. Color depth
B. Refresh rate
C. Resolution'
D. Scaling

C. Resolution

You are about to start troubleshooting a Windows system. You need to be able to view the bootmgr file in the C: root of the hard drive. Which of the following should you configure to make this file visible? [Select the two best answers.]

A. Hidden files and folders
B. Extensions for known file types
C. Encrypted or compressed NTFS files in color
D. Protected operating system files

A. Hidden files and folders
D. Protected operating system files

A customer's computer has many logins to websites saved within Windows. Some of these are security risks. Where can you go to remove those login usernames and passwords? [Select the two best answers]

A. Programs and Features
B. Credential Manager
C. Devices and Printers
D. MSDT
E. Store User Names and Passwords
F. Sync Center

B. Credential Manager
E. Store User Names and Passwords

Which of the following are administrative share names? [Select the two best answers.]

A. C$
B. C:\\Windows
C. ADMIN$
D. System32
E. $print

A. C$
C. ADMIN$

Which of the following requires a Windows-created password to gain access to it?

A. Workgroup
B. Client/server
C. HomeGroup
D. Domain

C. HomeGroup

You want to connect to a share on \\server1\data-share. Which of the following should be used to accomplish this?

A. HomeGroup
B. Right-click the folder and select Share with
C. ipconfig
D. net use

D. net use

You have been tasked with setting up a client Windows computer. It needs to gain access to the Internet, but all web traffic is cached and filtered by a go-between server on the LAN. What should you configure to enable Internet access for the Windows client?

A. Alternate IP address
B. Proxy server
C. Duplex
D. WSD

B. Proxy server

Which of the following are important considerations when planning the installation of a new application? [Select the three best answers.]

A. CPU speed
B. Windows location
C. Program Files location
D. User permissions
E. Warranty

A. CPU speed
C. Program Files location
D. User permissions

In Windows 10, which network location profile settings should you choose if you are not sure what computers will be on the network or if you can trust them?

A. Private
B. Home
C. Work
D. Public

D. Public

Which of the following is the built-in web browser for macOS?

A. Safari
B. Chrome
C. Firefox
D. Internet Explorer

A. Safari

Which program should you use to access Utilities in macOS? [Select the two best answers.]

A. Mission Control
B. Finder
C. Spotlight
D. Safari

B. Finder
C. Spotlight

Which of the following should be enabled when you want a user at another Mac to take control of your computer?

A. Remote Desktop
B. Remote Assistance
C. Screen Sharing
D. Screen Mirroring

C. Screen Sharing

Which utility allows a MAC user to dual-boot macOS and Windows?

A. Ubuntu
B. apt-get
C. bootrec
D. Boot Camp

D. Boot Camp

You want to save the state of the Mac running macOS. Which tool should be used?

A. System Restore
B. Time Machine
C. Force Quite
D. Disk Utility

B. Time Machine

Which program handles a printer's driver automatically in macOS? [Select the best answer]

A. Bonjour
B. Magic Mouse
C. AirPrint
D. iCloud

C. AirPrint

A customer reports that a spinning wheel appears on her screen whenever she tries to run a specific application. What does this represent? [Select the best answer.]

A. A failing CPU
B. An Apple macOS proprietary crash screen
C. A Microsoft Windows proprietary crash screen
D. A Linux proprietary crash screen

B. An Apple macOS proprietary crash screen

Which command in Linux will show the directory contents?

A. ls
B. pwd
C. cd
D. mv

A. ls

Which command should be used to change the permissions of a file?

A. ps
B. chown
C. NTFS
D. chmod

D. chmod

Which command will show the configuration details of a wireless connection in Linux?

A. ifconfig
B. ipconfig
C. iwconfig
D. grep

C. iwconfig

Which of the following is the science of recognizing humans based on physical characteristics?

A. Mantraps
B. Biometrics
C. Tailgating
D. CAC

B. Biometrics

You have been tasked with preventing unwanted removal of a webcam. Which of the following tools should you implement??

A. Smart card
B. USB fingerprint scanner
C. USB lock
D. Privacy filter

C. USB lock

When is a Windows 10 computer completely secured?

A. When you have updated to the latest version
B. When you have locked down the Local Security Policy
C. When Microsoft releases the latest update
D. Never

D. Never

Which of the following is a built-in security component of Windows 10?

