CompTIA A+ 220-1002 - Prep Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1442 | Total Attempts: 6,630,300
| Attempts: 236
SettingsSettings
Please wait...
  • 1/79 Questions

    A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of up-time in case of extreme weather conditions. Which of the following should a technician recommend?

    • UPS (Uninterruptible Power Supply)
    • Surge protector
    • Power strip
    • Power distribution unit
Please wait...
About This Quiz

CompTIA A+ 220-1002 - Prep Quiz - Quiz

Quiz Preview

  • 2. 

    Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

    • SSO

    • Permission propagation

    • Inheritance

    • MFA

    Correct Answer
    A. SSO
    Explanation
    *##*SSO (Single-Sign On) is the only option that allows an end-user to enter the same username and password once to use for multiple applications.*##*Permission propagation, Inheritance, and MFA (Multi-Factor Authentication) do not offer this option.

    Rate this question:

  • 3. 

    A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?

    • Guest

    • Administrator

    • Power User

    • Remote Desktop User

    Correct Answer
    A. Guest
    Explanation
    The Administrator and Power User privilege are too much for these users and Remote Desktop User doesn't apply here. Guest is the most likely option.

    Rate this question:

  • 4. 

    An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

    • Untrusted software

    • Outdated antivirus

    • MDM policies

    • Inactive VPN

    Correct Answer
    A. Inactive VPN
    Explanation
    An Inactive VPN is the MOST likely item to inhibit a remote worker.

    Rate this question:

  • 5. 

    Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

    • Put on an ESD strap.

    • Place components on an ESD mat

    • Disconnect the power before servicing the PC

    • Place the PC on a grounded work bench

    Correct Answer
    A. Disconnect the power before servicing the PC
    Explanation
    While none of these options are bad, you should not work in a PC still receiving power. That's the absolute first thing to do!

    Rate this question:

  • 6. 

    Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

    • There is unauthenticated wireless connectivity

    • She has exceeded the data allowance

    • The phone is only 3G capable

    • It is an unrooted phone

    • The SIM card was not activated

    • A data plan was not purchased

    Correct Answer
    A. There is unauthenticated wireless connectivity
    Explanation
    Ann is experiencing unauthenticated wireless connectivity. The presence of a "?" in the radio icon suggests that the phone is connected to the public hotspot, but it is not able to authenticate and establish a proper connection. This is why she is unable to access the internet and sees the "page cannot be displayed" message.

    Rate this question:

  • 7. 

    A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?

    • Reboot into safe mode and roll back the updates

    • Repair the Windows Registry

    • Disable Windows services and applications

    • Configure boot options in the BIOS

    Correct Answer
    A. Reboot into safe mode and roll back the updates
    Explanation
    After restarting the computer and finding that the OS still does not load, the technician should attempt to reboot into safe mode and roll back the updates. This is because the black screen issue could be caused by a recent patch or update that is incompatible with the system. By booting into safe mode, the technician can access the system with minimal drivers and services, allowing them to uninstall or roll back the problematic update. This can potentially resolve the issue and allow the OS to load properly. Repairing the Windows Registry, disabling Windows services and applications, or configuring boot options in the BIOS may not directly address the issue of the OS not loading after a recent update.

    Rate this question:

  • 8. 

    A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use?

    • Network installation

    • Clean install

    • In-place upgrade

    • Image deployment

    Correct Answer
    A. In-place upgrade
    Explanation
    An in-place upgrade is the appropriate method for the technician to use in this scenario. This method allows the technician to install the latest OS without affecting the user's settings and files. It essentially upgrades the existing OS to the latest version while preserving all the user's data and configurations. This ensures a seamless transition for the user without the need to reconfigure settings or restore files from a backup.

    Rate this question:

  • 9. 

    A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

    • Logon times

    • User access control

    • Date and time

    • UEFI boot mode

    Correct Answer
    A. Date and time
    Explanation
    Making sure the date and time are correct is how the computer knows if a certificate is expired or not. None of these options would interfere in this process as much as an un-adjusted date and time.

    Rate this question:

  • 10. 

    A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following operating systems should the technician recommended to ensure the BEST performance on this computer?

    • Windows 7

    • Windows 8

    • Windows 8.1

    • Windows 10

    Correct Answer
    A. Windows 7
    Explanation
    This is a question meant to trick you into thinking it's a specifications issue. Technically, the user's Windows XP machine meets the minimum 32bit requirements for all 4 versions of Windows. However, it says "upgrade" not Clean Install.
     

    There is not a direct option to upgrade to Windows 8+. But there is an option to upgrade to Windows 7. The difference between upgrading and a clean install would be the loss of files and settings. 


     

    Rate this question:

  • 11. 

    A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?

    • Open license

    • Personal license

    • Corporate license

    • Enterprise license

    Correct Answer
    A. Open license
    Explanation
    An Open License is the only license that is free.

    Rate this question:

  • 12. 

    A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

    • System

    • Display

    • Folder Options

    • Indexing Options

    Correct Answer
    A. Folder Options
    Explanation
    The technician should use the "Folder Options" utility in the Control Panel. This utility allows the user to customize various settings related to folders and files, including the ability to view and modify protected system files. By enabling the option to show hidden files and folders, the technician will be able to locate and edit the protected .dll file that they need.

    Rate this question:

  • 13. 

    An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

    • Phishing

    • Spear phishing

    • Dumpster diving

    • Impersonation

    Correct Answer
    A. Dumpster diving
    Explanation
    Dumpster diving is exactly how it sounds. The individual looks in your waste to find material.

    Rate this question:

  • 14. 

    After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

    • Gpupdate

    • Diskpart

    • Gpresult

    • Net use

    Correct Answer
    A. Gpupdate
    Explanation
    The question is which CMD tool allows a technician to apply a new policy. The only option here that can do that is gpupdate which stands for for group policy update.

    Rate this question:

  • 15. 

    A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?

    • System memory

    • Surge protector

    • Hard drives

    • Battery backup

    Correct Answer
    A. Battery backup
    Explanation
    If the battery backup went down during an outage, then that would directly explain the missing time and seemingly the corrupted files/backups.

    Rate this question:

  • 16. 

    Which of the following is the maximum RAM limit of a Windows 32-bit version?

    • No limit

    • 4GB

    • 8GB

    • 32GB

    Correct Answer
    A. 4GB
    Explanation
    All 32-bit systems have a maximum RAM of 4GBs, often less.

    If you're a massive nerd saying " well you can use a PAE (Physical Adddress Extension to access up to 64GBs), that's cool and all but unless you're running Windows Server then any other copy of Windows won't support PAE.

    Rate this question:

  • 17. 

    A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

    • Delete the user accounts

    • Disable the user accounts

    • Restrict the user accounts

    • Reset the user accounts

    Correct Answer
    A. Disable the user accounts
    Explanation
    Disabling the user accounts would be the best way to enforce the company's security policy. By disabling the user accounts, the contractors will not be able to log in to the laptops after the inventory is completed, ensuring that they cannot access the laptops until the next inventory. Deleting the user accounts would permanently remove them, which may not be necessary if the contractors will be returning for future inventories. Restricting the user accounts may still allow contractors to log in but with limited access, which does not align with the policy. Resetting the user accounts would only reset the passwords, but the contractors would still be able to log in.

    Rate this question:

  • 18. 

    A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

    • Air filters

    • Privacy screens

    • Vacuums

    • ESD mats

    Correct Answer
    A. Air filters
    Explanation
    During construction, there is likely to be a lot of dust and debris in the air, which can be harmful to the sensitive equipment in a server room. Using air filters at the site will help to remove these particles from the air, ensuring a clean and safe environment for the servers. This will help to prevent any damage or malfunctions that could be caused by the dust and debris. Therefore, air filters are necessary while setting up the temporary server room during construction.