A. UAC
B. Firefox
C. Active Directory
D. MFA

A. UAC

You have been tasked with configuring a user account so that its folder and settings will follow the user to whatever computer the user logs on to within the domain. Which of the following should you configure?

A. OU
B. Roaming profile
C. Logon script
D. Home folder mapped to a network drive

B. Roaming profile

You need to block users from installing programs in Windows 10. Of the following, what tool should you select?

A. wf.msc
B. IKEv2
C. WIP
D. gpedit.msc
E. certmgr.msc

D. gpedit.msc

Which of the following is the strongest form of wireless encryption?

A. WPA
B. WEP
C. AES
D. TKIP

C. AES

You have been tasked with connecting wireless clients to a server that supports SSO and 802.1X. Which of the following technologies should you implement?

A. WPA2-PSK
B. WPA2-ENT
C. WEP
D. TKIP'
E. RADIUS

B. WPA2-ENT
E. RADIUS

Which of the following types of malware self-replicates?

A. Virus
B. Worm
C. Trojan
D. Rootkit

B. Worm

Which of the following types of malware is designed to gain administrative-level control of a system?

A. Ransomware
B. Keylogger
C. Rootkit
D. Spyware

C. Rootkit

You have been tasked with implementing a virus prevention plan on a group of Windows client computers. Which of the following should you carry out? [Select all that apply]

A. Update AV software
B. Configure File History
C. Update Microsoft Office
D. Install a rootkit scanner
E. Verify that a firewall is installed

A. Update AV software
B. Configure File History
E. Verify that a firewall is installed

Which of the following describes an attempt to guess a password by using a combination of letters and numbers?

A. Brute-force
B. Social engineering
C. Dictionary
D. Zero-day

A. Brute-force

A user clicked a link in an e-mail that appeared to be from his bank. The like led him to a page that requested he charge his password to access his bank account. it turns out that the webpage was fraudulent. What is this an example of?

A. Impersonation
B. Dumpster diving
C. Phishing
D. Shoulder surfing

C. Phishing

Several hundred infected computers simultaneously attacked your organization's server, rendering it useless to legitimate users. What kind of attack is this an example of?

A. Botnet
B. MITM
C. Tailgating
D. DDoS
E. Rainbow table

D. DDoS

You have been tasked with setting up encryption for a Windows computer. You are required to encrypt several shared folders within partition, so that they can't be need by other users. What tool should you use?

A. BitLocker
B. TPM
C. Administrative share
D. EFS

D. EFS

One of the users on your network is trying to access files shared on a remote computer. The file's share permissions allow the user Full Control but the NTFS permissions allow the user Read access. Which of the following will be the resulting access for the user?

A. Full Control
B. Modify
C. Read
D. Write

C. Read

You are the administrator for your network and you set up an administrative share called Data$. Which of the following is necessary in order for another user to access this share? [Select the two best answers.]

A. The user must be part of a HomeGroup.
B. The user must have permissions to access the share.
C. The user must know the decryption key.
D. The user must know the exact network path to the share.
E. The user must enable File Sharing in the Network and Sharing Center

B. The user must have permissions to access the share.
D. The user must know the exact network path to the share.

Which Windows account would you create for someone who needs to regularly install software, change settings, and take ownership?

A. Power User
B. Standard User
C. Guest
D. Root
E. Administrator

E. Administrator

You want to prevent a user from accessing your phone while you step away from your desk. What should you do?

A. Implement remote backup
B. Set up a remote wipe program
C. Configure a screen lock
D. Install a locator application

C. Configure a screen lock

Which of the following can be described as removing limitations on iOS?

A. Rooting'
B. Jailbreaking
C. Gegtracking
D. AV software

B. Jailbreaking

Your organization is concerned about a potential scenario where a mobile device with confidential data is stolen. Which of the following should be recommended first? [Select the best answer]

A. Remote backup application
B. Remote wipe program
C. Password locks
D. Locator application

B. Remote wipe program

You are concerned about the possibility of jailbreaks on your organization's iPhones and viruses on the Android-based devices. Which of the following should you implement? [Select the two best answers.]

A. AV software
B. Firewall
C. Mobile device management
D. Device reset

A. AV software
C. Mobile device management

There are Android-based smartphones in your organization that are part of the BYOD infrastructure. They need to be able to connect to the LAN remotely using a VPN, Which of the following should you incorporate into the MDM profile for the smartphones to connect to the VPN securely? [Select the best answer.]