    Rate this question:

  • 19. 

    Which of the following provide the BEST security for a server room? (Select two.)

    • Bollard

    • Badge reader

    • Cable lock

    • Biometric lock

    • Privacy window shades

    • USB token

    Correct Answer(s)
    A. Badge reader
    A. Biometric lock
    Explanation
    Compared to the other options, a Badge Reader and Biometric lock would be the most secure. both would identify the specific user and combined, they would make it even harder to gain access.

    Rate this question:

  • 20. 

    A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

    • Telnet

    • SSH

    • RDP

    • VNC

    Correct Answer
    A. SSH
    Explanation
    SSH (Secure Shell) is the correct answer because it provides a secure and encrypted method for accessing network devices such as switches and routers. Unlike Telnet, which sends data in clear text, SSH encrypts the data, making it more secure against unauthorized access or eavesdropping. RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are used for remote desktop access and control, but they are not typically used for managing network devices. Therefore, SSH is the most appropriate choice for securely accessing the devices in this scenario.

    Rate this question:

  • 21. 

    Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

    • 2GB

    • 4GB

    • 8GB

    • 16GB

    Correct Answer
    A. 4GB
  • 22. 

    A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

    • Politely ask the user to call back

    • Ask another technician to take the call

    • Troubleshoot the issue for the user

    • Input the issue as a ticket and escalate to Tier 2

    • Put the user on hold and troubleshoot after the scheduled break

    Correct Answer
    A. Ask another technician to take the call
    Explanation
    You want to perform to the best of your ability while meeting the obligations of your workplace. The best option is to have another technician that is available.

    Rate this question:

  • 23. 

    A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

    • Fingerprint lock

    • Passcode lock

    • Swipe lock

    • PIN lock

    Correct Answer
    A. Fingerprint lock
    Explanation
    *##*Fingerprint Locking is the most secure of these 4 options. Biometric security makes it harder while the other options can be brute forced or provide no security.*##*Swipe lock doesn't provide any security.

    A PIN can be brute forced easily

    A passcode is secure to a point, but it's not as secure as a biometric lock.

    Rate this question:

  • 24. 

    A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

    • Activate real-time protection on both antivirus software programs

    • Uninstall one antivirus software program and install a different one

    • Run OS updates

    • Enable the quarantine feature on both antivirus software programs

    • Remove the user-installed antivirus software

    Correct Answer
    A. Remove the user-installed antivirus software
    Explanation
    Installing multiple real-time protection antivirus software programs can cause conflicts and slow down the performance of the laptop. Removing the user-installed antivirus software will eliminate any conflicts and improve the performance of the laptop.

    Rate this question:

  • 25. 

    Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

    • Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot

    • Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one

    • Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

    • Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

    Correct Answer
    A. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
    Explanation
    The technician should ask more open-ended questions to try and narrow down the issue. By asking specific questions, the technician can gather more information and potentially identify the problem more efficiently. This approach can help save time by avoiding unnecessary troubleshooting steps that have already been tried by the customer. It also shows the technician's commitment to resolving the issue and addressing the customer's concerns.

    Rate this question:

  • 26. 

    In which of the following file extension types would a user expect to see the command. “net use T:\\server\files’?

    • .bat

    • .vbs

    • .js

    • .py

    Correct Answer
    A. .bat
    Explanation
    "net use" is a command that you would see in a .bat script or more specifically, CMD prompt.

    Rate this question:

  • 27. 

    Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?

    • Single-factor

    • Multifactor

    • RADIUS

    • TACACS

    Correct Answer
    A. Single-factor
    Explanation
    Any other option besides Single-factor means there is another point asking the end user for authentication or authorization. But since there isn't, then single-factor is the only option.

    Rate this question:

  • 28. 

    A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

    • Sudo

    • Chmod

    • Grep

    • Pwd

    Correct Answer
    A. Sudo
    Explanation
    The correct answer is "sudo". The sudo command in Linux allows a user to run programs with the security privileges of another user, typically the superuser or root. By using sudo, the junior Linux system administrator can gain the necessary permissions to update the system software.

    Rate this question:

  • 29. 

    A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

    • SSD

    • Optical Drive

    • Flash Drive

    • PXE

    Correct Answer
    A. PXE
    Explanation
    The correct answer is PXE. PXE stands for Preboot Execution Environment, which is a boot method that allows computers to boot from a network instead of a local storage device like an SSD, optical drive, or flash drive. In this scenario, since the technician only has one disc for the installation, they choose to upgrade over the network using PXE to initiate the upgrade process on multiple machines.

    Rate this question:

  • 30. 

    Which of the following is considered governmentregulated data?

    • PII

    • End-user license agreement

    • Digital Millennium Copyright Act

    • DRM

    Correct Answer
    A. PII
    Explanation
    PII, or Personally Identifiable Information, is considered government-regulated data because it refers to any information that can be used to identify an individual, such as their name, social security number, or address. Governments often have regulations in place to protect the privacy and security of PII, as its misuse can lead to identity theft or other forms of harm. Therefore, PII is subject to government regulations and organizations handling such data are required to comply with specific security and privacy standards.

    Rate this question:

  • 31. 

    A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

    • Task Manager

    • MSTSC

    • MSConfig

    • PerfMon

    Correct Answer
    A. Task Manager
    Explanation
    The technician can use Task Manager to resolve the issue. Task Manager allows the technician to view and manage the running processes and applications on the laptop. By closing unnecessary or resource-intensive applications, the technician can reduce the CPU utilization and improve the laptop's performance. However, since the issue persists the next day, there may be underlying factors causing the high CPU utilization that need to be further investigated.

    Rate this question:

  • 32. 

    A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

    • Time Machine

    • Snapshot

    • System Restore

    • Boot Camp

    Correct Answer
    A. Time Machine
  • 33. 

    Which of the following technologies is used by malicious employees to obtain user passwords?

    • Main-in-the-middle

    • Phishing

    • Tailgating

    • Shoulder surfing

    Correct Answer
    A. Shoulder surfing
    Explanation
    Shoulder surfing is a technique used by malicious employees to obtain user passwords. It involves the act of looking over someone's shoulder while they are entering their password, in order to gain unauthorized access to their accounts. This method allows the malicious employee to easily observe and memorize the password without the victim's knowledge. It is a form of social engineering attack that exploits human vulnerabilities and lack of awareness about the surroundings.

    Rate this question:

  • 34. 

    Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

    • UPS

    • Server rack

    • Desktop printer

    • Patch panel

    • Modem

    Correct Answer(s)
    A. UPS
    A. Server rack
    Explanation
    UPS (Uninterruptible Power Supply) and server racks are both devices that are commonly used in data centers or server rooms where the grounding of electrical equipment is crucial for safety and proper functioning. UPS devices often have grounding wires to ensure that any electrical faults are safely directed to the ground. Server racks also typically have grounding wires to prevent static electricity buildup and to protect sensitive equipment from electrical surges. On the other hand, desktop printers, patch panels, and modems are not typically designed with grounding wires as they are not as sensitive to electrical issues as UPS and server racks.

    Rate this question:

  • 35. 

    A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

    • Reduce the transmit power

    • Reduce the channel availably

    • Disable the DHCP server

    • Enable QoS management

    • Disable the SSID broadcast

    Correct Answer(s)
    A. Reduce the transmit power
    A. Disable the SSID broadcast
    Explanation
    To increase the security of the wireless network in a crowded building, the installation technician should perform two actions. Firstly, reducing the transmit power will limit the range of the wireless signal, making it harder for unauthorized users outside the office to connect to the network. Secondly, disabling the SSID broadcast will prevent the wireless network from being easily detected by potential attackers, as the network name will not be visible in the list of available networks. These two measures together help to minimize the chances of unauthorized access and enhance the overall security of the wireless network.