A. AV software
B. Certificate
C. Remote wipe
D. Authentication app
E. Microsoft Intune

B. Certificate

A hard drive needs to be disposed of in such a way that no one can access the data. Which method should be used?

A. Degaussing
B. Clearing
C. diskpart
D. Destruction

D. Destruction

A drive is to be repurposed within your company. You have been tasked with zeroing out the drive three times from within Windows. Which of the following methods will accomplish this?

A. Degaussing
B. format C: /fs:fat32/p:3
C. diskpart > select disk 1 > clean all
D. dd if=/dev/zero of=/dev/sda1

B. format C: /fs:fat32/p:3

You have been tasked with purging a hard drive so that it can be recycled to a sister company. Which of the following should you perform before sending the hard drive out?

A. Clear the drive
B. Degauss the drive
C. Run Secure Erase
D. Pulverize the drive

C. Run Secure Erase

Which of the following helps to secure a SOHO router? [Select the three best answers.]

A. Change default passwords
B. Enable SSID
C. Enable MAC filtering
D. Enable WPS
E. Enable WPA2

A. Change default passwords
C. Enable MAC filtering
E. Enable WPA2

You want to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network. How can you accomplish this? [Select the two best answers.]

A. Enable MAC filtering
B. Create a DMZ
C. Configure a complex SSID
D. Disable physical ports

A. Enable MAC filtering
D. Disable physical ports

You want to prevent certain users from accessing particular websites. What should you configure on the SOHO router?

A. MAC filtering
B. Disable unused ports
C. Port forwarding
D. Parental controls
E. Power levels

D. Parental controls

Which option starts the operating system with a minimal set of drivers?

A. Windows RE
B. System Restore
C. Safe Mode
D. Debugging Mode

C. Safe Mode

Which tool should be used if you want to do Startup Repair in Windows?

A. File History
B. Windows RE
C. System Restore
D. Safe Mode

B. Windows RE

Which command repairs the bootmgr file in Windows? [Select the best answer.]

A. msconfig
B. bootrec /fixboot
C. bootrec /rebuildbcd
D. boot\bcd

C. bootrec /rebuildbcd

One of your customers updated the software for a wireless adapter on a PC. After rebooting the user logged in and the computer displayed a blue screen. What should you do?

A. Install the device on a known good computer.
B. Reboot the computer and access debugging mode.
C. Purchase a new wireless adapter.
D. Roll back the device drivers in Safe Mode

D. Roll back the device drivers in Safe Mode

You are running Windows 8.1 and want to save personal files and remove all programs installed to the desktop while resetting PC settings. Which of the following should you select?

A. Reset your PC
B. Refresh your PC
C. System Recovery Options
D. Command Prompt

B. Refresh your PC

A stop error could manifest itself as what?

A. A BSOD
B. An Event Viewer error
C. An Action Center notification
D. An Internet Explorer error

A. A BSOD

Which tools can be used to restore a computer? [Select all that apply]

A. File History
B. System Restore
C. System Image Recovery
D. Msconfig

B. System Restore
C. System Image Recovery

Which of the following might cause a blue screen?

A. A faulty DVD-ROM
B. A CPU without a fan
C. Bad drivers
D. A program compatibility issue

C. Bad drivers

An application is frozen and cannot be closed. However, the rest of the operating system works fine. Which tool can be used to close the application?

A. tasklist
B. taskkill
C. shutdown
D. convert

B. taskkill

You are tasked with repairing an issue with a Windows client computer that is attempting to log on to a domain. The user informs you that it takes 5 minutes to log on to domain, but logging in to the local machine only takes 15 seconds. What steps should you take to fix the problem? [Select the two best answers.]

A. Clean up temp files.
B. Disable unnecessary services in msconfig.
C. Update the BIOS boot order.
D. Synchronize the Windows client's time to the domain.
E. Run ipconfig/release and ipconfig /renew

A. Clean up temp files.
D. Synchronize the Windows client's time to the domain.

Which of the following are symptoms of viruses? [Select the three best answers.]

A. A computer runs slowly.
B. A computer locks up.
C. Excessive pop-up windows appear.
D. A strange website is displayed whenever a search is done..
E. Unusual error messages are displayed

A. A computer runs slowly.
B. A computer locks up.
E. Unusual error messages are displayed

Which of the following is the best mode to use when scanning for viruses?