    Rate this question:

  • 36. 

    A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?

    • Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS

    • Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

    • Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode

    • Send a test email, open a command prompt to check the file system, and empty the browser cache

    Correct Answer
    A. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
    Explanation
    *##*Updating the antivirus software, running a scan, verifying the browser settings are correct along with the hosts file and checking all email settings will provide a better resolution to the problem than changing more settings.*##*What's being described here is a connection issue. Modifying the BIOS and changing the OS is a leap but also not relevant to the immediate issue of the internet. The technician found nothing wrong with the CPU, only slow loading pages and periodic connections dropped.

    Sending a test email, running a file system check, and emptying the browser cache isn't necessarily wrong but doesn't seem like something that will resolve the problem.

    Rate this question:

  • 37. 

    A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error?

    • The computer has GRUB Legacy installed

    • Windows Startup services are not running

    • An incompatible partition is marked as active

    • An unsupported version of Windows is installed

    Correct Answer
    A. An incompatible partition is marked as active
    Explanation
    An incompatible partition being marked as active is the most likely cause of the error "No OS found" after installing a secondary OS. When a partition is marked as active, the computer looks for an operating system in that partition during boot. If the partition contains an incompatible OS or no OS at all, the error message is displayed. In this case, the technician has confirmed that the boot.ini file is correct, ruling out other potential causes such as GRUB Legacy, Windows Startup services, or an unsupported version of Windows.

    Rate this question:

  • 38. 

    Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed?

    • NTLDR not found

    • No boot device available

    • Operating system not found

    • BIOS ROM checksum error

    Correct Answer
    A. No boot device available
    Explanation
    The message "No boot device available" will be displayed. This message indicates that the computer is unable to find any device from which it can boot the operating system. Since the hard drive is not recognized, the computer cannot access the necessary files to start up. This could be due to a faulty hard drive or a problem with the connection between the hard drive and the motherboard.

    Rate this question:

  • 39. 

    A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

    • Internet Options – Advanced

    • Internet Options – Security

    • Internet Options – Content

    • Internet Options – Connections

    • Internet Options – Privacy

    Correct Answer
    A. Internet Options – Connections
  • 40. 

    Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?

    • Frequently restore the servers from backup files and test them

    • Configure the backups to restore to virtual machines for quick recovery

    • Set up scripts that automatically rerun failed backup jobs

    • Store copies of the backups off-site in a secure data-center

    • Set up alerts to let administrators know when backups fail

    Correct Answer
    A. Set up alerts to let administrators know when backups fail
    Explanation
    Joe can set up alerts to let administrators know when backups fail in order to ensure that the backups will work if needed. This will allow the administrators to take immediate action and address any issues or errors with the backups, ensuring that they are functioning properly and can be relied upon for recovery if necessary. By being alerted to backup failures, the IT department can promptly troubleshoot and resolve any problems, minimizing the risk of data loss and maximizing the effectiveness of the backup plan.

    Rate this question:

  • 41. 

    With which of the following types is a man-in-the-middle attack associated?

    • Brute force

    • Spoofing

    • DDoS

    • Zero-day

    Correct Answer
    A. Spoofing
    Explanation
    A MITM attack is done using spoofing to mask the attacker as someone trusted.

    Rate this question:

  • 42. 

    A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.)

    • WPA

    • WPA2

    • WEP

    • TKIP

    • RADIUS

    • Multifactor

    • TACACS

    • SSO

    Correct Answer(s)
    A. WPA2
    A. Multifactor
    Explanation
    Of all these options, WPA2 on a SOHO router is the most secure. Combined with Multifactor Authentication, it meets all the needs of the user.