A. Safe Mode
B. Reset the PC
C. Command Prompt only
D. Boot into Windows normally

A. Safe Mode

You have been tasked with repairing a computer that is exhibiting the following symptoms:

-Excessive pop-up windows appear:
-A particular website comes up every time the user searches.

What is this most likely cause?

A. Spam
B. Virus
C. Social engineering
D. Trojan
E. Spyware

E. Spyware

A co-worker technician is using certmgr.msc to analyze a problem with a computer. Which of the following issues is the technician most likely troubleshooting?

A. Trusted root CA
B. Hijacked e-mail
C. Spam
D. Browser redirection

A. Trusted root CA

Several computers were infected with malware because the end users clicked unknown links embedded in e-mails. You have successfully applied the first six steps of the best practice procedures for malware removable. What should you do next?

A. Schedule scans and run updates.
B. Enable System Restore and create a restore point.
C. Document findings, actions, and outcomes.
D. Educate the corporate users.

D. Educate the corporate users.

An application won't close on an Android smartphone. You've tried to force stop it, to no avail. What should you do?

A. Hard reset the device
B. Stop the underlying service in Running Services
C. Soft reset the device.
D. Take the device to an authorized service center.

C. Soft reset the device.

Which of the following are valid Wi-Fi troubleshooting methods? [Select the two best answers.]

A. Power cycle the device.
B. Restart Bluetooth
C. Use a static IP.
D. Make sure the device is within range.
E. Rename the SSID

A. Power cycle the device.
D. Make sure the device is within range.

You are troubleshooting a mobile device's e-mail connection. Your company requires the latest in security when it comes to e-mail sessions. The e-mail client is a separate app that is not browse based. How should the mobile device's e-mail client program be configured? [Select the two best answers.]

A. SSL on port 25
B. TLS on port 443
C. POP3 with TLS using port 995
D. SMTP using port 995
E. IMAP using SSL on port 110
F. SMTP using TLS on port 587

C. POP3 with TLS using port 995
F. SMTP using TLS on port 587

You suspect that a mobile device has been compromised and is now part of a botnet. What are some of the indicators that has happened? [Select the two best answers.]

A. High resource usage
B. Notification of camera/webcam usage
C. Apps were forced stopped
D. Power drain
E. Log files are unavailable
F. The user's account was locked out

A. High resource usage
D. Power drain

You have been tasked with fixing a problem on a Windows Server. You need to find out which switch it connects to and how it connects. Which of the following types of documentation should you consult?

A. Microsoft Knowledge Base
B. Network topology diagram
C. Incident documentation
D. Compliance policy
E. Inventory management

B. Network topology diagram

You work for an enterprise-level organization that is certified as ISO 27002:2013. You have been tasked with adding a group of Windows client computers with a new image configuration to the IT asset inventory database, and this task has a standard procedure. You must furnish a document to be signed off by two people. Who should you approach for signatures? [Select the two best answers.]

A. Your manager
B. Compliance officer
C. IT directory
D. Owner of the company
E. CISO

A. Your manager
C. IT directory

What do inventory management systems and software use to keep track of assets? [Select the two best answers.]

A. Regulatory policies
B. AUPs
C. Asset tags
D. Barcodes

C. Asset tags
D. Barcodes

In a change management board meeting you are discussing any vulnerabilities that can be mitigated as part of a recommended change and anything that could potentially occur due to that change. What best describes what you are discussing?

A. Purpose of change
B. Scope the change
C. Backout plan
D. Document changes
E. Risk analysis

E. Risk analysis

You have been tasked with backing up new user profiles in an enterprise environment. You propose to back up these user accounts to a new tape backup device. Which of the following procedures should you follow?

A. Change management
B. End-user acceptance
C. File History
D. Incremental backup
E. Backup testing

A. Change management
E. Backup testing

You have been contracted to perform some work at a small office. There is a problem with a Windows 10 computer and the user accounts folder has been corrupted. "Luckily" the company has a backup. Where should you restore the accounts to? [Select the two best answers.]

A. C:\Users
B. Ntdsutil
C. Active Directory Users and Computers
D. Local Users and Groups
E. ISO-compliant array

A. C:\Users
D. Local Users and Groups

If a power supply fails, what should you do?

A. Replace it
B. Repair it
C. Use a different computer
D. Switch it to a different voltage setting.

A. Replace it

Which of the following are ways to avoid ESD? [Select three,]

A. Use an antistatic wrist strap
B. Use a vacuum cleaner
C. Use an antistatic mat
D. Touch the chassis of the computer

A. Use an antistatic wrist strap
C. Use an antistatic mat
D. Touch the chassis of the computer

You walk into the server room and see a person lying on the floor with a live electrical wire draped over. What should you do first?

A. Run out and call 911.
B. Grab the wire and fling it off the person.
C. Grab the person and drag him out from under the wire.
D. Grab a piece of wood and use it to move the wire off the person.

D. Grab a piece of wood and use it to move the wire off the person.

What document can aid you if a chemical spill occurs?

A. HEPA
B. MSDS
C. OSHA
D. EPA

B. MSDS

A co-worker complains that after the cleaning crew has come through, the key-board irritates his hand and leaves some green residue. What should you do?

A. Call the department.
B. Contact the facilities department.
C. Contact the manufacturer of the keyboard.
D. Call OSHA and complain.

B. Contact the facilities department.

You are concerned with the power outages that occur infrequently and for short periods of time. You don't want to suffer from potentially harmful restarts. What device should you install for the users' computers?

A. Surge protector
B. Line conditioner
C. MSDS
D. UPS

D. UPS

You want a cost-effective solution to the common surges that can affect your computer. Which device offers the best solution?

A. UPS
B. Surge suppressor
C. Power strip
D. Line conditioner

B. Surge suppressor

You find illegal materials on a customer's computer. Your boss commands you to preserve computer evidence until he gets to the scene. What is your boss asking you to begin?

A. Documentation
B. Chain of custody
C. First response
D. GDPR compliance

B. Chain of custody

Which of the following is not one of the steps of the incident response process?

A. Eradication
B. Recovery
C. Containment
D. Non-repudiation

D. Non-repudiation

You are the security administrator for your organization. You have just identified a malware incident. Of the following, what should be your first response?

A. Containment
B. Removal
C. Recovery
D. Monitoring

A. Containment

Which type of regulated data is specifically protected under the HIPAA Privacy Rule?

A. PII
B. PCI
C. GDPR
D. PHI

D. PHI

How will speaking with a lot of jargon make a technician sound?

A. Competent
B. Insecure
C. Smart
D. Powerful

B. Insecure .

A customer experiences a server crash. When you arrive, the manager is upset about this problem. What do you need to remember in this scenario?

A. Stay calm and do the job as efficiently as possible.
B. Imagine the customer in his underwear.
C. Avoid the customer and get the job done quickly.
D. Refer the customer to your supervisor.

A. Stay calm and do the job as efficiently as possible.

Which of the following are good ideas when dealing with customers?

A. Speak clearly.
B. Ignore them.
C. Avoid distractions.
D. Explain to them what they did wrong.

A. Speak clearly.
C. Avoid distractions

You are a field technician working at a customer's site. One of the workers asks you to load a copy of an organization's purchased software on a personal laptop. What should you do first?

A. Verify that the installation is allowed under the company's licensing agreement.
B. Act as though you are distracted and ignore the user.
C. Leave the premises and inform the policy.
D. Tell the worker that installing unlicensed software is illegal.
E. Notify the worker's manager of a security breach.

A. Verify that the installation is allowed under the company's licensing agreement.

You have been asked by a customer at a hospital to perform routine maintenance on a laser printer. Before you begin, you notice PHI has printed out. What should you do first?

A. Ensure the paper tray is full so that everything can print.
B. Place the printed output in a secure recycle bin and begin maintenance.
C. Kindly warn the customer that printing PHI at work is a HIPPA violation.
D. Ask the customer to move the printed output to another area

D. Ask the customer to move the printed output to another area.

What should you type to comment out syntax in JavaScript?

A. $
B. #
C. //
D.

C. //

Which of the following is an integer? [Select the two best answers.]

A. 16
B. cat
C. string
D. 00000001

A. 16
D. 00000001

You want to list a variable number 16 times but don't want to type 16 lines of code. Which of the following techniques should you use?

A. If-Then
B. Looping
C. Environmental variables
D. Comment syntax

B. Looping

A technician just finished scripting sequence of code and saved the file as a .sh. What system is the technician working in?

A. PowerShell
B. Linux
C. JavaScript
D. Python
E. Batch file

B. Linux

Which program enables a user to invite a technician to help repair their computer remotely?