    And before you ask...RADIUS is for remote users and TACACS is an outdated alternative to Radius.

    Rate this question:

  • 43. 

    A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

    • Image deployment

    • Multiboot configuration

    • In-place upgrade

    • System repair

    Correct Answer
    A. Image deployment
    Explanation
    The technician is most likely performing image deployment on the computer. PXE booting is a method that allows a computer to boot from a network instead of a local hard drive. This is commonly used for deploying operating system images to multiple computers simultaneously. Therefore, the technician is likely using PXE booting to deploy an image onto the computer.

    Rate this question:

  • 44. 

    A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Which of the following should be changed to resolve this issue?

    • Privacy - Maps

    • Display - Brightness

    • Storage - Photos

    • Mail - Work

    Correct Answer
    A. Display - Brightness
    Explanation
    The correct answer is Display - Brightness. The user's mobile device is losing battery life rapidly and feeling warm to the touch, which indicates that the display brightness may be set too high. Higher display brightness consumes more battery power and generates more heat. By reducing the display brightness, the device will consume less power and generate less heat, thereby resolving the issue.

    Rate this question:

  • 45. 

    Which of the following devices provides protection against brownouts?

    • Battery backup

    • Surge suppressor

    • Rack grounding

    • Line conditioner

    Correct Answer
    A. Battery backup
    Explanation
    *##*Most battery backups usually have a built in Surge Suppressor/Protector. And would be the most effective with dips in power such as brownouts.*##*Any option besides Battery Backup won't help against brownouts.

    Rate this question:

  • 46. 

    A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

    • Default SSID

    • MAC filtering

    • Power Levels

    • Content Filtering

    • Firewall

    Correct Answer
    A. Power Levels
    Explanation
    The correct answer is "Power Levels" because by adjusting the power levels of the wireless network, the small business can limit the range of the network signal. This will make it more difficult for the nearby company to connect and use the wireless connection without permission. By reducing the power levels, the network signal will be weaker and have a shorter range, making it more localized to the small business premises.

    Rate this question:

  • 47. 

    Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

    • Driver detection

    • Metro Interface

    • Account Control

    • PXE Installation

    Correct Answer
    A. Driver detection
    Explanation
    The feature that has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process is driver detection. In Windows 10, the operating system has improved driver compatibility and the ability to automatically detect and install drivers for hardware devices, reducing the need for manual driver installation and making the overall installation process more streamlined and user-friendly.

    Rate this question:

  • 48. 

    A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)

    • Dir

    • Chkdsk

    • Dism

    • Ipconfig

    • Format

    • Diskpart

    Correct Answer(s)
    A. Chkdsk
    A. Dism
    Explanation
    chkdsk is short for "Check Disk" and dism stands for "Deployment Image Servicing and Management"

    • Dir would show a targeted directory and folders within
    • Ipconfig would show the ip configuration for that device
    • Format would format a disk
    • diskpart would create a disk partition

    Of these choices, chkdsk and dism are the only two that perform some measure of troubleshooting tasks related to the mentioned issue.

    Rate this question:

  • 49. 

    A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?

    • Enable System Restore and create a restore point so no data is lost

    • Educate the user about how to avoid malware in the future

    • Update the antivirus software and run a full system scan

    • Move the infected system to a lab with no network connectivity

    Correct Answer
    A. Move the infected system to a lab with no network connectivity
    Explanation
    Identify malware symptoms. << Technician DID THIS
    Quarantine infected systems. << THIS IS what the Technician should do next.
    Disable System Restore.
    Re-mediate: Update antivirus.
    Re-mediate: Scan and remove.
    Schedule scans and run updates.
    Educate the end user.


    "Im the Quirky Dr. of the USS Enterprise"

    Rate this question:

Quiz Review Timeline (Updated): Oct 11, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 11, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 11, 2020
    Quiz Created by
    Catherine Halcomb

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.