A. Remote Desktop Connection
B. Remote Assistance
C. RDP
D. Remote connectivity

B. Remote Assistance

You have been tasked with making a command-line-based, remote connection to an Ubuntu Linux computer located on your LAN, so that you can run two scripts on it as an administrator. What protocol should you use? [Select the best answer.]

A. RDP
B. mstsc
C. SSH
D. VPN

C. SSH

You are in charge of setting up the administrators' connections to remote Windows 10 computers located at satellite offices using RDP. What are some of the ways to make the connections more secure? [Select the three best answers.]

A. Use strong passwords
B. Use OpenSSH
C. Use Network Level Authentication
D. Use PuTTY
E. Use L2TP and IKEv2

A. Use strong passwords
C. Use Network Level Authentication
E. Use L2TP and IKEv2

Recommended textbook solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Engineering Electromagnetics

8th EditionJohn Buck, William Hayt

483 solutions

Starting Out with C++ from Control Structures to Objects

8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis

1,294 solutions

Python Programming: An Introduction to Computer Science

2nd EditionJohn M Zelle

484 solutions

Sets with similar terms

A+ 220-902 Practice

80 terms

TimmyPlease

CompTIA 220-902

289 terms

jlucero12

A+

83 terms

Jennifer_Chalifoux

A+ 220-902 Part A

82 terms

marvin_cornejo

Sets found in the same folder

CompTIA A+ 220-1002 Important Facts

299 terms

dadetokunbo

CompTIA 220-1002

155 terms

jwroth

1002 Final Review Comptia A+

231 terms

chunker779

CompTIA A+ 220-1002 Practice Exam A

227 terms

prich72

Other sets by this creator

A+ Core 1 Study

14 terms

dadetokunbo

CompTIA 220-1001 Core 1 Notes

259 terms

dadetokunbo

Landscape Mode and Portrait Mode

2 terms

dadetokunbo

Spanish Basics Set

87 terms

dadetokunbo

Verified questions

COMPUTER SCIENCE

Show that using a single bit to store each vertex color suffices by arguing that the DFS procedure would produce the same result if line 3 of DFS-VISIT was removed.

Verified answer

COMPUTER SCIENCE

The selection sort algorithm could be modified to stop when the unsorted section of the list contains only one number, because that one number must be in the correct position. Show that this modification would have no effect on the number of comparisons required to sort an n-element list.

Verified answer

COMPUTER SCIENCE

True/False: A function definition is a sequence of statements that defines a new command.

Verified answer

COMPUTER SCIENCE

Write a function that accepts a pointer to a C-string as an argument and displays its contents backward. For instance, if the string argument is “ Gravity” the function should display “ ytivarG”. Demonstrate the function in a program that asks the user to input a string and then passes it to the function.

Verified answer

Other Quizlet sets

AP HUG CH4

36 terms

lbogner4

Chapter 12

18 terms

Carolina_Pauta

Maryland Licensing

38 terms

Ziad_Ghossein

Praxis Prep: Language Development

87 terms

j496a767

Related questions

QUESTION

to avoid stock outs manufacturers might carry extra raw materials. this is known as safety stock

3 answers

QUESTION

What was the most widely used personal computer application until the mid-90s?

3 answers

QUESTION

What is the maximum amount of RAM supported by Microsoft Windows 7 Enterprise 64-bit [x64]?

2 answers

QUESTION

A... protects a computer or network from unauthorized access via open ports.

3 answers

What score do you need to pass a+ 1002?

Passing scores: The passing score for the Core 2 exam is 700 [on a scale of 100 to 900]. This equates to 75% of the exam to pass. A lot of candidates choose to take practice exams and try to score 85% or higher when preparing to take the CompTIA A+ 1002 exam.

What is the single biggest social mistake a tech can make at a job site?

What is the single biggest social mistake a tech can make at a job site? Options are : Get angry.

What type of condition and device does root checker basic report on?

What type of condition and device does Root Checker Basic report on? Explanation: Root Checker Basic is a free app. that produces a report showing whether an Android device has been rooted or not.

Which of the following would you choose to track inventory that are on pallets in your company's warehouse?

Which of the following would you choose to track inventory that are on pallets in your company's warehouse? RFID tags offer the most accurate tracking method of the choices provided.

Chủ Đề